Online Postgraduate Award in Cyber Crime Prevention

Structure

The online Postgraduate Award in Cyber Crime Prevention programme consists of three modules. The first introduction on-boarding module takes four weeks to complete and subsequent hands-on, practical modules take eight weeks to complete.

Modules

  1. Learning and Developing in the Digital Age
  2. Applied Cryptography
  3. Cyber Crime Prevention and Protection

Objective:

To provide an understanding of the core concepts related to online education with University of Liverpool Online and to help you develop the skills required for successful progression within the programme. Successful completion of this module is required to continue on to subsequent modules.

Description:

This module is intended to prepare students for successful online study as well as to ensure they understand the academic requirements associated with the programme. As a student, you will learn how to make the best use of the learning platform, to navigate the online classroom and the University of Liverpool’s online library confidently. You will also learn how to produce high quality academic work that draws on classroom materials, collaborative activities with peers and your own professional experience.

Curriculum

  • The University’s model of online learning, with respect to independent learning and continuing professional development
  • Collaborative communication of professional and academic concepts to fellow students and independently within formal assignments
  • Engagement with topical literature to develop academic arguments, carry out library research and reference sources correctly in the appropriate style
  • Self-reflection and application of feedback to improve future academic work
  • Development of an effective and realistic study plan, to anticipate the time required to complete a module successfully

Duration:

4 weeks

Objective

To provide insights into cryptographic algorithms and protocols, including a detailed understanding of symmetric key encryption algorithms, hash function algorithms, public key cryptography algorithms and key agreement protocols. You will have the opportunity gain an in-depth understanding of attacks, vulnerabilities and of quantum computing techniques, as well as experience to apply cryptographic algorithms and protocols to solve security issues.

Description

This module provides students with a critical understanding of how to use cryptographic algorithms and protocols to solve practical security problems (such as confidentiality, integrity and authenticity). As a student, the module also allows you to acquire a systematic understanding of open-source tools to build secure applications, and to learn how best to apply such tools.

Curriculum

  • Introduction to classical cryptography
  • Block ciphers, symmetric key encryption and secure hash functions
  • Public key cryptographic encryption and signature schemes
  • PKCS: Public Key Cryptography Standards
  • Elliptic Curve cryptography
  • Quantum computing and quantum cryptography
  • Key agreement, identification, and zero knowledge
  • Password authentication, identity based cryptography, and other advanced topics.

Duration:

8 weeks

Objective

To provide a systematic understanding of the tools and techniques that can be deployed for cybercrime prevention by developing a broad understanding of the information security management landscape. You have the opportunity to develop practical skills to deploy the tools and techniques of cybercrime prevention, in both commercial and non-commercial settings, through the use of ‘ethical hacking’.

Description

This module provides students with a comprehensive understanding of the tools that can be used to prevent and mitigate against cybercrime – including the deployment of cybercrime prevention strategies for application in the workplace by considering the motivations behind cybercrime. Students have the opportunity to build an ‘ethical hacking’ environment with which to experiment and test their skills.

Curriculum

  • Critical overview of cybercrime prevention terminology and the legal aspects involved
  • Information Security Management, Security Auditing, Monitoring, Ethical hacking and Penetration Testing
  • Building of an ethical hacking environment (laboratory) to allow experimentation with hacking techniques and comprehensive understanding of these techniques can be gained
  • Ethical hacking in a number of contexts such as: wireless communication: WiFi, Protocol access, Operating Systems, the ’Secure Sockets Layer‘ access point cloning, router attacks, SQL injection and the building of key loggers
  • Techniques, tools and processes for cybercrime prevention in a variety of domains such as: desktop applications, wireless access points smartphones and Bluetooth connections
  • Comprehensive understanding of the security challenges of emerging computing environments.

Duration:

8 weeks

Get started now with our new 100% online application

Apply now

Start creating your application straight away.

Need more information?

Please fill in this form to request more information about this programme.

By submitting this form, I provide my express written consent for the University of Liverpool’s online learning partner Laureate Online Education to contact me via email, text, telephone, and pre-recorded message regarding furthering my education. I understand that calls may be generated using automated technology. You may opt-out at any time. Please view our Privacy Policy or Contact us for more details.