Alert for students

THIS TOPIC WILL BE OFFERED FROM 2025.

Overview

An organisation's network is always at risk of being compromised. Students will learn how to find threats and eliminate them by mastering the practical and theoretical aspects of traffic analysis and network forensics as it applies to enterprise investigations. Students will collect and analyse evidence from different network sources and … For more content click the Read More button below.

Aims

This topic covers the field of internet and network security, ethical hacking, mapping the network, tampering detection; network traffic analysis, such as firewalls, routers, DNS & DHCP services, Host/Network IDS; log analysis, web attack and DoS investigation. The topic also covers the analysis of forensic data in applications such as browsers, email, social media, data cloud, botnets malware and ransomware.

Students will also be introduced to:

  1. Malware analysis - fileless malware, malicious documents, packed, obfuscated, anti-analysis, and different process injection methods
  2. Reverse engineering - students will learn how to dissect by reverse engineering and debugging malware samples

Learning outcomes

On completion of this topic you will be expected to be able to:
1.
Analyse internet and network security, ethical hacking, mapping the network, tampering detection
2.
Interpret network traffic, network logs and other forensic data artefacts
3.
Evaluate and respond to threats in applications such as email, social media, data clouds, botnets, malware and ransomware

Requisites information

Pre-requisites:
Anti-requisites: