• Course Description:

    The aim of the course is to introduce different methods of protecting information and data in the cyber world, including the privacy issue. Topics include introduction to security; cyber attacks and threats; cryptographic algorithms and applications; network security and infrastructure.

    Course Name: Introduction to cyber security

    Course Stream: Cyber Security, Financial Computing

    IsCEF: No

    Course Credit: 6

  • Course Description:

    This course provides students a foundational knowledge about reverse engineering and malware analysis, through the study of various cases and hand-on analysis of malware samples.  It covers fundamental concepts in malware investigations so as to equip the students with enough background knowledge in handling malicious software attacks.  Various malware incidents will be covered, such as cases in Ransomware, banking-Trojan, state-sponsored and APT attacks, cases in Stuxnet and malicious software attacks on Industrial Control System and IoT devices.  With the experience of studying these cases and analyzing selected samples, the students will be able to understand the global cyber security landscape and its future impact.  Hands-on exercises and in-depth discussion will be provided to enable students to acquire the required knowledge and skill set for defending and protecting an enterprise network environment.

    Students should have programming/development skills (Assembly, C, C++, Python) and knowledge in Operating System and computer network.

    Course Name: Reverse engineering and malware analysis

    Course Stream: Cyber Security

    IsCEF: No

    Course Credit: 6

  • Course Description:

    This is an ethical hacking course.  In this course, we will teach students how to conduct ethical hacking so as to better protect a computer system in a company.  Topics include physical security, password cracking, network hacking, operating system hacking, and application hacking.  The course will also discuss R&D problems related to hacking and defense.  The course will try to strike a balance between theory and practice so that students can understand the theories behind the hacking process as well as get enough hands-on exercises to perform ethical hacking and defense.

    Prerequisites: Students are expected to have knowledge in university level mathematics and systems plus experience in programming

    Course Name: Information security: attacks and defense

    Course Stream: Cyber Security

    IsCEF: Yes

    Course Credit: 6

  • Course Description:

    This course introduces the fundamental principles of digital investigation and forensics. The course starts with a brief introduction to common computer crimes and digital evidence, and then moves on to the computer basics and network basics pertaining to digital forensics, and finally comes to the techniques for digital investigation and forensic examination.

    Course Name: Digital investigation and forensics

    Course Stream: Cyber Security

    IsCEF: No

    Course Credit: 6

  • Course Description:

    This course aims at introducing various analytics techniques to fight against financial fraud.  These analytics techniques include, descriptive analytics, predictive analytics, and social network learning.  Various data set will also be introduced, including labeled or unlabeled data sets, and social network data set.  Students learn the fraud patterns through applying the analytics techniques in financial frauds, such as, insurance fraud, credit card fraud, etc.

    Key topics include: Handling of raw data sets for fraud detection; Applications of descriptive analytics, predictive analytics and social network analytics to construct fraud detection models; Financial Fraud Analytics challenges and issues when applied in business context.

    Required to have basic knowledge about statistics concepts.

    Course Name: Financial fraud analytics

    Course Stream: Cyber Security, Financial Computing

    IsCEF: No

    Course Credit: 6

  • Course Description:

    This course introduces computer professionals to the various legal means of protecting digital property including computer software, algorithms, and any work or innovation in digital form.  Focus is on the main issues in protecting digital property arising from developments in information technology, and their legal solutions.  Topics covered include, but are not limited to, the following: 1) Copyright protection of software and websites, 2) Patent protection of software and algorithms, 3) Protection of personal data.

    Mutually exclusive with: COMP3311/CSIS0311 Legal aspects of computing and ECOM6004 Legal aspects of IT and e-commerce

    Course Name: Legal protection of digital property

    Course Stream: Cyber Security

    IsCEF: No

    Course Credit: 6

  • Course Description:

    Selected topics in information security that are of current interest will be discussed.

    Course Name: Topic in information security

    Course Stream: Cyber Security

    IsCEF: No

    Course Credit: 6

keyboard_arrow_up