The objective of the programme is to educate a new generation of management level cybersecurity specialists and prepare them for the management of information resources of different types of organisations, taking into account a multidimensional, comprehensive view of information security problems.
The subject enables students to learn about the basic aspects of an organisation, structure and use of cybersecurity systems. The topics of lectures and exercises include, inter alia, technological aspects of cybersecurity, standards and norms within cybersecurity, mechanisms for ensuring security of networks, operational systems and computing clouds, the use of artificial intelligence methods in cybersecurity as well as issues of so-called cybersecurity engineering.
The subject allows the student to learn about the main threats and methods of data protection in databases considered against the background of architecture and contemporary applications of database technology. In particular, attention will be paid to the fundamental differences between the rules for the protection of transactional and statistical databases. Processes and mechanisms of confidentiality protection, mechanisms of data integrity protection (statistical and dynamic) and the issue of ensuring the continuity of the database system will be discussed. The importance of management decisions and the role of the database system administrator team in these processes will be emphasized. Due to the rapid increase in the importance of data analysis using the concept of "Big Data", the lectures also included the issues of security of information processes that use often incomplete, inconsistent Internet distributed network resources.
The course provides postgraduate students with knowledge in the field of managerial decision-making. Students will be introduced to both models, methods and computer tools used to solve decision-making problems. Students learn about the principles of modelling decision-making problems, types of decision-making models, examples of models of typical decision-making problems in the field of management and command, and their applications. They are introduced to the problem of decision making in deterministic and random (risk) conditions, with multiple criteria (multi-criteria optimization), in conflict situations (elements of game theory). In addition, they learn about the analysis of complex projects (CPM, PERT, CPM-cost), forecasting methods and optimization of investment decisions.
The course allows to provide the student of postgraduate studies with the basics of knowledge about the problems related to the so-called information warfare. Students will learn: forms of activities and models of combat in cyberspace; models, methods and tools for identifying, recognizing and assessing the possibilities of information impact; models, methods and tools to counteract the information impact; the issues of manipulating people with the use of artificial intelligence; hacking artificial intelligence; OSINT basics.
The course will enable the postgraduate student to learn the basic principles and practical methods of crisis management in an organization affected by a cyberattack and its renewal after a crisis.
The course will introduce to the student of the post-graduate studies the architecture of the national cybersecurity system in Poland and practical aspects of cybersecurity on the national and sectorial level.
The subject allows to provide the student of postgraduate studies with the basics of knowledge about the problems related to the security of various objects / entities operating in cyberspace and their management in terms of cyber threats. Students learn to identify and understand the problems of information cybersecurity, construct models and methodologies for measuring the level of cyberthreats in relation to various types of systems / objects functioning in cyberspace. Students learn how to effectively and efficiently use the available technical and organizational security measures as well as instruments and mechanisms to protect sensitive cyberspace resources. Moreover, students acquire skills in the area of cybersecurity risk analysis and estimation as well as the effects of cyber threats in cyberspace.
The course will introduce the student of the post-graduate studies to the evolution of NATO approach to cyber security, influence of changing security environment on NATO cyber security policy, and NATO initiatives concerning cyberspace.
The aim of the course is to prepare students for the criminal law analysis of the most common security incidents - i.e. determining which incidents constitute crimes and performing a criminal law analysis of the elements of a prohibited act. Moreover, the goal of the classes is to prepare students to independently determine what evidence should be collected depending on the act that is the subject of the proceedings.
The module presents issues of building information and communication systems, paying attention to the key aspects of managing IT projects and including cyber security issues. The module discusses practical aspects of applying project management methodologies with particular emphasis on requirements engineering, software complexity estimation, cost estimation, project scheduling and implementation of supervision techniques.
The course will introduce the student of the post-graduate studies to the basic principles and practical methods of IT service management.
The subject allows to provide students with the basics of knowledge about problems related to cyber conflicts at the international level. Students will learn about current and historical examples of activities in cyberspace, regarding the use of ICT tools in violating the cyberspace security of other countries or organizations by state structures, the main actors of activities in cyberspace, the consequences of cyber attacks, in particular with regard to services essential for the functioning of state organisms, and methods of describing these phenomena, also by trying to measure it. They will learn practical methods of strategic planning and coordination of activities at the level of organizational units, which are to counteract and limit the effects of cyber attacks.
The subject is devoted to the essence and methodology of writing diploma theses. The primary goal is to develop the ability to write a dissertation and present the results of research or project work. The subject is also intended to create a platform for the exchange of knowledge and experiences between the audience in the form of presentations and moderated discussions by the teacher of the subject with the participation of all seminar participants.