Page 97 - PG-Handbook23-24-finale
P. 97
WOX7001 Research Methodology
Course Learning Outcomes
At the end of the course, students are able to:
1. Describe appropriate methodologies used in computer science and information technology
research.
2. Devise a plan to be carried out within a feasible duration for answering research problems and
questions identified.
3. Demonstrate attitude and character in line with professional and ethical codes in computer science
and information technology research.
Synopsis of Course Content
This course gives on overview of the dimensions of research in computer science and information
technology. Major considerations and tasks in conducting research in the areas such as review of
literature, identify problem statement, formulate research questions and objectives, select an
appropriate approach or method to the research, plan and manage the research, tools for research,
data analysis, and writing and presentation strategies, will be discussed too.
Evaluation and Weightage
Continuous Assessment : 100%
Final Examination : 0%
WQE7001 Cyber Security
Learning Outcomes
At the end of this course, students are able to:
1. Understand cybersecurity operations, network principles, roles, and responsibilities as well as the
related technologies, tools, regulations, and frameworks available.
2. Integrate network monitoring tools to identify attacks against network protocols and services.
3. Apply knowledge and skills to monitor, detect, investigate, analyse, and respond to security
incidents.
Synopsis of Course Content
This course introduces the core security concepts and skills needed to monitor, detect, analyse, and
respond to cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory
requirements, and other cybersecurity issues facing organizations. It includes skills needed to practice
cybersecurity operations knowledge in a controlled environment.
Evaluation and Weightage
Continuous Assessment : 70%
Final Examination : 30%
WQE7002 Advanced Network Security Programming
Learning Outcomes
At the end of the course, students are able to:
1. Determine the network security methods that can defence against cyber-attacks.
2. Develop a secure network solution to mitigate the cyber threat.
3. Synthesize network in terms of the exposure to potential threats, vulnerability and security.