Course Brief

Aims

Most large and medium sized organisations are heavily dependent on distributed applications running either over a corporate intranet, VPN or the Internet. An increasing number of business functions from advertising to e-sales and services are being conducted over the Internet. These activities require a secure, reliable and efficient network. This in turn assumes the availability of network professionals with expertise in security and management issues and an understanding of the legal and ethical issues concerning ecommerce systems. This course will cover all aspects of cyber security. This course will prove useful to network professionals in medium and large organisations.


Learning Outcomes:

On successful completion of this module a student will be able to:
1. Analyse the security needs of networks, users and applications.
2. Critically evaluate security threats, the need to achieve an appropriate level of security while allowing legitimate access.
3. Evaluate the algorithms and procedures for encryption, keys, digital signatures, and certificates; strengths and weaknesses.
4. Critically discuss the methodologies and software tools typically used by hackers.
5. Identify the relevant laws which apply to the security of information systems.

Security weaknesses and vulnerabilities in network protocols and equipment; The WWW – CGI, Client side and Server side vulnerabilities, DNS, SQL injection, Cross-site Scripting Intruders and Malicious code – viruses; worms; Trojans; Back doors; Denial of Service attacks; Botnets; Defences – VPNs, Intrusion Detection Systems; concept of a DMZ; Firewalls: Packet-filtering and Application-Level, Encryption techniques – substitution, transposition, blocking, symmetric and asymmetric encryption; Encryption Applications such as PCIDSS, ISO27002:2013 and ISO 27032:2012. Public Key Infrastructure: Trusted Third Parties, Certificates and C.A’s; Digital Signatures and message digests, MD5, SHA, HMAC, nounces;, PGP, S/MIME, WEP/WAA, Rainbow tables, Hashing, Birthday Paradox; Legal issues: Regulation of Investigatory Powers Act, E-commerce Bill, key escrow; Legal issues : Computer Misuse Act, forensic data, Police & Criminal Evidence Act.

Concepts will be introduced in lectures, problem solving will be done through practical work in the laboratory sessions and tutorial sessions and guided independent study.

Coursework: 100% weighting, 50% pass mark.
Learning Outcomes: All.
Outline Details: A coursework: practical coursework for cyber security.

Formative Assessment: Quizzes and class exercises as part of the weekly tutorial and lab sessions.

  • MSc Computer Forensics & Cyber Security

    The MSc Computer Forensics & Cyber Security, awarded by the University of Greenwich, is structured to provide a viable option to graduates of:

    • An honours degree 2:2 or above in computing or computing science or a suitable numerate subject (e.g. mathematics, physics, engineering, information systems or multimedia) that includes software development experience.
    • University of Greenwich's BSc (Hons) Computing and Information System with Upper Second Class Honours or above 
    • Mature applicants who demonstrate academic potential and work experience can also be assessed for eligibility.
    • Applicants with a similar level qualification may also be eligible for more information or email us at uog-cf@sbcs.edu.tt

    Students on the MSc Computer Forensics & Cyber Security will learn a wide range of practical and theoretical skills which will develop a sound knowledge of cyber security and its application in real life situations.

    Our Computer Forensics and Cyber Security course allows students to familiarise themselves with the most recent technologies, scientific innovations and best practice in protecting digital infrastructures, from enterprise networks to Internet of Things environments. Students are also trained on modern tools and methodologies for conducting digital forensics investigations, spanning the whole range from the collection of evidence to analysis and acting as expert witnesses.

    This course is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers practical skills for network security, penetration testing and digital forensics, as well as the theory and scientific basis that underpins everyday practice. It also ensures that students have a basic understanding of the legal and regulatory requirements and the standards pertaining to computer security.

    Enrol by December 16, 2024, to receive a 10% discount.

    SBCS GLI alumni(degree graduates) will receive a 5% discount.
    Students paying in full will receive a 5% discount.
     

    Highlights at a glance

    • This programme is offered blended/online - part-time and comprises four (4) semesters
    • Total duration - 2 years (Part Time)
    • All material provided digitally
    • Blended approach to learning with a combination of self study, online sessions and workshops

    Programme Content at a glance

    • Modern methods and techniques for cyber security, including penetration testing and IT auditing.
    • Throughout this course you will study cyber security and digital forensics, system administration and security.
    • You will learn how to apply police and forensic methods to detecting cyber crime, using related software and hardware technologies.
    • This course includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.
    • University of Greenwich is an academic partner with The Council for Registered Ethical Security Testers (CREST) and with the Chartered Institute of Information Security (CIISec).
    • The degree is provisionally certified by the National Cyber Security Centre (NCSC), a part of GCHQ.

     

    At SBCS we focus on