Universität Wien

052000 VU Information Security Management (2022W)

Continuous assessment of course work
MIXED

Registration/Deregistration

Note: The time of your registration within the registration period has no effect on the allocation of places (no first come, first served).

Details

max. 25 participants
Language: English

Lecturers

Classes (iCal) - next class is marked with N

Monday 03.10. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 10.10. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 17.10. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 24.10. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 31.10. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 07.11. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 14.11. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 21.11. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 28.11. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 05.12. 16:45 - 18:15 Digital
Monday 12.12. 16:45 - 18:15 Digital
Monday 09.01. 16:45 - 18:15 Digital
Monday 16.01. 16:45 - 18:15 Digital
Monday 23.01. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00
Monday 30.01. 16:45 - 18:15 Seminarraum 5, Kolingasse 14-16, EG00

Information

Aims, contents and method of the course

The aim of the course is to teach the basics of information security and the structure of information security management systems.

The contents are based on the CISSP certification and the textbooks used. Among others, the following topics are covered:
- Security and Risk Management
- Asset Security
- Security Engineering
- Communications and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
- Baseline Security
- ISO 2700x, BSI Grundschutz

Assessment and permitted materials

- written or oral examination
- Submission of exercise examples
- Presentation of course content

Minimum requirements and assessment criteria

50% to pass.

Grading scheme:
=IF(B2>89;1;IF(B2>79;2;IF(B2>64;3;IF(B2>49;4;5))))

Examination topics

Slides of the lectures
Exercise examples
selected chapters of the textbooks

Reading list

- Management of Information Security. 6ed. Whitman
- CISSP All in one. 9th ed. Fernando Maymi, Shon Harris

Association in the course directory

Modul: W1 Vertiefung

Last modified: Th 11.05.2023 11:27