Overview
To view overview information, please select an offering from the drop-down menu above.
Academic contacts
To view unit coordinator information, please select an offering from the drop-down menu above.
Offerings
DUBAI-ISC-TJD-FACE2FACE-2025-2025
DUBAI-ISC-TJD-FACE2FACE-2027-2027
DUBAI-ISC-TMD-FACE2FACE-2026-2026
DUBAI-ISC-TSD-FACE2FACE-2025-2025
DUBAI-ISC-TSD-FACE2FACE-2027-2027
KAPLAN-SGP-TJA-MIXEDMODE-2025-2025
KAPLAN-SGP-TJA-MIXEDMODE-2027-2027
KAPLAN-SGP-TMA-MIXEDMODE-2026-2026
KAPLAN-SGP-TSA-MIXEDMODE-2025-2025
KAPLAN-SGP-TSA-MIXEDMODE-2027-2027
MALAYSIAKL-TJC-FACE2FACE-2025-2025
MALAYSIAKL-TJC-FACE2FACE-2027-2027
MALAYSIAKL-TMC-FACE2FACE-2026-2026
MALAYSIAKL-TSC-FACE2FACE-2025-2025
MALAYSIAKL-TSC-FACE2FACE-2027-2027
MURDOCH-S1-FACE2FACE-2025-ONGOING
MURDOCH-S1-ONLINEFLEX-2025-ONGOING
MURDOCH-S1-ONLINESCHD-2025-ONGOING
Requisites
Prerequisite
Other learning activities
To view other learning activity information, please select an offering from the drop-down menu above.
Learning activities
To view learning activity information, please select an offering from the drop-down menu above.
Learning outcomes
1.
Understand the fundamentals of cyber forensics, security operations and incident response.
2.
Select and apply appropriate tools for malware analysis and cyber forensic analysis.
3.
For a forensic investigation, identify the forensic issues, develop a plan for the forensic analysis, gather and analyse the evidence, and report the findings.
4.
Examine the legal and ethical implications related to forensic examination and incident management.
5.
Analyse information from various data sources using security operations tools and techniques to identify and gain insight into threats, vulnerabilities, and adversary behaviour.
6.
Identify, analyse, report and respond to security incidents including performing incident-related forensic investigations.
Assessments
To view assessment information, please select an offering from the drop-down menu above.
Additional information
Unit content:
- Introduction to cyber forensics and incident response
- Security Operations Centre (SOC), Security Orchestration, Automation and Response (SOAR)
- Forensic data acquisition, duplication, analysis, and Validation
- Current digital forensics tools and report writing
- Windows and CLI systems, Linux, and Mac systems forensics
- Threat hunting, Incident response plan, Incident handling and response
- Security Incident and Event Management (SIEM), Cyber Threat Intelligence (CTI)
- Live acquisitions, network forensics, and cloud forensics
- Recovering graphic files and anti-forensics
- Malware and email forensics
- IoT and mobile device forensics