Students are expected to attend all timetabled classes.
Cybersecurity terminology
Cybersecurity tools and technical security solutions
Programming from a cybersecurity perspective
Introduction to Information and System Security
Core threats to Information and System Security (technical, social engineering, organisational structures)
Introduction to Information Security Management Systems (ISMS) e.g. the CIA triad, risk management, security policies and standards
Introduction to penetration testing
Social engineering
1. To provide students with an understanding of the core concepts within cybersecurity.
2. To identify core threats and their impact.
3. To familiarise students with the basics of Information Security Management Systems (ISMS).
4. To present how hackers operate and cybersecurity tools.
Lectures accompanied by IT workshops, group work, in-class tests and problem-solving scenarios. Formative assessment will be ongoing and will comprise activities that enable a student to appraise their own learning and guide them towards the development of self-study.
LO1 Show an understanding of key cybersecurity terminologies.
LO2 Understand and demonstrate basic programming from a cybersecurity perspective.
LO3 Demonstrate an understanding of core threats with respect to Information and System Security.
LO4 Present knowledge of cybersecurity tools and the key stages and processes of penetration testing.
LO5 Present the key aspects of Information Security Management Systems (ISMS).
Component
Weighting %
Learning outcome(s) assessed
Assessment category
1
Online Test 1 hour
50%
2, 3 and 5
Written Exam
2
Coursework 1200 words
50%
1 and 4
Coursework
Reassessment will use the same mode of assessment.
Erickson, J. (2008). Hacking – The Art of Exploitation. (2nd ed.). No Starch Press.
Mooney, T. (2015). Information Security A Practical Guide - Bridging the gap between IT and management. ITGP.
Rao, U., & Nayak, U. (2014). The Infosec Handbook: An Introduction to Information Security. Apress.
Solomon, M., & Chapple, M. (2005). Information Security Illuminated, Jones and Bartlett.
Watkins , S. G. (2013). An Introduction to Information Security and ISO 27001 (2013) A Pocket Guide, Second Edition. IT Governance Publishing.
Zeichner, L. (2014). Cybersecurity Foundations: An Interdisciplinary Introduction. Zeichner Risk Analytics.
In addition, a range of relevant research articles available through ACM Digital Library, IEEE/IET Electronic Library and other online journals should be used.
Dave Price-Williams
Centre for Foundation Studies
LTI Board of Studies
Wed, 17 Aug 2016
Close - return to programme display page Print - launches the print options panel