Teaching Responsibility
LJMU Schools involved in Delivery:
LJMU Partner Taught
Learning Methods
Lecture
Practical
Module Offerings
7541CYQR-APR-PAR
7541CYQR-JAN-PAR
7541CYQR-SEP_NS-PAR
Aims
To gain a significant understanding of various security vulnerabilities and cyber threats to computer systems/applications as well as the importance of cyber security.
To assess critically a variety of ethical hacking tools and penetration testing techniques for the protection and evaluation of computer systems and applications.
To promote the use of appropriate ethical security techniques to solve cyber security problems.
To understand practices of network forensics and intrusion analysis to aid cyber threat intelligence gathering.
To develop independent research skills in threat intelligence to detect, respond to, and defeat focused and targeted threats.
Learning Outcomes
1.
Deploy ethical hacking tools and techniques to complex computer systems
2.
Demonstrate critical awareness of recent developments in ethical hacking techniques
3.
Critically review developments in system defence, response and intelligence techniques.
Module Content
Outline Syllabus:Ethical hacking fundamentals: Penetration testing lifecycle, vulnerability detection, vulnerability-scanning techniques.
Hacking methods and tools: system hacking methods exploit frameworks, network and device-hacking techniques, web application attacks, password attacks and exploit development.
Advanced techniques: malicious software code, network forensics, intrusion detection and prevention, cyber threat hunting, security monitoring and incident response techniques and procedures.
Additional Information:The spectacular growth of the Internet has spawned a great demand for secure computer systems. Ethical hacking can help to assess the cyber security defence of computer systems. Intrusion detection and firewalls provide additional layers of defence for the detection and prevention of cyber-attacks on computer systems. This module examines various cyber security issues and solutions within these areas.