This course examines cybersecurity from the perspective of future business and industry leaders. Cybersecurity is no longer a specialized field, but rather a fundamental skill that every manager needs to know. Students will learn from real-world and topical examples, including sessions focusing on the London Olympics and Apple vs. FBI, utilizing public media as case studies.
This course examines the fundamental principles of computer security as applied to information technology. The course covers foundations, psychology, prevention, detection, human factors, law, ethics, technical considerations, management processes and future considerations for the security of information technology. It is designed and developed to cover several domains in including security management, security architecture, business continuity and disaster recovery, physical security, some cryptography, and networks.
This course is intended for all students who aspire to improve their understanding of cybersecurity, a fundamental underpinning of ICT and modern technology. Not only does ICT touch every facet of a company, but also the products and services it provides. This course is targeted to students who want to think strategically across corporate silos and to bridge the manadatory gap between technology and management. The Internet of Things (IoT) is an example of this phenomenon, let alone the security implications of millions of newly connected devices. Thus, the access to skilled resources to top CEO's around the world, Cybersecurity has become the No. 1 concern of enterprises. In 2015, the median average salary for CISOs in the U.S. is $223,000 with locations such as San Francisco paying as much as $421,000. Furthermore, predictions show that there will be 1 million global cybersecurity positions available in 2016.
The abundant number of reports and articles about cybersecurity in the public media reflects the rising risk of cyber attacks and the importance of cybersecurity. In real business situations, business leaders often rely on this public information for risk assessments and decision makings. In this course, we attempt to simulate the real business environment by using articles from public media as case studies. Students are required to analyze cybersecurity incidents by referring to articles and reports from media such as the internet, magazines and books.
Programs: Full-time MBA, Part-time MBA, Pre-MBA, Open-enrollment
Discipline: Special Course
Course Level: Specialized Course
Special Features: None
Required/Elective Course: Elective Course
Number of Credits: 1.0
Hours Per Class: 3 hours
Class Capacity: 25
*Due to the characteristics of the course, application of the substitute class and leave of absence system is not available.
|CASE||Starting a cybersecurity company|
|THEME||Foundation of cybersecurity|
|CASE||History of cryptography and modern use of cybersecurity|
|THEME||Networking principles & security|
|THEME||Vulnerabilities, Risks, Threats|
|CASE||TJX, Home Depot, Benesse, JPMorgan Chase|
|THEME||Mobile, BYOD, IoT, FinTech, Blockchain, Machine Learning|
|THEME||Human aspects in cybersecurity|
|CASE||Apple v FBI|
|THEME||Security, compliance, legal in Enterprise|
|CASE||Sony Pictures Entertainment, Japanese ATMs Hack|
|THEME||Analysis of the latest cybersecurity incidents|
|CASE||Latest cybersecurity incidents|
If you wish to start from Pre-MBA
Tuition Fee: 101,000 yen
Please find more about the Pre-MBA Program.