Cyber Security
Subjects at A level
- Computer Science
- Social Science
- Sociology
- Physics
- Mathematics
- Accountancy
- Adult Education
- Aerospace Engineering
- African Studies
- Agriculture and Horticulture
- Anthropological Science
- Anthropology
- Archaeology
- Architecture
- Art and Design
- Astronomy
- Biochemistry/Medicinal Chemistry
- Biology
- Biomedical Engineering
- Biomedical Sciences
- Business Management
- Business Studies
- Chemical Engineering
- Chemistry
- Childhood Education
- Civil Engineering
- Computer Science
- Computer Systems Engineering
- Counselling
- Cultural Heritage Studies
- Cyber Security
- Dentistry
- Digital Marketing
- Earth Science
- Economics
- Electrical Engineering
- Engineering Management
- English Literature
- Environmental Engineering
- Fashion and Textiles
- Finance
- Food Science and Technology
- Forensic Science
- Fuels and Energy Engineering
- Geography and Environmental Studies
- Graphic Design
- History
- Human Geography
- Information Technology
- Interior Design
- Journalism and Media Studies
- Law
- Life Sciences
- Linguistics
- Logistics and Transport Management
- Manufacturing and Production Engineering
- Marketing
- Mathematics
- Mechanical Engineering
- Medicine and Health Sciences
- Metallurgy Engineering
- Mining Engineering
- Music
- Nursing
- Nutrition and Health
- Pharmacology
- Pharmacy
- Philosophy
- Physics
- Physiology
- Physiotherapy
- Plant and Crop Sciences
- Political Science and Governance
- Property Development and Estate Management
- Psychology
- Public Administration
- Public Health
- Religious Studies
- Safety Health and Environmental Management
- Social Work
- Sociology
- Software Engineering
- Sport Science
- Statistics
- Surveying And Geomatics
- Telecommunications Engineering
- Theatre Arts And Performance Studies
- Tourism and Hospitality Management
- Veterinary
Description:
Introduction to degree course was developed in response to high dropout and failure rates of university students.
The program fully supports successful progression of students from high school to undergraduate study and beyond.
This course introduces students to a degree, giving students a frame work and direction in their area of study.
We are well aware that if students fail to understand the foundation of the subject they are likely to lose interest in the subject that is why this course was
designed to make it easier for students. The course is equipped with most of the learning materials required by students to understand their degree program.
This course was developed in consultation with universities at global. The course is designed to give students a deeper knowledge and understanding of the degree.
The course is designed to enhance the creativity and critical thinking skills that are needed by students to develop their own ideas at University
standard. Taking students step by step, to simplify and to explain the degree.
The course equips students with the knowledge needed to make an informed decision before starting and during your studies enabling students to plan
ahead, minimizing student failure rates. The process makes knowledge transfer easier between students, universities, professionals, employers and research institutes
The aim of this course is not just to make learning easier, but also to help put qualification in to use. We understand that most
students at Universities fail not because they are “dumb” but, because they don’t get to understand what they are required to do.
Key Modules:
1: Introduction to Cyber Security
This module provides an overview of the field of cyber security, including its importance, fundamental concepts, and the challenges faced in securing computer systems and networks.
Enroll for this module2: Network Security
This module focuses on the security of computer networks. It covers topics such as network architecture, network protocols, firewall configuration, intrusion detection systems, virtual private networks (VPNs), and secure network design.
Enroll for this module3: Operating System Security
This module explores the security aspects of operating systems. It covers topics such as access control mechanisms, user authentication, secure file systems, secure configuration of operating systems, and securing operating system services.
Enroll for this module4: Secure Software Development
This module examines the principles and practices of developing secure software. It covers topics such as secure coding principles, common software vulnerabilities, secure software design, and techniques for testing and verifying software security.
Enroll for this module5: Cryptography
The module focuses on the principles and applications of cryptography in securing data and communications. It covers topics such as symmetric and asymmetric encryption, digital signatures, cryptographic protocols, key management, and secure communication channels.
Enroll for this module6: Incident Response and Management
This module explores the processes and techniques for detecting, responding to, and managing cyber security incidents. It covers topics such as incident handling procedures, incident response planning, forensic analysis, and legal and ethical considerations in incident response.
Enroll for this module7: Ethical Hacking and Penetration Testing
This module examines the techniques and tools used to identify vulnerabilities in computer systems and networks. It covers topics such as penetration testing methodologies, vulnerability assessment, exploit development, and ethical and legal aspects of penetration testing.
Enroll for this module8: Cyber Threat Intelligence
The module focuses on gathering, analyzing, and utilizing intelligence to understand and mitigate cyber threats. It covers topics such as threat modeling, threat intelligence sources, threat analysis techniques, and the use of threat intelligence in proactive cyber defense.
Enroll for this module9: Secure Cloud Computing
The module explores the security challenges and solutions in cloud computing environments. It covers topics such as cloud architecture, virtualization security, data protection in the cloud, access control in cloud environments, and cloud service provider security.
Enroll for this module10: Secure Web Applications
This module focuses on the security issues and best practices in web application development. It covers topics such as web application vulnerabilities, secure coding for web applications, web application firewalls, and secure deployment and configuration of web applications.
Enroll for this module11: Digital Forensics
This module examines the techniques and tools used to investigate cybercrimes and gather digital evidence. It covers topics such as digital crime scene investigation, data recovery and analysis, chain of custody, and legal considerations in digital forensics.
Enroll for this module12: Cyber Security Governance and Compliance
This module explores the governance and compliance aspects of cyber security. It covers topics such as security policies and standards, risk management frameworks, regulatory compliance, security audits and assessments, and security awareness and training programs.
Enroll for this module13: Wireless and Mobile Security
This module focuses on the security challenges and solutions in wireless and mobile computing environments. It covers topics such as wireless network security, mobile device security, mobile application security, and secure mobile communication protocols.
Enroll for this module14: Secure IoT (Internet of Things)
Focuses on the security challenges and solutions related to IoT devices and networks. It covers topics such as IoT architecture, IoT communication protocols, IoT device security, data privacy in IoT, and securing IoT deployments.
Enroll for this module15: Communication and Information Technologies
This module explores the principles and technologies used in network communication and information exchange. It covers topics such as network protocols, data transmission, network security, data encryption, and network infrastructure.
Enroll for this module16: Algorithms and Datatypes
This module delves into the fundamental algorithms and data structures used in computer science. It covers topics such as sorting algorithms, searching algorithms, graph algorithms, data representation, and algorithmic complexity.
Enroll for this module17: Information Systems and Databases
This module examines the design, implementation, and management of information systems and databases. It covers topics such as database management systems, relational databases, data modeling, database security, and data integrity.
Enroll for this module18: Cyber Crime
Focuses on the various types of cybercrime, their impact, and methods of prevention and detection. It covers topics such as hacking, identity theft, online fraud, cyberbullying, cyber terrorism, and the legal and ethical aspects of cybercrime.
Enroll for this module19: Risk Management and Compliance
This module explores the process of identifying, assessing, and managing risks in the context of cyber security. It covers topics such as risk assessment methodologies, risk mitigation strategies, compliance frameworks and regulations, and the integration of risk management into cyber security practices.
Enroll for this module20: Ethics
This module examines the ethical considerations in the field of cyber security. It covers topics such as ethical theories, professional codes of ethics, privacy and data protection, responsible disclosure of vulnerabilities, and ethical decision-making in cyber security.
Enroll for this module21: Programming
Provides a foundation in programming concepts and practices. It covers topics such as programming languages, syntax, variables, data types, control structures, functions, and debugging techniques.
Enroll for this module22: Server Management and Virtualization
Focuses on the management and administration of server systems, including virtualized environments. It covers topics such as server deployment, configuration, maintenance, virtual machine management, and server security best practices.
Enroll for this module23: System Administration and Security
This module explores the principles and practices of system administration with an emphasis on security. It covers topics such as user management, access control, system monitoring, backup and recovery, system hardening, and incident response.
Enroll for this module24: Computer Architecture
This module examines the structure and organization of computer systems. It covers topics such as processor architecture, memory systems, input/output devices, instruction sets, computer performance, and parallel processing.
Enroll for this module25: Big Data
The module focuses on the management, analysis, and security of large-scale data sets. It covers topics such as data storage and retrieval, distributed computing, data analytics techniques, data privacy, and ethical considerations in big data.
Enroll for this module26: Artificial Intelligence
This module explores the concepts and applications of artificial intelligence (AI). It covers topics such as machine learning, natural language processing, computer vision, AI algorithms, ethical considerations in AI, and AI security.
Enroll for this module27: Web Development and Security
This module focuses on web development principles and techniques, with an emphasis on security. It covers topics such as web programming languages, client-server architecture, web application frameworks, web security vulnerabilities, and secure web development practices.
Enroll for this module28: Machine Learning
This module examines the principles and algorithms used in machine learning. It covers topics such as supervised and unsupervised learning, feature selection, model evaluation, deep learning, ethical considerations in machine learning, and machine learning for cyber security.
Enroll for this module29: Business Continuity and Disaster Recovery
This module focuses on ensuring the continuity of business operations in the face of cyber security incidents and other disruptions. It covers topics such as business impact analysis, disaster recovery planning, backup and restoration strategies, and incident response coordination.
Enroll for this module30: Project Management
This module provides an overview of project management principles and practices. It covers topics such as project planning, scheduling, resource management, risk management, project communication, and project documentation.
Enroll for this module
Our professional development courses are designed to give students the accumulated knowledge gained in
conferences, seminars, workshops and continuing education programs that a professional person
can pursue to advance their career.
What is the professional skills development program?
The Professional Skills Development Program (PSDP) teach and enhance key skills that are needed at workplaces.
This increases students' employability chances and effectiveness at work.
Students can then complement their learning outside the classroom with thier academic qaulifications building confidence with these skills.