Security Assessment and Validation - 2025 entry
| MODULE TITLE | Security Assessment and Validation | CREDIT VALUE | 15 |
|---|---|---|---|
| MODULE CODE | COM3030 | MODULE CONVENER | Unknown |
| DURATION: TERM | 1 | 2 | 3 |
|---|---|---|---|
| DURATION: WEEKS | 11 |
| Number of Students Taking Module (anticipated) | 30 |
|---|
Even if systems have been developed with security in mind, their security needs to be assessed regularly, as, e.g., new attacks might be developed. Thus, assessing and validating the security of systems, e.g., penetration testing is an important part of cyber security. In this module you will learn the theory and practice of assessing the security of systems and applications both using manual techniques as well as automated approaches. The module focuses on offensive security that might be used by “red teams.”
This module aims to give you a broad understanding in analysing the weaknesses of a system, i.e., the areas an attacker would most likely attack a system. Driven by the discovered weaknesses, we will discuss several offensive security techniques, i.e., simulate how a threat actor (attacker) might gain access to a system, or the data processed by a system.
In more detail, the aims of the module are to enable you to
- assess the security weaknesses of a system
- develop a strategy how to attack a system
- understand the both the social and technical foundations for attacking systems or organisations
- understand the ethical responsibilities of an offensive security researcher
On successful completion of this module you should be able to:
Module Specific Skills and Knowledge
Discipline Specific Skills and Knowledge
Personal and Key Transferable / Employment Skills and Knowledge
The module will cover:
- Threat analysis
- Social engineering
- Manual security testing (penetration testing)
- Vulnerability scanning
- Automated security testing
- Exploit development
| Scheduled Learning & Teaching Activities | 33 | Guided Independent Study | 117 | Placement / Study Abroad | 0 |
|---|
| Category | Hours of study time | Description |
| Scheduled Learning & Teaching activities | 22 | Lectures |
| Scheduled Learning & Teaching activities | 11 | Tutorials or Practical Work |
| Guided Independent Study | 117 | Background Reading and Self-Study |
| Form of Assessment | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
|---|---|---|---|
| Tutorial and Practical Work | 11 hours | All | Oral |
| Coursework | 40 | Written Exams | 60 | Practical Exams | 0 |
|---|
| Form of Assessment | % of Credit | Size of Assessment (e.g. duration/length) | ILOs Assessed | Feedback Method |
|---|---|---|---|---|
| Written exam - closed book | 60 | 2 hours | All | Oral (on request) |
| Coursework | 40 | 50 hours | All | Written |
| Original Form of Assessment | Form of Re-assessment | ILOs Re-assessed | Time Scale for Re-assessment |
|---|---|---|---|
| Written exam - closed book | Written exam - closed book (2 hours, 60%) | All | Referral/deferral period |
| Coursework | Coursework (50 hours, 40%) | All |
Referral/deferral period
|
Reassessment will be by coursework and/or written exam in the failed or deferred element only. For referred candidates, the module mark will be capped at 40%. For deferred candidates, the module mark will be uncapped.
information that you are expected to consult. Further guidance will be provided by the Module Convener
Basic reading:
- TBC
Web based and Electronic Resources:
- ELE
Other Resources:
Reading list for this module:
| CREDIT VALUE | 15 | ECTS VALUE | 7.5 |
|---|---|---|---|
| PRE-REQUISITE MODULES | ECM2426 |
|---|---|
| CO-REQUISITE MODULES |
| NQF LEVEL (FHEQ) | 6 | AVAILABLE AS DISTANCE LEARNING | No |
|---|---|---|---|
| ORIGIN DATE | Tuesday 11th March 2025 | LAST REVISION DATE | Monday 17th March 2025 |
| KEY WORDS SEARCH | Security Testing, Penetration Testing, Vulnerability Scanner, Offensive Security |
|---|
Please note that all modules are subject to change, please get in touch if you have any questions about this module.


