Home
The aim of this course is to gradually introduce students to principles, concepts and practices for governing, managing and auditing cybersecurity in accordance with international standards (i.e., International Organization for Standardization - ISO), and generally accepted professional best practices. Particular attention is given to the architecture of effective cybersecurity programs, including the elements and mechanisms that form the basis of cybersecurity management systems adopted by organizations to define scope; identify threats; assess/manage risks; select mitigating controls; self-asses security posture; provide assurance and demonstrate compliance through audits and formal certifications.
The course will enable students to analyze the logical linkages, concepts, frameworks, models pertaining to:
A combination of lectures and real case studies reviews will introduce students to the adoption of professional standards, best practices and code of ethics that define objectives and control mechanisms for establishing, governing, operating, monitoring, improving, independently auditing and certifying cybersecurity management systems.
Effective Cybersecurity: A Guide to Using Best Practices and Standards, First Edition, By William Stallings
Additional reference books: In addition to the textbook, students are encouraged to consult the following books:
Reference materials
A final written exam/homework will require students to analyze a real case cybersecurity scenario and develop a plan: Defining the relevant information assets and scope; Analyze threats; Identify and assess risks; Propose mitigating controls; and Recommend continuous improvement mechanisms.
Criteria of the assessment will include: