Course detail
Management Information Security
FP-ImibePAcad. year: 2022/2023
Information Security Management is focused on the security aspects of information systems and to explore the basic elements of creating security policies of the organization. It is to introduce students to the main areas and directions of the implementation of security measures and to acquaint them with their policies.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
2. Basic terminology of ISMS.
3. Definition of ISMS.
4. Implementation methodology of ISMS.
5. Risk analysis.
6. Security controls.
7.Security standards and norms.
8. Network security management.
9. Application security management.
10. Information security for supplier relationships.
11. Data security management.
12. Personaly security issues.
13. Legal aspects of cyber security. Cybersecurity Act and implementing regulations.
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
Recommended reading
Classification of course in study plans
- Programme MGR-IM Master's 1 year of study, winter semester, compulsory
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
A follow-up objective is to understand the linkages in security issues from the individual to the organization.
Another objective is to introduce students to the main areas and directions in the implementation of security measures and to familiarize them with their principles.
1. Digital literacy
2. Basic concepts of information security management
3. Definition of information security management
4. Methodology of ISMS implementation
5. Security risk analysis
6. Security measures
7. Security standards
8. Network security management
9. Application security management
10. Supply chain security
11. Data protection management
12. Personal security and physical IT security issues.
13. Legal aspects of cyber security. Cybersecurity Act and implementing regulations.