|
Module/Course Title: Cyber Security |
|||||
|
Module course code KOMS120610 |
Student Workload
|
Credits 3 / 4.5 ETCS |
Semester 6 |
Frequency
Even Semester |
Duration 16 |
|
1 |
Type
of course Field of Study Courses |
Contact
hours
|
Independent
Study
|
Class Size 30 |
|
|
2 |
Prerequisites
for participation (if applicable) - |
||||
|
3 |
Learning Outcomes
|
||||
|
4 |
Subject aims/Content This course provides an introduction to the field of cybersecurity, covering fundamental concepts, techniques, and best practices. It focuses on securing digital assets and systems from cyber threats. It primarily deals with the protection of computer networks, systems, and data from unauthorized access, attacks, and breaches. It also includes related topics such as network security, application security, data protection, incident response, and the identification and mitigation of cyber threats. Practical hands-on exercises and case studies are incorporated to enhance skills in securing systems, identifying vulnerabilities, and implementing effective cybersecurity measures. Students will gain knowledge and skills related to securing information systems, protecting against cyber threats, and managing security incidents. Study MaterialComputer and network security Information acquisition (Reconnaissance) The Human Factor in Network Security Malicious Software Malicious Software (2) Web threat Operating System Threat MIDTERM EXAM Network Security Network Security Risk Management Cloud Technology Intrusion Detection and Prevention Privacy & Personal Data Emerging Technology FINAL EXAMS" |
||||
|
5 |
Teaching methods
Synchronous: face-to-face (online) Asynchronous: Delivery of material through modules in e-learning in the form of text, audio, or video. Internet research |
||||
|
6 |
Assesment Methods
Assignment |
||||
|
7 |
This module/course is used in the following study programme/s as well Computer Science Study Programme |
||||
|
8 |
Responsibility for module/course
|
||||
|
9 |
Other Information Books:
Publications:
|
||||