FP3405 - Introduction to Cybersecurity

FP3405

Introduction to Cybersecurity

3

20 CC   10 ECTS

Centre for Foundation Studies

N/A


Tutor contact: 60 hours

Self directed study: 140 hours

Lectures, workshops, IT labs

Scheduled hours Placement Hours Independent Guided study
60 0 140

Students are expected to attend all timetabled classes.

  • Cybersecurity terminology
  • Cybersecurity tools and technical security solutions
  • Programming from a cybersecurity perspective
  • Introduction to Information and System Security
  • Core threats to Information and System Security (technical, social engineering, organisational structures) 
  • Introduction to Information Security Management Systems (ISMS) e.g. the CIA triad, risk management, security policies and standards
  • Introduction to penetration testing
  • Social engineering

1. To provide students with an understanding of the core concepts within cybersecurity.

2. To identify core threats and their impact.

3. To familiarise students with the basics of Information Security Management Systems (ISMS).

4. To present how hackers operate and cybersecurity tools. 

 

 

Lectures accompanied by IT workshops, group work, in-class tests and problem-solving scenarios. Formative assessment will be ongoing and will comprise activities that enable a student to appraise their own learning and guide them towards the development of self-study.

LO1 Show an understanding of key cybersecurity terminologies.

LO2 Understand and demonstrate basic programming from a cybersecurity perspective.

LO3 Demonstrate an understanding of core threats with respect to Information and System Security.

LO4 Present knowledge of cybersecurity tools and the key stages and processes of penetration testing.

LO5 Present the key aspects of Information Security Management Systems (ISMS).

Component Weighting % Learning outcome(s) assessed Assessment category
1Online Test 1 hour50%2, 3 and 5Written Exam
2Coursework 1200 words50%1 and 4Coursework


Reassessment will use the same mode of assessment.

  • Erickson, J. (2008). Hacking – The Art of Exploitation. (2nd ed.). No Starch Press.
  • Mooney, T. (2015). Information Security A Practical Guide - Bridging the gap between IT and management. ITGP.
  • Rao, U., & Nayak, U. (2014). The Infosec Handbook: An Introduction to Information Security. Apress.
  • Shotts, W. (2012). Linux command line: A complete introduction. No Starch Press. https://ebookcentral.proquest.com/lib/uocuk/detail.action?docID=1137548
  • Solomon, M., & Chapple, M. (2005). Information Security Illuminated, Jones and Bartlett.
  • Watkins , S. G. (2013). An Introduction to Information Security and ISO 27001 (2013) A Pocket Guide, Second Edition. IT Governance Publishing.
  • Zeichner, L. (2014). Cybersecurity Foundations: An Interdisciplinary Introduction. Zeichner Risk Analytics.

In addition, a range of relevant research articles available through ACM Digital Library, IEEE/IET Electronic Library and other online journals should be used.

Dave Price-Williams

Centre for Foundation Studies

LTI Board of Studies

Wed, 17 Aug 2016

Close - return to programme display page  Print - launches the print options panel