Search for a course and click to view the specifications
| Course | Description |
|---|---|
| CST999: Thesis | Students will be expected to carry out a research in a relevant area of Cyber Security and submit |
| CST908: Unknown | This covers intelligence foundation, lifecycle, attack, defence and tools; cyber threat intellige |
| SCI802: ICT and Research Methodologies | This course should cover essentials of Spreadsheets, Internet technology, Statistical Packages, P |
| SCI801: Management and Entrepreneurship | The course will cover business environment, general management, financial management, entrepreneu |
| CST899: Dissertation | Students will be expected to carry out a study in a relevant area of Cyber Security and submit a |
| CST812: Cyber Law and Ethics | Legal and policy challenges of evolving cybersecurity threats at national and international level |
| ATI823: Introduction to Algorithms | This course gives students a soft landing into Algorithms for those lacking a strong background i |
| CST822: Seminar | Literature study, writing up and oral presentation of a topic on an aspect of Cyber Security as a |
| CST810: Web Security | Security Fundamentals, creating web pages and running web servers, JavaScript: the language, and |
| ATI822: Computational Logic | This course introduces students to the computational dimensions of Logic. |
| CST809: Security Architecture and Design | Fundamental components to security architecture; Components design; Principles of secure componen |
| CST808: Incidence Management and Disaster Recovery | An Overview of Information Security and Risk Management: Overview of Risk Management, Contingency |
| ATI821: Basic Probability, Statistics and Algebra | This course will introduce students to the basics of Probability & Statistics, and basics of |
| CST807: Secure Software Engineering | Security requirements; Specification of security requirements; Software development lifecycle and |
| CST806: Cyber war and Cyber Deterrence | Introduction to Cyber Warfare Threats landscape: definition of cyberwar, motivation, attackers, t |
| CST805: Computer and Network Security | Contemporary Security, Network Intrusion detection systems, network threat and mitigation, Passwo |
| ATI899: Dissertation | Students are required to work independently on a project related to a self-selected problem in th |
| CST804: Ethical Hacking and Penetration Testing | Focuses on penetration testing and vulnerability analysis. |
| CST803: Advanced Cryptography | Private-key cryptosystems; Advanced Encryption Standard (AES); Overview of modular arithmetic, di |
| ATI806: Introduction to Robotics | This course introduces students to robotic design and autonomous agents through the integration o |
| CST802: Malware and Digital Forensics | Malware Analysis, Malware Incident response; Analysing Physical Process Dumps for Malware Art |
| ATI805: Machine Learning I | This course provides a broad introduction to machine learning, data mining and statistical patter |
| CST801: Fundamentals of Cyber Security & Cyber Crime | An overview of the various branches of computing security, cybersecurity concepts, challenges, an |
| ATI804: Machine Learning II | This course will provide you with (i) the foundations of Deep Learning, understand how to build n |
| ATI808: Probability and Statistics | This course presents important probabilistic modeling languages for representing complex domains |
| GST807: Study Guide for Distance Learning | Introduction to the Open and Distance Learning (ODL) System: History of the Open and Distance Lea |
| ATI803: Programming for Artificial Intelligence | This course develop students skills in using the Python Programming language to implement algorit |
| CST807: Secure Software Engineering | Security requirements; Specification of security requirements; Software development lifecycle and |
| ATI802: Natural Language Processing | This course provides the fundamental concepts and ideas in Natural Language Processing (NLP), an |
| CST802: Malware and Digital Forensics | Malware Analysis, Malware Incident response; Analyzing Physical Process Dumps for Malware Art |