Contents Course organisation Course learning outcomes Why Cyber Security What is Cyber Security Networking Recommended reading list Tools and resources Lab sessions
Course organisation
Course organisation Course activities Attend 4 hours lectures each day Lecture notes available on Aula Lab sessions will be followed immediately after lectures each day. Attend tutorials every Wednesday 4 hours of self-directed learning Assignments Assignment 1 will be practical assessment (40%) Assignment 2 will be time-constrained MCQ assessment (60%) Field trip Students visit to GCHQ (Still in the pipeline)
Course learning outcomes A student who successfully completes the course will have achieved the following learning outcomes : [ Theory and technology] Understand the underlying theory, technology, operation and security concerns of modern computing systems to practice within the computing and information technology domain. [Development] Design, develop and evaluate systems, meeting the needs of a set of requirements and utilising relevant cyber security technology, problem solving techniques, design methods, programming languages and supporting tools. [Security] Develop and demonstrate an in-depth knowledge of cyber security concepts including risks and threats to information and business integrity and develop the ability to manage cyber security in a professional context.
Course learning outcomes [Digital forensics] Recognise the technical, commercial, cultural, ethical and professional issues related to Digital Forensics and Ethical Hacking. [Legal, social, ethical and professional context] Exercise initiative, personal responsibility and integrity in decision making as a computing professional taking account of legal, social, ethical and professional issues and manage and sustain your own professional development. [Researching and critical thinking] Research new and emerging technologies, techniques, business and societal issues, analysing and thinking critically and manage your own learning. [Personal and transferable] Communicate effectively in written and spoken English using a variety of media, work individually and in teams and develop and sustain positive, productive and professional relationships with others.
Why study Cyber security? Cybersecurity – An Evergreen Industry A Career that Serves the Greater Good A Chance to Work with Secret Agencies (GCHQ, MI5) No Math! Unlimited Potential for Growth Plenty of Opportunities A Variety of Industries to Choose A Job that Never Gets Boring Travel the World With Cybersecurity Fat Pay Cheques
The Digital E ra
The golden age for data exploit
Types of Cyber Attacks
What is Cyber Security? Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.