Cyber Security
£2360 (£1600 during the tuition waiver period)
The process of encrypting and decrypting information forms the basis of much computer, device and network security. Cryptography is designed and used to protect the confidentiality, integrity and authenticity of information. From the very beginnings of computing, and throughout the industry’s evolution, the establishment of policies, guidelines and laws has shaped the disciplines of information security and organisational resilience in profound and, often, unintended, ways.
In this course learners will be introduced to the concept and history of cryptography, and its subdisciplines (including cryptology), and how cyber-enabled networks and devices have their communications security underpinned by cryptographic methods and sector standards. Learners will explore methods of attack, including side-channel, additional encryption methods and escrow principles and key. Learners will look at how businesses can deploy encryption to enhance their information security approaches.
1. Understand key cryptographic principles and modes
2. Understand the standards, regulations and laws that apply to business and government organisations in relation to encryption
3. Design an encryption plan and courses of action for a given organisation
Scholarships
Citizens of the following countries are eligible for a 50% scholarship upon writing a personal statement. All scholarships are to be approved by the Academic Board. The list of countries are: Sri Lanka, Indonesia, Philippines, Bhutan, Morocco, Vietnam, Papua New Guinea, Laos, Cambodia, India, Nigeria, Ghana, Bangladesh, Laos, Myanmar, Pakistan, Nepal and South Africa. Please talk to your student counselor and ask for the Coupon Code to get the 50% Tuition Waiver.
To pass the unit a 40% overall grade must be achieved.
You are eligible if you meet our stipulated entry requirements.
Introduction
Stream Ciphers
Block Ciphers
Authenticated Encryption
Basic Key Exchange
Public-Key Encryption