production
Skip to Content

BU551X: FINANCIAL CRIME AND CYBER SECURITY (2021-2022)

Last modified: 31 May 2022 13:05


Course Overview

While violent crime has exhibited a considerable decline in most developed countries, financial crime and cyber-crime have flourished.

This course provides an overview of financial crime and major cyber security risks. To evaluate risk and develop preventive methods, it is important to learn how cyber-criminals work.

This course follows strict ethical hacking guidelines.

We introduce the main tools used by cyber-criminals including the dark web, TOR hidden services, private operating systems, cryptocurrencies, encryption, scanning, enumeration, and penetration testing.

Students are required to take CS5076 Introduction to Programming in the first sub-session; hence, the course expects a basic level of programming skills in Python.

Course Details

Study Type Postgraduate Level 5
Term Second Term Credit Points 15 credits (7.5 ECTS credits)
Campus Aberdeen Sustained Study No
Co-ordinators
  • Professor Gerhard Kling

What courses & programmes must have been taken before this course?

  • Master Of Science In Financial Technology
  • ()
  • Any Postgraduate Programme

What other courses must be taken with this course?

None.

What courses cannot be taken with this course?

None.

Are there a limited number of places available?

No

Course Description

The course is structured into ten units and associated tutorials.

Unit 1: Introduction

Definition of financial and cyber-crime, long-term trends, risks.

Unit 2: Identity theft and electronic crime

Fraud prevention, controls, online and mobile banking.

Unit 3: Ethical hacking and legal aspects

Ethical hacking principles, legal documentation including statements of work, non-disclosure agreements etc.

Unit 4: TOR and hidden services

Installation, verification of zip file, and VPNs.

Unit 5: The dark web

Access, anonymity, TAILS, and hidden services.

Unit 6:  Cryptocurrencies

Wallets, P2P services, mixers, and tumblers.

Unit 7: Computer networks

Ips, MAC addresses, TCP, UDP, three-way handshake, common ports and protocols, and OSI model.

Unit 8: Linux

Using Linux on Windows, Kali Linux, Bash, and basic commands.

Unit 9: Reconnaissance

Information gathering, Hunter.io, Burp Suite and Google Fu.

Unit 10: Scanning and exploitation

Tools for scanning (e.g. Metasploit), exploitation,


Contact Teaching Time

Information on contact teaching time is available from the course guide.

Teaching Breakdown

More Information about Week Numbers


Details, including assessments, may be subject to change until 30 August 2024 for 1st term courses and 20 December 2024 for 2nd term courses.

Summative Assessments

Computer Programming Exercise

Assessment Type Summative Weighting 75
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Written feedback will be provided outlining whether and how students met the learninng outcomes.

Learning Outcomes
Knowledge LevelThinking SkillOutcome
Sorry, we don't have this information available just now. Please check the course guide on MyAberdeen or with the Course Coordinator

Essay

Assessment Type Summative Weighting 25
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Written feedback will be provided outlining whether and how students met the learning outcomes.

Word Count 1500
Learning Outcomes
Knowledge LevelThinking SkillOutcome
Sorry, we don't have this information available just now. Please check the course guide on MyAberdeen or with the Course Coordinator

Formative Assessment

There are no assessments for this course.

Resit Assessments

Essay

Assessment Type Summative Weighting 100
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Written feedback provided outlining whether and how students met the learning outcomes.

Word Count
Learning Outcomes
Knowledge LevelThinking SkillOutcome
Sorry, we don't have this information available just now. Please check the course guide on MyAberdeen or with the Course Coordinator

Course Learning Outcomes

Knowledge LevelThinking SkillOutcome
ProceduralEvaluateBy the end of this course students shall critically evaluate the processes and practices of assessing cyber security.
ConceptualUnderstandUnderstand the impact of financial risk and cyber security on FinTech.
ReflectionCreateDevelop programming skills in Python and Linux to test the security of systems.

Compatibility Mode

We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.