Learning outcome
1.1

Strategy and planning

1.2

Security and privacy

1.3

Governance, risk and compliance

1.4

Advice and guidance

2.5

Change implementation

2.6

Change analysis

2.7

Change planning

3.8

Systems development

3.9

Data and analytics

3.10

User experience

3.11

Content management

3.12

Computational science

4.13

Technology management

4.14

Service management

4.15

Security services

5.16

People management

5.17

Skills management

6.18

Stakeholder management

6.19

Sales and marketing

A1

<p>Apply initiative and judgment to adapt algorithms to diverse contexts of cyber risks.</p>

A2

<p>Research and interpret appropriate solution developments for cyber security.</p>

K1

<p>Articulate the importance and privacy and ethical implications of cyber data analytics for threat detection, incident response and prevention.</p>

K2

<p>Investigate information from domains, external datasets, transport layer security/secure sockets layer certificates.</p>

K3

<p>Discuss the implementation of cyber space intelligence through clustering, classification, prediction and association rule mining.</p>

K4

<p>Explore the usages of open-source and proprietary tools for computational cyber space data analytics.</p>

K5

<p>Evaluate computational data analytic skills in tactical and operational level of threat detection intelligence.</p>

S1

<p>Identify and create intelligence requirements through practices such as threat modeling.</p>

S2

<p>Discover the different sources in cyber space to integrate adversary data for incident analytics.</p>

S3

<p>Develop threat intelligence to detect, forecast, and respond to targeted attacker or victim.</p>

S4

<p>Generate association rules to help with incident response and security operations.</p>

S5

<p>Apply system logs filtering to identify abnormal usage of system resources.</p>

Learning outcome
1.1

ICT Fundamentals

1.2

ICT Infrastructure

1.3

Information & Data Science and Engineering

1.4

Computational Science and Engineering

1.5

Application Systems

1.6

Cyber Security

1.7

ICT Projects

1.8

ICT Management and Governance

2.1

Professional ICT Ethics

2.2

Impacts of ICT

2.3

Working Individually and in ICT development teams

2.4

Professional Communication

2.5

The Professional ICT Practitioner

A1

<p>Apply initiative and judgment to adapt algorithms to diverse contexts of cyber risks.</p>

A2

<p>Research and interpret appropriate solution developments for cyber security.</p>

K1

<p>Articulate the importance and privacy and ethical implications of cyber data analytics for threat detection, incident response and prevention.</p>

K2

<p>Investigate information from domains, external datasets, transport layer security/secure sockets layer certificates.</p>

K3

<p>Discuss the implementation of cyber space intelligence through clustering, classification, prediction and association rule mining.</p>

K4

<p>Explore the usages of open-source and proprietary tools for computational cyber space data analytics.</p>

K5

<p>Evaluate computational data analytic skills in tactical and operational level of threat detection intelligence.</p>

S1

<p>Identify and create intelligence requirements through practices such as threat modeling.</p>

S2

<p>Discover the different sources in cyber space to integrate adversary data for incident analytics.</p>

S3

<p>Develop threat intelligence to detect, forecast, and respond to targeted attacker or victim.</p>

S4

<p>Generate association rules to help with incident response and security operations.</p>

S5

<p>Apply system logs filtering to identify abnormal usage of system resources.</p>