Cybersecurity Operations Management
Duration
- One Semester or equivalent
Contact hours
- 36
On-campus unit delivery combines face-to-face and digital learning. For Online unit delivery, learning is conducted exclusively online.
2021 teaching periods
Swinburne Online
Teaching Period 2 | ||
---|---|---|
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
Aims and objectives
Cybersecurity of an organisation concerns all stakeholders, employees and customers. This unit focuses on the management of resources and aims to develop and refine skills in stakeholder management and communications. Students will use a variety of methods to research communication protocols, cybersecurity principles, recovery and mitigation strategies
Students will use the frameworks that relate to information sharing and develop strategies for whole of organisation cybersecurity management. Some of the topics include communication protocols and strategies, security audits, security program development, incident handling, maturity models data governance, third party and supply chain risk.
Students will use the frameworks that relate to information sharing and develop strategies for whole of organisation cybersecurity management. Some of the topics include communication protocols and strategies, security audits, security program development, incident handling, maturity models data governance, third party and supply chain risk.
Students who successfully complete this unit will be able to:
1. Explain cybersecurity imperatives and implications to principle decision makers in an organisation
2. Critically evaluate the cybersecurity culture of an organisation
3. Analyse cybersecurity framework for an organisation against industry best practice
4. Examine the cybersecurity implications of the internet in relation to an organisation and the implications to business continuity
5. Examine and refine business continuity and disaster recovery plans and strategies as they relate to cybersecurity
2. Critically evaluate the cybersecurity culture of an organisation
3. Analyse cybersecurity framework for an organisation against industry best practice
4. Examine the cybersecurity implications of the internet in relation to an organisation and the implications to business continuity
5. Examine and refine business continuity and disaster recovery plans and strategies as they relate to cybersecurity
Unit information in detail
- Teaching methods, assessment, general skills outcomes and content.
Teaching methods
Face to Face Mode: Class 3 hours per week
Online Mode (SOL):
Engaging with online content and discussions
Student workload:
For all teaching and learning structures (both face to face and online), students are expected to spend an average of 150 hours per unit in total over the duration of the study period
This includes all:
• Scheduled teaching and learning events and activities (contact hours timetabled in a face-to-face teaching space) and scheduled online learning events (contact hours scheduled in an online teaching space), and
To be successful, students should:
• Read all prescribed materials and/or view videos in preparation for each class
• Attend and engage in all scheduled classes (face to face or online)
• Start assessment tasks well ahead of the due date, and submit assessments promptly
• Read / listen to all feedback carefully, and consider it for future assessment
• Engage with fellow students and teaching staff (don’t hesitate to ask questions)
Online Mode (SOL):
Engaging with online content and discussions
Student workload:
For all teaching and learning structures (both face to face and online), students are expected to spend an average of 150 hours per unit in total over the duration of the study period
This includes all:
• Scheduled teaching and learning events and activities (contact hours timetabled in a face-to-face teaching space) and scheduled online learning events (contact hours scheduled in an online teaching space), and
• Non-scheduled learning events and activities (including directed online learning activities, assessments, independent study, student group meetings, and research)
• Read all prescribed materials and/or view videos in preparation for each class
• Attend and engage in all scheduled classes (face to face or online)
• Start assessment tasks well ahead of the due date, and submit assessments promptly
• Read / listen to all feedback carefully, and consider it for future assessment
• Engage with fellow students and teaching staff (don’t hesitate to ask questions)
Assessment
Assignments (Individual) 50-60%
Project (Individual) 40-50%
General skills outcomes
• problem solving skills
• analysis skills
• communication skills
• ability to work independently
• analysis skills
• communication skills
• ability to work independently
Content
• Implementing and managing effective cybersecurity across an organisation, with respect to scale and nature of the business comparative to industry best practice
• Conducting security audits
• Conducting security audits
• Security program development for technical and non-technical, particularly frontline staff
• Incident handling and developing business continuity plans and disaster recovery
• Security strategy and policy formulation and implementation across an organisation
• Information-sharing and the privacy, and compliance and ethical issues for business
• Cybersecurity maturity model
• Governance: data, organisation, policy impact
• Cloud frameworks
• Disaster recovery
• Third party risk – supply chain implications
• Security strategy and policy formulation and implementation across an organisation
• Information-sharing and the privacy, and compliance and ethical issues for business
• Cybersecurity maturity model
• Governance: data, organisation, policy impact
• Cloud frameworks
• Disaster recovery
• Third party risk – supply chain implications
Study resources
- References.
References
• Santos, O 2019, Developing Cybersecurity Programs and Policies 3rd edition, Pearson IT Certification PTG , USA
• Aslam, A, Williams, C, Donaldson, S & Siegel, S 2015, Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats, , Apress, Berkley
• Aslam, A, Williams, C, Donaldson, S & Siegel, S 2015, Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats, , Apress, Berkley