Singapore University of Social Sciences

Information Security Offence Defence and Incident Management

Information Security Offence Defence and Incident Management (ICT348)

Applications Open: 01 October 2024

Applications Close: 15 November 2024

Next Available Intake: January 2025

Course Types: Modular Undergraduate Course

Language: English

Duration: 6 months

Fees: $1529.14 View More Details on Fees

Area of Interest: Science and Technology

Schemes: Alumni Continuing Education (ACE)

Funding: To be confirmed

School/Department: School of Science and Technology


Synopsis

ICT348 Information Security Offence Defence and Incident Management enables students to not only understand how cyber attacks are carried out, but also learn the security measures that organisations can implement to ensure protection against cyber attacks. Students will learn how to gather information and identify vulnerabilities of targeted computing systems that may be potentially exploited by cyber attackers. Penetration testing will be introduced so that students can determine information security weaknesses. In addition, students will be able to explain how various types of security appliances can be utilized to improve the cyber defence of organisations. Students will also know how to investigate information security incidents through incident response using log analysis and forensics tools.

Level: 3
Credit Units: 5
Presentation Pattern: EVERY REGULAR SEMESTER

Topics

  • Stages of Cyber Attacks
  • Pentest Planning and Scoping
  • Reconnaissance Techniques
  • Exploiting Vulnerabilities
  • Vulnerability Management
  • Secure Software Development
  • Security Appliances
  • Logging and Analysis
  • Incident Response
  • Forensic Tools
  • Incident Analysis and Recovery
  • Security Architecture

Learning Outcome

  • Use information gathering and vulnerability identification
  • Apply ethical hacking
  • Improve defence strategy
  • Implement incident investigation
  • Demonstrate penetration testing
  • Assess vulnerabilities and threats
  • Design incident response
Back to top
Back to top