About the course
The course is divided into three substantive sections: information security and reducing risk; cyber vulnerabilities; and cybersecurity and cyberterrorism.
By the end of the course, students should be able to
- Ascertain what information should be regarded as security sensitive
- Recognise the need to protect information from unauthorised disclosure
- Recognise methods used to protect security sensitive information
- Identify the most common breaches of information security
- Develop, review, monitor and audit a Cyber Security Plan (CSP)
- Recognise key aspects of cyberterrorism and cyber attacks
- Recognise key challenges in fighting cyber terrorists and cyber attacks and demonstrate insight into cyberterrorism tools, techniques and methodologies
- Outline and discuss the key characteristics of cyber warfare, cyber attacks and ways to counter them.