Information and Communication Security >>> MSc Course content
Posted on 21.02.2022
INFORMATION SECURITY MANAGEMENT PART 1
Impact of cyber attack on the business
Cybersecurity and information security, DLT, BLOCKCHAIN and other coin Weaknesess
Cybersecurity and cyberprotection, therminological discrepancy, black hats, blue teas, red teams, white hats.
The pressure over CERT
Cybersecurity is not show!
European institutions and cybersecurity regulations, Reglaments, Directives and other acts
Cybersecurity laws
Organisational forms – CERT, Security Operation Center and corelated sophisticated hackers attack
Cybersecurity Maturity Models and when the thins gonna complicated. Resiliance or prolonged and painful elimination of the consequences of cyber incidents
Standards. Governance, risk management and compliance
INFORMATION SECURITY MANAGEMENT PART 2
PERSONAL DATA SECURITY
Privacy laws over the world
GDPR entrapments, the cost personal data in the hacker forums, Crime as a Service