Prospectus

nl en

Introduction to cyberspace

Course
2016-2017

Admission requirements

Admission only after intake, see https://www.csacademy.nl/en/education/master-s-programmes/executive-master-s-programme-cyber-security.

Description

  • exploring what cyberspace entails: first explorations in conceptualising cyberspace, its working, cyber risks, and cyber security challenges

  • introduction to fundamental concepts that are central to understanding and reasoning about cyberspace, cyber security and related risks

  • learning by doing: practical demonstrations and exercises related to cyber attack and defense

  • lectures on the basic working and governance of ITC systems (including the Internet)

  • lectures and exercises on (cyber) risk management (assessment & mitigation) approaches

  • critical infrastructures and critical information infrastructures and their interdependencies

  • lectures and assignments on “the human factor” of cyber security ((motives of the) people in the role of attacker and that of end-user)

  • summary/outcomes: (common) conceptualisations of cyberspace, cyber risks, cyber security challenges

  • use a few basic intelligence, attack and defense tools in a lab environment (including the working of these tools and what possible consequences of their application)

  • apply a chosen cyber risk assessment or mitigation approach onto a new case study

Course objectives

Participants have:

  • basic knowledge & understanding of what cyberspace entails, the various sub domains, the interwoven nature of virtual and real worlds, and the implications for cyber security as well as security in the real world

  • basic knowledge & understanding of how Internet works, the use and abuse of the Internet and the dependency on IT services in critical infrastructures, how society in all kinds of sub-domains has become (highly) dependent on IT services

  • basic knowledge of the governance of the Internet and involved stakeholders

Participants are able to:

  • identify various cyber risks (intentional and unintentional) and what impact they result into (e.g. legal, economical and, political impact)

  • (qualitatively) reason about the relations cyber threats-incidents-risks and possible counter measures to reduce existing cyber risks to accepted levels (bowtie thinking)

  • use a few basic intelligence, attack and defense tools in a lab environment (including the working of these tools and the possible consequences of their application)

  • apply a chosen cyber risk assessment or mitigation approach onto a new case study

Timetable

7 days from 9.30 until 17.00.

  • Thursday 2 February 2017

  • Friday 3 February 2017

  • Friday 10 February 2017

  • Friday 17 February 2017

  • Friday 24 February 2017

  • Friday 10 March 2017

  • Friday 17 March 2017

Mode of instruction

Lectures, seminars, exercises, class discussion.

Lecturers: Prof.dr. Jan van den Berg, Dr. Bibi van den Berg, Dr. Dennis Broeders, Prof.dr. Michel van Eeten, Prof.dr. Edwin Bakker, and others

Course Load

5 EC.

Assessment method

  • Assignments (60%), written exam (40%)

  • No compensation is possible for assignments of 30% or more.

You can find more information about assessments and the timetable exams on the website.
Details for submitting papers (deadlines) are posted on Blackboard.
On the Public Administration front page of the E-guide you will find links to the website, uSis and Blackboard.

Resit
Students will be permitted to resit an examination if they have taken the first sit and have a mark lower than 5.5 or with permission of the Board of Examiners.

Resit written exam
Students that want to take part in a resit for a written exam, are required to register via uSis. Use the activity number that can be found on the ‘timetable exams’.

Blackboard

Yes, for posting slides of lectures, relevant literature and assignments.

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard.

Registration

Use both uSis and Blackboard to register for every course.
Register for every course and workgroup via uSis. Some courses and workgroups have a limited number of participants, so register on time (before the course starts). In uSis you can access your personal schedule and view your results. Registration in uSis is possible from four weeks before the start of the course.
Also register for every course in Blackboard. Important information about the course is posted here.

Registration Studeren à la carte and Contractonderwijs

N/A

Contact

Remarks

See https://www.csacademy.nl/en/education/master-s-programmes/executive-master-s-programme-cyber-security