Duration: 12 weeks × 3 hours | Total Hours: 36 hours | Focus: Network Security (30%) & Web Application Security (70%)
This comprehensive cyber security course uses the OS³ Newman Cyber Security Lab for practical cyber security education. The course balances network security and web application security through hands-on modules, starting with fundamentals and progressing through web security to network security.
CMU540: Cyber Security features a comprehensive assessment structure designed to evaluate practical security skills developed through the OS³ Newman Cyber Security Lab.
Project Type: Individual security assessment using OS³ Newman Cyber Security Lab
Scope: Web application and network security assessment
Requirements: Complete security analysis covering OWASP Top 10 and network security modules
Due: End of course (consultation with tutor required)
Test your knowledge with interactive quizzes for each session. Each quiz contains questions based on the lecture content and practical exercises.
Test your understanding of fundamental security concepts and OS³ Newman Cyber Security Lab setup.
Questions: 15 | Time: 20 minutes
Assess your knowledge of OWASP A01 access control vulnerabilities.
Questions: 15 | Time: 20 minutes
Evaluate your understanding of OWASP A02 cryptographic vulnerabilities.
Questions: 15 | Time: 20 minutes
Test your knowledge of OWASP A03 SQL injection attacks.
Questions: 15 | Time: 20 minutes
Assess your understanding of OWASP A03 XSS vulnerabilities.
Questions: 15 | Time: 20 minutes
Test your knowledge of OWASP A04 (CSRF) and A05 security misconfigurations.
Questions: 15 | Time: 20 minutes
Evaluate your understanding of OWASP A06 and A07 vulnerabilities.
Questions: 15 | Time: 20 minutes
Test your knowledge of OWASP A08 and A09 data protection and logging.
Questions: 15 | Time: 20 minutes
Assess your understanding of OWASP A10 SSRF and file upload vulnerabilities.
Questions: 15 | Time: 20 minutes
Practical assessment applying all web security concepts learned in weeks 2-9.
Questions: 20 | Time: 30 minutes
Test your knowledge of protocol security, port scanning, and DNS security.
Questions: 18 | Time: 25 minutes
Comprehensive assessment covering traffic analysis, firewall configuration and integrated security.
Questions: 25 | Time: 35 minutes
Explore additional resources to deepen your understanding of cyber security. These carefully selected materials include official documentation, educational videos, and academic articles.
Comprehensive guide to the most critical web application security risks and mitigation strategies. Essential resource for understanding modern web security threats.
Visit OWASP Top 10Official NIST guidelines for cryptographic key management and security standards. Essential reference for understanding cryptographic security practices.
Download NIST DocumentFundamental principle of cryptographic security design. Understanding the basis for modern cryptographic systems and security through obscurity.
Read on WikipediaComprehensive academic review examining cyber risk assessment methodologies and data availability challenges in cybersecurity research.
Read Research PaperResearch paper covering modern hardware security threats, side-channel attacks, and defensive strategies for hardware systems.
Read on arXivAnalysis of cutting-edge cybersecurity threats and innovative defensive technologies shaping the future of digital security.
Read on arXivComprehensive study of AI applications in cybersecurity, including AI-powered attacks and defensive AI systems.
Read on arXivUnderstanding the integration of cybersecurity with physical security systems and the convergence of security domains.
Read on WikipediaUK-focused report on secure-by-design principles and the importance of building security into systems from the ground up.
Read UK ReportInteractive cybersecurity learning platform with practical labs, challenges, and real-world security scenarios for hands-on experience.
Start Learning