Skip to content
6005-CEM Security
Week 1 videos
Initializing search
6005-CEM Security
Home
Essentials
Essentials
Module Guide
Assessment
Assessment
Overview
Coursework 1
Coursework 2
Teaching and Learning
MS Teams
Guides
Guides
Overview
Using These Materials
Home Lab Setup
Kali in the University
Docker Guide
Github Labs
Further Hacking
Week 1 Introduction
Week 1 Introduction
Materials
Materials
Introduction
What Is Cyber Security?
3 Pillars of Cyber Security
CIA Triangle
Threats to Businesses
Types of Attack
Who are the Hackers
Lab Tasks
Lab Tasks
Lab Tasks
Video Walkthrough
Videos
Videos
Video "Lectures"
Video "Lectures"
Table of contents
What is Cyber Security
Three Pillars of Cyber Security
The CIA Triangle
Week 2 Legal Factors
Week 2 Legal Factors
Materials
Materials
Introduction
GDPR
Privacy by design
Implementing GDPR
Online Lecture
Online Lecture
Lecture
Task
Lab
Lab
Lab Session
Week 3 Secure Design and Infrastructure
Week 3 Secure Design and Infrastructure
Materials
Materials
Introduction
Threats To Systems
Technology
Secure Design Principles
Secure Development Lifecycle
Online Lectures
Online Lectures
Lecture
Labs
Labs
Port Scanner
Week 4 Cryptography (Hashing)
Week 4 Cryptography (Hashing)
Materials
Materials
Introduction
Authentication
History of Crypto
Encoding
Hashing
Online Lectures
Online Lectures
Lecture
Lab Session
Lab Session
Using Hashes
Week 5 Cryptography (Encryption)
Week 5 Cryptography (Encryption)
Materials
Materials
Introduction
Symmetric Encryption
Key Exchange
Asymetric Encryption
On Campus Lab Session
On Campus Lab Session
Chat Client
Table of contents
What is Cyber Security
Three Pillars of Cyber Security
The CIA Triangle
Video "Lectures"
What is Cyber Security
Three Pillars of Cyber Security
The CIA Triangle
Back to top