Semester 1 / ECTS Credits: 6 ECTS

Course Description:

The main objective of this course is to give a core concepts about Information Security.  Students will understand various types of security incidents and attacks, security management, Information Security standards and general issues of Information Security.

Students will gain comprehensive knowledge of the topic covered with the security theories, concepts, and practices of Cyber Security.

Throughout this course, basic legal directive, HR and EU will be discussed as well as examples of national cyber security strategies. Examples of application of information security standards as well as examples of best practices will be presented and, through the practical part, students will independently develop a security policy and evaluate the maturity of the organization with respect to appropriate standards. Students will learn about the most important steps in information security management system processes and how to evaluate implemented standards.

Practical skills of organizational and technical measures to protect the information system will be gained through working on real-life scenarios / case-studies during laboratory workouts.

Learning Outcomes:

  1. Present the concept of information security,
  2. Critically evaluate implemented security standards,
  3. Present standards and security policies,
  4. Evaluate security threats and vulnerabilities,
  5. Analyze malware and malware protection,
  6. Estimate the security of cloud applications,

Course content lectures:

  1. Introduction to Information Security
  2. Information security Theory
  3. Threats to information systems
  4. Legislative framework for electronic business
  5. National strategy of cyber security
  6. Information Security Standards
  7. Information security management system (ISMS),
  8. CIS Controls
  9. Public key Infrastructure
  10. Computer crime
  11. Malicious programs and protection against malware
  12. Types of attacks on wireless networks
  13. Methods of protecting wireless networks,
  14. Security problems and risks of cloud computing
  15. CSA cloud computing security recommendations