| # | Topic Title | Lecture (hours) |
Seminar (hours) |
Independent (hours) |
Total (hours) |
Resources |
|---|---|---|---|---|---|---|
| 1 |
Fundamentals of cybersecurity law |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 2 |
Legal framework for cybersecurity governance |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 3 |
Cyber threats and vulnerabilities |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 4 |
. Critical infrastructure protection in cybersecurity law |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 5 |
. Legal aspects of corporate cybersecurity |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 6 |
Legal aspects of cybersecurity |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 7 |
International cybersecurity law |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 8 |
Technological aspects of cybersecurity |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 9 |
Technological innovations and methods of countering cyber threats: technical, software and infrastructure aspects of ensuring cybersecurity in the modern digital world |
2 | 2 | 7 | 11 |
|
|
|
||||||
| 10 |
Future trends in cybersecurity law and technology |
2 | 2 | 7 | 11 |
|
|
|
||||||
| Total | All Topics | 20 | 20 | 75 | 115 | - |