Our lives are heading deeper and deeper into cyberspace. Digital systems now process and store more of our personal data than ever before and are central to areas of critical …
The Computer Misuse Act (CMA) is the main legislation in the UK which covers computer-related crime. When was the CMA founded? It was originally introduced in 1990 and has been …
Many penetration testing assignments are related to highly secure and sensitive environments and so require that the pentesting team holds an appropriate level of security clearance. This clearance ensures that …
As mentioned already, more and more of our personal lives are moving into the digital systems of cyberspace. Defending these systems is a significant challenge that requires a combination of …
In order to complete the practical lab that takes place later this week, you’ll need to download and configure the virtual machines (VMs) from our repository. This step contains instructions …
Needless to say, a lot of the skills and information that you learn in this course are used by criminals, as well as legitimate penetration testers. There are a few …
There are many different types of threats that can compromise information security. Focusing on cyberattacks, we can separate them into three main categories: Technical attacks – usually take advantage of …
As this might be your first time studying with Coventry University, we’ve put together a few tips to help you get the most out of the experience. Comments FutureLearn is …