In this module, we will explore the effects of cybersecurity on network systems and designs, with a specific focus on network vulnerability assessments. We will discuss methods for scanning, evaluating, and sometimes mitigating network vulnerabilities. Additionally, we will consider the field of vulnerability assessments and explain the various mechanisms and approaches encompassed in the Vulnerability Assessment Continuum.
● Understanding the fundamentals of vulnerability assessment in various systems.
● Understanding the basics of security provision in information networks.
● Familiarity with the various protocols and architectures used by network systems.
● A thorough understanding of the use and benefits of monitoring and logging tools.
● Ability to create and use security vulnerability and assessment tools.
● Capability to present critical arguments for specific actions or outcomes to a diverse audience.
● Opportunity to reflect on and evaluate personal development.
1. Identification and analysis of security threats and vulnerabilities in network systems. You will also learn to determine appropriate methodologies, tools, and techniques to manage and solve them.
2. Design and critically evaluate computer programs and systems that can produce solutions to manage and audit risk and security issues.
3. Gather and synthesise information from multiple sources, including internet security alerts and warning sites, to aid in systematically analysing security breaches and issues.
4. Expression of the legal, social, ethical, and professional issues information security and risk professionals face.