UC2IRM10 IT Risk Management
UC2IRM10 IT Risk Management
- Course description
- NQF LevelBachelor's degree (Level 6 1. Cycle)
- Area of StudyComputing
- Program of StudyDigital Assurance and Security Management
- ECTS10
- CampusOnlinePLUS - Bergen, OnlinePLUS - Oslo, Online
- Course LeaderPiet Delport
This course aims to equip students with the ability to analyze problems and situations, assess risk, communicate impact, and develop viable solutions in alignment with technology strategy goals. Students gain knowledge of threats, vulnerabilities, risk appetite, tolerance, impact, prioritization, response, and mitigating controls. They develop skills to connect IT-related risk management to business objectives, balance IT-related risk with other enterprise risks, and suggest cost-effective risk mitigation controls. The course cultivates competence in effectively communicating risk concepts to stakeholders and systematically approaching complex tasks within risk management.
The student has knowledge of
K1 | threats and vulnerabilities. |
---|---|
K2 | risk appetite and tolerance. |
K3 | risk impact, prioritization and response. |
K4 | risk mitigating controls and strategies. |
The student gain skills in
S1 | connecting management of IT-related risk to business objectives. |
---|---|
S2 | balancing IT-related risk with other enterprise risk. |
S3 | suggesting appropriate risk mitigation controls based on cost-benefit analyses. |
The student can demonstrate
G1 | communicating with stakeholders on concepts of risks • systematically approaching complex tasks within risk management. |
---|
- Essential Risk Governance and Management components
- Risk Assessment, Response and Communication
- Teaching will be based on a hybrid-flexible approach. Instructor-led face-to-face learning is combined with online learning in a flexible course structure that gives students the option of attending sessions in the classroom, participating online, or doing both.
- All activities require active student participation in their own learning.
- Learning delivery methods and available resources will be selected to ensure constructive alignment with course content, learning outcomes and assessment criteria.
- Students will be taught using a mixture of guidance, self-study, and lecture material. Topics will be introduced in a series of weekly lectures. The guidance sessions will be directed practical exercises and reading in which students can explore topics with support from a teacher. This material will also require students to self-manage their time to ensure tasks are completed and the theory is fully understood. This will allow the students to fully engage with lectures and with their peers.
- Learning resources are available in the LMS and include, but is not limited to:
- literature and online reading material (essential and recommended)
- streams, recordings and other digital resources, where applicable
- video conferencing and communication platforms, if applicable
- tools, software and libraries, where applicable
- Students must have access to an internet connection, and suitable hardware.
- Accessing live streams and virtual laboratories requires a minimum broadband connection of 2Mbps (4Mbps recommended).
- Students working on their own laptop/computer are required to acquire appropriate communications software; e.g., webcam, microphone, headphones.
UC1ISG05 Information Security and Governance, or equivalent course(s).
The reading list for this course and any additional electronic resources will be provided in the LMS.
Activity | Duration |
---|---|
Teacher-led activity | 33 |
Teacher-supported work | 48 |
Self-study | 169 |