University of Warsaw - Central Authentication System
Strona główna

Cyber security

General data

Course ID: 2100-SPP-L-D2CYSE
Erasmus code / ISCED: 14.0 Kod klasyfikacyjny przedmiotu składa się z trzech do pięciu cyfr, przy czym trzy pierwsze oznaczają klasyfikację dziedziny wg. Listy kodów dziedzin obowiązującej w programie Socrates/Erasmus, czwarta (dotąd na ogół 0) – ewentualne uszczegółowienie informacji o dyscyplinie, piąta – stopień zaawansowania przedmiotu ustalony na podstawie roku studiów, dla którego przedmiot jest przeznaczony. / (0310) Social and behavioural sciences, not further defined The ISCED (International Standard Classification of Education) code has been designed by UNESCO.
Course title: Cyber security
Name in Polish: Cyber security
Organizational unit: Faculty of Political Science and International Studies
Course groups: (in Polish) Social and Public Policy - DZIENNE I STOPNIA - 2 semestr 1 rok - przedmioty obowiązkowe
ECTS credit allocation (and other scores): 4.00 Basic information on ECTS credits allocation principles:
  • the annual hourly workload of the student’s work required to achieve the expected learning outcomes for a given stage is 1500-1800h, corresponding to 60 ECTS;
  • the student’s weekly hourly workload is 45 h;
  • 1 ECTS point corresponds to 25-30 hours of student work needed to achieve the assumed learning outcomes;
  • weekly student workload necessary to achieve the assumed learning outcomes allows to obtain 1.5 ECTS;
  • work required to pass the course, which has been assigned 3 ECTS, constitutes 10% of the semester student load.
Language: English
Short description:

The purpose of the class is to introduce the area of cyber security issues. The classes cover, among other things, basic concepts, definitions, standards, legal regulations, applied technologies and solutions that increase the level of broadly understood security.

The range of topics discussed includes, in particular, aspects of EU, state and citizen cyber security.

Full description:

This course includes real-world cybersecurity case studies: data breaches, ransomware issues, best practices in various management areas. There are also simulations and cyber games where students can play different roles during a cyber attack or other cyber issues.

Fundamental questions:

1. Is security possible? Managing risk in the information age

2. Practice cybersecurity with real-world scenarios

3. Government strategy to cybersecurity

4. Cybersecurity is not a technical problem: relevant case-studies in cyber management

Key topics:

- Cybersecurity Basics

- Identify threat actors and typical attack vectors: phishing, vishing, ransomware, social engineering, DDOS

- The role of leadership in managing cyber risk and crisis management Incident response and accountability

- Understand your technology: Identifying the best technologies to protect systems, networks, and data.

- Protect yourself: password strategy, multifactor authentication, avoiding scammers, free resources.

Bibliography:

Domet, Jack J. „A Leader's Guide to Cybersecurity.” Harvard Business Review Press 2019.

Making the UK the safest place to live and work online, National Cyber Security Centre, Annual Review 2021

Cybok: The Cyber Security Body of Knowledge, 2021, cybok.org

Smith, L. „Cyber security for beginners:: a comprehensive and essential guide for every novice to understand and master cybersecurity, 2022

Sennewald, Ch., Baillie, C. “Effective Security Management”, Elsevier 2021.

IT Management Simulation: Cyber Attack! Harvard.edu

Learning outcomes:

The graduate comprehends the fundamental principles, significance, and interdependence of cyber security and its relation to other fields of science in terms of subject and methodology (K_W09).

The graduate possesses knowledge and comprehension of the behaviors that have an impact on cybersecurity, with a specific focus on those that are significant to the security of the society in which they work. Furthermore, they possess knowledge of human activities designated to secure the safe usage of tools and solutions offered by information technology (K_KK03, KK04).

The graduate can explain and utilize fundamental techniques and technologies to maintain the cyber security of IT systems and infrastructures, as well as identify the essential hardware and software components of computer systems from the perspective of dependable functionality and cyber security (K_U03, K_U04).

Assessment methods and assessment criteria:

This course will teach you the fundamentals of cybersecurity. No technical or management expertise is required. The entire course is based on the case study method, using real and recent cases of data breaches and cybersecurity crises in well-known companies.

This method effectively promotes social skills such as collaboration, discussion, and presenting findings to other participants.

Pass points are awarded for each class. There is a google spreadsheet with the points you get. It is constantly updated. Additional points can be earned through special assignments, presentations, etc. (e.g., for making up absences).

There is no final exam.

Classes in period "Summer semester 2023/24" (in progress)

Time span: 2024-02-19 - 2024-06-16
Selected timetable range:
Navigate to timetable
Type of class:
Project, 30 hours more information
Coordinators: Bartłomiej Moszoro
Group instructors: Bartłomiej Moszoro
Students list: (inaccessible to you)
Examination: Course - Grading
Project - Grading
Course descriptions are protected by copyright.
Copyright by University of Warsaw.
Krakowskie Przedmieście 26/28
00-927 Warszawa
tel: +48 22 55 20 000 https://uw.edu.pl/
contact accessibility statement USOSweb 7.0.3.0 (2024-03-22)