Network Security and Ethical Hacking 1 (CSTA - Ethical Hacking 1)
Students learn the principles and processes involved in network security, including major hacking attacks that may be used against organisations networks. A range of counter measures are also covered.
Network Security and Ethical Hacking 2 (CSTP - Ethical Hacking 2)
This module provides you with the knowledge of, and how to protect against, the ‘OWASP Top-Ten’. It is an essential component of modern information security strategies and a requirement of the Payment Card Industry Data Security Standard (PCI DSS).
Wireless Security (CWSA - Wireless Security)
This module develops expertise in wireless network security. Using case studies students learn the principles, threats and associated protection strategies related to wireless networks.
Forensic Tools and Processes (CFIP - Forensic Investigations)
Develops expertise in static digital forensic analysis. Using case studies students learn the principles and processes involved in undertaking and reporting a professional ‘static’ forensic investigation. The assessment of the module provides an opportunity for specialisation and the development of personalised training and development.
Applied Forensics – Malware Investigations (CMI – Malware Investigations)
This module develops expertise in malware behavioural analysis, an increasingly important skill. Using case studies students learn the principles and processes involved in undertaking a thorough professional malware analysis.
Advanced Forensicsand Incident Response (CSIS – Computer Security Incident Investigation)
Provides an understanding of security incidents and their impact on business continuity. The module will provide the knowledge and skills in prevention techniques to protect organisations’ assets from security incidents. You will develop knowledge in the principles and practice of a forensic incident response, including live analysis of servers as well as gaining skills in gathering data, remote acquisition, external and internal scanning analysis and containment techniques.
Security Strategy and Standards (CIIP – Implementing ISO 27001)
This module develops knowledge of and skills in management of information security
risk assessment and security policy formulation, certification processes and required procedures and state of the art risk management models and strategies.
Advanced Topics in Forensics and Security
Students learn, appreciate and engage with the main academic, professional and research concerns of computer security and forensics. This module is research led and focused; most of the work will be involve engaging with topics at the leading edge of research in this domain. The module help to prepare students for the MSc Project.
Provides the opportunity to develop and to demonstrate skills acquired from the taught course or development during the project in the solution of real practical and or theoretical problems.