Introduction to Cyber Security looks at the primary goals for network and system security. The course is suited to company employees with little cyber security knowledge providing a mixture of theory and practical experience. This 10 weeks course is delivered using a blend of classroom, home and online study.
Duration: 10 weeks (no class on Good Friday 25th March)
Times: 1.30 – 4.30pm
Start Date: 19 February 2016
Mode: Blended learning
Subject area: Computing
Location: GCU Glasgow
Costs: The cost of this 10 week course will be £850 per participant; this will include the course pack, access to online training materials and refreshments during the class time.
CPD points: Students are awarded a certificate and 20 British Computer Society CPD points on completion.
The programme aims to assist companies to develop their employees by providing a broad overview of the state of Cyber Security and current thinking in relation to maintaining a secure presence on the internet. It provides an introduction to core security concepts and skills needed to maintain the integrity, confidentiality and availability of data and devices. The course emphasizes the practical considerations underpinning network security skills, through a programme of directed study, including analysis of relevant case studies.
The syllabus covers topics ranging from basic Cyber Security terminology and thinking, through to coverage of some technically challenging material on the devices and strategies used in maintaining secure networks. There will also be material relating to personal safety on the internet, covering themes such as safe password employment through to identifying social engineering attacks.
The students will be encouraged to have confidence in their ability with both self-study and research. On completion of the programme the student will:
be conversant with the language of Cyber Security
have a basic knowledge of how the internet works
have basic knowledge of the devices used in network security
have knowledge of selected network security analysis tools
be aware of the various types of malware
be aware of Social Engineering attacks
have a basic knowledge of the role of cryptography in network security