Page 101 - PG-Handbook23-24-finale
P. 101

WQE7009          Emerging Cyber Security Trends



               Learning Outcomes
               At the end of this course, students are able to:
               1. Identify the emerging trends in cybersecurity issues, attacks, threats and risks.
               2. Analyse the emerging approaches in mitigating and defending networks from the cyber-attacks.
               3. Apply  the suitable  approaches in  analysing and synthesizing the emerging cyber-attacks and
                   threats.

               Synopsis of Course Content
               This course covers the understanding of the emerging issues, attacks, threats and risk in cyber security.
               The topic is not limited to the existing issues, but also covers the possible issues in the near future. This
               include to analyse and understand how the latest technologies can be used to mitigate and defense the
               network from the cyber-attacks. This course extends the coverage by applying the suitable approaches
               in analysing and synthesizing the latest cyber-attacks and threats.

               Evaluation and Weightage
               Continuous Assessment      : 60%
               Final Examination          : 40%



               WQE7010          Cloud Computing



               Learning Outcomes
               At the end of the course, students are able to:

               1. Recognize the architecture and various basic concepts related to cloud computing technologies.
               2. Demonstrate cloud virtualization, cloud storage, data management and data visualization.
               3. Design cloud computing security using access control strategies.

               Synopsis of Course Content
               This course covers topics and technologies related to cloud computing various basic concepts and
               architecture models (such  as IaaS,  PaaS, SaaS). It  also  discusses the important features  of cloud
               computing such as cloud virtualization, cloud storage, clustering,  data management  and data
               visualization.  The  theoretical  knowledge  and  practical  sessions  will  be  applied  to  design  cloud
               computing security using access control strategies.


                Evaluation and Weightage
               Continuous Assessment      : 60%
               Final Examination          : 40%



               WQE7011             Advanced Computer Penetration and Defense



               Learning Outcomes
               At the end of this course, the students are able to:
               1. Identify the principles and techniques to hack and defend computer systems.
               2. Apply the concepts and techniques to hack and defend computer systems.
               3. Analyze the weaknesses in computer systems and their countermeasures.
   96   97   98   99   100   101   102   103   104   105   106