Cybersecurity is important for our daily lives including various types of activities. There is a growing demand for students who can be researchers and engineers capable of understanding cybersecurity.
In order to satisfy this demand, Tokyo Tech has launched Progressive Graduate Minor in Cybersecurity in April, 2016. We design the curriculum of Progressive Graduate Minor in Cybersecurity in collaboration with NRI as the core, also with Rakuten, NTT, AIST, and NISC. The following six courses are organized in School of Computing: Foundation of Cybersecurity (1Q, 2-0-0), Theory of Cryptography for Cybersecurity (3Q, 2-0-0), Cybersecurity Governance (3Q, 1-1-0), Attack and Defense on Cybersecurity I (2Q, 1-1-0), Attack and Defense on Cybersecurity II (3Q, 1-1-0), and Attack and Defense on Cybersecurity III (4Q, 1-1-0).
This course is one of the core courses in this minor. In this course, you will understand the basic framework of management measures related to information security and master methods for corporate governance with security consideration.
By studying this lecture, you understand the following and learn how to think.
1) Understand the framework on information security management.
2) You can understand concrete security measures for corporate governance.
3) You can plan for information security.
4) We can make recommendations, support and report to management.
security, information security, cybersecurity, incident, risk control, IoT
✔ Specialist skills | Intercultural skills | Communication skills | ✔ Critical thinking skills | ✔ Practical and/or problem-solving skills |
Classes will be advanced through lectures and dialogues, related exercises.
Course schedule | Required learning | |
---|---|---|
Class 1 | Orientation, recent topics, basic idea of information security management | Understanding security management framework. |
Class 2 | Organization/structure/rules for information security management, employee management and education and training | Understanding internal control, human resources definition. |
Class 3 | Responding and managing information security incidents | Understanding incident handling. |
Class 4 | Security management of information assets, information security management of facilities and environment, security management of terminals and media | Understanding controls and guidelines. |
Class 5 | Network security management, information security systemization | Understanding support system/tool. |
Class 6 | Risk assessment, information security audit | Understanding risk control. |
Class 7 | Information security management of group companies and overseas bases | Understanding corporate governance. |
Class 8 | Laws on information security | Understanding law, institution, standard. |
Class 9 | Overview of regulations on information security in financial institutions, various problems by business type | Understanding regulation on business law, FinTech. |
Class 10 | Information security of control system, information security of embedded systems | Understanding IoT, Industrial equipment. |
Class 11 | Information use and information security management, information security management | Understanding management level. |
Class 12 | Information security management and personnel and labor problems, information security and public relations | Understanding organizational behavior, stakeholders, risk communication. |
Class 13 | Information security of government agencies, information security of universities/research and development agencies | Understanding security issues related to educational research institutes. |
Class 14 | Formulation of information security response plan, education and training plan, creation of required specifications for outsourcing | Understanding planning, procurement. |
Class 15 | Information security for researchers, information security as a carrier | Understanding expected role and career development. |
Textbooks will be used in this course.
References will be announced in the classes.
The evaluation consists of several reports as homework assignments during the course. Instructors also give exercises in the classes.
None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly.
keisuke[at]is.titech.ac.jp
Appointment by e-mail is required.