Course Overview
This course explores how information systems and emerging technologies enable strategy, transform business models, and reshape organizational processes. Building from the study materials, we cover modern IT infrastructure and networking; cloud computing models (IaaS, PaaS, SaaS); data/AI foundations; information security fundamentals (confidentiality, integrity, availability); authentication, authorization, and encryption; risk management; and the evolving cyber threat landscape (e.g., DDoS, SQL injection, ransomware, insider threats, MitM, APTs, supply chain attacks) and defenses (firewalls, IDS/IPS, MFA, encryption).
We’ll connect these foundations to enterprise architecture, analytics/AI implementation, zero trust, governance/compliance, and global MIS strategy— culminating in practical methods for threat detection, vulnerability assessment, security awareness, and incident reporting in real organizations.
Target Audience
Master's Focus
- Practical implementation skills and systems thinking
- Cloud, data/AI integration, and security tooling
- Analytics for decision support and operations
- Case-based, real-world deployment
PhD Focus
- Research methods and theory-building
- Experimental design and reproducibility
- Security/AI governance and policy analysis
- Publication-ready deliverables
Course Format
- Weekly Structure: 3 hours lecture + 1 hour seminar/lab
- Interactive lectures with current industry examples and case work
- Hands-on labs with practical tool usage and implementation
- Seminar debates on emerging trends and research
- Guest speakers from industry and regulatory bodies
- Collaborative projects with peer review
Key Learning Objectives
By the end of this course, students will be able to:
- Explain and apply core MIS concepts to strategy and operations
- Differentiate cloud service and deployment models; plan suitable architectures
- Design data/AI workflows and evaluate tradeoffs in model deployment
- Apply the CIA triad, AuthN/AuthZ, and encryption to protect systems
- Execute risk identification, assessment, mitigation, and monitoring processes
- Analyze common attack vectors (DDoS, SQLi, ransomware, insider, MitM, APT, supply chain)
- Configure and interpret defenses (firewalls, IDS/IPS, MFA, logging), and threat detection methods
- Conduct vulnerability assessments and communicate findings
- Implement zero trust principles and align with governance/standards
- Lead digital transformation initiatives and evaluate future technologies
Detailed Course Modules
The course is organized into comprehensive modules. Click on each topic to expand the lecture notes.
Assessment Structure
Program-level distributions are shown below. Adjustments may be announced by the lecturer.
Master's Program Assessment
PhD Program Assessment
In‑Lecture Links (Jump to Topic)
Course Materials
Download →
Core Textbooks & Readings
View on Amazon →
View on O'Reilly →
Key Frameworks & Standards
NIST SP 800‑145 →
NIST SP 800‑207 →
Official ISO Page →
Essential Tools & Platforms
Explore AWS Free Tier →
Use diagrams.net (Free) →
Explore Hugging Face Hub →