Skip to content
6005-CEM Security
Lecture
Initializing search
6005-CEM Security
Home
Essentials
Essentials
Module Guide
Assessment
Assessment
Overview
Coursework 1
Coursework 2
Teaching and Learning
MS Teams
Guides
Guides
Overview
Using These Materials
Home Lab Setup
Kali in the University
Docker Guide
Github Labs
Further Hacking
Week 1 Introduction
Week 1 Introduction
Materials
Materials
Introduction
What Is Cyber Security?
3 Pillars of Cyber Security
CIA Triangle
Threats to Businesses
Types of Attack
Who are the Hackers
Lab Tasks
Lab Tasks
Lab Tasks
Video Walkthrough
Videos
Videos
Video "Lectures"
Week 2 Legal Factors
Week 2 Legal Factors
Materials
Materials
Introduction
GDPR
Privacy by design
Implementing GDPR
Online Lecture
Online Lecture
Lecture
Lecture
Table of contents
Slides
Recordings
Task
Lab
Lab
Lab Session
Week 3 Secure Design and Infrastructure
Week 3 Secure Design and Infrastructure
Materials
Materials
Introduction
Threats To Systems
Technology
Secure Design Principles
Secure Development Lifecycle
Online Lectures
Online Lectures
Lecture
Labs
Labs
Port Scanner
Week 4 Cryptography (Hashing)
Week 4 Cryptography (Hashing)
Materials
Materials
Introduction
Authentication
History of Crypto
Encoding
Hashing
Online Lectures
Online Lectures
Lecture
Lab Session
Lab Session
Using Hashes
Week 5 Cryptography (Encryption)
Week 5 Cryptography (Encryption)
Materials
Materials
Introduction
Symmetric Encryption
Key Exchange
Asymetric Encryption
On Campus Lab Session
On Campus Lab Session
Chat Client
Table of contents
Slides
Recordings
Week 2: Lecture
Slides
Week 2 Slides
Recordings
Back to top