BACHELOR OF SCIENCE HONOURS DEGREE IN CYBERSECURITY (HCSEC)
PROGRAMME OVERVIEW
- The BSc Honours degree in Cybersecurity is a programme that aims to provide students with sound theoretical and practical training in security of cyberspace as well as in-depth detail of the risks that users are likely to encounter within the cyberspace realm.
ENTRY REQUIREMENTS
- For all entry pathways candidates must have at least five Ordinary Level subjects/ National Foundation Certificates including English Language, Mathematics and a Science subject at grade C or better:
- Normal Entry
A minimum of 2 A’ Level passes in Mathematics AND (Physics OR Computer Science OR any other relevant Science subject).
- Special Entry
Special entry may be granted to applicants with a National Diploma in Computer Science or any related field from a recognized institution.
- Mature Entry
Refer to Section 3.3 of the General Academic Regulations.
2.1.4 Visiting School/Block Release
Should have at least an ND or HND in Software Engineering or any relevant field and have proof of employment in the field specifying the nature of duties.
CAREER OPPORTUNITIES AND FURTHER EDUCATION
- Employability: Careers in the Computer Science field which include:
Research Scientists, Information Security Analyst, Lead Software Security Engineer, Chief Information Security Officer, Analyst Programmers, Penetration Tester, Cybersecurity Crime Investigator/ Forensics Expert
- Further Studies: Master’s and doctoral studies in Cybersecurity or in interdisciplinary programmes related to computing practices.
PROGRAMME STRUCTURE
A student will not be allowed to register for a module with a pre-requisite if the pre-requisite is not passed. Electives will be offered subject to availability of personnel. * denotes core modules.
Level 1 Semester 1
Code | Module Description | Credits |
---|---|---|
HCSCI132* | Fundamentals of Programming Languages | 10 |
HSWE111* | Software Engineering Fundamentals | 10 |
HCSCI133* | Operating Systems | 10 |
HCSEC111* | Introduction to Information Security | 10 |
HCSE138* | Discrete Mathematics | 10 |
CS131* | Communication Skills | 12 |
Level 1 Semester 2
Code | Module Description | Credits |
---|---|---|
HCSCI135 | Computer Architecture and Organization | 10 |
HCSEC122* | Cyberspace Ethics and Laws | 10 |
HCSEC123* | Principles of Secure Coding | 10 |
HCSE135 | Database Systems | 10 |
HCSCI136* | Data Structures and Algorithms | 10 |
HCSEC125* | Forensics and Incidence Response | 10 |
Level 2 Semester 1
Code | Module Description | Pre-Requisites | Credits |
---|---|---|---|
HCSEC211* | Coding Theory | HCSE138 | 10 |
HCSEC212* | Number Theory | HCSE138 | 10 |
HCSCI234* | Research Methods | 10 | |
HCSCI237 | Data Communications and Computer Networks | 10 | |
TNCP201* | Technopreneurship | 12 | |
GS231* | Gender Studies | 12 |
Level 2 Semester 2
Code | Module Description | Pre-Requisites | Credits |
---|---|---|---|
HCSEC221* | Network Programming | HCSEC123 | 10 |
HCSEC222* | Cryptography | HCSEC111 | 10 |
HCSEC223* | Ethical Hacking | 10 | |
HCSEC224* | Cybersecurity Mini Project | 12 | |
Elective (Select 1 module from the following): | |||
HSWE221 | Web Technologies | 10 | |
HCSEC225 | Systems Administration and Security | 10 |
Level 3 Semester 1
Code | Module Description | Credits |
---|---|---|
HCSEC311* | Work-Related Learning I | 40 |
Level 3 Semester 2
Code | Module Description | Pre-Requisites | Credits |
---|---|---|---|
HCSEC321* | Work-Related Learning II | HCSEC311 | 80 |
Level 4 Semester 1
Code | Module Description | Pre-Requisites | Credits |
---|---|---|---|
HCSEC411* | Blockchain Technology | 10 | |
HCSEC412* | Network Security | HCSEC221 | 10 |
HCSEC413* | Digital Forensics | HCSEC125 | 10 |
HCSEC414* | Cryptanalysis and Development of Cryptosystems | HCSEC222 | 10 |
HCSEC415* | Cybercrime and Security Management | 10 | |
Elective (Select 1 module from the following): | |||
HCSEC416 | Secure Ecommerce | 10 | |
HSWE419 | Advanced Web Engineering | HSWE221 | 10 |
HSWE418 | Web Services and Service Oriented Architecture | 10 |
Level 4 Semester 2
Code | Module Description | Pre-Requisites | Credits |
---|---|---|---|
HCSEC421* | Android Security Design and Internals | 10 | |
HCSEC422* | Cloud Architectures and Security | HSWE221 | 10 |
HCSEC423* | IT Auditing and Assurance | 10 | |
HCSEC424* | Penetration Testing and Vulnerability Assessment | HCSEC125, HCSEC223 | 10 |
HCSEC425* | Capstone Project | HCSEC224 | 24 |
SYNOPSES
HCSCI132 Programming Languages
The module aims to introduce the basic principles of programming, programming paradigms, program constructs and implementation of algorithms using Python programming language. Modular programming through the use of functions, and modules will also be covered to enhance students understanding of code reusability. Moreover, data persistence will be demonstrated in files and data structures. The module will equip students with knowledge on basics of Object-Oriented Programming (OOP) and databases. Lastly, students will get to explore the fundamentals of object-based programming using the Tkinter library in Python.
HSWE111 Software Engineering Fundamentals
This subject introduces the issues, concepts, techniques, tools, and methodologies related to large-scale software development covering the entire life cycle. Topics include definition, estimation, analysis, design, implementation, testing, deployment, maintenance, refinement of the software and use of CASE Tools.
HCSCI133 Operating Systems
Operating Systems Overview: Evolution of operating systems, Operating Systems Concepts, Operating System structure, Processes, CPU Scheduling, Interprocess Communication, Deadlocks, Memory Management, Virtual Memory and Paging, File Systems, Protection and Security.
HCSEC111 Introduction to Information Security
A review of the origins of information security, outline of the phases of the security systems development life cycle, critical characteristics of information (CIA). Examination of the various threats facing organizations and methods for ranking these threats (in order to assign them relative priority), examination of the types of attacks that could result from these threats, and how these attacks could impact the organization’s information systems, secure software development. Legal, ethical, and professional issues in Information Security. Risk Management: an overview of risk management (know yourself/the enemy), Risk identification, Risk assessment, Risk control strategies, Selecting a risk control strategy (feasibility studies). Benchmarking and best practices, Baselining, Residual risk. Information security policy, standards, and practices. EISP, ISSP, SysSP, The information security blueprint, Security Education, Training, and Awareness Program (SETA), Continuity strategies. Security Technology: Security Technology: Intrusion Detection and Prevention Systems. Physical Security: Physical access controls, Mobile and portable systems, Remote computing security. Implementing Information Security: Information security project management, Technical aspects of implementation (Conversion strategies, The Bull’s-Eye model). Personnel Security: Positioning and staffing the security function, Credentials of information security professionals, Employment policies and practices, Security considerations for non-employees. Information Security
HCSE138 Discrete Mathematics
In this module the discovery that logical propositions are the underlying model of discrete systems is made. From this modest beginning algorithms are developed and their efficacy proven. Topics include propositional and predicate logic, basic proof techniques, set algebra and Boolean algebra, recursion and induction, trees and graphs, introductory combinatorics, and matrix algebra
CS131 Communication Skills
Students will cover theory of technical communication and the requisite principles. Students learn how to communicate technically through writing and oral presentations while applying verbal and nonverbal communication skills with the use of ICT tools. They also critique visual and audio images or literature according to modern standards. Students learn how to design a technical report for laboratory experiments, research project reports and analyzing literature.
HCSCI135 Computer Architecture and Organization
The module covers the fundamentals of computer architecture, Von Neumann and Harvard architecture, functions of control unit (CU), arithmetic logic unit (ALU), memory and I/O devices. Topics to be covered include fetch-decode cycle, machine instructions, memory and registers addressing modes, arithmetic operations, translating high level arithmetic into assembly, stack memory, heap memory, subroutines, recursive subroutines, negative numbers and two’s complement. The subject will also explore the evils of floating point, latches and memory reading, multi-cycle implementations, finite state machines, balancing the work into single cycles, PLAs, Microcode, RISC, CISC, pipelines, principle of locality, Direct Mapped Caches, I/O polling and interrupts.
HCSEC122 Cyberspace Ethics and Laws
Focus is on the need for suitable legislation, and appropriate resourcing of law enforcers to address cybercrime. Students learn about the global nature of computer crime and examine national and international laws, regulations and agreements that govern computer crime, including computer investigations, prosecution and defense. The module encourages analytical thinking and reasoning about computer crime topics and relevant legal issues so that students can identify, analyze, and solve problems in the continually emerging cybercrime and cyber law issues and trends. The module explores legal responses to cybercrime, including regulatory and law enforcement initiatives aimed at combating computer crime. This module is designed to acquaint students with electronic privacy, security and ethics. Students will gain an understanding of information ethics, existing and emerging cyber-laws, organizational liability issues, and explore several Code of Ethics. Students will learn about real and potential security issues, steps that can be taken to create environments of trust, how to evaluate the strengths and weaknesses of a firm’s information resource environment, and risk management and operation feasibility issues. Cyber policies and privacy are also catered for.
HCSEC123 Principles of Secure Coding
This module provides a detailed explanation of common programming errors in programming languages and describes how these errors can lead to software systems that are vulnerable to exploitation. It will also cover defensive programming and identify its benefits and disadvantages, secure programming, its relationship to defensive programming, and its benefits and disadvantages, sources of risk that can negatively impact your software applications, best practices for creating secure code, how to include defensive programming techniques into your software development process, why testing should be performed and identify the major phases of the software testing process, what unit testing is and the benefits it provides, the benefits of employing defensive and secure programming and recognizing the phases of the software testing process. Software security, organizational security and connection security are covered.
HCSE135 Database Systems
The module covers fundamentals of database system principles, database management systems (DBMS), database design concepts and implementation. It also includes topics in database models, database system architecture, normalization, structured query system (SQL), NoSQL database manipulation and database security. The assignments are implemented using any SQL database tool depending on the instructor.
HCSCI136 Data Structures and Algorithms
This module covers data structures and algorithms fundamentals: algorithm correctness, algorithm analysis, the relationship between algorithms and data structures- containers, dictionaries, binary search trees and priority queues; specialized data structures; graph data structures and algorithm design. Applications and approaches to sorting: incremental insertion, divide and conquer, randomization, and bucketing techniques. Algorithm Design and Breaking Problems Techniques for increasing efficiency: dynamic programming, application, implementation, and limitations; divide and conquer. Graph traversal, minimum spanning trees, and shortest paths. Backtracking, search pruning, bandwidth minimization, heuristic methods, and parallel algorithms. Programming assignments will be implemented in python/C.
HCSEC125 Forensics and Incidence Response
This module focuses on the forensic analysis of data from computer systems and response after an incident. It also covers Incident Response Overview, Incident Response Phases, Digital Forensics Overview, Digital Forensics Evidence Acquisition, Digital Forensics Evidence Analysis, Digital Forensics Reporting. Societal security, organizational security and human security are also covered.
HCSEC211 Coding Theory
The module covers the following areas: Introduction to Information Theory. Concept of information, units, entropy, marginal, conditional and joint entropies, relation among entropies, mutual information, and information rate. Source coding: Instantaneous codes, construction of instantaneous codes, Kraft‘s inequality, coding efficiency and redundancy. Noiseless coding theorem, construction of basic source codes, Shannon – Fano Algorithm, Huffman coding, Channel capacity – redundancy and efficiency of a channel, binary symmetric channel (BSC), Binary erasure channel (BEC) – capacity of band limited Gaussian channels. Continuous Sources and Channels: Differential Entropy, Mutual information, Waveform channels, Gaussian channels, Shannon – Hartley theorem, bandwidth, SNR trade off, capacity of a channel of infinite bandwidth, Shannon’s limit. Introduction to rings, fields, and Galois fields. Codes for error detection and correction – parity check coding – linear block codes – error detecting and correcting capabilities – generator and parity check matrices – Standard array and syndrome decoding. Perfect codes, hamming codes, encoding and decoding Cyclic codes, polynomial and matrix descriptions, generation of cyclic codes, decoding of cyclic codes BCH codes, Construction and decoding, Reed Solomon codes. Convolutional Codes – encoding – time and frequency domain approaches, State Tree and Trellis diagrams – transfer function and minimum free distance – Maximum likelihood decoding of convolutional codes – The Viterbi Algorithm. Sequential decoding.
HCSEC212 Number Theory
The module covers areas such as prime numbers and divisibility in integers, G.C.D, L.C.M — prime numbers – prime factorization– Fundamental theorem of arithmetic – Euclidean division algorithm — Fermat numbers. ARITHMETICAL FUNCTIONS The Mobius function μ(n)- divisor sum formula for μ(n) – The Euler totient function φ(n) – divisor sum formula for φ(n)– A relation connecting μ and φ- A product formula for φ(n) – properties of φ(n)–Multiplicative functions–completely multiplicative function. CONGRUENCES Basic properties – Residue classes and complete residue systems – linear congruences – Reduced residue systems and Euler Fermat theorem – Simultaneous linear congruences – The Chinese remainder theorem. PRIMITIVE ROOTS Primitive roots and reduced residue system – Non-existence of p-roots mod 2α (α ≥ 3) – existence of p-roots mod p for odd primes p – Existence of p-root mod pα – p- root mod 2 pα -Non-existence of p-roots in other cases. QUADRATIC RECIPROCITY AND ELLIPTIC CURVES – Quadratic Residues – Legendre’s symbol and its properties – Evaluation of (-1 | p) and (2 | p) – Gauss’ lemma – The Quadratic Reciprocity law – Applications – The Jacobi symbol – continued fractions – elliptic curves –applications.
HCSCI234 Research Methods
This module equips students with research techniques including definition of research objectives, research framework, design, research problem, experimental research, experiment data acquisition and processing, population and sampling methods, research methods and instruments, data processing and analysis, descriptive statistics, inferential statistics, data presentation and interpretation. research ethics, report writing.
HCSCI237 Data communications and Computer Networks
Introduction and Background to Data Communications. LANS (Wired and Wireless). Internetworking and Routing. Routing Fundamentals. Multicast and multicast routing. Application Layer Protocols. Non-real-time and real-time Internet applications: Telnet, FTP, SMTP, DNS, WWW, VoIP, SIP and H.323. Network security. IPsec, TLS and PGP.
TCNP 201 Technopreneurship
Nature and importance of technopreneurship, Differences between technopreneurship and entrepreneurship; Relationship between technopreneurship and the national economy. Developing a business model and basics of small business management, Risks and stages of funding, Sources of funding, Financial funding for growth, product valuation. Opportunity recognition and creation, Sources of opportunity, Screening technology opportunities. The New Product Development process. Concept of intellectual property and its significance, Basics of patenting, legislation governing IP in Zimbabwe.
GS231 Introduction to Gender Studies
This module will empower the students with knowledge and skills that enable them to be gender sensitive in the University, workplace and in all their social interaction. Topics covered include: understanding gender, gender analysis, gender issue in Zimbabwe, redressing gender imbalances, empowerment and strategies for creating gender responsive environment. Students gain insight into accounts of gender studies in Science and Technology
HCSEC221 Network Programming
Modules covers Linux Utilities- File handling utilities, Security by file permissions, Process utilities, Disk utilities, Networking utilities, Filters, Text processing utilities and Backup utilities. Bourne again shell(bash) – Introduction, pipes and redirection, here documents, running a shell script, the shell as a programming language, shell meta characters, file name substitution, shell variables, command substitution, shell commands, the environment, quoting, test command, control structures, arithmetic in shell, shell script examples. Files- File Concept, File types File System Structure, Inodes, File Attributes, file I/O in C using system calls, kernel support for files, file status information-stat family, file and record locking-lockf and fcntl functions, file permissions. File and Directory management – Directory contents, Scanning Directories- Directory file APIs. Process- Process concept, Kernel support for process, process attributes, process control – process creation, replacing a process image, waiting for a process, process termination, zombie process, orphan process.: Signals- Introduction to signals, Signal generation and handling, Kernel support for signals, Signal function, unreliable signals, reliable signals, kill, raise, alarm, pause, abort, sleep functions. Interprocess Communication – Introduction to IPC mechanisms, Pipes- creation, IPC between related processes using unnamed pipes, FIFOs-creation Shared Memory- Kernel support for shared memory, UNIX system V APIs for shared memory, client/server example. Network IPC – Introduction to Unix Sockets, IPC over a network, Client-Server model, Address formats (Unix domain and Internet domain), Socket system calls for Connection Oriented – Communication, Socket system calls for Connectionless-Communication, Example-Client/Server Programs- Single Server-Client connection, Multiple simultaneous clients, Socket options – setsockopt, getsockopt, fcntl. Network Programming in Java- Network basics, TCP sockets, UDP sockets (datagram sockets), Server programs that can handle one connection at a time and multiple connections (using multithreaded server
HCSEC222 Cryptography
The nature, purposes and history of cryptography; Classical cryptography: transposition ciphers, substitution ciphers, Affine cipher, the Vigenere cipher. Entropy and equivocation; Perfect secrecy and one-time pads, Unicity distance. Fields: Field extensions, Finite fields, Fields over irreducible polynomials. Modern encryption algorithms: stream ciphers vs. block ciphers (e.g. RC4, AES), Symmetric (Secret key systems) vs. Asymmetric (Public key systems) – RSA (history, construction and applications), ElGamal. Information flow controls, Inference controls, Access controls, Cryptography techniques. Component security and organizational security.
HCSEC223 Ethical Hacking
Areas to be covered include: Introduction: Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations, Reconnaissance, Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable, Integration Information Security Models: Computer Security, Network Security, Service Security, Application Security, Security Architecture Information Security Program: The Process of Information Security, Component Parts of Information Security Program, Risk Analysis and Ethical Hacking. The Business Perspective: Business Objectives, Security Policy, Previous Test Results, Business Challenges Planning for a Controlled Attack: Inherent Limitations, Imposed Limitations, Timing is Everything, Attack Type, Source Point, Required Knowledge, Multi-Phased Attacks, Teaming and Attack Structure, Engagement Planner, The Right Security Consultant, The Tester, Logistics, Intermediates, Law Enforcement. Preparing for a Hack: Technical Preparation, Managing the Engagement Reconnaissance: Social Engineering, Physical Security, Internet Reconnaissance. Enumeration: Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of Enumeration, Preparing for the Next Phase Exploitation: Intuitive Testing, Evasion, Threads and Groups, Operating Systems, Password Crackers, Rootkits, applications, Wardialing, Network, Services and Areas of Concern. Deliverable: The Deliverable, The Document, Overal Structure, Aligning Findings, Presentation Integration: Integrating the Results, Integration Summary, Mitigation, Defense Planning, Incident Management, Security Policy, Conclusion.
HCSEC224 Cyber Security Mini Project
After having gained knowledge in modules undertaken earlier on, students will be equipped enough to conceive a project idea in any of the thematic areas within the cyberspace realm exposed to earlier on. The expectation is that the student will design and implement a solution under the supervision of a lecturer and submit a suitable report on the work carried out. An artifact commensurate with the level of study is expected at this point. Projects can be done in groups depending upon approval by the departmental board.
HSWE221 Web Technologies
Students will cover Web design fundamentals and internet technologies. They will have an appreciation of Web communication protocols and methods. They will learn how to use Scripting languages, interface design tools, Application Programming Interface (API), Web Services and design patterns in Web Application Development.
HCSEC225 Systems Administration and Security
This module introduces concepts of systems administration on servers such as Unix/Linux and Microsoft amongst others. As well as making sure these servers are secured. It covers systems security, component security and organizational security with a focus on system thinking, management, access and control as well as testing and retirement. System architectures are also covered.
HCSEC311 Work-Related Learning I
Refer to Section 8 of the Faculty of Science and Technology Regulations.
HCSEC321 Work-Related Learning II
Refer to Section 8 of the Faculty of Science and Technology Regulations.
HCSEC411 Blockchain Technology
Areas to be covered include: Distributed Database, Two General Problem, Byzantine General problem and Fault Tolerance, Hadoop Distributed File System, Distributed Hash Table, ASIC resistance, Turing Complete. • Cryptography: Hash function, Digital Signature – ECDSA, Memory Hard Algorithm, Zero Knowledge Proof. Blockchain: Introduction, Advantage over conventional distributed database, Blockchain Network, Mining Mechanism, Distributed Consensus, Merkle Patricia Tree, Gas Limit, Transactions and Fee, Anonymity, Reward, Chain Policy, Life of Blockchain application, Soft and Hard Fork, Private and Public blockchain. Distributed Consensus: Nakamoto consensus, Proof of Work, Proof of Stake, Proof of Burn, Difficulty Level, Sybil Attack, Energy utilization and alternate. Cryptocurrency: History, Distributed Ledger, Bitcoin protocols – Mining strategy and rewards, Ethereum – Construction, DAO, Smart Contract, GHOST, Vulnerability, Attacks, Sidechain, Namecoin. Cryptocurrency Regulation: Stakeholders, Roots of Bitcoin, Legal Aspects-Crypto currency Exchange, Black Market and Global Economy. Applications: Internet of Things, Medical Record Management System, Domain Name Service and future of Blockchain. Tutorial and Practical: Naive Blockchain construction, Memory Hard algorithm – Hashcash implementation, Direct Acyclic Graph, Play with Go-ethereum, Smart Contract Construction, Toy application using Blockchain, Mining puzzles
HCSEC412 Network Security
Topics include Network traceroute and packet filtering project. Protocol designs, Security Concepts and Terminology, TCP/IP and OSI Network Security, Access Control Issues (Packet Filters, Firewalls), Communication Security (OSI Layer Security Protocols), Security Tools, Cryptography, System Security – Intruders and Viruses, E-mail and Web Security. Implementation will be done using Appropriate Networking Programming. Areas to be looked at include Network and web basics, Socket Programming. Distributed objects. Connection security and component security as well as systems security are also catered
HCSEC413 Digital Forensics
This module covers mobile phone security and forensics, investigating wireless and web attacks, network-based forensics, anti-forensics methods, tools and techniques emerging technologies in the field of digital forensics. It will also involve the reconstruction of web browsing history from web artifacts, capture and interpret network traffic, discuss the challenges associated with mobile device forensics, inspect a system (network, computer, or application) for the presence of malware or malicious activity and identify anti-forensic methods. Data security and societal security are catered for along with elements of component and connection security.
HCSEC414 Cryptanalysis and Development of Cryptosystems
This module covers teaching students how to break codes, explicitly describe the real-world constraints and realities of Cryptanalysis, critic, design, and build secure cryptographic systems, explicitly the real-world constraints and realities of cryptography, critic, design, and build secure cryptographic systems understand current implementations of cryptography algorithms and protocols in real life and teach emerging technologies. Data security and software security as well as component security are catered for.
HCSEC415 Cybercrime and Security Management
This module covers types of computer crimes and various modes of attacks, investigating cybercrimes, Identity management, social engineering, social and behavioural privacy, usable security and privacy, business continuity and management with respect to information security, Security patch management and Security Incident and Event Management (SIEM), management of computer security and emerging technologies in security management and investigating and handling cybercrimes.
HCSEC416 Secure E-commerce
The module introduces the concepts and principles of electronic commerce, security in E-commerce transactions, Internet technologies and tools for implementing E-commerce applications; and to implement some basic secure E-commerce applications to gain hands-on experience. The following topics will be covered: Introduction to basic concepts of E-commerce and security, introduction to the underlying network infrastructure of Internet, Introduction and implementations on the operations and security of Client Side and Server Side. Introduction and implementations on secure web-based application development using various technologies such as XML, Perl, PHP, ASP, JSP and JavaScript. Implementing cryptographic tools to support confidentiality, integrity, authentication, digital signature, non-repudiation services for electronic transmissions and transactions. Familiarity with business, legal, and ethical issues in the area of E-commerce, and the interaction of these issues with technical issues. Data and connection security as well as organizational security are covered.
HSWE419 Advanced Web Engineering
The module advances the hands-on experience of students with enterprise web development tools like J2EE, JavaBeans, JFX and Struts. It also covers web design patterns which include MVC, Observer etc., use of application and session data, state in web applications, XML and JSON will be explored. Both server-side and client-side scripting technologies like JSP, ASP.Net, JavaScript and Ajax, web application security and integration with Cloud Database will also be covered.
HSWE418 Web Services and Service Oriented
The module introduces students to the world of web service principles, applications, best practices and the service-oriented paradigm. It covers the background on distributed systems, component-based development and the factors which influenced service-oriented architecture (SOA). The module also seeks to provide learners with sound knowledge on web services architecture, technologies, development, registration and discovery process. Web services security and management will conclude the module.
HCSEC421 Android Security Design and Internals
This module will look at the following areas: Android Security Model – Linux Kernel- Native User space – Dalvik VM- Java Run Time Libraries- System Services- IPC- Binder’s- Framework Libraries- Applications- Sandboxing- Code Signing and Platform Key- SELinux- System Updates- Verified Boot. Permissions – Nature of Permission- Request for permission- Management- Protecting Levels- Assignment- Enforcement- System Permission- Shared User ID- Custom Permission – Broadcast Permissions- Content Provider Permission- Pending Intents. Introduction to Secure Coding – Building a Secure Smartphone Society – Developer’s Context- Steps to Install Sample Codes into Android Studio- Android Application Security- Handling Input Data Carefully and Securely. Application Development – Creating/Using Activities- Receiving/Sending Broadcasts. -Creating/Using Content Providers- Creating/Using Services- Using SQLite- Handling Files- Using Browsable Intent- Outputting Log to LogCat- Using WebView- Using Notifications. Secure Functions – Building custom Android ROM- Steps and Tools, Creating Password Input Screens- Permission and Protection Level- Add In-house Accounts to Account Manager- Communicating via HTTPS- Handling privacy data- Using Cryptography- Using fingerprint authentication features- Risk of Information Leakage from Clipboard.
HCSEC422 Cloud Architectures and Security
The module will cover the following areas: CLOUD COMPUTING FUNDAMENTALS – Cloud Computing definition, private, public and hybrid cloud. Cloud types; IaaS, PaaS, SaaS. Benefits and challenges of cloud computing, public vs private clouds, role of virtualization in enabling the cloud; Business Agility: Benefits and challenges to Cloud architecture. CLOUD APPLICATIONS – Technologies and the processes required when deploying web services-Deploying a web service from inside and outside a cloud architecture, advantages and disadvantages- Development environments for service development; Amazon, Azure, Google App. SECURING THE CLOUD – Security Concepts – Confidentiality, privacy, integrity, authentication, non-repudiation, availability, access control, defence in depth, least privilege- how these concepts apply in the cloud and their importance in PaaS, IaaS and SaaS. e.g. User authentication in the cloud. VIRTUALIZATION SECURITY – Multi-tenancy Issues: Isolation of users/VMs from each other- How the cloud provider can provide this- Virtualization System Security Issues: e.g. ESX and ESXi Security, ESX file system security- storage considerations, backup and recovery- Virtualization System Vulnerabilities. CLOUD SECURITY MANAGEMENT – Security management in the cloud – security management standards- SaaS, PaaS, IaaS availability management- access control- Data security and storage in cloud.
HCSEC423 IT Auditing and Assurance
The module is designed to provide the student with a foundation for the study and professional career development in the field of information technology (IT) auditing and assurance services. The module will introduce the fundamentals of IT auditing and assurance services, core reasons why IT auditing is a specialized area of auditing, evolution of IT assurance, and the principle objectives of IT auditing and assurance services. The module will also address career and skill and knowledge development. Also involves management’s goals and concerns regarding the security, integrity and availability of IT systems. The module will emphasize business management issues regarding the security and control of IT and the achievement of value through managed IT processes. Over the module, students will gain a working familiarity with COBIT, which is the principle control model for IT governance and control (or an equivalent and comparable platform). Students will also be introduced to control evaluation techniques and a number of the primary references used by IT professionals and IT auditors regarding IT
HCSEC424 Penetration Testing and Vulnerability
This module covers concepts of penetration testing and vulnerability assessment, Footprinting and social engineering tools and methods, methods of ensuring and countering attacks on data security, network protection systems and security against attacks on the web, ethical hacking, laws and methodologies and emerging technologies in the field of penetration testing. Data, software, systems and human security are key in this module.
HCSEC425 Capstone Project
Students will be expected to use modern Cybersecurity principles, Emerging Technologies and other Domain area knowledge in coming with a final year research project which addresses a particular need and produce a working prototype.