Description:
The course runs over 6 weeks and is broken down into manageable weekly topics:
Week 1: Introduction (How cyber security is part of information security assurance; How to identify those perpetrating a cyber-attack; The importance of cyber security in a data science environment)
Week 2: Common technical vulnerabilities (The need for cyber security: The top 10 vulnerabilities to an IT system; Background to the Cyber Essential Scheme; Vulnerabilities based on STRIDE methodology)
Week 3: Thinking like a hacker (Why students are an important link in the security chain; How social engineering can be deployed in cyberspace; Methods used in social engineering; How to apply controls to a given scenario)
Week 4: Assessing the vulnerabilities in a Web application (Using browser-based technologies to identify vulnerabilities; How to attack a commercial website reporting vulnerabilities; Recommending mitigation strategies for identified vulnerabilities; Identifying possible impact of vulnerabilities through poor site design)
Week 5: Hacking assignment (Selecting appropriate penetration testing techniques; Using standard industry tools to identify vulnerabilities; How to successfully attack a ‘Bank’ website reporting vulnerabilities; Recommending mitigation strategies for identified vulnerabilities; Identifying possible impact of vulnerabilities through poor site design)
Week 6: Formal risk assessment and future cyber security (Conducting a risk assessment within your own organisation; Producing a risk assessment report to an appropriate standard; Recommending mitigation strategies for identified vulnerabilities; Legal and ethical aspects of cyber data security; Future directions of cyber security for data science
After successfully completing the course, you’ll be able to:
– Understand the need for security governance and the legal aspects of cyber security
– Identify the types of cyber vulnerabilities and threats to your organisation
– Mitigate the data security risks within your organisation
– Identify the costs to implement various risk mitigation strategies
– Guide your organisation through the complexities and risks of managing personal data
– Conduct risk impact assessments for your organisation
Minimum 25 students.
Email us for more information: