Show/hide contentOpenClose All
Curricular information is subject to change
Upon successful completion of this module students should be able to:
• List and explain hacking offences as defined by the Council of Europe's Convention of Cybercrime
• Explain the purpose of malware
• Describe common methods of malware dispersal and transmission
• Explain the “Business Models” of Malware
• Describe the process of Malware Analysis
• Determine the purpose of unknown executable files in a safe manner
• Detect the signs of malware intrusion on computer systems
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Practical | 20 |
Autonomous Student Learning | 156 |
Total | 200 |
In order to take this module you must be a serving member of a law enforcement organisation.
Description | Timing | Component Scale | % of Final Grade | |||
---|---|---|---|---|---|---|
Continuous Assessment: continuous assessment | Varies over the Trimester | n/a | Graded | No | 30 |
No |
Examination: 2 hour End of Trimester Exam | 2 hour End of Trimester Exam | No | Graded | No | 70 |
No |
Resit In | Terminal Exam |
---|---|
Summer | Yes - 2 Hour |
• Feedback individually to students, post-assessment
Not yet recorded.