This module will look at ways of assessing the security of computer software and hardware, and how to investigate and respond when security has been compromised. A range of methods and tools will be introduced to identify vulnerabilities, and to analyse systems that have already been attacked.
Learning Outcomes
By the end of the module students should be able to:
Identify security vulnerabilities in a range of software and hardware systems
Understand how vulnerabilities may be exploited by an attacker
Use a range of methods and tools to analyse systems that have already been attacked.
Write formal reports that summarise their findings