Master of Science in Cyber Security and Management



Similar documents
The International MBA in Corporate Security Management (IMBASM) Distance Learning

Master of Science in Engineering Business Management for Defence Studies (MEBM)

CYBER SECURITY Audit, Test & Compliance

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Bellevue University Cybersecurity Programs & Courses

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

PROGRAMME DETAIL SPECIFICATION. Programme Summary

developing your potential Cyber Security Training

Cyber security Indian perspective & Collaboration With EU

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

Department of Information Systems and Cyber Security

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

CYBER SECURITY TRAINING SAFE AND SECURE

Full-time Master s Programme

A NEW APPROACH TO CYBER SECURITY

Security & privacy in the cloud; an easy road?

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Defending Against Data Beaches: Internal Controls for Cybersecurity

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

Certificate in Cyber Security

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Management of Information Security and Risk

Introduction to Cyber Security / Information Security

Addressing Cyber Risk Building robust cyber governance

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

External Supplier Control Requirements

FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES

Assessing the strength of your security operating model

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

The FBI and the Internet

MSc Studies in Computing

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

Defending Against Cyber Attacks with SessionLevel Network Security

Identifying Cyber Risks and How they Impact Your Business

N/A. Computer Science. Software Engineering. Electrical and/or Electronic Engineering. Mathematics with Computer Science

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

Faculty of Organizational Sciences

ESKISP Conduct security testing, under supervision

KEY TRENDS AND DRIVERS OF SECURITY

Study in Singapore at

Cyber Security: Designing and Maintaining Resilience

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Information Security and Risk

PROGRAMME DETAIL SPECIFICATION. Programme Summary

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

LOUGHBOROUGH UNIVERSITY. Programme Specification. International Financial and Political Relations

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN LIBRARY AND INFORMATION MANAGEMENT (MSc[LIM])

Implementing Cisco IOS Network Security

Part one: Programme Specification

How To Defend Yourself Against Cyber Attacks

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Faculty of Organizational Sciences

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

N/A N/A. Programme duration: 1 year full time - September (semester 1) and January (Semester 2) starts, 2 years parttime N/A.

Programme Specification and Curriculum Map for BSc Honours Network Management and Security

Unit 3 Cyber security

PREPARE YOUR INCIDENT RESPONSE TEAM

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Research Topics in the National Cyber Security Research Agenda

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Sytorus Information Security Assessment Overview

The UK cyber security strategy: Landscape review. Cross-government

CESG Certification of Cyber Security Training Courses

MASTER PROGRAM IN EVENT MANAGEMENT (One year) 1. Program Title Master in Business Administration with specialization in event management (One year)

Information Systems and Tech (IST)

Bachelor of Information Technology (Network Security)

POSTGRADUATE PROGRAMME SPECIFICATION

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Executive Cyber Security Training. One Day Training Course

2015 Information Security Awareness Catalogue

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

McAfee Security Architectures for the Public Sector

IINS Implementing Cisco Network Security 3.0 (IINS)

School of Informatics Department or equivalent Department of Computer Science Programme code

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

ESKISP Manage security testing

Introduction to Cybersecurity Overview. October 2014

Cyber Defense Operations Graduate Certificate

A Primer on Cyber Threat Intelligence

Practical Steps To Securing Process Control Networks

Cyber security Building confidence in your digital future

Cybercrime in the Automotive Industry How to improve your business cyber security

70250 Graduate Certificate in Digital Forensics

Transcription:

Master of Science in Cyber Security and Management Introduction Realizing the importance of protecting her critical national information infrastructure, Malaysia has introduced the National Cyber Security Policy. The policy aims to provide a framework on how the national critical infrastructures are to be managed and governed in order to ensure that those critical services are protected and maintained. The greatest threats addressed by the policy are cyber related threats which are so dominant today. The cyber threats are so real hence the country requires professionals with knowledge and skill to understand and mitigate the threats systematically. We believe that mitigating cyber security risk with technical skill will not be sufficed. Managerial and governance skills are also paramount in ensuring risks are properly managed in an organisation. Enhancement cooperation with Warwick University UPNM has started its collaboration Warwick University of London since 2012 as part of its global partnership. The collaboration started with the inception of a Master program i.e. Master of Science in Engineering Business Management for Defence Studies (MEBM). As of 2015, XXX has been graduated from this MEBM program. The collaboration with Warwick University will be enhanced with the introduction of another program which is well received in UK, i.e. the Master of Science in Cyber Security and Management (MCSM). 1

Objectives of the Program To provide advance understanding of managing cyber security within an organization. The student will be taught the techniques and technologies used in an organization security architecture and cover key areas of information risk management and network defence. The course also prepares students in the broad skills required for effective management and leadership excellence. Modules The course comprises of 10 academic modules with one project known as dissertation. Security Architectures and Network Defence The first Cyber Security module begins by introducing the domain and the core fundamental concepts relating to cyber security. Students will gain a comprehensive understanding of the underlying security infrastructure and in particular the protocols required in setting up a system where secure transaction (financial or communicational) are required. The syllabus also includes malware and attacks, the threats ecosystem, phishing, pharming and data theft, the AAA of security, firewalls and defence and Intrusion Detection System Cryptosystems and Data Protection This module focuses on the technology and concepts behind data protection and in particular the numerous cryptosystems and protocols that allow us to keep communications private. We also focus on the use of encryption technology to provide authorization and access control systems. Throughout the module we disentangle often complex protocols to begin to understand how they work. The module will enable you to develop a broad understanding of data-centric protection, data-leakage threats and vulnerabilities and key prevention and detection technologies. 2

Information Risk Management and Governance This module will develop your ability to establish and maintain an information risk management framework in order to guarantee that security and assurance strategies ae aligned with business objective and are consistent with legal and regulatory obligation. A strong focus will be put on business continuity and resilience and there is an emphasis on the practical nature of this process and the issues that face managers in the real world. Industrial Espionage and Counterfeiting This module examines the motivations for industrial espionage and the various method of attack on the physical security of an organisation, its electronic infrastructures and its staff and suppliers. Student will learn to analyse and mitigate potential attacks through industrial espionage; will develop an understanding of counterfeiting attacks and design countermeasures; and will carry out risk management processes in both industrial espionage and counterfeiting Digital Forensics, Evidence and Intelligence Cyber-crime affects all walks of life and transcends personal, social and business domain. This module investigates the core techniques currently used for the purpose of data retrieval, evidence preparation, crime scene management and intelligence extraction where the source of data is a digital storage system. It will give an overview of national and international digital forensic investigation infrastructures and put legal procedure into context. Global E-Business In this module you will critically examine the processes and organisational structures that enable future manufacturing and service enterprise to win business, deliver systems, products or services and maintain relationships in the radically more complex business landscape. 3

Business Strategy and Strategic Management The increasingly dynamic and complex global business environment in which most organisations operate requires managers to be aware of the impact of strategic decision-making on their business. This module introduces the main features of strategic thinking and the strategic management process including the strategy formulation process. Leading Change Organisations today operate in a rapidly changing business environment that demands ever higher standards of operations, business efficiency and customer service. This module is designed to give participants an understanding of change and the reasons for it. We look at the strategic models and tools and measures, as well as giving the hands-on experience of managing change and dealing with the consequences of change within a simulated business environment. Project Planning Management and Control This module provides an understanding of the principles, philosophies and methods of project management. It establishes an appreciation of, an ability to apply, current tools and techniques for project planning and control, including the selection and management of project teams. Financial Analysis and Decision Making This module provides an understanding of the main accounting statements together with an awareness of basic accounting principles, terminology and techniques which will enable you to interpret financial reports and information. An introduction to management accounting practices as an aid to effective operational financial planning controls is also included. 4

Who should attend this program? To prepare one-self to become an effective Information Security Leader in an organization, the following individuals are encouraged to enrol the program: Information Security Officer Risk Officer Cyber Investigation Officer Cyber Intelligence Officer Chief Information Officer Protective Security Officer The conduct of the program The program will be conducted in modular mode within one year in UPNM. Each module will be run in five working days. Students are expected to submit their individual assignment with 2 weeks after the completion of each module. By first month, students are expected to submit their dissertation proposal and they will be assigned to their supervisors. Submission will be three months after the completion of the last module. A skype communication will be arranged for students to communicate with their supervisors from UK. Entry Requirement The candidate shall have a qualification of Bachelor of Science in IT or Computer Science or Technology Management with a minimum CGPA of 3.00 from universities recognized by Warwick University. Those with a lower CGPA must have a minimum working experience of two years. Other related field will also be considered. English qualification is also required: IELTS with minimum score of 6.5 or TOEFL with a minimum of 650. 5

Further Information Please contact the followings: 1. Lt. Col. Asmuni Yusof (Retired) - Course Coordinator asmuni@upnm.edu.my Tel: +6011 2069 3828 / +6016 683 4477 2. Mr. Khaidzir bin Lokman khaidzir@upnm.edu.my Tel: +6017 244 9437 6