About the training
Students will learn about risk management processes with a particular focus on how to manage the risk related to the use, processing, storage, and transmission of data. Laws, regulations, controls, compliance, and violations as it pertains to personal information and data are also included.
Students will learn about risk management processes with a particular focus on how to manage the risk related to the use, processing, storage, and transmission of data. Laws, regulations, controls, compliance, and violations as it pertains to personal information and data are also included.
What you will learn
LO1 Assess, manage and control the risk related associated to the use, processing, storage and transmission of data.
LO2 Identify key risk metrics with the aim of being able to mitigate against a particular risk scenario.
LO3 Appraise the laws, regulations, policies and ethics as they relate to cyber security and privacy.
LO4 Evaluate key data security standards designed to protect personal information.
LO5 Assess and test an organizations procedures in the event of data compromise, and operational and financial impact of the violation/compromise.
LO1 Assess, manage and control the risk related associated to the use, processing, storage and transmission of data.
LO2 Identify key risk metrics with the aim of being able to mitigate against a particular risk scenario.
LO3 Appraise the laws, regulations, policies and ethics as they relate to cyber security and privacy.
LO4 Evaluate key data security standards designed to protect personal information.
LO5 Assess and test an organizations procedures in the event of data compromise, and operational and financial impact of the violation/compromise.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Gillian O'Carroll- Gillian.ocarroll@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Gillian O'Carroll- Gillian.ocarroll@mtu.ie