Code
MGSE MIS 4403
Level
M1
Field
Systèmes d’information
Language
Anglais/English
ECTS Credits
1
Class hours
12
Total student load
27
Program Manager(s)
Department
- Technologies, Information et Management
Educational team
Introduction to the module
In an increasingly interconnected world, cybersecurity has evolved from a technical challenge into a cornerstone of business strategy and societal stability. Unlike other departments that receive funding to deliver visible results, successful cybersecurity management often requires significant investment without immediately tangible outcomes. It is only when incidents occur that the critical importance of robust cybersecurity practices becomes glaringly evident.
Cybersecurity, alongside artificial intelligence, stands at the forefront of contemporary business innovation. Yet, its foundational principles trace back to ancient times, rooted in humanity’s enduring need to protect valuable information assets. Modern data breach reports reveal a striking insight: despite the sophisticated technologies involved, the majority of security incidents originate from human error. This underscores the multidisciplinary nature of cybersecurity management, which demands an understanding of human behavior, business priorities, and the exploitation of vulnerabilities by attackers.
The central objective of this course is to introduce students to cybersecurity in ways that are both relatable to their digital lives and relevant to modern business practices. Students will explore the subtle interplay between human behavior, managerial decisions, and technological vulnerabilities. Through practical case studies, analyses of human bias, secure design principles, and current business-technology news, the course aims to demystify cybersecurity and inspire students to integrate security considerations into projects far beyond this course.
Learning goals/Programme objectives
- LG1 Being able to extend digital intelligence through its different dimensions
- LG2 Having the ability to manage uncertainty and complexity with accuracy and rigor
- LG3 Having the foundations of responsible and sustainable management
Content : structure and schedule
Note: the order of modules and title names may be subject to minor change.
1. Introduction to Cybersecurity and Cyber Threats
2. Compromising Cybersecurity and the Promise of the Secured
3. Protective Strategies and the Cybersecurity Management Lifecycle
4. Simulation and Case Study: Incident-Centered Management
Learning delivery
synchrone
Evaluation and grading system and catch up exams
The evaluation of the course includes the final exam (60%), a course group project (30%) in written format, and attendance score (10%)
Textbook Required and Suggested Readings
There will be a number of reading materials for the course (mostly articles and short forms). Textbook-wise, one source we refer to is "Information Security Management" by Raggad.
Keywords
Cybersecurity, Information Security, Privacy, Risk, Ethics
Prerequisites
There is no hard prerequisite for the course, although familiarity of digital technologies and cybersecurity threats are welcomed.