Learning outcome |
1.1Strategy and planning |
1.2Security and privacy |
1.3Governance, risk and compliance |
1.4Advice and guidance |
2.5Change implementation |
2.6Change analysis |
2.7Change planning |
3.8Systems development |
3.9Data and analytics |
3.10User experience |
3.11Content management |
3.12Computational science |
4.13Technology management |
4.14Service management |
4.15Security services |
5.16People management |
5.17Skills management |
6.18Stakeholder management |
6.19Sales and marketing |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A1<p>Apply initiative and judgment to adapt algorithms to diverse contexts of cyber risks.</p> |
|||||||||||||||||||
A2<p>Research and interpret appropriate solution developments for cyber security.</p> |
|||||||||||||||||||
K1<p>Articulate the importance and privacy and ethical implications of cyber data analytics for threat detection, incident response and prevention.</p> |
|||||||||||||||||||
K2<p>Investigate information from domains, external datasets, transport layer security/secure sockets layer certificates.</p> |
|||||||||||||||||||
K3<p>Discuss the implementation of cyber space intelligence through clustering, classification, prediction and association rule mining.</p> |
|||||||||||||||||||
K4<p>Explore the usages of open-source and proprietary tools for computational cyber space data analytics.</p> |
|||||||||||||||||||
K5<p>Evaluate computational data analytic skills in tactical and operational level of threat detection intelligence.</p> |
|||||||||||||||||||
S1<p>Identify and create intelligence requirements through practices such as threat modeling.</p> |
|||||||||||||||||||
S2<p>Discover the different sources in cyber space to integrate adversary data for incident analytics.</p> |
|||||||||||||||||||
S3<p>Develop threat intelligence to detect, forecast, and respond to targeted attacker or victim.</p> |
|||||||||||||||||||
S4<p>Generate association rules to help with incident response and security operations.</p> |
|||||||||||||||||||
S5<p>Apply system logs filtering to identify abnormal usage of system resources.</p> |
Learning outcome |
1.1ICT Fundamentals |
1.2ICT Infrastructure |
1.3Information & Data Science and Engineering |
1.4Computational Science and Engineering |
1.5Application Systems |
1.6Cyber Security |
1.7ICT Projects |
1.8ICT Management and Governance |
2.1Professional ICT Ethics |
2.2Impacts of ICT |
2.3Working Individually and in ICT development teams |
2.4Professional Communication |
2.5The Professional ICT Practitioner |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A1<p>Apply initiative and judgment to adapt algorithms to diverse contexts of cyber risks.</p> |
|||||||||||||
A2<p>Research and interpret appropriate solution developments for cyber security.</p> |
|||||||||||||
K1<p>Articulate the importance and privacy and ethical implications of cyber data analytics for threat detection, incident response and prevention.</p> |
|||||||||||||
K2<p>Investigate information from domains, external datasets, transport layer security/secure sockets layer certificates.</p> |
|||||||||||||
K3<p>Discuss the implementation of cyber space intelligence through clustering, classification, prediction and association rule mining.</p> |
|||||||||||||
K4<p>Explore the usages of open-source and proprietary tools for computational cyber space data analytics.</p> |
|||||||||||||
K5<p>Evaluate computational data analytic skills in tactical and operational level of threat detection intelligence.</p> |
|||||||||||||
S1<p>Identify and create intelligence requirements through practices such as threat modeling.</p> |
|||||||||||||
S2<p>Discover the different sources in cyber space to integrate adversary data for incident analytics.</p> |
|||||||||||||
S3<p>Develop threat intelligence to detect, forecast, and respond to targeted attacker or victim.</p> |
|||||||||||||
S4<p>Generate association rules to help with incident response and security operations.</p> |
|||||||||||||
S5<p>Apply system logs filtering to identify abnormal usage of system resources.</p> |