Filter results by
At the end of this module learners should have the ability to operate, configure and secure various electronic communication systems, services and networks.
The learner will evaluate common cyber security threats and defense in depth techniques to defend against these threats.
The aim of the module is to enable students to understand the differences between IT and OT security risks, the impacts of user's behaviour and how to establish a Cyber Security Ma
This module focuses on secure software development practices and how they should be integrated throughout the software development life cycle.
Students will learn the key concepts and techniques employed in designing secure system architectures.
Learn how to locate and identify system vulnerabilities along with methods to identify potential vulnerabilities in a system design.
This module explores various web penetration testing techniques and industry-standard tools.
A vulnerability assessment analyst performs assessments within the network environment and identifies where those systems/networks deviate from acceptable configurations.