Syllabus

Title
6044 Elective - Managing the Cybersecurity Function
Instructors
Dr. Margeret Hall
Contact details
Type
PI
Weekly hours
2
Language of instruction
Englisch
Registration
02/10/22 to 04/26/22
Registration via LPIS
Notes to the course
This class is only offered in summer semesters.
Dates
Day Date Time Room
Tuesday 05/03/22 01:30 PM - 05:30 PM D5.1.004
Tuesday 05/10/22 01:30 PM - 05:30 PM D5.1.004
Tuesday 05/17/22 01:30 PM - 05:30 PM D5.1.003
Tuesday 05/24/22 01:30 PM - 06:30 PM D5.1.004
Tuesday 06/07/22 01:30 PM - 06:30 PM D5.1.004
Contents

This course considers the contemporary cybersecurity threat landscape facing organizations including computer crime and information operations as it relates to international, national, economic, organizational, and personal security. Students apply various risk frameworks to provide structure to the decision-making needed to invest in resources for security controls and countermeasures. Multiple strategies are explored, including policies, procedures, training, strategic alliances, technologies, and methodologies, especially drawing upon risk management and financial decision-making that are used in other sectors of an organization. Cybersecurity policy and ethical issues will be examined. The course will prepare students to be successful in taking on leadership roles in assuring the security of an organization’s operations.

Learning outcomes

By the end of this course, students will be able to:

· Demonstrate a fundamental understanding of cybersecurity terminology, concepts, issues, and components.

· Describe the role of cybersecurity in the success of global organizations and its limitations, particularly the limits of defensive technologies.

· Incorporate multiple perspectives in planning cybersecurity controls to address vulnerabilities.

· Plan and conduct a risk management program for cybersecurity in an organization, including a critical assessment of strengths and limitations of the various methods.

· Present a comprehensive and coherent analysis of offensive and defensive cybersecurity in terms of actors, targets, methods, and technologies, outcomes, policies, and laws.

· Separate fact from fiction by giving an accurate picture of threat, emphasizing actual incidents and statistics over speculation about what could happen.

 

Attendance requirements

We expect students to attend all meetings of this course in order to be able to successfully master all assignments.

Teaching/learning method(s)

Week 1: Introduction; Core Concepts and Objectives; Global Context and Trends

Week 2: Human Factors in Cybersecurity; Acquiring and Maintaining a Skilled Workforce; The Role of Your Board in Corporate Cybersecurity Strategies

Week 3: Ethical, Legal, and Social Implications; Responsible Innovation and Digital Opportunity

Week 4: Identifying Threats and Vulnerabilities; Risk Analysis; Prevention

Week 5: Incidence Response; Disaster Recovery; Continuity and Strategic Responses

 

Expectations of students

· Take ownership of your learning. You are responsible for what you get out of this course. I have organized the course to emphasize two goals: The acquisition of relevant knowledge and the development of the skillful use of that knowledge. In Week 1, we will review and discuss the rationale for this method of promoting deep learning.

· Team-Based Learning. Notice that a substantial portion of your grade is associated with the team-based learning activities. Such activities are vital to helping you learn how to skillfully apply acquired knowledge in a near-to-real world environment.

· Written analyses. Notice that a substantial portion of the homeworks are essay-based. This form of exam promotes and measures the reasoning and communication skills you need to skillfully apply acquired knowledge in the real world.

· Importance of Attending Class. As detailed in MyLearn and BACH, this course is a “PI” meaning that no more than four hours of the in-class time may be missed. The course will be held in a recitation style whereby we balance our classroom time between lecture and experiential learning exercises that help you develop your ability to apply relevant knowledge, using effective communication skills, teamwork skills and problem-solving skills. Thus, attending class is vitally important to your learning and academic performance.

Assessment

The semester is graded on a 1000 points scale. Assignment description and corresponding rubrics for these items can be found in MyLearn under Files/Assignments.

Current event/ Paper Reviews: 4 at 50 points each, 20% total, Individual Assignment

State of the Field Presentation: 200 points, 20% total, Group Assignment

Prep and Discussion of Case: 3 at 100 points each, 30% total, Individual Assignment

Event Simulation: 200 points, 20% total, Group Assignment

Final Presentation: 50 points, 5% total, Group Assignment

Final Paper: 50 points, 5% total; Group Assignment

 

This corresponds to the following grading scale:

 

Excellent (1)

87.5%-100.0%

Good (2)

75.0% -<87.5%

Satisfactory (3)

62.5% -<75.0%

Sufficient (4)

50.0% -<62.5%

Fail (5)

<50.0%

Readings

Please log in with your WU account to use all functionalities of read!t. For off-campus access to our licensed electronic resources, remember to activate your VPN connection connection. In case you encounter any technical problems or have questions regarding read!t, please feel free to contact the library at readinglists@wu.ac.at.

Recommended previous knowledge and skills

There are no prerequisites for this course. However, to successfully understand the material, you should have a general understanding of digital technologies and their management. This is not a programming or technical course, but geared to students aiming for “C-suite” roles where their firm’s technology is critical to its success. You will benefit from this elective if you:

· Plan a career as an entrepreneur, executive, or analyst wanting to gain strategic insight and actionable knowledge to create new ventures or develop business strategies

· Are intellectually curious and motivated and are aspiring towards future-fit skills in cybersecurity

· Interact with consumer data, and/or are responsible for compliance and data privacy regulations

Additional (blank) field

Student Standards of Academic Conduct

You are not to submit another person’s work and claim it as your own or share solution concepts of individual assignments with others. Unless otherwise specified, work submitted for a grade must be work that you completed alone (respectively, within your specific working group). Plagiarism and/or collusion will result in disciplinary actions including grade demerits, zero credit given, or expulsion from the course.

Disciplinary proceedings may be initiated against any student who engages in scholastic dishonesty, including, but not limited to, cheating, plagiarism, collusion, the submission for credit of any work or materials that are attributable in whole or in part to another person, taking an examination for another person, any act designed to give unfair advantage to a student or the attempt to commit such acts. For information about consequences, and rights and responsibilities review: Wirtschaftsuniversität Wien: Consequences of Academic Fraud - Code of Conduct - WU Campus

Last edited: 2022-02-04



Back