Learning Outcomes:
On completion of this module, students will be able to:
● Choose and apply cybersecurity frameworks and evaluate cyber risk
● Explain how encryption and authentication works and how attacks are mitigated
● Evaluate the impact of cybersecurity technologies on society
● Describe and theorize the recent history of information security
● Identify and evaluate criteria for cybersecurity technology procurement and implementation
● Summarize cryptographically-secure governance, identity, and management technologies
● Debate ethical and social values for emerging technologies, surveillance, and privacy
● Make use of and develop novel research methods
● Practice teamwork and leadership skills