Show/hide contentOpenClose All
Curricular information is subject to change
On completion of this module, students will be able to:
• Evaluate and apply cybersecurity frameworks
• Explain how cyber technologies work and how attacks are mitigated
• Evaluate the impact of cybersecurity technologies on society
• Evaluate and measure enterprise cybersecurity risks
• Identify and evaluate criteria for cybersecurity technology procurement and implementation
• Debate ethical and social values for emerging technologies, surveillance, and privacy
• Practice teamwork and leadership skills
“Defining the Cybersecurity Challenge”
“Meeting the Cybersecurity Challenge”
“Enterprise Cybersecurity Architecture”
“Implementing Enterprise Cybersecurity”
“Operating Enterprise Cybersecurity”
“Building an Effective Defense”
“Responding to Incidents”
“Managing a Cybersecurity Crisis”
“Assessing Enterprise Cybersecurity”
“Measuring a Cybersecurity Program”
“Mapping Against Cybersecurity Frameworks”
“Managing an Enterprise Cybersecurity Program”
“Looking to the Future”
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Specified Learning Activities | 24 |
Autonomous Student Learning | 24 |
Total | 72 |
Not applicable to this module.
Description | Timing | Component Scale | % of Final Grade | ||
---|---|---|---|---|---|
Continuous Assessment: Choose your own adventure (10%) News discussion (10%) Mid-term exam (30%) Essay topic selection (10%) Peer Supported Individual Essay (40%) |
Throughout the Trimester | n/a | Graded | No | 100 |
Resit In | Terminal Exam |
---|---|
Spring | Yes - 2 Hour |
• Feedback individually to students, post-assessment
• Group/class feedback, post-assessment
Feedback provided directly for individual assignment, collectively for group assignment. Quizzes and exams will be marked and you will receive feedback individually.
Name | Role |
---|---|
Dr Quinn Dupont | Lecturer / Co-Lecturer |