Cyber Risk & regulation Management

MicroMasters Program

Level:

Beginner/
Intermediate

Duration:

148 hours

Effort:

4-6 Hours weekly

Language:

Arabic/English

Price:

£ 2100

Why Cyber Risk & regulation Management MicroMasters?

Are you tired of hearing that your computer has a virus? Or that your email or bank account has been hacked? Now, is the time for you to protect yourself by understanding the basics of cyber security?

This MicroMasters presents an introduction to cyber security. You will learn the main existing cyber security threats and how to protect yourself against them. The course presents a practical approach with all required material will be provided to allow you to understand attacks and establish appropriate countermeasures.

Taught by instructors with years of experience in the field of cyber security, this course will pave the way to the security area of IT-related professions. Next, we learn digital rights management and trusted computing. We hypothesize how we know the software and hardware we are running is legitimate and has not been modified or stolen.

Lastly, we dive into the technical background for the very popular BitCoin, and its sister cryptocurrencies. We have a guest lecturer speak to us about the history and modern-day uses of these cryptocurrencies.

Who is this program for?

Participants are expected to have a basic knowledge of computer science or equivalent work experience. Knowledge of IT is helpful. This MicroMasters is designed for:

Syllabus

  • Introduction to Information Security.
  • Security Design Principles.
  • Threat Modeling.
  • Security Policy.
  • Introduction to Cryptography.
  • Authentication.
  • Access Control.
  • Containerization.
  • Cybersecurity: an overview.
  • Computer forensics.
  • Assembly programming: towards reversing.
  • Cyberdefense.
  • Malware and Advanced Persistent Threats (APTs).
  • Vulnerabilities and exposures.
  • Secure Network Design and Architecture.
  • Risk Management.
  • Cryptography.
  • Vulnerability Assessment.
  • Identity and Access Management.
  • Injection Attacks and Defenses.
  • Privacy and Anonymity.
  • Software Validity and Rights.
  • How Networks are Attacked.
  • Wireless Security.
  • Discovering Vulnerabilities.
  • Exploitation.
  • Review of Web App Exploits.
  • Exploitation – Passwords and Authentication.
  • Packet Analysis.
  • Wireshark.
  • Router and Switch Configuration.
  • Windows and Linux Administration Techniques.
  • Windows and Linux Hardening.
  • Web Technology Architecture and Security.
  • Introduction to key concepts in security economics.
  • Measuring cybersecurity.
  • Economics of information security investment.
  • Security market failures.
  • Behavioural economics for information security, policy and regulation.
  • Economic analysis and data analytics to cybersecurity.
  • Kali Linux.
  • Metasploit.
  • Hashcat.
  • Burp Suite.
  • Outline of the cyber threat.
  • What’s different about cyber?
  • Secure configuration of IT infrastructure.
  • Malware protection.
  • Configuring network devices securely.
  • Approach and effective access controls.
  • Implement approaches and effective access controls.
  • The importance of 2 factor authentication.
  • Understand risks.
  • Principles of risk management.
  • Manging the risks effectively.
  • Understand and manage third-party supplier risks.
  • Manging the full supply chain.
  • Information value and sensitivity.
  • Supplier impacts on service delivery.
  • Understand and manage third-party supplier risks.
  • Manging the full supply chain.
  • Encouraging a cyber-security aware culture.
  • Words into actions.
  • Respond and recovery.
  • Incident management capability.
  • Respond and recover plan for breaches.
  • Continuous improvement.
  • The need for performance monitoring.
  • Defining appropriate KPIs.
  • Performance dashboard.
  • Skills and resources.
  • The importance of access to the right skills.
  • Cryptocurrency.

Key Programme Takeaways

  • Cyber security landscape.

  • Articulate different security mechanisms.

  • Analyze Security, Privacy, Ethics & Legal Issues related to design.

  • Describe countermeasures to Layer 2 attacks and security best practices to prevent attacks.

  • Sound understanding of the economics of cybersecurity as a systems discipline, from security policies (modeling what ought to be protected) to mechanisms (how to implement the protection goals).

  • Understand that effective security protection is a combination of people, process and technology and how to create a culture of cyber and information security.

Your Learning Journey

The first week is orientation week. During this week you will be introduced to the other participants in the class from across the world and you will learn about the track details, materials, assignments, and final project.

On other weeks, you have learning goals set for the week. The goals would include the online interactive lectures and completing the assignments. All assignments need to be submitted within one week.

The programme features weekly live online sessions with industry practitioners who are available to help you clarify your doubts pertaining to the content. Assignments are graded by the program faculty.

Discussion boards are an integral part of each module and provide a forum where participants can interact, share ideas, and ask questions.

Live webinars with Everest Business School provide opportunity for additional instruction as well as Q&A sessions for the group.

The Programme Support team will follow up over emails and phone calls with learners who are unable to submit their assignments on time or have any other concerns during the learning journey till sending the MicroMasters’ final grade.