The system will be offline between 13:00 and 14:00 17 October 2024 for scheduled maintenance.
Last modified: 23 Jul 2024 10:43
Data breaches are everywhere, and cyber incidents can be extremely costly for an organization. Therefore, the speed at which you identify a violation and respond to the incident is critical to your data and systems' security. This course will provide technical and legal discussions on incident detection, investigation, response, and digital forensic techniques. It will walk you through best practices for everything from incident response to in-depth digital forensics. This will help the student identify vulnerabilities and better communicate breaches to those impacted.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | Second Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
Data breaches are everywhere, and cyber incidents can be extremely costly for an organization. Therefore, the speed at which you identify a violation and respond to the incident is critical to your data and systems' security. This course will provide technical and legal discussions on incident detection, investigation, response, and digital forensic techniques. It will walk you through best practices for everything from incident response to in-depth digital forensics. This will help the student identify vulnerabilities and better communicate breaches to those impacted.
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 25 | |
---|---|---|---|---|
Assessment Weeks | 25 | Feedback Weeks | 25 | |
Feedback |
Online |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Analyse | Analyse the breach and respond to the incident in the cybersecurity industry, financial institutions and other knowledge transfer activities |
Conceptual | Apply | Understand how to design protection plans for incident response |
Assessment Type | Summative | Weighting | 25 | |
---|---|---|---|---|
Assessment Weeks | 24 | Feedback Weeks | 24 | |
Feedback |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Analyse | Analyse the breach and respond to the incident in the cybersecurity industry, financial institutions and other knowledge transfer activities |
Procedural | Analyse | Understand the concepts of digital forensics and incident management |
Assessment Type | Summative | Weighting | 25 | |
---|---|---|---|---|
Assessment Weeks | 26 | Feedback Weeks | 26 | |
Feedback |
Online |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Apply | Understand how to design protection plans for incident response |
Conceptual | Apply | State-of-the-art knowledge in digital forensics and incident management |
Assessment Type | Summative | Weighting | 25 | |
---|---|---|---|---|
Assessment Weeks | 26 | Feedback Weeks | 26 | |
Feedback |
2,000 words |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Analyse | Analyse the cybersecurity risk quantification |
There are no assessments for this course.
Assessment Type | Summative | Weighting | ||
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
(Continuous Assessment Courses Only) Where a student fails the course overall they will be afforded the opportunity to resit those parts of the course that they failed (pass marks will be carried forward). |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Analyse | Analyse the breach and respond to the incident in the cybersecurity industry, financial institutions and other knowledge transfer activities |
Procedural | Analyse | Analyse the cybersecurity risk quantification |
Conceptual | Apply | State-of-the-art knowledge in digital forensics and incident management |
Conceptual | Apply | Understand how to design protection plans for incident response |
Procedural | Analyse | Understand the concepts of digital forensics and incident management |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.