Admission requirements
Admission only after intake, see https://www.csacademy.nl/en/education/master-s-programmes/executive-master-s-programme-cyber-security.
Description
exploring what cyberspace entails: first explorations in conceptualising cyberspace, its working, cyber risks, and cyber security challenges
introduction to fundamental concepts that are central to understanding and reasoning about cyberspace, cyber security and related risks
learning by doing: practical demonstrations and exercises related to cyber attack and defense
lectures on the basic working and governance of ITC systems (including the Internet)
lectures and exercises on (cyber) risk management (assessment & mitigation) approaches
critical infrastructures and critical information infrastructures and their interdependencies
lectures and assignments on “the human factor” of cyber security ((motives of the) people in the role of attacker and that of end-user)
summary/outcomes: (common) conceptualisations of cyberspace, cyber risks, cyber security challenges
use a few basic intelligence, attack and defense tools in a lab environment (including the working of these tools and what possible consequences of their application)
apply a chosen cyber risk assessment or mitigation approach onto a new case study
Course objectives
Participants have:
basic knowledge & understanding of what cyberspace entails, the various sub domains, the interwoven nature of virtual and real worlds, and the implications for cyber security as well as security in the real world
basic knowledge & understanding of how Internet works, the use and abuse of the Internet and the dependency on IT services in critical infrastructures, how society in all kinds of sub-domains has become (highly) dependent on IT services
basic knowledge of the governance of the Internet and involved stakeholders
Participants are able to:
identify various cyber risks (intentional and unintentional) and what impact they result into (e.g. legal, economical and, political impact)
(qualitatively) reason about the relations cyber threats-incidents-risks and possible counter measures to reduce existing cyber risks to accepted levels (bowtie thinking)
use a few basic intelligence, attack and defense tools in a lab environment (including the working of these tools and the possible consequences of their application)
apply a chosen cyber risk assessment or mitigation approach onto a new case study
Timetable
7 days from 9.30 until 17.00.
Thursday 2 February 2017
Friday 3 February 2017
Friday 10 February 2017
Friday 17 February 2017
Friday 24 February 2017
Friday 10 March 2017
Friday 17 March 2017
Mode of instruction
Lectures, seminars, exercises, class discussion.
Lecturers: Prof.dr. Jan van den Berg, Dr. Bibi van den Berg, Dr. Dennis Broeders, Prof.dr. Michel van Eeten, Prof.dr. Edwin Bakker, and others
Course Load
5 EC.
Assessment method
Assignments (60%), written exam (40%)
No compensation is possible for assignments of 30% or more.
You can find more information about assessments and the timetable exams on the website.
Details for submitting papers (deadlines) are posted on Blackboard.
On the Public Administration front page of the E-guide you will find links to the website, uSis and Blackboard.
Resit
Students will be permitted to resit an examination if they have taken the first sit and have a mark lower than 5.5 or with permission of the Board of Examiners.
Resit written exam
Students that want to take part in a resit for a written exam, are required to register via uSis. Use the activity number that can be found on the ‘timetable exams’.
Blackboard
Yes, for posting slides of lectures, relevant literature and assignments.
Reading list
Compulsory literature and literature for further consultation will be announced via Blackboard.
Registration
Use both uSis and Blackboard to register for every course.
Register for every course and workgroup via uSis. Some courses and workgroups have a limited number of participants, so register on time (before the course starts). In uSis you can access your personal schedule and view your results. Registration in uSis is possible from four weeks before the start of the course.
Also register for every course in Blackboard. Important information about the course is posted here.
Registration Studeren à la carte and Contractonderwijs
N/A
Contact
Prof.dr. Jan van den Berg
Drs. Mireille Snels, programme manager:
m.m.snels@cdh.leidenuniv.nlPauline Hutten MSc, programme coordinator:
p.e.hutten@fgga.leidenuniv.nl
Remarks
See https://www.csacademy.nl/en/education/master-s-programmes/executive-master-s-programme-cyber-security