• عربي
  • 中文
  • English
  • Français
  • Русский
  • Español
 
  This module is a resource for lecturers  

 

Possible class structure

 

The following is a recommended structure for the class. Students should complete the required readings before coming to class. The lecture is meant to reinforce what they learned in the readings and the exercises are designed to apply what they learned in the readings and the lecture. The following breakdown is designed for a three-hour class. Lecturers can adapt the structure based on their needs and class times.

Introduction and learning outcomes

Lecture  (10 minutes):

  • Provide a brief introduction to the class and its contents
  • Identify and discuss the learning outcomes of the class
 

Assets, vulnerabilities and threats

Lecture  (20 minutes):

  • Define, discuss, and evaluate assets, threats, and vulnerabilities
 

Risk

Lecture  (20 minutes):

  • Define and discuss risks
  • Assess risks
 

Vulnerability Disclosure

Lecture  (20 minutes):

  • Identify and assess the ways in which vulnerabilities can be disclosed

[ Optional: Students complete " Homework # 2" under the "Student Assessment" section of this Module before class and discuss their findings during this lecture. Students can either hand in a one to three-page summary of their findings or merely come prepared to discuss their findings in class].

Exercise Discussion (20 minutes):

 

Break

Time: 10 minutes

 

Cybersecurity Measures and Usability

Lecture  (30 minutes):

  • Describe and critique the relationship between cybersecurity and usability

[ Optional: Students complete " Homework # 3" under the "Student Assessment" section of this Module before class and discuss their findings during the lecture. Students can either hand in a one to three-page summary of their findings or merely come prepared to discuss their findings in class].

 

Situational Crime Prevention

Lecture  (10 minutes):

  • Discuss situational crime prevention and apply it to cybercrime prevention and reduction
  • Propose cybercrime prevention and reduction measures

Class Exercise  (20 minutes):

  • Students complete " Exercise # 2: Situational Crime Prevention" under the "Exercises" section of this Module before class and discuss their findings during the lecture. Students can either hand in their work or merely come prepared to discuss their findings in class.
 

Incident Detection, Response, Recovery, and Preparedness

Lecture  (20 minutes):

  • Discuss and analyse incident detection, response, recovery, and preparedness

[ Optional: Students complete " Exercise # 3: Detection, Response, Recovery, and Preparedness" under the "Exercises" section of this Module before class and discuss their findings during the lecture].

 
Next: Core reading
Back to top