Teaching ISEC

Network Security

This course builds upon the basic concepts introduced in Communications Systems in year 1 and Network Implementation in year 2. The student will be able to show an understanding of the security issues surrounding networks. This will include the security of Web servers and networks generally, including attaching to the Internet. The role of Firewalls and Intrusion Detection Systems in the Enterprise will be covered. Penetration testing and the legal issues surrounding this area will also be addressed. More Details

Cyber Security

This masters course introduces the students to malware, hacking and cyber attacks. It goes on the cover cryptography and encryption in depth. Uk Law is covered with respect to hacking and cyber trespass. The concepts of defending the corporate network are also covered to provide the student with a complete view of the threats and possible defences in the real world. More Details

Penetration Testing

This course provides students with knowledge and hands-on experience of penetration testing using current testing tools and techniques, aligned with the CREST "CRT" syllabus, which is a widely accepted professional certification for penetration testers. It will enable the students to conduct penetration testing on a simple network, including planning, testing and report writing. It will give the students an understanding of common vulnerabilities, allow them to explain their implications and give recommendations for remedial action. More Details

Computer Crime and Forensics

The aim of the course is to provide students with knowledge and hands on experience of tools, technologies and scientific methods used, for conducting forensic analysis of electronic devices of all kinds as well as managing the forensic analysis process. The practical tool based approach will equip potential practitioners with the necessary awareness of real-world expertise and competence in the use of technologies used by police and forensic investigations. More Details

Computer Forensics 2

This course will enable the students to be able to undertake a simple forensic investigation using current forensic tools. The use of forensic tools that are currently used in Forensic Departments by the Police and Financial Institutions is essential to give a hands-on approach to teaching forensics. More Details

Computer Forensics 3

This course will build on the topics learned in Computer Forensics 2 and take the student's knowledge further deepening their understanding of the reasons for a methodical approach to initiating and conducting a computer and network forensic investigation. The approach includes identifying, preserving the computer crime scene and maintaining and or extracting records of evidence. Students taking this course will obtain the technical expertise and understanding of the relevant legal and evidence-collecting guidelines that govern a computer forensics investigation. More Details

Audit & Security

The aim of this course is to show the need to consider information security threats and their subsequent audit and control at management level within an organisation. Students will be expected to utilise professional skills learnt in other parts of the programme and apply them to practical audit and reporting tasks. The main taught element will focus on how to identify security issues and apply principles of audit and control to management reporting. More Details

IT Application Security and Control

The aims of the course are to provide students with sufficient knowledge of the security controls concerning information produced from common business office applications so that they can act appropriately.

Managing IT Security and Risk

The aim of the course is to provide students with knowledge of methods for managing security to a recognised international standard e.g. ISO17799/ISO27001. The case study approach will provide the real-world aspect that potential practitioners need to be aware of. More Details

Operating System and Application Server Security

This course will provide a solid foundation for IT professionals/ academics interested in the theory and practice of secure administration in small and large-scale deployments. Supported by established theory and founded on recognised best practice, it will take a critical look at implementing security policies and procedures on a number of platforms, using a range of application technologies. More Details

Computer Security and Risk Analysis

The aim of the course is to provide students with knowledge of methods, for the strategic management and deployment, of an IT security architecture, using proven technologies, to a recognised international standard ISO17799/BS779.

ISEC is part of the Faculty of Liberal Arts and Sciences, University of Greenwich.