Cybersecurity: Prevention and Regulation 2751-BW-KONJA-20-CPR
Detailed Schedule for 15-Hour Course: Cybersecurity: Prevention and Regulation
Session 1: Introduction to Cybersecurity and Cybercrime (2 Hours)
Overview of the course structure and objectives.
Definitions of cybersecurity and cybercrime.
Discussion on the relevance of cybersecurity in today's digital landscape.
Historical evolution of cybercrime and notable case studies.
Activities:
Lecture on key concepts.
Group discussion: "What makes a system secure or vulnerable?"
Session 2: Threat Actors and Types of Cybercrime (2 Hours)
Classification of cybercrime: financial fraud, data breaches, ransomware, hacking, etc.
Overview of threat actors: cybercriminals, hacktivists, insider threats, and state-sponsored hackers.
Understanding their motivations and objectives.
Activities:
Case study analysis: "NotPetya Attack – A Global Perspective."
Brainstorming exercise on potential threat vectors in different industries.
Session 3: Legal Frameworks in Poland and the EU (2 Hours)
Overview of key cybersecurity and data protection regulations:
Poland: Act on National Cybersecurity System (KSC).
EU: GDPR, NIS Directive, Cybersecurity Act.
Rights, obligations, and penalties under these regulations.
The role of public institutions and private organizations in compliance.
Activities:
Interactive lecture with Q&A on compliance requirements.
Practical exercise: Analyze a data breach case and discuss legal implications.
Session 4: Cybersecurity Principles and Best Practices (2 Hours)
Fundamental principles of cybersecurity for users:
Password management.
Secure browsing habits.
Recognizing phishing and social engineering tactics.
Security measures for organizations: firewalls, antivirus software, and encryption.
Activities:
Workshop: Simulated phishing emails – how to identify and report them.
Group activity: Create a checklist for secure online practices.
Session 5: Prevention and Detection of Cyber Threats (2 Hours)
Strategies to prevent intrusions:
Network security practices.
Role of multi-factor authentication.
Methods for detecting and responding to intrusions:
Intrusion detection systems (IDS).
Incident response plans.
Activities:
Practical exercise: Setting up basic intrusion prevention measures.
Discussion on the importance of timely reporting and forensic investigation.
Session 6: Emerging Threats and Trends in Cybercrime (2 Hours)
Analysis of current trends: ransomware, deepfakes, IoT vulnerabilities.
Exploring cyber terrorism and its global implications.
Future trends and how to stay ahead of evolving threats.
Activities:
Case study: Cyberattack on critical infrastructure.
Brainstorming session: "How can technology both solve and create cybersecurity challenges?"
Session 7: Final Discussion, Review, and Project Presentations (3 Hours)
Summary of course topics.
Open discussion: Challenges and opportunities in combating cybercrime.
Student presentations on team projects:
Analysis of a major cybercrime event or proposal for a cybersecurity plan.
Feedback and course wrap-up.
Activities:
Team presentations and peer evaluations.
Course feedback and certification distribution.
Total student workload
Learning outcomes - knowledge
Learning outcomes - skills
Learning outcomes - social competencies
Teaching methods
Observation/demonstration teaching methods
Expository teaching methods
- participatory lecture
- description
- informative (conventional) lecture
- problem-based lecture
- narration
Exploratory teaching methods
- presentation of a paper
- practical
Online teaching methods
- cooperation-based methods
- exchange and discussion methods
Prerequisites
Course coordinators
Assessment criteria
Active participation in classes (discussion of 4-5 cybersecurity issues) and presentation of work results in group classes.
Class Participation 20%; Final Project 80%
-- Written Submission (50%)
-- Simulation (50%).
Class participation is both important and required.
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: