Operational Cybersecurity 1a: Introduction; 1b: Security & Planning in the Workplace

Even when we use the strongest bricks, Firewalls can be breached and other security measures can be exploited by malicious cyberattackers. In semester a, you will assume your role as Chief Information Security Officer (CICO) responsible for a data network’s design, maintenance, and end-user training. You will explore essentials of keeping networks safe and secure through the use of cryptology, keys, and certificates before moving into the important practice of risk assessment. In the end, your attention will shift to mitigating and managing identified risks and working with key stakeholders to improve the organization’s security posture and disaster response. Are you ready to help businesses protect personal information and outsmart cyber attackers? Grab your white hat, BYOD, and let’s get started!


More and more, companies are under attack by malicious cyber attackers compromising the security of sensitive employee, customer, and societal data. In semester b, you will dive into data security in the workplace and will learn ways to mitigate cyber threats that lurk in dark corners. You will step into the familiar shoes of CISO, this time at a startup company, making decisions about access and authentication protocols, security planning, and expanding the business in a safe way. Lastly, you will explore real-world security breaches, how they were solved, and step-by-step instructions to setup robust security policies. Let’s continue forging your cybersecurity stronghold against cyber attackers and keep sensitive data secure.



SKU: ea7281194db2 / / /
Semester options