Level-3 Diploma in Cyber Security Management And Operations -(LSIB-UK)Specifications

Page 6

Level 3 Diploma in Cyber Security Management and Operations Unit CSM01: Threat and Risk: Expecting the Unexpected Unit code: T/617/1163 RQF level: 3 Aim In this unit the learner will be look at various case studies in recent cyber-attacks on business organisations, public sector agencies and individual victims. They will then conduct analysis will then into the motivations of malicious hackers. This analysis will include basic geopolitical learning, as it relates to the cyber domain, as well as identifying how and why different industry sectors (including Banking and Finance) are particularly vulnerable. Towards the end of the unit the learner will look at the types of hacking undertaken: White Hat hacking, Grey Hat hacking and Black Hat Hacking. Learners will be introduced to concepts such as ‘Threat’, ‘’Risk’, ‘Security Engineering’, ‘Cyber Threat Intelligence’ and ‘Cyber Resilience’.

Learning Outcomes and Assessment Criteria

Learning Outcomes. To achieve this unit a learner must be able to:

Assessment Criteria: Assessment of these outcomes demonstrates a learner can:

1

1.1 Explain major cyber events and methods of attack that have severely impactedbusinesses

Understand key business cyber security concepts including ‘threats’ and ‘risks’

1.2 Explain sources of cyber security threats and risks Understand effective sources of Cyber Threat 2 Intelligence

2.1 Explain cyber intelligence and the most effective sources 2.2 Explain how organisations can proactively plan and calculate the risks and threats to prioritise remediation (risk-assessment) For a chosen global region, review how the IT function within a multinational organisation reports on and plans for cyber security threats and risks

3

Understand the ‘psychology’ of computer misuse and the associated terminology

3.1 Assess the factors that put individuals at risk from a cyber-attack Explain the attack-lifecycle 3.2 Describe the potential risks from a deliberate, planned attack, from a malicious hacker or group

London School of International Business | www.LSIB.co.uk

7


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.