Teaching Responsibility
LJMU Schools involved in Delivery:
LJMU Partner Taught
Learning Methods
Lecture
Practical
Tutorial
Module Offerings
6617YCOM-SEP-PAR
Aims
To gain a significant understanding of various security vulnerabilities in and cyber threats to computer systems/applications as well as the importance of cyber security.
To assess critically a variety of ethical hacking tools and techniques for the protection and evaluation of computer systems and applications.
To promote the use of appropriate security techniques to solve cyber security problems.
Module Content
Outline Syllabus:Ethical hacking: Ethical hacking fundamentals; security vulnerabilities; attack foot printing; attack scanning techniques; system hacking methods; network and device hacking techniques; application and data hacking methods; ethical hacking planning; and ethical hacking reporting and responding.
Ethical, Legal and Social: UK, EU and International Cybercrimes laws and regulations.
Additional Information:The spectacular growth of the Internet has spawned a great demand for secure computer systems. Ethical hacking can help to assess the cyber security defence of computer systems. Intrusion detection and firewalls provide additional layers of defence for the detection and prevention of cyber attacks on computer systems. This module examines various cyber security issues and solutions within these areas.
Assessments
Practice
Artefacts