Cyber Security Induction university of UK

MarufFarhanRigan1 23 views 18 slides Oct 20, 2024
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

cybersecurity induction


Slide Content

 

Cyber Security Musa Muhamad [email protected] 21 st September, 2020

Contents Course organisation Course learning outcomes Why Cyber Security What is Cyber Security Networking Recommended reading list Tools and resources Lab sessions

Course organisation

Course organisation Course activities Attend 4 hours lectures each day Lecture notes available on Aula Lab sessions will be followed immediately after lectures each day. Attend tutorials every Wednesday 4 hours of self-directed learning Assignments Assignment 1 will be practical assessment (40%) Assignment 2 will be time-constrained MCQ assessment (60%) Field trip Students visit to GCHQ (Still in the pipeline)

Course learning outcomes A student who successfully completes the course will have achieved the following learning outcomes : [ Theory and technology] Understand the underlying theory, technology, operation and security concerns of modern computing systems to practice within the computing and information technology domain.   [Development] Design, develop and evaluate systems, meeting the needs of a set of requirements and utilising relevant cyber security technology, problem solving techniques, design methods, programming languages and supporting tools. [Security] Develop and demonstrate an in-depth knowledge of cyber security concepts including risks and threats to information and business integrity and develop the ability to manage cyber security in a professional context.

Course learning outcomes [Digital forensics] Recognise the technical, commercial, cultural, ethical and professional issues related to Digital Forensics and Ethical Hacking.   [Legal, social, ethical and professional context] Exercise initiative, personal responsibility and integrity in decision making as a computing professional taking account of legal, social, ethical and professional issues and manage and sustain your own professional development. [Researching and critical thinking] Research new and emerging technologies, techniques, business and societal issues, analysing and thinking critically and manage your own learning. [Personal and transferable] Communicate effectively in written and spoken English using a variety of media, work individually and in teams and develop and sustain positive, productive and professional relationships with others.

Why study Cyber security? Cybersecurity – An Evergreen Industry A Career that Serves the Greater Good A Chance to Work with Secret Agencies (GCHQ, MI5) No Math! Unlimited Potential for Growth Plenty of Opportunities A Variety of Industries to Choose A Job that Never Gets Boring Travel the World With Cybersecurity Fat Pay Cheques

The Digital E ra

The golden age for data exploit

Types of Cyber Attacks

What is Cyber Security? Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.

Protect Against What?

The CIA Triad

The CIA Triad

How is Cyber Security Implemented?

How is Cyber Security Implemented?

Thank you
Tags