Learning outcome |
1.1Strategy and planning |
1.2Security and privacy |
1.3Governance, risk and compliance |
1.4Advice and guidance |
2.5Change implementation |
2.6Change analysis |
2.7Change planning |
3.8Systems development |
3.9Data and analytics |
3.10User experience |
3.11Content management |
3.12Computational science |
4.13Technology management |
4.14Service management |
4.15Security services |
5.16People management |
5.17Skills management |
6.18Stakeholder management |
6.19Sales and marketing |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A1Apply the knowledge of policy development based on governance principles and strategic alignment for business objectives and investments |
|||||||||||||||||||
A2Analyse various business cases to conduct and monitor risk assessment and mitigation strategies and implement mechanisms for continuous monitoring in line with organisational strategies and compliance principles |
|||||||||||||||||||
K1Explain governance principles and their importance in the organisational strategies |
|||||||||||||||||||
K2Apply appropriate methodologies to assess and mitigate cybersecurity risks |
|||||||||||||||||||
K3Develop and apply compliance knowledge to ensure regulatory adherence |
|||||||||||||||||||
K4Integrate and align cybersecurity initiatives with organisational objectives and processes |
|||||||||||||||||||
K5Apply appropriate strategies and processes for ongoing monitoring, evaluation, and enhancement of cybersecurity GRC programs |
|||||||||||||||||||
S1Select and apply appropriate leadership, policy development, stakeholder management, and strategic alignment skills for cybersecurity governance initiatives |
|||||||||||||||||||
S2Identify cybersecurity risks and implement risk mitigation strategies and controls |
|||||||||||||||||||
S3Interpret and apply relevant cybersecurity laws, regulations, and standards and conduct compliance assessments and audits |
Learning outcome |
1.1ICT Fundamentals |
1.2ICT Infrastructure |
1.3Information & Data Science and Engineering |
1.4Computational Science and Engineering |
1.5Application Systems |
1.6Cyber Security |
1.7ICT Projects |
1.8ICT Management and Governance |
2.1Professional ICT Ethics |
2.2Impacts of ICT |
2.3Working Individually and in ICT development teams |
2.4Professional Communication |
2.5The Professional ICT Practitioner |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A1Apply the knowledge of policy development based on governance principles and strategic alignment for business objectives and investments |
|||||||||||||
A2Analyse various business cases to conduct and monitor risk assessment and mitigation strategies and implement mechanisms for continuous monitoring in line with organisational strategies and compliance principles |
|||||||||||||
K1Explain governance principles and their importance in the organisational strategies |
|||||||||||||
K2Apply appropriate methodologies to assess and mitigate cybersecurity risks |
|||||||||||||
K3Develop and apply compliance knowledge to ensure regulatory adherence |
|||||||||||||
K4Integrate and align cybersecurity initiatives with organisational objectives and processes |
|||||||||||||
K5Apply appropriate strategies and processes for ongoing monitoring, evaluation, and enhancement of cybersecurity GRC programs |
|||||||||||||
S1Select and apply appropriate leadership, policy development, stakeholder management, and strategic alignment skills for cybersecurity governance initiatives |
|||||||||||||
S2Identify cybersecurity risks and implement risk mitigation strategies and controls |
|||||||||||||
S3Interpret and apply relevant cybersecurity laws, regulations, and standards and conduct compliance assessments and audits |