Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


So many options :(

  • Please log in to reply
1 reply to this topic

#1 m0hs


  • Members
  • 3 posts
  • Gender:Male
  • Location:United Kingdom
  • Local time:04:32 PM

Posted 20 February 2015 - 01:13 PM

Hi all,


Hope everything is going well guys. Well I have been given some optional modules to choose as in the final year of undergraduate course. Now I'm doing my second year in computer forensics and my field or interest is digital forensics investigation and penetration testing. What I need is your suggestions and opinions on the modules and how they are related to my major.


Module One // Secure Web Application Development


Outline content:


Object Oriented web applications
Simple patterns - MVC, Registry, etc
Single point of access architecture
Secure access to databases
Accessing web services
Common web-site vulnerabilities & how to avoid them
Module Two // Telematics
Outline content:
CAN Networking, with emphasis on vehicle telematic systems using the J1939 protocol, and knowledge of industrial protocols such as DeviceNet.
Application of GSM technology for remote monitoring and control. Specific emphasis will be the use of SMS (PDU and Text mode), GPRS and dial-up connections to transfer data.
Application of BlueTooth technology for wireless monitoring and control. Specific emphasis will be placed on gaining an understanding of the BASIC HCI protocol that underpins BlueTooth, and some higher level applications.
Module Three // Fuzzy Logic and Knowledge Based Systems 
Outline Content
Introduction to Fuzzy Logic and Fuzzy Systems
Applications of Fuzzy Logic and Systems – suitability and trade-offs.
Development of Fuzzy Systems using Matlab / C
Introduction to Knowledge Based Systems (KBS)
Knowledge acquisition, Representation and inferencing/reasoning
Applications of KBS
Comparison between KBS and Fuzzy Systems
Module Four // Privacy and Data Protection
Outline Content
Address the legal, social and technological aspects of privacy and data protection,
Consider privacy enabling technologies and privacy invasive technologies
Identify and evaluate the role of the computer professional in providing privacy and data protection, and
Review privacy and data protection legislation from different countries.
I'd really appreciate it if you could recommend some tips
Thanks in advance
Have a nice weekend 

Edited by hamluis, 21 February 2015 - 09:48 AM.
Moved from Gen Chat to IT Certs/Careers - Hamluis.

BC AdBot (Login to Remove)


#2 Kilroy


  • BC Advisor
  • 3,408 posts
  • Gender:Male
  • Location:Launderdale, MN
  • Local time:11:32 AM

Posted 22 February 2015 - 03:52 PM

Either Privacy and Data Protection or Introduction to Fuzzy Logic and Fuzzy Systems will probably suit you better for what you want to do.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users