Overview
To view overview information, please select an offering from the drop-down menu above.
Academic contacts
To view unit coordinator information, please select an offering from the drop-down menu above.
Offerings
DUBAI-ISC-TJD-FACE2FACE-2026-2026
DUBAI-ISC-TMD-FACE2FACE-2025-2025
DUBAI-ISC-TMD-FACE2FACE-2027-2027
DUBAI-ISC-TSD-FACE2FACE-2026-2026
KAPLAN-SGP-TJA-FACE2FACE-2026-2026
KAPLAN-SGP-TMA-FACE2FACE-2025-2025
KAPLAN-SGP-TMA-FACE2FACE-2027-2027
KAPLAN-SGP-TSA-FACE2FACE-2026-2026
MALAYSIAKL-TJC-FACE2FACE-2026-2026
MALAYSIAKL-TMC-FACE2FACE-2025-2025
MALAYSIAKL-TMC-FACE2FACE-2027-2027
MALAYSIAKL-TSC-FACE2FACE-2026-2026
MURDOCH-S1-FACE2FACE-2025-ONGOING
MURDOCH-S1-ONLINESCHD-2025-ONGOING
Requisites
Prerequisite
Exclusion
Other learning activities
To view other learning activity information, please select an offering from the drop-down menu above.
Learning activities
To view learning activity information, please select an offering from the drop-down menu above.
Assessments
To view assessment information, please select an offering from the drop-down menu above.
Additional information
Unit content:
The unit is organised into these topics:
- Introduction to ethical hacking and software security, e.g. types of hackers, hacking concepts and phases
- Computer security review, e.g. access control, authentication, security architecture, cryptography
- Network security, reconnaissance, scanning, spoofing, and defenses
- Pentesting process, reporting, ethics and laws
- Malware and attack technology, e.g. botnets, polymorphic/metamorphic malware, malware economy, adversarial behaviors, attack techniques
- Software security, Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), buffer overflows/overreads, race conditions
- Web technologies, HTTP, scripting, DB/SQL, microservice architecture
- Web attacks, e.g. SQL injection, session hijacking, cross-site request forgery, cross-site scripting
- Secure software development and lifecycle, source code analysis and analysis tools
- Active directory and Cloud attacks
- Human factors, risk perception, social engineering
- Ethics and laws