Skip main navigation

How do you bring down an organisation?

In this video we revisit NET DM Limited IT Solutions to see if the vulnerability in their network has been resolved. The video also poses three questions: What are the …

State hacking

As we saw in the previous step, countries can rise to the top of a cyber threat list or sink to the bottom depending on current intelligence and recent events. …

The internet of things

To fully appreciate the human/social aspect of cyber security, we need to consider this at an individual level. In the video, Steve Rogers demonstrates how your life, through the interconnectivity …

The journey overview

In the video, we introduce you to Steve Rogers, who is an enterprise cloud and infrastructure architect at Coventry University. Steve puts into context the development of network defence management …

Continue learning with Coventry University

Well done on completing Introduction to Network Defence Management, the first course in the Network Defence Management ExpertTrack brought to you by Coventry University. Courses in this ExpertTrack are organised …

The big question

Let’s take a look at one of the big questions in this course: How do you take down an organisation? In the video, we introduce you to NET DM Limited …

International Cyber Security Policy

Let us now consider the policy perspective of international cyber security. There are key policy documents on cyber security for different countries on a national level. The cyber security policy …

Review of the week

This week, we have explored both national and international cyber security. We have also discussed the technical and social elements of network defence, as well as key policies, strategies and …

Attacks and counter attacks

As you’ve seen, cyber attacks cost a lot of money. There are tactics, and hypothetical tactics, at play from both the attackers and the attacked and what works in one …

The key features of cyber security strategies

The cyber security report by OECD (2012) states that most cyber security strategies have the following concepts: Enhanced governmental coordination at policy and operational levels Reinforced public-private cooperation Improved international …

Understanding your Assignment brief

Hopefully, from your discussion, you’ll have noted that societal trends and behaviours can have a massive impact on how secure our data is and will be in the future. Fortunately, …

Review of the week

This week, we provided you with an overview of cyber security and its relation to network defence. We also explored cyber security from a UK perspective, along with the threats …

Cyber threats in the UK

Cyber attacks in the UK are regularly reported on in the news. According to the Cyber Security Breaches Survey report by the Department for Digital, Culture, Media & Sport (2019: …

National Cyber Security Strategy (NCSS)

In this step, we consider the UK Government’s National Cyber Security Strategy (NCSS). The UK’s vision for 2021 is to provide a secure and resilient environment in the UK against …

Getting the most out of your learning

Learning at Coventry University Coventry University believes that a good student experience is central to learning at a world-class standard. The Coventry Way At Coventry University Online, we’re committed to …