This course engages a range of live hacking examples in order for candidates to get a better understanding of the subject. Candidates will be trained to expose vulnerabilities in software in order to fix security holes before a malicious hacker discovers them.
|Delivery Method||Online and Physical based learning and industrial training with hands-on practical|
|Entry Criteria||Applicants must have prior study in the field of computing and Linux|
|Modes of Study||Part-Time/ Full Time|
|Assessment||Modules within the program will be assessed by assignments|
|Overall Grading Type||Assessing schemes will be used|