Prerequisite/Recommended prerequisite for
participation in the module
Basic understanding of network security.
Content, progress and pedagogy of the
- Must have knowledge of standards addressing top cyber security
- Must have knowledge of effective measures that cyber security
programs should take
- Must have knowledge of trusted and open architectures
- Must have an understanding of device security trends and
threats associated with “Bring your own device” (BYOD)
- Must have knowledge of (mobile) device management and integrity
factors for trusted and untrusted devices
- Must have knowledge of strong user and machine authentication
based on valuable assets
- Must have knowledge of hardware-based encryption (“Security on
chip”) for higher performance
- Must have a knowledge of technologies already embedded in
- Must have knowledge of cyber attacks
- Must have knowledge of behavioural profiling and intrusion
prevention tools for layer defences
- Must have knowledge of security services and policies within
public and private cloud networks
- Must be able to identify requirements and create policies to
establish a consistent architecture
- Must be able to monitor, detect and respond to anomalies in the
- Must be able to analyse the integrity of the platform to ensure
that no unauthorised use has occurred.
- Must be able to design and implement different levels of trust
in open architectures.
- Must have the competency to design cyber security measures for
- Must have the competency to discuss end-to-end standards to
enable seamless security in an open ecosystem.
- Must have the competency to discuss the business potential and
implications of trusted ecosystems
Type of instruction
Types of instruction are listed at the start of Chapter 3.