About the training
In this module, students will examine the impact of risk management frameworks and develop a critical appreciation of risk management relating to the use, processing, storage and transmission of data. Students will examine key laws, regulations, compliance and violations as pertaining to personal information and data. The module will enable students to reflect on widely adopted cybersecurity risk management frameworks and critically appraise how these frameworks can be applied by organisations to minimise cybersecurity risk.
In this module, students will examine the impact of risk management frameworks and develop a critical appreciation of risk management relating to the use, processing, storage and transmission of data. Students will examine key laws, regulations, compliance and violations as pertaining to personal information and data. The module will enable students to reflect on widely adopted cybersecurity risk management frameworks and critically appraise how these frameworks can be applied by organisations to minimise cybersecurity risk.
What you will learn
LO1 Critically analyse the risks associated with the use, processing, storage and transmission of data.
LO2 Examine appropriate cybersecurity risk metrics to mitigate against various data risk scenarios.
LO3 Assess statutory laws, regulations, policies and ethics as they relate to cybersecurity and privacy.
LO4 Analyse key data security standards designed to protect personal information.
LO5 Evaluate effective organisational procedures in the event of data compromise, reflecting the operational and financial impacts of non-compliance.
LO1 Critically analyse the risks associated with the use, processing, storage and transmission of data.
LO2 Examine appropriate cybersecurity risk metrics to mitigate against various data risk scenarios.
LO3 Assess statutory laws, regulations, policies and ethics as they relate to cybersecurity and privacy.
LO4 Analyse key data security standards designed to protect personal information.
LO5 Evaluate effective organisational procedures in the event of data compromise, reflecting the operational and financial impacts of non-compliance.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Gillian.ocarroll@mtu.ie
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Gillian.ocarroll@mtu.ie