📖Program Curriculum
Cyber Security Bootcamp offers a holistic perspective of cyber security You’ll learn about threat detection and prevention strategies risk management investigative tools and the way in which each are leveraged by organisations to secure operations and minimise disruption
Critical Vulnerability Analysis exposes specific strategies for evaluating and reporting for example structural vulnerabilities and inadequate cybersecurity safeguards Business preparations that include a degree of penetration testing are examined
Business Security Architecture aims to develop your understanding of how to define an appropriate security architecture for a business You also learn about established architectures trade-offs between security and business functionality and strategies of information governance
Offensive and Defensive Cyber Operations aims to provide you with an in-depth understanding of the techniques used in computer and network defence As cyber defenders you learn about the strategies and technical skills to protect and harden cyber systems such as collecting appropriate data through logging detecting persistent hacking attempts and responding to intrusions
Critical National Infrastructure CNI is about learning to define the relevant CNI for your country and analyse its potential impact on a chosen business or sector You explore the unique operational resilience challenges and the emerging industry and government standards for that sector Protecting CNI is of developing concern that is rising up the national risk registers internationally An understanding of this topic is therefore a key part of a cyber security professionals knowledge base
Cyber War is about who the threat actors currently are and who they may be in the near future It examines how attackers identify targets of opportunity and how they work to disrupt them Across the module you analyse case studies of past cyberwars with a view to understanding their motivations attack strategies and impacts
Dissertation taking into account relevant theories practice and organisational contexts you first identify a target for enquiry in agreement with your supervisor Following approval of your plan you proceed to conduct the research evaluate data and articulate findings and recommendations in the form of an academic report The final stage of your dissertation is a viva in which you defend your arguments
Course modules
This course includes or offers the following modules Please check the programme document for more details on which modules are core required or optional
Cyber Security Bootcamp
Business Security Architecture
Critical Vulnerability Analysis
Offensive and Defensive Cyber Operations
Critical National Infrastructure
Cyber War
Dissertation




