This module will
look at ways of assessing the security of computer software and hardware, and
how to investigate and respond when security has been compromised. A range of
methods and tools will be introduced to identify vulnerabilities, and to
analyze systems that have already been attacked.