Singapore University of Social Sciences

Information Security Management

Information Security Management (ICT309)

Applications Open: To be confirmed

Applications Close: To be confirmed

Next Available Intake: To be confirmed

Course Types: Modular Undergraduate Course

Language: English

Duration: 6 months

Fees: To be confirmed

Area of Interest: Science & Technology

Schemes: To be confirmed

Funding: To be confirmed

School/Department: School of Science & Technology


This course provides an overview of the 10 domains in the Information Security Common Body of Knowledge. They include: Security Management Practices, Security Architecture and Models, Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP), Law, Investigations, and Ethics, Physical Security, Operations Security, Access Control Systems and Methodology, Cryptography, Telecommunications, Network, and Internet Security.

Level: 3
Credit Units: 5
Presentation Pattern: Every July
E-Learning: BLENDED - Learning is done MAINLY online using interactive study materials in Canvas. Students receive guidance and support from online instructors via discussion forums and emails. This is supplemented with SOME face-to-face sessions. If the course has an exam component, this will be administered on-campus.


  • Introduction
  • The Need for Security
  • Professional, Legal & Ethical Issues in Information Security
  • Risk Management
  • Planning for Security
  • Physical Security
  • Security Technology 1
  • Security Technology 2
  • Cryptography
  • Implementing Information Security
  • Personnel & Security
  • Maintenance of Information Security

Learning Outcome

  • Show in-depth knowledge of information security fundamentals
  • Appraise issues related to information security management
  • Apply the basic concepts of cryptography and its role in information security
  • Relate the importance of risk management and its process – b4
  • Distinguish the security technologies commonly used in information security management
  • Assess the problems relating to physical security and personnel security
  • Appraise the issues surrounding computer security laws, privacy rights and intellectual property laws
  • Draft a risk assessment plan
  • Prepare a skeleton risk management plan
Back to top
Back to top