Detection, investigation, and structured response to cyber intrusions using industry-standard methodologies. This module covers threat analysis, incident handling procedures, and the production of professional incident response documentation aligned with real-world security operations.
This module examined the full intrusion analysis and incident response lifecycle. Working through a simulated or real intrusion scenario, the investigation involved identifying indicators of compromise, analysing attack vectors, and documenting findings in a structured incident report. The larger academic report covers the theoretical and practical frameworks underpinning intrusion detection and response, including threat intelligence, forensic analysis techniques, and remediation strategies.
First Class / Distinction
SIEM Tools, Wireshark, Log Analysis, Threat Intelligence Frameworks
Intrusion Detection, Incident Response, Forensic Analysis
Full academic documentation covering intrusion analysis methodology, detection techniques, response frameworks, forensic investigation process, and evaluation of findings.
Download Full Report (Word) →A professionally structured incident report produced as part of the module, documenting the intrusion scenario, timeline of events, indicators of compromise, impact assessment, and recommended remediation actions.
Download Incident Report (Word) →