This course gives overview for various aspects for cyber-security policy development, governance structures, policy selection and implementation, auditing, and control mechanisms to assure compliance and efficacy. In addition, the students will learn about various legal considerations involved in formulating and managing such policies, cybercrime, intellectual property, cyberwarfare, and the homeland security (i.e., critical infrastructure protection). They will also be exposed to various technical issues that can be utilized in developing effective national and international policies related to cyberspace. It covers how to analyze policies thoroughly, identify their weaknesses, then compare and contrast them, and recognize the significance of training and compliance in information security risk management. The course highlights the transdisciplinary impacts and issues that must be addressed in designing or putting into practice successful national cybersecurity laws and policies.
Undergraduate 132 CRs
Krag Brotby, Information Security Governance: A Practical Development and Implementation Approach, Wiley
Trim, Peter and Yang-Im Lee, Cyber Security Management: A Governance, Risk and Compliance Framework, Routledge
content serial | Description |
---|
1 | Course Aim, Course outline, and governance overview |
2 | Security Governance and Regulation |
3 | Cybersecurity and the GDPR |
4 | Risk management and information security outcomes |
5 | The SABSA framework and methodology |
6 | 7th week Assessment |
7 | Know about COBIT management framework |
8 | Know ISO/IEC 27001/ 27002 |
9 | What is risk management? |
10 | Developing a security strategy |
11 | 12th week Assessment |
12 | What is bitcoin and its usage, and why they are volatile |
13 | Using CMM for strategy development |
14 | Incident management and response metrics |
15 | A case study including a sample strategy development |
Start your application