Cyber Security - Course Outline CES LUMS
Cyber Security - Course Outline CES LUMS
Cyber Security - Course Outline CES LUMS
Anyone interested in understanding cyber security basics for personal or professional purposes, including
homemakers, seniors, students, and non-tech professionals.
Small business owners and home office individuals needing to secure their digital assets and data.
Individuals considering a career in cyber security and looking to understand the fundamentals.
Computer science students or IT professionals wishing to broaden their cyber security knowledge.
Course Description
This course, "Cyber Security Foundation", offers a comprehensive introduction to the exciting and ever-evolving field of cybersecurity.
Accessible to individuals from all backgrounds and levels of technological proficiency, this course aims to demystify the subject, making
cybersecurity understandable and applicable to everyone. Through this course, participants will familiarise themselves with the basic principles
of cyber security, the different types of threats and attacks in the digital world, and how they can defend against them using various security
technologies. We will explore crucial topics such as social engineering, cryptography, malware, digital forensics, and risk management.
Furthermore, the course will explore how cyber security can be improved at an organisational or personal level and how a cyber security culture
can be cultivated. The course wraps up with a look into the future directions of cyber security.
Course Learning Outcomes
LO1: Understand the fundamental concepts and importance of cyber security, including different types of cyber threats, attacks, and the basic
principles of cryptography.
LO2: Identify various social engineering tactics and malware types, and apply preventive measures and mitigations to protect against these threats.
LO3: Assess the cyber security posture of an organisation or home, apply various security technologies, and understand the importance and
implementation of a robust cyber security policy.
LO4: Understand and implement principles of risk management, incident response, disaster recovery, and business continuity in the context of cyber
security.
LO5: Recognise and discuss emerging trends and future directions in cyber security, and understand the significance of cultivating a cyber security
culture.
Assessments/Graded Components
Attendance and Participation: Regular attendance is required for this course and will contribute to the completion certificate. This includes active
involvement in class discussions, hands-on activities, and interactive exercises.
Course Summary
4 Malware and Types of Malware, Malware Life Cycle, Privacy Concepts, Policies, Issues, and
Privacy Anonymity
7 Cyber Security
Pillars of Security Management, Information Security Management System
Posture
(ISMS), Risk Management, Self-assessment Techniques
Assessment
8 Crafting a
Importance and Design Cycle of a Cyber Security Policy, Policy Benchmarks,
Cyber Security
Example Policies
Policy
9 Risk
Management Definition of Risk, Risk Management Process, Incident Response, Disaster
and Incident Recovery, Business Continuity, Physical Security
Handling
10 Emerging
Trends in Internet of Things (IoT) Security, Drone Security
CyberSecurity