Cyber Threats
Week | Date | Day | Topic | |
1 | | Monday | Module introduction Introduction | |
| | | Foundations of cyber security | |
| | | Application of cyber security concepts Slides Day 1 | |
| | Tuesday | Fundamental building blocks and typical architectures of ICT infrastructure | |
| | | Vulnerabilities Slides Day 2 | |
| | Wednesday | Common vulnerabilities in networks and systems Slides Day 3 | |
| | Thursday | Vulnerabilities | |
| | | Network-based attacks. Practical Slides Day 4 | |
| | Friday | Impact of vulnerabilities in an organisational context | |
| | | Human dimension of cyber security | |
| | | How an employee may enable a successful attack chain without realising it Slides Day 5 | |
| |
2 | | Monday | Issue assignment 1 Slides Day 1 | |
| | Tuesday | Factors that may increase or decrease risks related to an organisation’s ‘cyber culture’ Slides Day 2 | |
| | Wednesday | Links between physical, logical, personal and procedural security Slides Day 3 | |
| | Thursday | Ways to defend against cyber attack Slides Day 4 | |
| | Friday | Adversarial thinking in the context of system development, application development and analysis Slides Day 5 | |
| |
3 | | Monday | Presentations | |
| | | Assignment 1 due. Issue assignment 2 | |
| | Tuesday | Horizon scanning | |
| | | Threat intelligence lifecycle | |
| | Wednesday | Threat analyses | |
| | Thursday | Assignment work | |
| | Friday | Assignment work | |