Cyber security defences
- About
- e-Leadership MBA
- Graduate Professional Program
- Joint Graduate Study Programme in Computer Science - Internet of Things and Artificial Intelligence
- Lecture Plan
- Computing
- Undergraduate University Program
- Learning outcomes on the program level
- Learning outcomes on the program level
- Admission
- Learning outcomes on the program level
- Learning outcomes on the program level
- Apply now
- Learning outcomes on the program level
- Learning outcomes on the program level
- Learning outcomes on the program level
- Learning outcomes on the program level
- Useful Information
- Learning outcomes on the program level
- Learning outcomes on the program level
- Useful Information
- Professional Title Acquired
- 3D Design
- Design
- Duration of the Study Program
- Undergraduate Professional Program
- Lecture Plan
- Lecture Plan
- Lecture Plan
- Useful Information
- Useful Information
- Software Package Included in the Price of the Study
- Software Package Included in the Price of the Study
- Course Schedules
- Course Schedules
- Professional Title Acquired
- Duration of the Study Program
- Digital Marketing
- Software Package Included in the Price of the Study
- Duration of the Study Program
- Lecture Plan
- Professional Title Acquired
- Useful Information
- Course Schedules
- Multimedia Computing
- Industry Certifications
- Course Schedules
- Professional Title Acquired
- Software Package Included in the Price of the Study
- System Engineering
- Duration of the Study Program
- Lecture plan
- Course Schedules
- Professional Title Acquired
- Software Package Included in the Price of the Study
- Industry Certifications
- Useful Information
- Software Engineering
- Duration of the Study Program
- Software Package Included in the Price of the Study
- Course Schedules
- Lecture Plan
- Industry Certifications
- Useful Information
- Professional Title Acquired
- Creative Market Communications Management
- Duration of the Study Program
- Course Schedules
- Industry Certifications
- Lecture Plan
- Useful Information
- Duration of the Study Program
- Software Package Included in the Price of the Study
- Digital Marketing
- Who Can Enroll
- Professional Title Acquired
- Software Package Included in the Price of the Study
- Course Schedules
- Lecture Plan
- Professional Title Acquired
- Useful Information
- Useful Information
- Data Science
- Industry Certifications
- Course Schedules
- Jobs and necessary knowledge and skills that graduates will be prepared for
- Course Schedules
- Duration of the Study Program
- Software Package Included in the Price of the Study
- Lecture Plan
- Duration of the Study
- Game Development
- Professional Title Acquired
- Who Can Enroll
- Professional Title Acquired
- MITx MicroMasters® program
- Useful Information
- Lecture Plan
- Software Package Included in the Price of the Study
- System Engineering
- Duration of the Study
- Who can Apply
- Course Schedules
- Lecture Plan
- Software Engineering
- Software Engineering
- Useful Information
- Study Duration
- Lecture Plan
- Lecture Plan
- Useful Information
- Useful Information
- Learning outcomes on the program level
- Learning outcomes on the program level
- Industry Certifications
- Industry Certifications
- Professional Title Acquired
- Professional Title Acquired
- Duration of the Study Program
- Duration of the Study Program
- Course Schedules
- Course Schedules
- Learning outcomes on the program level
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Partnership with Goldsmiths, University of London
- Class 30
- Practice 30
- Independent work 90
Course title
Cyber security defences
Lecture type
Elective
Course code
21-02-507
Semester
1
ECTS
5
Lecturers and associates
Course overview
This module is designed for students to learn the fundamental skills needed to analyse the internal and external security threats against a network, and to implement security mechanisms to protect an organization’s information. During this module students will learn to evaluate network and Internet security issues and provide security solutions such as designing a security policy, troubleshooting networks, and digital signatures.
Students will learn:
Fundamental goals, benefits, challenges, and available countermeasures for network defense.
Analyze cryptography algorithms and design implementation strategies for privacy and security of information.
Role of the Intrusion Detection and Prevention System in defending thenetworks.
Linux and Windows security concerns and hardening techniques such as password management, security baseline configurations, etc.
Identify risks associated with IoT and mobile devices and select appropriate countermeasures including policies, guidelines, and tools.
Implement application whitelisting and blacklisting, sandboxing, patch management, and web application firewall, encryption techniques, and secure design strategies for data loss prevention.
Examine the evolution of network security management in virtualized IT environments.
Cloud computing concepts and different security concerns.
Wireless networking concepts, network encryption mechanisms, authentication methods, and advantages of network traffic monitoring.
Logging concepts, centralized log monitoring and perform log analysis to manage secure network operations.
Development a risk management program and implement different strategies such as attack surface analysis and cyber threat intelligence to reduce organizational risks.
This module is the foundation for the Cyber Security modules.
Literature
Essential reading:
[Anon.] (2020). Certified Network Defender, Albuquerque: Ec-Council
Recommended reading:
Easttom II, W.C., (2013). Network defense and countermeasures: principles and practices. Hoboken: Pearson IT Certification.
Further reading:
Molina-Markham, A., Winder, R.K. and Ridley, A., (2021). Network Defense is Not a Game. arXiv preprint arXiv:2104.10262.
Minimal learning outcomes
- Evaluate the goals, benefits, challenges, and available countermeasures for network defence
- Evaluate the role of intrusion detection and prevention systems in network defence
- Evaluate the risks associated with operating systems and choose the appropriate protection
- Recognize the risks associated with IoT and mobile devices and select appropriate protection
- Evaluate the risks associated with cloud computing and choose the appropriate protection
- Recognize the risks associated with wireless networks and choose the appropriate protection
Preferred learning outcomes
- Design solution for network defence
- Design solution for intrusion detection and prevention systems
- Design appropriate solution for operating systems protection
- Design appropriate solution for IoT and mobile devices protection
- Design appropriate solution for cloud computing protection
- Design appropriate solution for wireless networks protection