inline-defaultCreated with Sketch.

This website uses cookies to ensure you get the best experience on our website.

Students
Tuition Fee
GBP 4,670
Per course
Start Date
Medium of studying
On campus
Duration
2 months
Program Facts
Program Details
Degree
Diploma
Major
Cybersecurity | Network Security
Area of study
Information and Communication Technologies
Education type
On campus | Blended
Timing
Part time
Course Language
English
Tuition Fee
Average International Tuition Fee
GBP 4,670
Intakes
Program start dateApplication deadline
2023-09-012023-07-09
2024-01-012023-11-26
2024-09-01-
2025-01-01-
About Program

Program Overview


This 12-week Ethical Hacking and Cyber Security course from Teesside University provides a comprehensive understanding of information and network security principles, tools, and configurations. It also explores ethical hacking concepts like penetration testing, attack vectors, and vulnerability analysis, preparing learners for careers in the growing field of cyber security. The course is delivered through a blended learning approach, combining online and face-to-face interactions for a comprehensive learning experience.

Program Outline


Ethical Hacking and Cyber Security UCPD course | Teesside University


Degree Overview:


Overview:

This 12-week course provides a comprehensive understanding of information and network security principles, tools, and configurations for defending network technologies. It also delves into ethical hacking concepts like penetration testing, attack vectors, and vulnerability analysis. This course is part of a series aimed at developing digital innovation skills in areas such as coding, software development, cyber security, virtual reality, augmented reality, big data, and artificial intelligence.


Objectives:

  • Equip learners with a detailed understanding of information and network security concepts and principles.
  • Train learners to use tools and configurations for defending network technologies.
  • Explore key ethical hacking concepts including penetration testing, attack vectors, and vulnerability analysis.
  • Teach learners how to use ethical hacking tools in an ethical, professional, and legal manner.
  • Provide learners with the knowledge and skills needed by employers in the digital innovation field.

Ideal for:

  • School or college leavers wanting to explore the subject before committing to a full degree.
  • Unemployed individuals seeking to develop employability skills.
  • Teachers looking to refresh their knowledge or learn new skills.
  • Professionals seeking to enhance their knowledge and skills.
  • Individuals returning to education after a break.
  • Students currently in higher education who want to complement their skillset.

Outline:


Content:

  • Information and network security concepts and principles
  • Tools and configurations for defending network technologies
  • Ethical hacking concepts
  • Penetration testing
  • Attack vectors and models
  • Vulnerability analysis
  • Industry-standard hacking tools

Structure:

  • The course is divided into two parts:
  • Weeks 1-10:
  • Each week consists of:
  • One-hour recorded online lecture
  • Two-hour face-to-face class-based teaching (Wednesday 4.00pm - 6.00pm)
  • Two-hour online classes (Thursday 6.00pm - 8.00pm)
  • Weeks 11-12:
  • Each week consists of:
  • Two-hour synchronous online classes (Thursday 6.00pm - 8.00pm)

Modules:

  • Information and Network Security Concepts
  • Tools and Configurations for Network Defense
  • Ethical Hacking Concepts
  • Penetration Testing
  • Attack Vectors and Models
  • Vulnerability Analysis
  • Industry-Standard Hacking Tools

Module Descriptions:

  • Information and Network Security Concepts: This module provides a foundational understanding of essential information and network security concepts, including principles, threats, vulnerabilities, and risk management.
  • Tools and Configurations for Network Defense: This module explores various tools and configurations used to defend network technologies, including firewalls, intrusion detection/prevention systems, and network segmentation.
  • Ethical Hacking Concepts: This module delves into the ethical hacking methodology, covering principles, phases, and attack methodologies.
  • Penetration Testing: This module focuses on the practical application of penetration testing techniques, including reconnaissance, scanning, exploitation, and post-exploitation.
  • Attack Vectors and Models: This module examines different attack vectors and models, including zero-day vulnerabilities, social engineering, and denial-of-service attacks.
  • Vulnerability Analysis: This module equips learners with the ability to identify, analyze, and prioritize vulnerabilities within systems and networks.
  • Industry-Standard Hacking Tools: This module familiarizes learners with industry-standard hacking tools and techniques, emphasizing their ethical and legal use.

Assessment:

  • Coursework
  • Practical work
  • Assessments

Teaching:


Teaching Methods:

  • Recorded online lectures
  • Face-to-face class-based teaching
  • Online classes
  • Synchronous online classes

Faculty:

  • The course is delivered by experienced and qualified instructors with expertise in information and network security as well as ethical hacking.

Unique Approaches:

  • The course provides a blended learning approach, combining online and face-to-face interactions for a comprehensive learning experience.
  • It emphasizes practical application through hands-on exercises and real-world scenarios.
  • The course promotes ethical hacking practices and responsible use of hacking tools.

Careers:


Career Opportunities:

  • Security Analyst
  • Penetration Tester
  • Cyber Security Engineer
  • Network Security Engineer
  • Security Consultant
  • Security Architect
  • IT Security Manager

Career Outcomes:

  • The course prepares graduates for a successful career in the growing field of cyber security.
  • Graduates can pursue diverse career paths within various industries and organizations.
  • They can also further their education with a related degree or professional certification.

Other:

  • The course is funded by the government, making it accessible to a wider range of individuals.
  • Learners can apply for short course funding if they are currently in education or already qualified to degree, master's, or PhD level.
  • Study Support Bursaries are available to assist learners in overcoming barriers to studying this course.
  • This course is part of a series of digital innovation short courses offered by Teesside University.
SHOW MORE
How can I help you today?