INDICATIVE CONTENT
The topics covered will include but are not limited to:
Installation of virtual machines to create a safe environment for implementing and analysing cybersecurity threat events.
The role of the Cybersecurity Operations Analyst in enterprise.
Windows Operating System features and characteristics needed to support cybersecurity analyses.
Features and characteristics of the Linux Operating System.
Operation of network protocols and services.
Operation of network infrastructure.
Classification of the various types of network attacks.
Network monitoring tools to identify attacks against network protocols and services.
Prevention of malicious access to computer networks, hosts, and data.
Impacts of cryptography on network security monitoring.
Endpoint vulnerabilities and attacks.
Evaluation of network security alerts.
Analysis of network intrusion data to identify compromised hosts.
Incident response models to manage network security incidents.
ADDITIONAL ASSESSMENT DETAILS
Written online test - A time constrained written online test covering Operating Systems, network attack scenarios, and cryptographic systems and applications (Learning Outcomes 2 to 4).
Practical test assessment – A practical test which will investigate through a case study a network attack and implementation of mitigation techniques (Learning Outcomes 1 and 3).
LEARNING STRATEGIES
There will be 6 hours lectures and labs/tutorials, to accompany self-directed learning using on-line material and case studies. There will be virtual lab sessions set up every week to gain practical networking experience and reinforce theory
Investigation using the Web.
LEARNING OUTCOMES
1. Investigate and analyse the role of the cyber security analyst in the management of critical attacks and incidents
Analysis, Enquiry
2. Explain and evaluate the differences in the Windows and Linux operating systems, being able to identify their vulnerabilities
Knowledge and Understanding, Reflection
3. Discuss and logically evaluate network attacks and their mitigation techniques
Application, Knowledge and Understanding, Reflection
4.Explain through analysis how cryptographic systems work
Analysis, Knowledge and Understanding, Enquiry
TEXTS
Calder, A. and Perring, S. (2020) The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks. Ely: IT Governance Ltd
McNab, C. (2016). Network Security Assessment: Know Your Network 3rd Edition, O¿Reilly
McMillan, T. (2018), CCNA Security Study Guide: Exam 210-260 2nd ed. Edition, Sybex
Pramanik, S. (2022) Cyber security and digital forensics¿: challenges and future trends. Hoboken, New Jersey: John Wiley & Sons, Inc.
Santos, O and Muniz, J (2017), CCNA Cyber Ops (SECFND #210-250 and SECOPS #210-255) Official Cert Guide Library, 1/e
RESOURCES
Specialist software packages and virtual machines with hosted operating systems.
WEB DESCRIPTOR
This course introduces the core security concepts and skills needed to monitor, detect, analyse, and respond to cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory requirements and other cybersecurity issues facing organisations. In delivery it will take both a theoretical and practical perspective through investigative case studies.