Show/hide contentOpenClose All
Curricular information is subject to change
On completion of this module, students will be able to:
● Choose and apply cybersecurity frameworks and evaluate cyber risk
● Explain how encryption and authentication works and how attacks are mitigated
● Evaluate the impact of cybersecurity technologies on society
● Describe and theorize the recent history of information security
● Identify and evaluate criteria for cybersecurity technology procurement and implementation
● Summarize cryptographically-secure governance, identity, and management technologies
● Debate ethical and social values for emerging technologies, surveillance, and privacy
● Make use of and develop novel research methods
● Practice teamwork and leadership skills
Student Effort Type | Hours |
---|---|
Lectures | 20 |
Specified Learning Activities | 85 |
Autonomous Student Learning | 102 |
Total | 207 |
Not applicable to this module.
Remediation Type | Remediation Timing |
---|---|
Repeat | Within Two Trimesters |
• Group/class feedback, post-assessment
General feedback is provided to students on all their submitted assessment components.
Name | Role |
---|---|
Dr Christina Burke | Tutor |
George Chen Kaidi | Tutor |
Ms Michele Connolly Doran | Tutor |
Shirley Ho | Tutor |
Abdul Gafoor Zahir Hussain | Tutor |
John Kelly | Tutor |
Rachel Sim | Tutor |
Chee Shong Tan | Tutor |
Charlene Tan Puay Koon | Tutor |
V Sithira D/O Vadivel | Tutor |