Module Aims

  • Understand the fundamentals of vulnerability assessment in various systems.
  • Understand of the fundamentals of the provision of security in information networks.
  • Be aware of the various protocols and architectures used by various network systems.
  • An understanding of the use and benefits of various monitoring and logging tools.
  • An understanding of how to create and use security vulnerability and assessment tools.
  • The ability to present critical arguments for specific actions or outcomes to a diverse audience.
  • The opportunity to reflect on and evaluate their personal development.

Unit 1

History of Network Security, Vulnerabilities and Approaches

Unit 2

Advanced Persistent Threats: Applying the Cyber Kill Chain Model to a Case Study

Unit 3

Vulnerability Assessments

Unit 4

Breach Analysis and Mitigation

Unit 5

Logging, Forensics and Future Trends

Unit 6

The Future of the Internet and Generative AI

Phone

-

Address

Mumbai, India