ONLINE
COURSE AIMS & OBJECTIVES, KEY SKILLS AND LEARNING OUTCOMES
Course Aims & Objectives:
This course intents to provide professionals in contemporary public and private organizations the necessary understanding of cyber security threats, their impact and the way to respond to them from different organizational perspectives. This course is suitable to employees, operational and strategic managers to enable them to work hand in hand with IT departments and security experts towards a secured business systems and data.
The course will help participants understand what cyber threats are, how we secure digital infrastructure and how it is different from information systems security. Participants will acquire an understanding of how securing digital spaces is a crucial part of business resilience and operation continuity. The course will enable participants to develop the confidence and the skills needed to define security threats, vulnerabilities in business digital infrastructure and learn approaches to tackle them methodologically and technically.
Desired Outcomes: On successful completion, participants should be able to:
- Identify and understand different types of cyber security threats
- Plan to respond to these threats
- Start designing for security when thinking about IT systems and data
- Apply good practices in planning for systems security and threats handling
- Increase the awareness of legal and regulatory frameworks relevant to data and systems use
Learning Method & Delivery Format
Course material, in the form of handouts, will be shared 3 days in advance and this includes lecture notes (PDF), slides (PPTX), datasets and Python codes. All material will be shared via Dropbox. The course would be delivered via Zoom over 3 days – 6-hour sessions. Each interactive session will provide a combination of discussion and hands-on applications. All participants are encouraged to participate actively in class discussions.
Course Prerequisites
Basic computer and mobile using. Basic security knowledge preferable but not a must.
Who Should Attend?
- Post-doc students
- Traders
- Strategists.
- Risk Managers
- Consultants.
- Units and operation managers
Course Content
DAY 1:
- Introduction to Cyber Security in contemporary organisations
- Who wants to compromise information? How do they do it?
- Cyber security and Enterprise Resilience (Business perspective and motivation)
- How can we begin to analyze how an enterprise works with IT?
- State of the art security and protection
- End users and managerial perspectives on Cyber Security
- Managerial and strategic issues for enterprise resilience.
DAY 2:
- Security for Critical Infrastructure
- Security risks and assessments for BYOD
- Cloud systems security
- Cryptography and blockchain
- Data (small/big) protection
- Other emerging technologies (autonomous vehicles, IoTs and AI) opportunities & vulnerabilities
- Use cases from public and private sectors
DAY 3:
- Threats, impacts, assessment framework and mitigation
- Cyber risk management
- Corporate responsibility, risk, compliance, legal issues
- Legislations, policies and standards for information security and protection
- National and European legal frameworks and regulation. Industry standards, accreditation and training
- IT governance and standards
- Scenarios planning/analysis for four different Cyber Security challenges
COURSE Instructor
Dr. Amjad Fayoumi is a Senior Lecturer in Information Systems (IS) and a member of the Department of Management Science at Lancaster University Management School. He is researching in the information systems area focusing on digital business, enterprise systems modelling and simulation. Dr. Fayoumi has earlier industrial experience, as he worked previously in ICT consultancy for few years. Dr. Fayoumi is currently a member of several international professional associations.