Show/hide contentOpenClose All
Curricular information is subject to change
Upon successful completion of this module students should be able to:
• List and explain hacking offences as defined by the Council of Europe's Convention of Cybercrime
• Explain the purpose of malware
• Describe common methods of malware dispersal and transmission
• Explain the “Business Models” of Malware
• Describe the process of Malware Analysis
• Determine the purpose of unknown executable files in a safe manner
• Detect the signs of malware intrusion on computer systems
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Practical | 20 |
Autonomous Student Learning | 156 |
Total | 200 |
In order to take this module you must be a serving member of a law enforcement organisation.
Description | Timing | Component Scale | % of Final Grade | ||
---|---|---|---|---|---|
Continuous Assessment: continuous assessment | Varies over the Trimester | n/a | Graded | Yes | 100 |
Remediation Type | Remediation Timing |
---|---|
In-Module Resit | Prior to relevant Programme Exam Board |
• Feedback individually to students, post-assessment
Not yet recorded.