Risk Management I
2015-2016 - IMT6111 - 5 ECTS

Expected learning outcomes

When the course is completed, the student should have:

Knowledge

  • Possesses advanced knowledge within specific frameworks /standards in Risk Management covered by the Master Programme.
  • Possesses insight and good understanding of the practical work of Risk Management in practical life

Skills

  • Is able to practice existing frameworks, standards and methods and to challenge established knowledge and practice in the media technology area.
  • Is able to use a given standard, framework or method in Risk Management and Risk Assessment in an organisation.
  • Is able to understand the nature of a Rsik Framework and how to apply this to an organisation
  • Is able to understand the major principles of Risk Management
  • Is able to understand which practical guidance and techniques are available
  • Guide to assist with the implementation of a Risk Management framework
  • Is able to apply a Risk Management standard/ framework to a practical case study

General Competence

Having completed the course, the students should have:

  • An advanced level of understanding of the structure and content of a risk management framework/ standard
  • An understanding of the advantages, challenges and complexity of working with Information Security Management and IT related risks in organisations.
  • An understanding of how to make well-informed decisions about and to respond to the extent of the IT risk

Topic(s)

  • Risk Management in the context of an Information Security Management system
  • Study of framework / standards for risk assessment

Teaching Methods

Lectures
Group works
Net Support Learning
Project work
Meeting(s)/Seminar(s)
Tutoring

Teaching Methods (additional text)

The course will include an introductory lecture providing an overview of the course content. The primary teaching method for the course is project work. The students are required to carry out and document a Risk Management activity by means of a case study.

Students are expected to present their work-in-progress at the seminars for discussions. Guidance, supervision and feedback will be provided during seminars only and given on material presented at the seminars only.

Students that cannot be present during the seminars are expected to be present by means of the Fronter Teleconference tool.

Form(s) of Assessment

Oral exam, individually
Evaluation of Project(s)

Form(s) of Assessment (additional text)

  • Project(s)
  • Oral exam (individual)
  • Both parts must be passed

The students are free to choose if they want to complete the project individually or in groups. Every group must have no more than 4 members, and all members of the group must be registered on the same course code.

Grading Scale

Pass/Failure

External/internal examiner

Evaluated by external and internal examiner.

Re-sit examination

Not allowed.

Teaching Materials

The course litterature will be the documents listed below or similar.

  • ISO/IEC 27005:2011. Information security risk management

Additional recommended reading:

  • ISACA. COBIT 5. www.isaca.org
  • ISO/IEC 27001:2013. Information security management systems – Requirements