Home

ONLINE

COURSE AIMS & OBJECTIVES, KEY SKILLS AND LEARNING OUTCOMES

Course Aims & Objectives:

This course intents to provide professionals in contemporary public and private organizations the necessary understanding of cyber security threats, their impact and the way to respond to them from different organizational perspectives. This course is suitable to employees, operational and strategic managers to enable them to work hand in hand with IT departments and security experts towards a secured business systems and data.

The course will help participants understand what cyber threats are, how we secure digital infrastructure and how it is different from information systems security. Participants will acquire an understanding of how securing digital spaces is a crucial part of business resilience and operation continuity. The course will enable participants to develop the confidence and the skills needed to define security threats, vulnerabilities in business digital infrastructure and learn approaches to tackle them methodologically and technically.

Desired Outcomes: On successful completion, participants should be able to:

  1. Identify and understand different types of cyber security threats
  2. Plan to respond to these threats
  3. Start designing for security when thinking about IT systems and data
  4. Apply good practices in planning for systems security and threats handling
  5. Increase the awareness of legal and regulatory frameworks relevant to data and systems use

Learning Method & Delivery Format

Course material, in the form of handouts, will be shared 3 days in advance and this includes lecture notes (PDF), slides (PPTX), datasets and Python codes. All material will be shared via Dropbox. The course would be delivered via Zoom over 3 days – 6-hour sessions. Each interactive session will provide a combination of discussion and hands-on applications. All participants are encouraged to participate actively in class discussions.

Course Prerequisites

Basic computer and mobile using. Basic security knowledge preferable but not a must.

Who Should Attend?

  • Post-doc students
  • Traders
  • Strategists.
  • Risk Managers
  • Consultants.
  • Units and operation managers

Course Content

DAY 1:

  • Introduction to Cyber Security in contemporary organisations
  • Who wants to compromise information? How do they do it?
  • Cyber security and Enterprise Resilience (Business perspective and motivation)
  • How can we begin to analyze how an enterprise works with IT?
  • State of the art security and protection
  • End users and managerial perspectives on Cyber Security
  • Managerial and strategic issues for enterprise resilience.

DAY 2:

  • Security for Critical Infrastructure
  • Security risks and assessments for BYOD
  • Cloud systems security
  • Cryptography and blockchain
  • Data (small/big) protection
  • Other emerging technologies (autonomous vehicles, IoTs and AI) opportunities & vulnerabilities
  • Use cases from public and private sectors

DAY 3:

  • Threats, impacts, assessment framework and mitigation
  • Cyber risk management
  • Corporate responsibility, risk, compliance, legal issues
  • Legislations, policies and standards for information security and protection
  • National and European legal frameworks and regulation. Industry standards, accreditation and training
  • IT governance and standards
  • Scenarios planning/analysis for four different Cyber Security challenges

COURSE Instructor

Dr. Amjad Fayoumi is a Senior Lecturer in Information Systems (IS) and a member of the Department of Management Science at Lancaster University Management School. He is researching in the information systems area focusing on digital business, enterprise systems modelling and simulation. Dr. Fayoumi has earlier industrial experience, as he worked previously in ICT consultancy for few years. Dr. Fayoumi is currently a member of several international professional associations.