Kies op maat

Inloggen Menu

Security

The digital landscape is changing at a rapid pace. Now more than ever news about cyber security reaches us on an almost daily basis. New technologies are shifting the attack opportunities available for attackers, increasing the need for a new generation of cybersecurity specialists.

 

In 2023 an ISC2 study estimated the global security workforce gap to be four million people. This minor aims to offer students with the needed knowledge for the working field as well as preparing them for problems they will encounter in the field.

 

This minor focuses not only on gaining technical cyber security knowledge but also on bridging the gap between technical personnel and management. The minor covers a broad range of subjects to facilitate this particular goal.

 

This program is based on gaining an in-depth understanding of the five core functions of the NIST CSF 2.0 framework. The five core functions of this circular framework are: Identify, Protect, Detect, Respond & Recover, all driven by the core function Govern.

Most courses are assessed by working on real cases provided by partner companies. Students need to combine their research with the knowledge gained from the lectures to help define a solution for these problems.

 

These activities will contribute to gaining a breadth of experience, knowledge & skills over the broad spectrum of cyber security. Next to that students are encouraged to gain a depth of high-level expertise in their Final Project. Here students have the opportunity to excel and grow in an expertise that best fits their interests

Leerdoelen

At the end of this minor the student:

o   has an understanding of the complexities and dependencies in cyberspace

o   can contribute to solving risks in cyberspace from both technical, policy, and managerial approaches.

o   has an understanding of the ethical responsibilities related to securing cyberspace.

o   can manage cyber threats to acceptable risks.

o   can manage the impact of a cyber incident to acceptable levels.

o   can bridge the gap between technical and more policy-oriented professionals within the organizations.

o   can translate tactical and operational cyber-related issues into a strategy for an organization.

o   can critically reflect on new developments and results within the field of cyber security

o   has an understanding of laws and regulations related to IT security

Ingangseisen

Audience:

o   Bachelor Information Technology 3rd & 4th year

o   Bachelor Business IT Management 3rd & 4th year

o   Bachelor Computer Science 3rd & 4th year

 

Do keep in mind there are a lot of technical courses in this course. It is recommended that students have experience/knowledge of networking and programming.

Rooster

Spring: February till June 2025

Strategies and teaching activities

  • Workshops / living labs by experts.
  • Theoretical classes with practical
  • Working on solving security problems of real companies.

Researching security problems

Toetsing

  • Final Project Assessment
  • Code assessment
  • Individual (written) exams
  • Case studies
  • Contributing to discussion forums

Aanvullende informatie

Sign up (deadline 30-11-2024):

Petra Folkertsma, Haarlem

petra.folkertsma@inholland.nl

Questions:

Wiley Finch, Haarlem

Wiley.finch@inholland.nl