Page 53 - 22.03.2021_IO1-CURRICULUM-FOR-VET-PROVIDERS_FINAL_plus-graphics
P. 53

security, risk              the start-up security,     start-up life.
               assessment and              including physical and
               security Control.           infrastructure issues,
                                           human resource issues
                                           and legal aspect issues.


                                    Chapter IV. Technological security issues

               Duration: 6 hours of self-study and work with digital exercises


               The effect after completion of Chapter IV:

                      Knowledge                      Skills                     Competences


               The participant has an      The participant names      The participant realises the
               integrated knowledge        the technological          benefits  of understanding
               about technological         issues and can explain     basics of technological
               aspects of security and  their basic principles.       security issues and can benefit
               issues stem from them.  practices; can find a          from their understanding.
                                           funds


               Requirements for obtaining a certificate of completion:

               The  minimum  requirements  for  Certificate  of  completion  of  Module:
               “Cybersecurity –protect your start-up” are as follows:
                   16. Self-study of training materials provided in m-learning form of delivery
                   17. Completion of online test: 10 questions (minimum 5 correct answers)
                   18. Submission  of  the  independent  work  on  topic:    Steps  to  effective
                      cybersecurity for my start-up (plan how to assure cybersecurity of student
                      own start-up: WORD, min. 2.000 –max. 4.000 characters with spaces)
               Resources of the Module:

               Required Reading:
               1)  "Site  Security  Handbook,"  RFC  2196,  https://tools.ietf.org/html/rfc2196,
               1997.

                      Publication  from  the  Internet  Society  (ISOC)  and  its  associated  bodies
               about how to create Security policy. Briefly and clearly specifies steps required
               to create Security policy
               2)  W.  Stalling  and  .  L.  Brown,  Computer  security  :  principles  and  practice,
               Hoboken, New Jersey: Pearson Education, Inc, 2018.

               Recommended Reading:
               1)     P. Bowen, J. Hash and M. Wilson, Information Security Handbook: A Guide



                                                     Programme: Erasmus+
                                   Key Action: Cooperation for innovation and the exchange of good practices
                                   Action Type: Strategic Partnerships for vocational education and training
                                             Project Number: 2019-1-PL01-KA202-065209
                                                                                                        53
   48   49   50   51   52   53   54   55   56   57   58