Learning outcome |
1.1Strategy and planning |
1.2Security and privacy |
1.3Governance, risk and compliance |
1.4Advice and guidance |
2.5Change implementation |
2.6Change analysis |
2.7Change planning |
3.8Systems development |
3.9Data and analytics |
3.10User experience |
3.11Content management |
3.12Computational science |
4.13Technology management |
4.14Service management |
4.15Security services |
5.16People management |
5.17Skills management |
6.18Stakeholder management |
6.19Sales and marketing |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A1Develop strategic security and cyber Incident response plan |
|||||||||||||||||||
A2Create effective cyber risk and incident management policy |
|||||||||||||||||||
A3Conduct an in-depth cyber-risk assessment utilizing selected tools, and provide a rationale for the tools used based on their assessed capabilities. |
|||||||||||||||||||
K1Explain enterprise information security risk management framework and its practices. |
|||||||||||||||||||
K2Articulate the business consequences of identified information security risks. |
|||||||||||||||||||
K3Discover the relationship between the cyber security risk and business value. |
|||||||||||||||||||
K4Discuss risk control, micro safeguards, business impact analysis, and ethical and societal impacts. |
|||||||||||||||||||
K5Discuss the cyber risk landscape and cyber security metrics. |
|||||||||||||||||||
S1Identify and model information security risks. |
|||||||||||||||||||
S2Research and apply qualitative and quantitative techniques for risk assessment. |
|||||||||||||||||||
S3Evaluate and select the most appropriate analytical tools for assessing cyber risks in business continuity management, substantiating choices with research findings. |
|||||||||||||||||||
S4Analyse challenges and problems in cyber risk assessment. |
Learning outcome |
1.1ICT Fundamentals |
1.2ICT Infrastructure |
1.3Information & Data Science and Engineering |
1.4Computational Science and Engineering |
1.5Application Systems |
1.6Cyber Security |
1.7ICT Projects |
1.8ICT Management and Governance |
2.1Professional ICT Ethics |
2.2Impacts of ICT |
2.3Working Individually and in ICT development teams |
2.4Professional Communication |
2.5The Professional ICT Practitioner |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A1Develop strategic security and cyber Incident response plan |
|||||||||||||
A2Create effective cyber risk and incident management policy |
|||||||||||||
A3Conduct an in-depth cyber-risk assessment utilizing selected tools, and provide a rationale for the tools used based on their assessed capabilities. |
|||||||||||||
K1Explain enterprise information security risk management framework and its practices. |
|||||||||||||
K2Articulate the business consequences of identified information security risks. |
|||||||||||||
K3Discover the relationship between the cyber security risk and business value. |
|||||||||||||
K4Discuss risk control, micro safeguards, business impact analysis, and ethical and societal impacts. |
|||||||||||||
K5Discuss the cyber risk landscape and cyber security metrics. |
|||||||||||||
S1Identify and model information security risks. |
|||||||||||||
S2Research and apply qualitative and quantitative techniques for risk assessment. |
|||||||||||||
S3Evaluate and select the most appropriate analytical tools for assessing cyber risks in business continuity management, substantiating choices with research findings. |
|||||||||||||
S4Analyse challenges and problems in cyber risk assessment. |