Lunching into cybersecurity
Module 1
Learning outcomes
The module aims to provide students with:
- Look into the professional roles, skillset, ethical responsibilities of Cyber Security professionals.
- Explore the relevant computing architectures, practices, applications and standards.
- Develop an understanding of the core concepts in Cyber Security such as cryptography, penetration testing and ethical hacking.
- Engage with programming concepts and practices necessary for facilitating security-based solutions to identified problems.
- Develop competent skills in applying algorithm and prorgramming practices, gaining individual confidence in developing computer programs.
- Develop the ability to implement a secure information system using the principles and concepts of object-oriented approaches to solve a given problem, such as information system design and web development.
- Discuss the ethos of professional development highlighting major ethical-social-corporate responsibilities underpinning the concepts of threats, securities and global impacts prevailing the recent technological innovations and future applications.
On completion of this module you will be able to:
- Identify and explain the architecture, structure and functionality of basic components of a computer system, considering Cyber Security issues.
- valuate critically implications of the key vulnerabilities and threats of software and network security and approaches to mitigate these issues.
- Appraise critically and apply the concepts and principles of secure object-oriented programming and design to facilitate business security-based decisions.
- Evaluate critically the solutions developed to solve/mitigate these security issues.
SUMMARYS and e-Portfolio Activity
Unit 1: Introduction to Cyber Security
Unit 2: Cyber Security Issues and Their Implications for Businesses
Unit 3: Approaches to Cyber Security Design
Unit 4: Threat Identification and Modelling
Unit 5: Object-oriented Analysis, Design and Programming Techniques for Secure Systems
Unit 6: Application of UML to Secure Software Design
Unit 7: Database Design and Implementation
Unit 8: Introduction to Python programming and MySQL
Unit 9: OOP Application of Principles and Concepts
Unit 10: Secure Web development
Unit 11: Introduction to Secure Web Programming with DJango
Unit 12: A Look into the Future of Cyber Security