The aim of this module is to critically explore the governance, management and security principles that underpin the management of an organisation’s information assets. It will provide you with a comprehensive and in-depth knowledge and understanding of the key concepts, theories, standards and frameworks of information governance, information management and information security. Through the critical analysis of these principles and tools you will develop a solid practical foundation on which to evaluate a range of organisations’ approaches to information.
The main objective of this module is to provide an in-depth coverage of the fundamental concepts, principles and technologies for network security. This module will provide students with a theoretical and practical understanding on two important aspects related to security namely, data security and network security. The module will cover a number of topics including cryptography, classical systems, IP protocol security, private and public-key cryptography, cryptographic protocols, hash functions, authentication, signature schemes, email and web security, viruses, and firewalls.
This module is designed to be suitable for a variety of networking professional roles including those wishing to gain a deeper understanding of 802.11 protocols, security and enterprise deployment. You will study enterprise wireless deployment elements and methodologies. Basic RF characteristics for mobile systems. 802.11 protocol operation and technologies wireless security issues and attack vulnerabilities.
This module will provide students in-depth knowledge of the processes used in assuring the security of information during use, sharing, storage, transmission and disposal. It will cover the protection of the integrity, authenticity, availability and confidentiality of all classes of information. The module is designed to provide a comprehensive framework for ensuring the resilience of business activities during threats and disruptive events thus enabling the assessment of potential risks to the business which could result from disasters or emergency situations.
This module will enable learners to develop a deep understanding of both theoretical and practical aspects of Ethical Hacking. An essential part of a modern organisation’s e-security includes rigorous testing and analysis to determine vulnerabilities. Carrying out such work requires a special skill set, which crosses, legal issues, psychology, computer networks along with detailed understanding of system vulnerabilities and exploits. Additionally, you will be exposed to a collection of industry standard hacking tools and will learn how to apply these in an ethical manner to determine system vulnerabilities.
Throughout the world of science, engineering, technology and business, the ability to pursue research is seen as a requisite for continued career progression in the appropriate subject discipline. This module introduces students to the nature of research and the processes involved in carrying out research. General research approaches and methods for research will be introduced including literature searching, evaluation and reviewing. This general introduction will be followed by the inclusion of topics specifically designed to meet the requirements of the students’ programme of study.
The aim of this module is to enable you to undertake a substantial academic research project at Masters Level and present the results from this work in both written and oral forms. Your project itself will be a major piece of independent and original research centred at the forefront of your programme discipline within the wider sphere of the computer science and digital technologies field.