Pomiń do głównej zawartości

Opis kursu

The course is addressed to current and future employees of public administration and enterprises, especially to persons responsible for the administration and management of security of ICT systems and for the development and implementation of security policy, as well as people working in analytical positions related to broadly understood information security.

We would like to inform you that the organizer of the course has changed its name from 1.10.2022 to the Akademia Nauk Stosowanych im. Józefa Gołuchowskiego and, therefore, the old name and logo - WSBiP - appears on some of the materials prepared in the course.


PREREQUISITES

The course participant should know the principles of operation of modern ICT systems and have general knowledge in the field of information technologies, operating systems, computer networks, databases, software engineering and issues of ICT security. He should also have knowledge of contemporary civilization threats in the information space and be familiar with development directions of the telecommunication systems. It is advisable for participants to have general knowledge of the legislation regarding sensitive information resources as well as basic knowledge of English.


COURSE OBJECTIVES 

The main goal of the course is to familiarize participants with modern security dilemmas in the digital world in the face of new threats related to information processing using stationary and mobile ICT systems with the simultaneous development of information security management skills, creating security architecture and establishing information security policy. The implementation of the main objective will enable the acquisition of good practices in the protection of classified information through the ability to perform risk analysis in the preparation of an ICT system for audit taking into account legislative requirements and information analysis in the event of  the use of computer forensics. Summing up - the course's goal should emphasize the acquisition of knowledge in the field of cybersecurity with an indication of the opportunities and threats from new technologies in the face of hybrid activities, cyberterrorism and information warfare.


ISSUES ADDRESSED

MODULE 1 

Theory of information security.

MODULE 2

Security of ICT systems.

MODULE 3

Security of databases, web applications and mobile devices.

MODULE 4

Information security management.

MODULE 5

Risk analysis in the area of information security.

MODULE 6

Information technology and protection of classified information.

MODULE 7

Audit of ICT systems.

MODULE 8

Information analysis and computer forensics.

MODULE 9

Cybercrime and cyberterrorism.

MODULE 10

Theory of information war.


PREREQUISITES

In order to pass the course, it is necessary to participate in closed-ended knowledge tests after each module of the course and in the knowledge test at the end of the course.

In order to pass the course, it is necessary to obtain at least a level of 80% accurate answers from the knowledge tests after each module and from the knowledge test at the end of the course (the final grade consists of 30% of the marks obtained from the tests after each module and 70% from the final test).

Anyone who obtains a passing grade will receive a certificate of completion of the course.


CONDITIONS FOR OBTAINING A CERTIFICA

In order to receive the certificate, it is necessary to participate in the knowledge tests at the end of each module and in the final test and provide accurate answers of 80%.