Cybersecurity and Data Governance


The ability to secure information within a modern enterprise is of growing strategic importance. This module provides the learners with an understanding of  the key issues associated with protecting information assets. This module provides participants with a comprehensive understanding of the field of cybersecurity, and the know how to develop  policies to implement information security controls.

It introduces students to concepts of Information technology governance, and the major governance policies which organisations use to manage their IT operations efficiently, safely and with a high degree of security. Frameworks  are briefly explained and the elements of these frameworks relating to cybersecurity risk management. International cybersecurity standards. 

Learning Outcomes

  1. Describe the different classes of cybersecurity threats and systems vulnerabilities

  2. Describe the requirements to ensure confidentiality, integrity and availability of information and systems.

  3. Outline and describe Information Technology governance rules and policies which ensure effective, controlled and secure operation of an organisation's IT infrastructure and data. 

  4. Examine a Risk Management Framework (RMF) which implements organisation-wide cybersecurity policies, controls and mitigations to reduce the impact malicious attacks on enterprise infrastructure and data.

  5.  Develop data governance policy based on guiding principles and ethical principles as per international guidance.

% Coursework 40%
% Final Exam 60%