Last modified: 31 May 2022 13:05
While violent crime has exhibited a considerable decline in most developed countries, financial crime and cyber-crime have flourished.
This course provides an overview of financial crime and major cyber security risks. To evaluate risk and develop preventive methods, it is important to learn how cyber-criminals work.
This course follows strict ethical hacking guidelines.
We introduce the main tools used by cyber-criminals including the dark web, TOR hidden services, private operating systems, cryptocurrencies, encryption, scanning, enumeration, and penetration testing.
Students are required to take CS5076 Introduction to Programming in the first sub-session; hence, the course expects a basic level of programming skills in Python.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | Second Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
The course is structured into ten units and associated tutorials.
Unit 1: Introduction
Definition of financial and cyber-crime, long-term trends, risks.
Unit 2: Identity theft and electronic crime
Fraud prevention, controls, online and mobile banking.
Unit 3: Ethical hacking and legal aspects
Ethical hacking principles, legal documentation including statements of work, non-disclosure agreements etc.
Unit 4: TOR and hidden services
Installation, verification of zip file, and VPNs.
Unit 5: The dark web
Access, anonymity, TAILS, and hidden services.
Unit 6: Cryptocurrencies
Wallets, P2P services, mixers, and tumblers.
Unit 7: Computer networks
Ips, MAC addresses, TCP, UDP, three-way handshake, common ports and protocols, and OSI model.
Unit 8: Linux
Using Linux on Windows, Kali Linux, Bash, and basic commands.
Unit 9: Reconnaissance
Information gathering, Hunter.io, Burp Suite and Google Fu.
Unit 10: Scanning and exploitation
Tools for scanning (e.g. Metasploit), exploitation,
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 75 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Written feedback will be provided outlining whether and how students met the learninng outcomes. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Assessment Type | Summative | Weighting | 25 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Written feedback will be provided outlining whether and how students met the learning outcomes. |
Word Count | 1500 |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
There are no assessments for this course.
Assessment Type | Summative | Weighting | 100 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Written feedback provided outlining whether and how students met the learning outcomes. |
Word Count |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Evaluate | By the end of this course students shall critically evaluate the processes and practices of assessing cyber security. |
Conceptual | Understand | Understand the impact of financial risk and cyber security on FinTech. |
Reflection | Create | Develop programming skills in Python and Linux to test the security of systems. |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.