Singapore University of Social Sciences

Advanced Cybersecurity Strategies

Advanced Cybersecurity Strategies (CSS319)

Applications Open: To be confirmed

Applications Close: To be confirmed

Next Available Intake: To be confirmed

Course Types: To be confirmed

Language: English

Duration: 6 months

Fees: To be confirmed

Area of Interest: Humanities and Social Sciences

Schemes: To be confirmed

Funding: To be confirmed

School/Department: School of Humanities & Behavioural Sciences


Synopsis

CSS319 aims to prepare students to be adept cybersecurity professionals with capabilities to protect digital assets. Students will gain a deep understanding of network and application security essentials from protocols to defence mechanisms. As the cloud becomes the backbone of modern infrastructure, there will be an opportunity to dissect cloud concepts and migration strategies. Students will then delve into planning for business continuity and disaster recovery, learn to navigate incidents and uncover the psychological underpinnings of social engineering and behavioural models to foster a resilient cybersecurity culture in their organisations. Prior knowledge of cybersecurity is not essential.

Level: 3
Credit Units: 5
Presentation Pattern: EVERY JAN

Topics

  • Network Security I: Concepts and Threats
  • Network Security II: Controls
  • Network Security III: Wireless Networks
  • Emerging Topic: Cloud Computing
  • Application Security I: Development
  • Application Security II: Attacks & Controls
  • Cybersecurity Planning I: Business Continuity Planning
  • Cybersecurity Planning II: Disaster Recovery Planning
  • Managing Cybersecurity I: Incident Response and Management
  • Managing Cybersecurity II: Security Assessment and Testing
  • Psychology of Cybersecurity I: Security Culture and Training
  • Psychology of Cybersecurity II :Social Engineering

Learning Outcome

  • Illustrate the OSI and TCP/IP models and their significance in network communications.
  • Appraise threats to data-in-motion, including eavesdropping and data corruption.
  • Apply psychological principles to improve security awareness and build a robust security culture.
  • Examine cloud service models, perform risk analysis, and apply cloud security tools.
  • Design secure system development controls and safeguard databases against threats.
  • Plan vulnerability assessments and penetration testing.
Back to top
Back to top