Develop leadership skills and create an effective cybsersecurity strategy
This module aims to equip participants with a comprehensive understanding of the cybersecurity landscape, including major threats, vulnerabilities, controls, and regulatory frameworks. It emphasizes the importance of governance, risk management, incident response, and maturity monitoring in creating an effective cybersecurity strategy.
Module Information
This module aims to equip participants with a comprehensive understanding of the cybersecurity landscape, including major threats, vulnerabilities, controls, and regulatory frameworks. The module also focuses on developing leadership skills to build and sustain a strong cybersecurity culture and organizational structure, aligning cybersecurity initiatives with business objectives to ensure resilience and strategic advantage.
Key Details
This module is delivered in hybrid format, as a combination of online, in-person and self-learning activities. The module uses innovative hybrid learning methods that combine live (synchronous) and self-paced (asynchronous) activities, with particular focus on practical activities and real-world scenarios connected to cybersecurity. Expert tutors guide students through the material, ensuring a comprehensive learning experience.
This module aims to equip participants with a comprehensive understanding of the cybersecurity landscape, including major threats, vulnerabilities, controls, and regulatory frameworks. Toward this goal the module employs periodic quizzes, in-class participation and assignments.
Time commitment:
– Online activities: 7 hours
– In-person activities: 7 hours
– Self-learning: 56 hours
– Individual, team and guided projects and activities: 105 hours
– Total: 175 hours
Credit points:
– 7 ECTS
Grading:
– Lecture quizzes: 10%
– Seminar work: 10%
– Assignments: 30%
– Exam: 50% (scenario essay, quiz)
Subjects covered
- The cybersecurity landscape including review of some narrated incidents. Overview of potential business impacts
- Overview of cybersecurity threats
- Overview of cybersecurity vulnerabilities
- Overview of controls as structured following major categorisations (four ISO 27001 domains, Five NIST domains, etc.)
- Review of major cybersecurity related frameworks and regulations
- The governance activities and the PLAN domains of governance
- Case Discussion: Building a CISO culture, a function and align with the organisation
- The Risk Management process: Business and technology risks
- The protection roadmap The BUILD domains of governance to implement relevant transformation actions
- Incident management, CERT and the RUN domains of governance
- The MONITOR domain including the seven components of maturity and the definition of security Dashboards (technical and managerial)
- Understand the various cybersecurity roles and the development of a CISO organisation
Learning objectives
Analyze cybersecurity incidents and extract lessons to inform organization-specific security strategies.
Apply frameworks and controls to evaluate organizational security posture and identify gaps.
Develop a cybersecurity risk management plan aligned with business objectives and regulatory requirements.
Design a comprehensive cybersecurity roadmap covering the phases of protection, detection, and response.
Create dashboards and reports to monitor cybersecurity maturity and effectiveness, integrating technical and managerial indicators.
Apply nowModule leaders
Răzvan Rughiniș is Professor in the Department of Computer Science of National University of Science and Technology POLITEHNICA BUCHAREST, co-founder of the Innovation Labs tech accelerator, and member of EDGE Institute for digital economy. He has extensive research, teaching, and doctoral coordination experience in the fields of cybersecurity, data protection, and HCI. He has been involved in core events of the cybersecurity community such as IDC Security Forum, Critical Infrastructure Protection Forum, and The New Global Challenges in Cyber Security – CERTCON. He is (co)author of over 150 scientific publications concerning cybersecurity, privacy and HCI, including top journals and conferences such as Computers & Security, Electronics, Ethics of Information Techology, ACM SIGSPATIAL, CODASPY, ACM-CHI, ACM-AltChi, CSCL and HCI.
Apply nowMaking Europe cyber-aware
Our digital world is under constant attack. Master the advanced skills to defend critical data and infrastructure. Become a sought-after expert in one of today’s most vital and in-demand career fields.
Download prospectus