This course will cover modern attack tactics, techniques, and procedures and how they can be addressed by security operation staff. Students will get practical skills in attack detection and investigation.
CILO
On Completion of this course, the learner will be able to
#
Learning Outcome Description
1
Demonstrate critical knowledge of cyber threat hunting and intelligence techniques.
2
Critically analyze the different cyber attacks using various techniques.
3
Use different threat intelligence sources to find new threats organization may face.
4
Build a cyber threat hunting infrastructure to prevent cyber attacks
Requisites
Pre Requisite: IT8505 (Defense in Depth) and IT7004 (Operating Systems and Platforms)
Examinations
Assessment Type Examination (Unseen)
Assessment Type Examination (Practical)
No Other Controlled Assessments
Uncontrolled Assessments
Assessment Type Project (Group)
The institute reserves the right to alter the nature and timings of assessment
Affiliated Entities
Entity Code
Entity Title
Entity Version
Entity Type
ICT7051
Associate Degree in Information and Communications Technology (Cyber Security)
1
Programme
ICT8050
Bachelor of Information and Communications Technology (Cyber Security Major)
2
Programme
ICT8051
Bachelor of Information and Communications Technology (Cyber Security Major)
2
Programme
No Code Yet
Copy Of Bachelor of Information and Communications Technology (Cyber Security Major)