Objectives and competences
The student will be able to
1. Explain the core cyber security principles and to identify and apply the key components of cybersecurity network architecture.
2. Describe risk management processes and practices.
3. Distinguish system and application security threats and vulnerabilities and to describe different classes of attacks.
4. Identify security tools and hardening techniques.
5. Describe new and emerging IT and IS technologies and corresponding security risks.
6. Appraise cybersecurity incidents and to apply appropriate response.
Content (Syllabus outline)
1. Cybersecurity introduction and overview
2. Cybersecurity concepts
3. Security architecture principles
4. Security of networks, systems, applications and data
5. Incident response
6. Security implications of the adoption of emerging technologies
7. Frameworks and guidelines for cybersecurity ensurance in an organization
Learning and teaching methods
- Lectures,
- Tutorial and computer work,
- e-Learning,
- Laboratory work.
Intended learning outcomes - knowledge and understanding
• Knowledge and understanding:Understanding the key concepts and terminology in cybersecurity as well as roles and domains of cybersecurity.
• Knowledge of various types of cybersecurity architecture.
• Knowledge of key components of securing networks, systems and applications and data.
• Ability of cybersecurity incident identification and outline the phases of incident response.
• Knowledge and awareness of implications for adaption of evolving technology.
Readings
Obvezno/Obligatory
1. Brezavšček, A. (2022). Kibernetska varnost, elektronsko učno gradivo, spletna učilnica Moodle.
Priporočeno/Recommended
2. ISACA (2017). CSX Cybersecurity Fundamentals Study Guide, 2nd Edition by ISACA.
3. Stallings, W., Brown, L. (2018). Computer security: principles and practice, 4th ed., Global ed., New York: Pearson.
4. Rhodes-Ousley, M. (2013). Information Security, The Complete Reference, 2nd Ed., New York: McGraw-Hill Education.
5. Stallings, W. (2014). Cryptography and Network Security: Principles and Practice, 6th ed. Prentice Hall.
6. Merkow, M.S., Breithaupt, J. (2014). Information Security: Principles and Practices, 2nd Ed., Pearson Education, Inc.
7. Singer, P.W., Friedman, A. (2014). Cybersecurity and Cyberwar, What Everyone Needs to Know, Oxford University Press.
8. Bernik, I. (2014). Cybercrime and Cyberwarfare, John Wiley & Sons, Inc.
9. Edgar, T., W.; Manz, D. O. (2017). Research methods for cyber security, Cambridge: Syngress