Cyber Threats
| Week | Date | Day | Topic | |
| 1 | | Monday | Module introduction Introduction | |
| | | | Foundations of cyber security | |
| | | | Application of cyber security concepts Slides Day 1 | |
| | | Tuesday | Fundamental building blocks and typical architectures of ICT infrastructure | |
| | | | Vulnerabilities Slides Day 2 | |
| | | Wednesday | Common vulnerabilities in networks and systems Slides Day 3 | |
| | | Thursday | Vulnerabilities | |
| | | | Network-based attacks. Practical Slides Day 4 | |
| | | Friday | Impact of vulnerabilities in an organisational context | |
| | | | Human dimension of cyber security | |
| | | | How an employee may enable a successful attack chain without realising it Slides Day 5 | |
| | |
| 2 | | Monday | Issue assignment 1 Slides Day 1 | |
| | | Tuesday | Factors that may increase or decrease risks related to an organisation’s ‘cyber culture’ Slides Day 2 | |
| | | Wednesday | Links between physical, logical, personal and procedural security Slides Day 3 | |
| | | Thursday | Ways to defend against cyber attack Slides Day 4 | |
| | | Friday | Adversarial thinking in the context of system development, application development and analysis Slides Day 5 | |
| | |
| 3 | | Monday | Presentations | |
| | | | Assignment 1 due. Issue assignment 2 | |
| | | Tuesday | Horizon scanning | |
| | | | Threat intelligence lifecycle | |
| | | Wednesday | Threat analyses | |
| | | Thursday | Assignment work | |
| | | Friday | Assignment work | |