Course Details

CYBER SECURITY
Course Synopsis
This course covers cybersecurity, ethical hacking, attack phases, countermeasures, Bug Bounty Hunting, Penetration Testing, Forensics, and more. It provides insight into hacker mindset for enhancing security and safeguarding against future threats. By comprehending system weaknesses, organizations can bolster security to mitigate potential incidents.
Required Textbooks
- Mary Aiken, “The Cyber Effect”, Random House.
- Peter Kim, “The Hacker Playbook 3”, Peter Kim.
- Helden Wong, “Cyber Security: Law and Guidance”, Bloomsbury Professional.
Completion Criteria
After fulfilling all of the following criteria, the student will be deemed to have finished the Module:
- Has attended 90% of all classes held.
- Has received an average grade of 80% on all assignments.
- Has received an average of 60% in assessments.
- The tutor believes the student has grasped all of the concepts and is ready to go on to the next module.
Prerequisites
- Basic knowledge about programming, bits/bytes, procedures, classes, computer architecture, etc. If you just have theoretical knowledge that is perfectly okay but you should have strong convictions on what programming is, and what you hope to achieve from this class.
- Willing and eager to spend at least 10-20 hours (varying from student-to-student) per week outside of the training class to read/write codes in JavaScript (self-study and practice.
- There is no prior educational level requirement for this course. Anyone from 10+2 student to someone who is doing her PHD in Genetic Engineering is welcome to take this course.
- If you are only interested in theory and have no interest/patience in spending at least 10 hours every week throughout the duration of the course, then this course might not be for you.
- If you have absolutely no idea about programming or do not see yourself doing programming in the next six - odd months, then this class may not be for you!