Security and Data Protection

Term: 
Winter
Credits: 
1.0
Status: 
Elective
Course Description: 

The main objectives of Security and Data Protection course may be summarised as:

  • Giving an overview about the role of CISO (Chief Information Security Manager)
  • Helping to designing an IT security policy (how to collaborate with customer and suppliers, how to align with the needs of the business.)
  • Helping to ensure compliance with the IT security standards.
  • Explaining the role of the risk management systems.
  • Teaching how to be proactive and evaluate in advance the security risks that may arise from changes made to the infrastructure, new lines of business, etc.

 

* detailed information about the course is available on the e-learning site of the Program

Learning Outcomes: 

Core Learning Area          

Learning Outcome                                            

Interpersonal Communication Skills.        

Students will be able to communicate about the role and responsibility of IT security issues also with IT managers and also with business managers.

Technology Skills               

Students will get an overview about today’s IT security standards and also about best-of -breed IT security tools.

Cultural Sensitivity and Diversity                            

Students will have increased  understanding about the relevance of diversities of IT security policies in different countries.

Quantitative Reasoning 

Students will learn how to deal with business and IT security trade off.

Critical Thinking               

Students will be encouraged to question the necessity of an IT/IT security investment and also to encourage the implementation of the must have IT security.

Ethics and Responsibility                    

Students will be motivated to consider the business limitations of IT security.   

 Management Knowledge and Skills                            

Non-specialist managers will have a clear understanding of the necessity and role of the IT security in enterprises.

Assessment: 

The course grade will be based on a number of different evaluation elements.

  • Class attendance and participation: 
40%
  • Minute paper (one time, at last session, 30 minutes, 5 questions):
30%
  • Homework (preparing and presenting one TED like presentations about a relevant IT security topic) 30%

 

Grades

 %

A

Outstanding

 96-100

A–

Excellent

90-95

B+

Very good

85-89

B

Good

80-84

B–

Satisfactory

75-79

C+

Minimum Pass

60-74

F

Fail

0-59

 

The above table serves as a generic example of the scaling applied: in line with the CEU grading policies the instructor reserves the right to adjust the scale, that is, to grade on a "curve", should he find that significantly more than the usual number of students would not pass the course under the indicated grading scale or should the distribution of the grades represent an unrealistic pattern.