Assessment Details
Assignment 1 covers Learning Outcomes 1, 2 and 4.
Assignment 2 covers Learning Outcomes 3 and 5
100% Coursework
Indicative Content
CYBER SKILLS
Fundamental concepts of security engineering.
The significance of security protocols and frameworks.
Systems-administration, attack scenarios, failure mechanisms and defensive solutions
Operation security
Business continuity and disaster recovery
ETHICAL HACKING SKILLS
Technical foundation of hacking
Understanding business aspects and the importance of performing penetration testing
Introduction to active and passive data gathering
Understanding Foot printing and scanning
System hacking and enumeration
The use of sniffers and methods to perform session hijacking and denial of service to gain access
Wireless technologies, security, and wireless attacks
Intrusion detection and multilevel security
Web Descriptors
The module has been designed to provide students with the necessary information and skill set relating to Cyber Security and System Testing using Ethical Hacking.
It will help them in the development, testing and management of a comprehensive approach to security practices. The module introduces students to a variety of security topics including fundamental concepts of security engineering, operational security and system hacking and enumeration.
To manage a secure a system it is essential for computer security professionals to understand the structure, configuration, tools, and techniques that hackers rely upon to successfully commit their act. It is also important to test the network regularly and discover any vulnerability due to misconfiguration or poor patching.
Learning Strategies
26 hours of lectures and 52 hours of practical/tutorials
Practical tasks and workshops will be used to re-enforce and apply theory to encourage an analytical and problem-based approach. Students will be required to complete background reading prior to each lecture / tutorial. This background reading will help them underpin the practical demonstrations. Where appropriate students will be given informative assessment to complete and evaluate with their peers.
Texts
Data Protection Act 2018 and GDPR 2018 ISO/IEC/IEEE 29148:2011
Easttom, C. (2016). Computer security fundamentals. 3rd edn. Indianapolis, IN: Pearson Education. ISBN: 078975746
x; 9780789757463.
HM Government, National Cyber Security Strategy 2016 to 2021, Published on Nov. 2016, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/-national_cyber_security_strategy_2016.pdf
International Organization for Standardization, ISO/IEC 27001:2013 - Information technology -- Security techniques -- Information security management systems -- Requirements".
ISO 8000-8:2015 Data quality -- Part 8: Information and data quality: Concepts and measuring
Johnson, T.A. (2015). Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare. ISBN-13: 978-1-48223923-2
Meyers, M. (2016). Comptia A+ Certification All-In-One Exam Guide, 9th edn. McGraw-Hill Education. ISBN: 9781259589515
Wu, C. and Irwin, J. (2016). Introduction to computer networks and cybersecurity. Hoboken: CRC Press., ISBN:1466572140
Simpson, M., Backman, K. and Corley, J. (2013). Hands-on ethical hacking and network defence. Boston, MA: Course Technology. ISBN: 1133935613
Resources
Specialised software and hardware as provided in Cyber Security lab, including virtualised servers/attack targets.
Lecture notes and tutorial notes provided via blackboard.
Supplementary handouts/resources as and when appropriate provided by lecturer(s).