Page 101 - PG-Handbook23-24-finale
P. 101
WQE7009 Emerging Cyber Security Trends
Learning Outcomes
At the end of this course, students are able to:
1. Identify the emerging trends in cybersecurity issues, attacks, threats and risks.
2. Analyse the emerging approaches in mitigating and defending networks from the cyber-attacks.
3. Apply the suitable approaches in analysing and synthesizing the emerging cyber-attacks and
threats.
Synopsis of Course Content
This course covers the understanding of the emerging issues, attacks, threats and risk in cyber security.
The topic is not limited to the existing issues, but also covers the possible issues in the near future. This
include to analyse and understand how the latest technologies can be used to mitigate and defense the
network from the cyber-attacks. This course extends the coverage by applying the suitable approaches
in analysing and synthesizing the latest cyber-attacks and threats.
Evaluation and Weightage
Continuous Assessment : 60%
Final Examination : 40%
WQE7010 Cloud Computing
Learning Outcomes
At the end of the course, students are able to:
1. Recognize the architecture and various basic concepts related to cloud computing technologies.
2. Demonstrate cloud virtualization, cloud storage, data management and data visualization.
3. Design cloud computing security using access control strategies.
Synopsis of Course Content
This course covers topics and technologies related to cloud computing various basic concepts and
architecture models (such as IaaS, PaaS, SaaS). It also discusses the important features of cloud
computing such as cloud virtualization, cloud storage, clustering, data management and data
visualization. The theoretical knowledge and practical sessions will be applied to design cloud
computing security using access control strategies.
Evaluation and Weightage
Continuous Assessment : 60%
Final Examination : 40%
WQE7011 Advanced Computer Penetration and Defense
Learning Outcomes
At the end of this course, the students are able to:
1. Identify the principles and techniques to hack and defend computer systems.
2. Apply the concepts and techniques to hack and defend computer systems.
3. Analyze the weaknesses in computer systems and their countermeasures.