Full course description
About this course
Course Snapshot
This course will provide you with a starting point in understanding these aspects of cyber security, enabling you to consider the real-world challenges. By the end of this course, you will have gained valuable insights into the various aspects of attacks and defences used, which will enhance your employability and lay the foundation for future studies.
Course Modules
Here's a brief overview of the modules you will work through in this course:
- Malware attacks: Dive into the world of malware, including viruses, worms, and Trojans. Learn how these malicious programs operate and get to know your cyber adversaries.
- Malware analysis, detection and response: Now that you are aware of what form malware attacks take, we will look at how analysis and detection occurs and what effective responses look like.
- Security operation and incidence management (SOIM): An introduction to structured approaches to handling security operations using industry accepted frameworks that will help you understand and explain the concepts and identify common data sources used for security monitoring.
- Intrusion detection and prevention: In this module you will see how data sources influence detection processes, other approaches to intrusion detection methods and available countermeasures.
- Digital forensics: We will start with some conceptual models and processes and then move onto some details on how digital forensic analysis is used in cyber security.
Anyone interested in learning more about cyber security
Upon completion of this course earn a Digital Badge.
This course is made up of a series of modules that are best used in sequence. While there is no set timetable with this course, a study plan is a valuable tool to help manage your time, stay motivated and that all materials a covered.
Everyone learns at a different pace, and the times for each module are an average. It may take you less or more time depending on what you already know and previous experiences.
Suggested study schedule
Topic | Hours of study |
---|---|
|
|
|
|
|
|
|
|
|
|
Professor Ernest Foo
Professor, School of Information and Communication Technology
Dr. Zahra Jadidi
Lecturer, School of Information and Communication Technology