Learning Outcomes
1. Identify and analyse security risks and vulnerabilities in IT network systems and determine appropriate methods to manage and/or solve them.
2. Design and critically appraise computer programs and systems to produce solutions that help manage and audit risk and security issues.
3. Gather and synthesise information from multiple sources to aid in the systematic analysis of security breaches and issues.
4. Articulate the legal, social, ethical and professional issues faced by information security professionals.
Group Project Meeting Minutes
1. Meeting 1 - 18th November: PDF here
1. Meeting 2 - 25th November: PDF here
1. Meeting 3 - 2nd December: PDF here
Artifacts
Powerpoints
1. STRIDE/DREAD presentation: Powerpoint Slides
2. TCP/IP vs OSI presentation: Powerpoint Slides
3. Pentesting Tools Evaluation presentation: Powerpoint Slides
4. Networking Tools Practical Application: Powerpoint Slides
5. Data Breach Case Study: Powerpoint Slides
Others
1. Unit 3 Scanning Exercise: Results
2. SQLMap: Results
3. Debate- The Future of the Internet: PDF here
Assignments
Assignment 1: Group Contract PDF here
Assignment 1: Design Document PDF here
Assignment 1: Tutor Feedback PDF here
Final Assignment: Executive Summary PDF here
Final Reflection
End of Module Reflection: My collected thoughts on the team project, our implementation of PTES and the lessons learned. Reflection here
Skills Matrix: Re-evaluation of my Skills at the end of the module. PDF here