• Malware and cyber threat characteristics including advanced persistent threats (APTs) • Computer network defense • Penetration testing/ethical hacking • Commercial software packages aimed at achieving increasing levels of Cyber Security covering the areas of Data Protection and Privacy, Security Information and Event Management (SIEM), Governance, Risk and Compliance (GRC) • Principles of building trusted computer systems and secure applications • Security in mobile systems and social media systems • Security in web applications and systems