Filter results by
The learner will evaluate log files and learn tools to extract associated valuable data for detecting cyber threats and system performance issues.
Malware analysis is used as part of a forensic investigation to understand the behaviour and purpose of malware which is designed to cause harm or exploit any programmable device.
This module teaches students the skills and toolsets required for in-depth investigations of modern malware and understanding what malicious impacts it can have on systems.
The aim of the module is to provide knowledge, skills and abilities related to communication networks and protocols used in Operational Technology.
Penetration Testing is the authorized process of attacking a computer system to evaluate the security of the system by identifying and verifying security weaknesses.
Students will gain a hands-on understanding of practical cryptographic applications and their correct implementations in information systems.
In this module, learners will be provided practical skills necessary to secure their networks, data devices, cloud security, VPNs, website security, cell phones, and more.
Learn the necessary awareness, business and technical, knowledge, skills and abilities to protect their business against cybersecurity threats.