Skip to main content
CIT855Sciences3 Unitsintermediate

Advanced Cyber Security

This course gives an advanced overview of computer security, covering cyber security principles, security technologies, security policies, and standards. It explores cyber security challenges, risk analysis, and threats to e-commerce. The course also addresses data security considerations, digital signatures, and cyber security tools. It is designed for IT practitioners, programmers, and engineers seeking to enhance their understanding of cyber security and its practical applications.

Take a practice test or generate AI study notes to help you excel in this course.

208h
Study Time
13
Weeks
16h
Per Week
basic
Math Level
Course Keywords
Cyber SecurityRisk AnalysisSecurity PoliciesE-Commerce ThreatsData Security

Course Overview

Everything you need to know about this course

Course Difficulty

Intermediate Level
Builds on foundational knowledge
65%
intermediate
Math Level
Basic Math
🔬
Learning Type
Hands-on Practice

Course Topics

Key areas covered in this course

1

Cyber Security Goals

2

Cyber Security Principles

3

Security Policies and Standards

4

Cyber Security Challenges

5

Cyber Security Risk Analysis

6

Cyber Security Threats

7

Data Security Concerns

8

Security Technologies

9

Cyber Security Tools

10

Cyber Security Operations

11

Types of Cyber Attacks and Attackers

12

Man-in-the-Middle Attacks

13

Cyber Security Wi-Fi Attacks

Total Topics13 topics

Requirements

Knowledge and skills recommended for success

Basic understanding of computer networks

Familiarity with operating systems

Knowledge of internet protocols

💡 Don't have all requirements? Don't worry! Many students successfully complete this course with basic preparation and dedication.

Assessment Methods

How your progress will be evaluated (3 methods)

assignments

Comprehensive evaluation of course material understanding

Written Assessment

tutor-marked assessments

Comprehensive evaluation of course material understanding

Written Assessment

final examination

Comprehensive evaluation of course material understanding

Written Assessment

Career Opportunities

Explore the career paths this course opens up for you

Security Analyst

Apply your skills in this growing field

Network Engineer

Apply your skills in this growing field

Cybersecurity Consultant

Apply your skills in this growing field

IT Security Manager

Apply your skills in this growing field

Information Security Analyst

Apply your skills in this growing field

Industry Applications

Real-world sectors where you can apply your knowledge

FinanceHealthcareGovernmentE-commerceTelecommunications

Study Schedule Beta

A structured 13-week journey through the course content

Week
1

Module 1: Fundamentals of Cyber Security

2h

Unit 1: Cyber Security Goals

2 study hours
  • Read Unit 1: Understand the CIA triad of cyber security.
  • Describe the 'C' in the CIA triad (Confidentiality).
  • Explain the 'I' in the CIA triad (Integrity).
  • Understand the 'A' in the CIA triad (Availability).
Week
2

Module 1: Fundamentals of Cyber Security

2h

Unit 2: Cyber Security Principles

2 study hours
  • Understand the economy of mechanism principle.
  • Describe the Fail-safe defaults principle.
  • Explain the least privilege and open design principles.
  • Understand complete mediation.
  • Explain the separation of privilege and least common mechanism.
  • Describe the psychological acceptability and work factor.
Week
3

Module 1: Fundamentals of Cyber Security

2h

Unit 3: Security Policies and Standards

2 study hours
  • Understand the security policies.
  • Explain the need for security policies.
  • Describe sample cyber security policies.
  • Understand the security standards.
  • Describe the International Organization for Standardization.
  • Explain the information technology act.
  • Understand the copyright act.
  • Understand the intellectual property rights.
Week
4

Module 2: Cyber Security Challenges and Threats

2h

Unit 1: Cyber Security Challenges

2 study hours
  • Understand the Ransomware Evolution.
  • Describe the Blockchain Revolution.
  • Explain the Internet of Things (IoT) Threats.
  • Understanding Artificial Intelligence (AI) Expansion.
  • Describing Serverless Apps Vulnerability.
Week
5

Module 2: Cyber Security Challenges and Threats

2h

Unit 2: Cyber Security Risk Analysis

2 study hours
  • Understand the cyber security risk analysis.
  • Describing the types of risk analysis.
  • Explaining the benefits of risk analysis.
  • Understanding the steps in the risk analysis process.
Week
6

Module 2: Cyber Security Challenges and Threats

2h

Unit 3: Cyber Security Threats

2 study hours
  • Understanding the Malware method.
  • Describing the Phishing method.
  • Explaining Man-in-the-Middle Attack.
  • Understanding how Distributed Denial of Service works.
  • Describing the Brute Force.
  • Explaining the SQL Injection.
  • Understanding the Domain Name System Attack.
  • Describing the Latest Cyber Threats.
Week
7

Module 2: Cyber Security Challenges and Threats

2h

Unit 4: Cyber Security Threat to E-Commerce

2 study hours
  • Understanding the security threats to e-commerce.
  • Describing the electronic payment system.
  • Explaining the Risk of Fraud and Tax Evasion.
  • Understanding the associated financial risks of Payment Conflict.
  • Understanding E-Cash and Credit / Debit Card Fraud.
  • Using Automated Teller Machine (ATM).
Week
8

Module 3: Managing Cyber Security

2h

Unit 1: Data Security Concerns

2 study hours
  • Understanding the data security considerations.
  • Describing the backup process.
  • Explaining the archival storage.
  • Understanding the disposal of data.
Week
9

Module 3: Managing Cyber Security

2h

Unit 2: Security Technologies

2 study hours
  • Understanding the Security Technologies.
  • Describe the Firewall.
  • Explain the Processing Mode.
  • Identify and describe the Development Era of Firewall.
  • Understand the Intended Development Structure.
  • Explain the Architectural Implementation.
  • Describe the Virtual Private Network (VPN).
  • Understand the Intrusion Detection System.
  • Explain the Access Control.
Week
10

Module 3: Managing Cyber Security

2h

Unit 3: Cyber Security Tools

2 study hours
  • Understanding the cyber security tools.
  • Describing the Firewalls.
  • Explaining the Antivirus Software.
  • Understanding how PKI Services work.
  • Describing Managed Detection and Response Service.
  • Explaining Penetration Testing and Staff Training.
Week
11

Module 3: Managing Cyber Security

2h

Unit 4: Cyber Security Operations

2 study hours
  • Understanding the security information management.
  • Describing the SOC staffing.
  • Explaining the escalation chains for security events.
  • Understanding how to classify security incidents.
  • Explaining the concept of security orchestration, automation and response.
Week
12

Module 4: Cyber Attacks and Attackers

4h

Unit 1: Types of Cyber Attacks and Attackers

2 study hours
  • Understanding the types of cyber-attacks.
  • Describing the web-based attacks.
  • Explaining the system-based attacks.
  • Understanding the Types of Cyber Attackers.
  • Describing the Cyber Criminals and Hacktivists.
  • Explaining the problems of State-sponsored Attackers.
  • Understanding the Insider Threats.

Unit 2: Man-in-the-Middle Attacks

2 study hours
  • Understanding the Man-in-the-Middle Attacks
  • Describing how MITM work
  • Explaining the types of MITM Attacks
  • Understanding how to detect Man-in-the-Middle Attack
  • Explaining the preventions of Mani-in-the-Middle Attack
Week
13

Module 4: Cyber Attacks and Attackers

2h

Unit 3: Cyber Security Wi-Fi Attacks

2 study hours
  • Understanding the Wi-Fi security.
  • Describing how Wi-Fi security works.
  • Explaining the hidden SSID.
  • Understanding how MAC Address filtering works.
  • Explaining the enterprise authentication of Wi-Fi.
  • Identifying Fake Wi-Fi Access points.

This study schedule is in beta and may not be accurate. Please use it as a guide and consult the course outline for the most accurate information.

Course PDF Material

Read the complete course material as provided by NOUN.

Access PDF Material

Study Tips & Exam Preparation

Expert tips to help you succeed in this course

1

Create concept maps linking Module 1 fundamentals to real-world applications.

2

Practice risk assessment scenarios from Module 2 using different methodologies.

3

Implement security policies from Module 1 in a virtualized environment.

4

Analyze network traffic captures for common cyber threats from Module 2.

5

Review case studies on e-commerce security breaches from Unit 4 of Module 2.

6

Simulate incident response procedures from Module 3 using different attack scenarios.

7

Focus on understanding the MITM attacks and prevention techniques from Module 4.

8

Practice identifying different types of cyber attackers and their motives from Module 4.

9

Review all TMAs and focus on areas where marks were lower.

10

Allocate specific time slots for revision in the weeks leading up to the exam.

Related Courses

Other courses in Sciences that complement your learning