Code
MGSE MIS 4403
Level
M1
Field
Systèmes d’information
Language
Anglais/English
ECTS Credits
1
Class hours
12
Total student load
20
Program Manager(s)
Department
- Technologies, Information et Management
Educational team
Introduction to the module
In an increasingly interconnected world, cybersecurity has evolved from a technical challenge into a cornerstone of business strategy and societal stability. Unlike other departments that receive funding to deliver visible results, successful cybersecurity management often requires significant investment without immediately tangible outcomes. It is only when incidents occur that the critical importance of robust cybersecurity practices becomes glaringly evident.
Cybersecurity, alongside artificial intelligence, stands at the forefront of contemporary business innovation. Yet, its foundational principles trace back to ancient times, rooted in humanity’s enduring need to protect valuable information assets. Modern data breach reports reveal a striking insight: despite the sophisticated technologies involved, the majority of security incidents originate from human error. This underscores the multidisciplinary nature of cybersecurity management, which demands an understanding of human behavior, business priorities, and the exploitation of vulnerabilities by attackers.
The central objective of this course is to introduce students to cybersecurity in ways that are both relatable to their digital lives and relevant to modern business practices. Students will explore the subtle interplay between human behavior, managerial decisions, and technological vulnerabilities. Through practical case studies, analyses of human bias, secure design principles, and current business-technology news, the course aims to demystify cybersecurity and inspire students to integrate security considerations into projects far beyond this course.
Learning objectives/Intended learning outcomes
- 1.1 - Audit advanced and specialised uses of digital intelligence tools in order to deploy them appropriately, taking into account the strategic context of organisations.
- 5.3 - Bring together and engage internal and external stakeholders in order to develop an internal and external network conducive to the strategic development of the organisation, while ensuring that interactions between management and the various operati
- 6.1 - Design, develop and implement policies and practices conducive to the dynamism of the organisation, in order to resolve identified issues, taking into account the specific characteristics of the business context.
Content : structure and schedule
Note: the order of modules and title names may be subject to minor change.
1. Introduction to Cybersecurity and Cyber Threats
2. Compromising Cybersecurity and the Promise of the Secured
3. Protective Strategies and the Cybersecurity Management Lifecycle
4. Simulation and Case Study: Incident-Centered Management
Sustainable Development Goals
This course contributes to SDG 9 (Industry, Innovation and Infrastructure) by strengthening students’ ability to design and govern secure, resilient, and trustworthy digital infrastructures—a prerequisite for sustainable innovation. The course equips future managers with practical frameworks for assessing cyber risk, implementing security controls, and aligning security strategy with business objectives, so that organizations can scale technology without undermining reliability, continuity, or trust. Through cases, risk-analysis exercises, and governance-oriented discussions, students learn how cybersecurity enables innovation by protecting critical systems, data flows, and inter-organizational infrastructures that modern industries depend on.
Number of SDG's addressed among the 17
9
Learning delivery
synchrone
Pedagogical methods
Interactive lectures (key concepts, frameworks, threat landscape); Case-based learning (real incidents: breaches, ransomware, supply-chain failures); Scenario / tabletop exercises (incident response, crisis decision-making, communication); Group projects (security strategy, governance plan, controls roadmap)
Evaluation and grading system and catch up exams
The evaluation includes final course project in groups (50%), a visual report or research report on practical cybersecurity issues (40%), and attendance score (10%). The catch-up exam is in the form of an essay-based exam involving intermediate topics.
Textbook Required and Suggested Readings
There will be a number of reading materials for the course (mostly articles and short forms). Textbook-wise, one source we refer to is "Information Security Management" by Raggad.
Keywords
Cybersecurity, Information Security, Privacy, Risk, Ethics
Prerequisites
There is no hard prerequisite for the course, although familiarity of digital technologies and cybersecurity threats are welcomed.