About the training
The aim of the module is to enable students to be aware of Security Standards and associated laws and regulations for Information Technology (IT) convergence.
The aim of the module is to enable students to be aware of Security Standards and associated laws and regulations for Information Technology (IT) convergence.
What you will learn
LO1 Appraise the laws, regulations, policies and ethics as they relate to cyber security and privacy.
LO2 Assess manage and apply the reporting standards relevant to Cyber Security Technologies .
LO3 Demonstrate an understanding of the ethical issues associated with computing.
LO4 Evaluate the threat landscape associated with Information Technology (IT) integration of systems
LO5 Value and accept the importance of laws, standards and ethics related to cyber security in computing
LO1 Appraise the laws, regulations, policies and ethics as they relate to cyber security and privacy.
LO2 Assess manage and apply the reporting standards relevant to Cyber Security Technologies .
LO3 Demonstrate an understanding of the ethical issues associated with computing.
LO4 Evaluate the threat landscape associated with Information Technology (IT) integration of systems
LO5 Value and accept the importance of laws, standards and ethics related to cyber security in computing
Training information
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.