Overview
To view overview information, please select an offering from the drop-down menu above.
Academic contacts
To view unit coordinator information, please select an offering from the drop-down menu above.
Offerings
DUBAI-ISC-TMD-FACE2FACE-2025-2025
DUBAI-ISC-TSD-INT-2024-2024
KAPLAN-SGP-TMA-MIXEDMODE-2025-2025
KAPLAN-SGP-TSA-INT-2024-2024
MALAYSIAKL-TMC-FACE2FACE-2025-2025
MALAYSIAKL-TSC-INT-2024-2024
Requisites
Prerequisite
Exclusion
Other learning activities
To view other learning activity information, please select an offering from the drop-down menu above.
Learning activities
To view learning activity information, please select an offering from the drop-down menu above.
Learning outcomes
1.
Describe the fundamentals of computer and network security
2.
Apply a wide range of tools and technologies to evaluate vulnerabilities
3.
Discuss and evaluate the significance of various security weaknesses
4.
Describe legal and ethical implications of computer security
5.
Investigate, implement and exploit security vulnerabilities in a lab environment
6.
Describe and select mitigation strategies for common attacks
Assessments
To view assessment information, please select an offering from the drop-down menu above.
Additional information
Unit content:The unit is organised into these topics:
1. Introduction to computer security, CIA triad, hacking phases
2. Software security, responsible vulnerability disclosure, Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE)
3. Buffer overflows and overreads and mitigations
4. Malware types, such as viruses, worms, Trojans, rootkits
5. Security architecture, access control theory, security models, systems evaluation, emanation attacks
6. Symmetric and asymmetric cryptography, public key infrastructure, attacks against cryptography
7. Authentication concepts, authentication factors, Windows and UNIX authentication, password attacks and mitigations
8. Network security, port and vulnerability scanning, packet sniffing, spoofing attacks and mitigations
9. Web security, SQL injection, session hijacking, cross-site request forgery, cross-site scripting
10. Covert channels, storage and timing channels, countermeasures against covert channels, air-gap channels
11. Botnets, polymorphic and metamorphic malware, malware economy, malware emerging trends
12. Human factors in computer security, risk perception and heuristics, scam principles