Winter Program: Managing Cyber Risks in Organizations

Department
  • International Program
Course unit code
  • IFLV6641
Number of ECTS credits allocated
  • 3.0
Name of lecturer(s)
Recommended optional program components
  • none
Level of course unit
  • Bachelor
Year of study
  • Fall 2025
Semester when the course unit is delivered
  • 1
Language of instruction
  • English
Learning outcomes of the course unit
  • • Develop a basic understanding of cyber threats, vulnerabilities, and exploits
    • Understand how social engineering is leveraged by hackers
    • Open Source Intelligence (OSINT) and how it is used (individuals, hackers, journalists, investigators, etc).
    • Explore how the lack of physical security controls create cyber security risks
    • Evaluate information security risk management methodologies and policies
    • Calculate cyber risk and evaluate against cost of prevention mechanisms
    • Evaluate impact of differing data privacy laws
    • Examine various biometrics and identity proofing methods, such as facial recognition, hand-vein analysis, fingerprints, etc.
    • Explore popular project methodologies and their gaps in cyber security processes
    • Understand the global commerce impact of varying national data privacy laws in western countries
    • Review commonly used fraud-prevention techniques
    • Review information security gaps in project management methodologies
    • Understand how businesses recover from an attack
Course contents
  • How can businesses protect themselves from becoming victims of cyber crime and data breaches? Is biometrics a better choice for identity proofing? Information Security has become a fundamental necessity for businesses regardless of size and industry. This course reviews common exploits that have cost organizations millions of dollars in damages and methods for assessing the risk of cyber threats. Data privacy laws differ by country, impacting international business transactions. The growing use of biometrics, fraud prevention mechanisms, data breaches, and how technology has been leveraged to perform crimes will be evaluated in addition to risk assessment and prevention methods for protecting corporate, governmental, and individual assets.
    • Social engineering
    • Understanding cybersecurity policy and governance
    • Physical and environmental security
    • Cloud security and cyber security framework
    • Biometrics for identify proofing
    • Fraud prevention
    • Risk management methodologies
    • Disaster recovery after an attack
Planned learning activities and teaching methods
  • The course comprises an interactive mix of lectures, discussions and individual and group work.
Work placement(s)
  • none

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.