About the training
The aim of the module is to enable students to understand the differences between IT and OT security risks, the impacts of users behaviour and how to establish a Cyber Security Management System (CSMS). This module was developed under the Cyber Skills HCI Pillar 3 Project. Please refer to the consortium agreement for ownership.
The aim of the module is to enable students to understand the differences between IT and OT security risks, the impacts of users behaviour and how to establish a Cyber Security Management System (CSMS). This module was developed under the Cyber Skills HCI Pillar 3 Project. Please refer to the consortium agreement for ownership.
What you will learn
LO1 Assess, manage and evaluate Operational Technology (OT) Security.
LO2 Present mitigation strategies for OT security.
LO3 Identify the differences between Information Technology (IT) and OT security.
LO4 Develop a Cyber Security Management Strategy.
LO5 Value and accept the importance of security awareness for Operational Technology (OT).
LO1 Assess, manage and evaluate Operational Technology (OT) Security.
LO2 Present mitigation strategies for OT security.
LO3 Identify the differences between Information Technology (IT) and OT security.
LO4 Develop a Cyber Security Management Strategy.
LO5 Value and accept the importance of security awareness for Operational Technology (OT).
Training information
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.