Professional Documents
Culture Documents
Systems Vulnerability and Texting
Systems Vulnerability and Texting
Version: 2
Course Description: This course introduces students to the process of identifying, classifying, and
Priotizing vulnerabilities in computer systems, networks, and applications. This unit will cover
vulnerability assessment methodologies, network system scanning, web application security testing,
wireless network security testing, risk assessment and management and security controls and
countermeasures. Overall, the course is designed to provide students with a clear understanding of
computer security and the tools and techniques used to access and test the security of computer
systems, networks and applications.
Assessment Description
A combination of written assignments, a 3000-word term paper, a quiz and a final exam to determine
the students understanding of the course and their ability to apply the concepts taught in real life and
also analyze security vulnerability.
Story Board
005 Use textbook to learn further on computer security and its importance. Self prep
008 TEST
Cyber attack , this is the use of technology to try and gain access to
unauthorized asset or to cause harm to an individual or organization
Ways to prevent ?
1. Use strong password
2. Enable two factor verification
3. Use anti virus
4. Limit access to other people