Overview

To view overview information, please select an offering from the drop-down menu above.

Academic contacts

To view unit coordinator information, please select an offering from the drop-down menu above.

Offerings

DUBAI-ISC-TJD-FACE2FACE-2026-2026
DUBAI-ISC-TMD-FACE2FACE-2025-2025
DUBAI-ISC-TMD-FACE2FACE-2027-2027
DUBAI-ISC-TSD-FACE2FACE-2026-2026
KAPLAN-SGP-TJA-FACE2FACE-2026-2026
KAPLAN-SGP-TMA-FACE2FACE-2025-2025
KAPLAN-SGP-TMA-FACE2FACE-2027-2027
KAPLAN-SGP-TSA-FACE2FACE-2026-2026
MALAYSIAKL-TJC-FACE2FACE-2026-2026
MALAYSIAKL-TMC-FACE2FACE-2025-2025
MALAYSIAKL-TMC-FACE2FACE-2027-2027
MALAYSIAKL-TSC-FACE2FACE-2026-2026
MURDOCH-S1-FACE2FACE-2025-ONGOING
MURDOCH-S1-ONLINESCHD-2025-ONGOING

Other learning activities

To view other learning activity information, please select an offering from the drop-down menu above.

Learning activities

To view learning activity information, please select an offering from the drop-down menu above.

Assessments

To view assessment information, please select an offering from the drop-down menu above.

Additional information

Unit content:

 The unit is organised into these topics:

  1. Introduction to ethical hacking and software security, e.g. types of hackers, hacking concepts and phases
  2. Computer security review, e.g. access control, authentication, security architecture, cryptography
  3. Network security, reconnaissance, scanning, spoofing, and defenses
  4. Pentesting process, reporting, ethics and laws
  5. Malware and attack technology, e.g. botnets, polymorphic/metamorphic malware, malware economy, adversarial behaviors, attack techniques
  6. Software security, Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), buffer overflows/overreads, race conditions
  7. Web technologies, HTTP, scripting, DB/SQL, microservice architecture
  8. Web attacks, e.g. SQL injection, session hijacking, cross-site request forgery, cross-site scripting
  9. Secure software development and lifecycle, source code analysis and analysis tools 
  10. Active directory and Cloud attacks
  11. Human factors, risk perception, social engineering
  12. Ethics and laws