{"id":197541,"date":"2023-04-19T12:07:06","date_gmt":"2023-04-19T10:07:06","guid":{"rendered":"https:\/\/www.ucly.fr\/?page_id=197541"},"modified":"2026-03-13T11:29:12","modified_gmt":"2026-03-13T10:29:12","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.ucly.fr\/en\/cybersecurity\/","title":{"rendered":"<strong>Cybersecurity<\/strong>"},"content":{"rendered":"<p>The course explores cybersecurity from a practical and regulatory perspective. It first explores the current threat landscape and engages with risk management and incident response principles and processes. The students become familiar with the most prominent threats and identify theories and principles in relation to managing such threats and dealing with cyberattacks that have taken place. The course then moves to explore different cybersecurity-related regulations, primarily the NIS and NIS2 Directives, the relation of data protection regulations to cybersecurity and other associated regulations. Finally the course focuses on AI and cybersecurity topics, analysing AI as a tool and target for cyberattacks, but also its usefulness in improving cybersecurity and supporting organisations against\u00a0attacks.<\/p>","protected":false},"excerpt":{"rendered":"<p>The course explores cybersecurity from a practical and regulatory perspective. It first explores the current threat landscape and engages with risk management and incident [&hellip;]<\/p>\n","protected":false},"author":151,"featured_media":0,"parent":0,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-197541","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - UCLy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ucly.fr\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - UCLy\" \/>\n<meta property=\"og:description\" content=\"The course explores cybersecurity from a practical and regulatory perspective. It first explores the current threat landscape and engages with risk management and incident [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ucly.fr\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"UCLy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T10:29:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ucly.fr\/en\/cybersecurity\/\",\"url\":\"https:\/\/www.ucly.fr\/en\/cybersecurity\/\",\"name\":\"Cybersecurity - UCLy\",\"isPartOf\":{\"@id\":\"https:\/\/www.ucly.fr\/en\/#website\"},\"datePublished\":\"2023-04-19T10:07:06+00:00\",\"dateModified\":\"2026-03-13T10:29:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ucly.fr\/en\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ucly.fr\/en\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ucly.fr\/en\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ucly.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ucly.fr\/en\/#website\",\"url\":\"https:\/\/www.ucly.fr\/en\/\",\"name\":\"UCLy\",\"description\":\"Un site utilisant WordPress\",\"publisher\":{\"@id\":\"https:\/\/www.ucly.fr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ucly.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ucly.fr\/en\/#organization\",\"name\":\"UCLy\",\"url\":\"https:\/\/www.ucly.fr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ucly.fr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ucly.fr\/wp-content\/uploads\/2025\/06\/logo-150ans-blanc.svg\",\"contentUrl\":\"https:\/\/www.ucly.fr\/wp-content\/uploads\/2025\/06\/logo-150ans-blanc.svg\",\"caption\":\"UCLy\"},\"image\":{\"@id\":\"https:\/\/www.ucly.fr\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - UCLy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ucly.fr\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - UCLy","og_description":"The course explores cybersecurity from a practical and regulatory perspective. It first explores the current threat landscape and engages with risk management and incident [&hellip;]","og_url":"https:\/\/www.ucly.fr\/en\/cybersecurity\/","og_site_name":"UCLy","article_modified_time":"2026-03-13T10:29:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ucly.fr\/en\/cybersecurity\/","url":"https:\/\/www.ucly.fr\/en\/cybersecurity\/","name":"Cybersecurity - UCLy","isPartOf":{"@id":"https:\/\/www.ucly.fr\/en\/#website"},"datePublished":"2023-04-19T10:07:06+00:00","dateModified":"2026-03-13T10:29:12+00:00","breadcrumb":{"@id":"https:\/\/www.ucly.fr\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ucly.fr\/en\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ucly.fr\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ucly.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.ucly.fr\/en\/#website","url":"https:\/\/www.ucly.fr\/en\/","name":"UCLy","description":"Un site utilisant WordPress","publisher":{"@id":"https:\/\/www.ucly.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ucly.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ucly.fr\/en\/#organization","name":"UCLy","url":"https:\/\/www.ucly.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ucly.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ucly.fr\/wp-content\/uploads\/2025\/06\/logo-150ans-blanc.svg","contentUrl":"https:\/\/www.ucly.fr\/wp-content\/uploads\/2025\/06\/logo-150ans-blanc.svg","caption":"UCLy"},"image":{"@id":"https:\/\/www.ucly.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/pages\/197541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/comments?post=197541"}],"version-history":[{"count":2,"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/pages\/197541\/revisions"}],"predecessor-version":[{"id":432156,"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/pages\/197541\/revisions\/432156"}],"wp:attachment":[{"href":"https:\/\/www.ucly.fr\/en\/wp-json\/wp\/v2\/media?parent=197541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}