Curriculum
Course: Foundation Year - Qualifi Level 3 Diplom...
Login
Text lesson

Unit CSM05: Solutions: Future-Proofing your Business

Unit code: R/617/1171

RQF level: 3

Aim

In this unit the learner will bring together your knowledge and understanding from the previous units. This unit focuses on scoping the threats and vulnerabilities to companies, employees and customers across their entire network space,  including LANs, WANs, Cloud Storage, mobile devices and any IoT-enabled devices The learner will apply the OSI model to understand the various opportunities that business organisations can take to protect their people, processes and technologies. The learner will then begin the task of developing an holistic security plan for a large-scale business organisation.  Learners will explore various Security Engineering Standards and Threat Assessment approaches before devising and generating their own organisational security plan based on a formal risk assessment. This plan should be comprehensive, relevant and suitable to be applied by a multinational organisational Executive Board.

Learning and Assessment Criteria

Learning Outcomes. To achieve this unit a learner must be able to:  Assessment Criteria: Assessment of these outcomes demonstrates a learner can:
1 Understand the future cyber threat environment for companies in the short to medium term

1.1 Discuss key emerging cyber-enabled workplace technologies and the associated cyber security risks

1.2 Apply formal information security management approaches to a complex modern workplace environment 

2 Understand how formal Industry Standards, Training and Accreditations support cyber security and business resilience

2.1 Explain the key industry standards relating to cyber security and business resilience

2.2 Explain  the key training and accreditation schemes relating to cyber security and business resilience 

3 Develop a cyber security plan (‘cyber security business toolkit’) for a large business organisation

3.1 Explain the costings and ‘business case’ for investing in a lawful internal cyber security system

3.2 Design a cyber security toolkit (security plan) to meet the security requirements of an organisation that is based on a formal risk assessment for the same organisation

 

Layer 1