This module explores the impact of cyber security on network systems and designs, focusing on network vulnerability assessments. It covers techniques for scanning, evaluating, and mitigating network vulnerabilities, as well as the various mechanisms and approaches encapsulated in the Vulnerability Assessment Continuum.
● A thorough understanding of vulnerability assessment in various systems.
● Knowledge of the fundamentals of security provision in information networks.
● Awareness of the various protocols and architectures used by different network systems.
● Knowledge of the use and benefits of various monitoring and logging tools.
● The ability to create and use security vulnerability and assessment tools.
● The ability to present critical arguments for specific actions or outcomes to a diverse audience.
● The opportunity to reflect on and evaluate their personal development.
1. Identify and analyse security threats and vulnerabilities in network systems and determine appropriate methodologies, tools, and techniques to manage and solve them.
2. Design and critically appraise computer programs and systems to produce solutions that help manage and audit risk and security issues.
3. Gather and synthesise information from multiple sources, including internet security alerts and warning sites, to aid in the systematic analysis of security breaches and issues.
4. Articulate the legal, social, ethical, and professional issues faced by information security and risk professionals.