Cyber security 2100-SPP-L-D2CYSE
This course includes real-world cybersecurity case studies: data breaches, ransomware issues, best practices in various management areas. There are also simulations and cyber games where students can play different roles during a cyber attack or other cyber issues.
Fundamental questions:
1. Is security possible? Managing risk in the information age
2. Practice cybersecurity with real-world scenarios
3. Government strategy to cybersecurity
4. Cybersecurity is not a technical problem: relevant case-studies in cyber management
Key topics:
- Cybersecurity Basics
- Identify threat actors and typical attack vectors: phishing, vishing, ransomware, social engineering, DDOS
- The role of leadership in managing cyber risk and crisis management Incident response and accountability
- Understand your technology: Identifying the best technologies to protect systems, networks, and data.
- Protect yourself: password strategy, multifactor authentication, avoiding scammers, free resources.
Course coordinators
Learning outcomes
The graduate comprehends the fundamental principles, significance, and interdependence of cyber security and its relation to other fields of science in terms of subject and methodology (K_W09).
The graduate possesses knowledge and comprehension of the behaviors that have an impact on cybersecurity, with a specific focus on those that are significant to the security of the society in which they work. Furthermore, they possess knowledge of human activities designated to secure the safe usage of tools and solutions offered by information technology (K_KK03, KK04).
The graduate can explain and utilize fundamental techniques and technologies to maintain the cyber security of IT systems and infrastructures, as well as identify the essential hardware and software components of computer systems from the perspective of dependable functionality and cyber security (K_U03, K_U04).
Assessment criteria
This course will teach you the fundamentals of cybersecurity. No technical or management expertise is required. The entire course is based on the case study method, using real and recent cases of data breaches and cybersecurity crises in well-known companies.
This method effectively promotes social skills such as collaboration, discussion, and presenting findings to other participants.
Pass points are awarded for each class. There is a google spreadsheet with the points you get. It is constantly updated. Additional points can be earned through special assignments, presentations, etc. (e.g., for making up absences).
There is no final exam.
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: