Learning outcome
1.1

Strategy and planning

1.2

Security and privacy

1.3

Governance, risk and compliance

1.4

Advice and guidance

2.5

Change implementation

2.6

Change analysis

2.7

Change planning

3.8

Systems development

3.9

Data and analytics

3.10

User experience

3.11

Content management

3.12

Computational science

4.13

Technology management

4.14

Service management

4.15

Security services

5.16

People management

5.17

Skills management

6.18

Stakeholder management

6.19

Sales and marketing

A1

Synthesize the unit concepts to create a secure, resilient operational framework for a mock organizational environment.

K1

Analyze advanced threat detection methodologies that leverage network traffic analysis, endpoint data analysis, and user behavior analysis.

K2

Critically evaluate security incident response frameworks and best practices for effectively handling security incidents. 

K3

Evaluate and compare leading security operations solutions such as Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) based on their functionalities and organizational needs.

S1

Develop security monitoring strategies using advanced threat detection techniques.

Learning outcome
1.1

ICT Fundamentals

1.2

ICT Infrastructure

1.3

Information & Data Science and Engineering

1.4

Computational Science and Engineering

1.5

Application Systems

1.6

Cyber Security

1.7

ICT Projects

1.8

ICT Management and Governance

2.1

Professional ICT Ethics

2.2

Impacts of ICT

2.3

Working Individually and in ICT development teams

2.4

Professional Communication

2.5

The Professional ICT Practitioner

A1

Synthesize the unit concepts to create a secure, resilient operational framework for a mock organizational environment.

K1

Analyze advanced threat detection methodologies that leverage network traffic analysis, endpoint data analysis, and user behavior analysis.

K2

Critically evaluate security incident response frameworks and best practices for effectively handling security incidents. 

K3

Evaluate and compare leading security operations solutions such as Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) based on their functionalities and organizational needs.

S1

Develop security monitoring strategies using advanced threat detection techniques.