Category Archives: Masterclass Lecture

Inspiring ideas for the enquiring young minds



Abhaya Induruwa and Ian Kennedy of the Department of Computing, Digital Forensics and Cybersecurity participated at the Big Bang @ Discovery Park, a free education event organised by the STEM Hub of the University for students of Kent & Medway Secondary Schools.  Students and teachers of Wellesley House School, Laleham Gap School, Ursuline College, and Kent College attended the workshops run by Abhaya and Ian.

Continue reading

Tackling the Threat of Cybersecurity: Dr Simon Moores

Computing, Digital Forensics and Cybersecurity students and staff were delighted to welcome the return of Dr Simon Moores ( as a guest speaker on Tuesday 28th November 2017.

SIMON Headshot

Simon is a security and technology futurist, a disruptive technologist, a security/risk consultant, social media expert, international conference keynote speaker and chair of the annual international eCrime Congress.  Simon appears regularly on national/international television/radio as an analyst and technology expert while also making frequent contributions to leading national/international newspapers, magazines and journals.

Continue reading

5G Cellular Networks with Prof. Ekram Hossain

This week we were delighted to welcome Professor Ekram Hossain from the University of Manitoba, Winnipeg, Canada. Professor Hossain is a well-known IEEE fellow, author and editor in ‘Communication Networks’ publications, and is the main lead for the ‘Wireless Communication, Networks and Services (WiCoNS)’ research group at Manitoba.

ekram-hossain-5g-networks-headerProfessor Hossain introduced us to a research presentation titled ‘5G Cellular Key Enabling Technologies and Research Challenges’. The presentation included and discussed current 3G and 4G technologies, licensed and un-licensed spectrum bands, multiple and co-existing architectures, the latitude of networks for users and providers, as well as the fabrications needed to support a clear rise in user density on mobile networks. Examples of such support and architectural enhancements are smaller base stations known as femtocells, picocells, and microcells. These stand in contrast to current macrocells which are commonly known as cell towers. Continue reading

Victor Völzow Masterclass

Victor Völzow lecture at Canterbury Christ Church University

Victor Völzow presents his digital forensics Masterclass to CCCU students.

Our Computing, Digital Forensics and Cybersecurity students had the pleasure to be shown the complex and dynamic world of digital forensics, by Victor Völzow, an international speaker on the subject. Victor is a trainer in digital forensics in Germany with a background in policing. He started working in the field in 2007 and has been training forensic specialists from regional, federal, and international law enforcement since. Continue reading

App Security and Penetration Testing Masterclass

Tom sits, tapping away at his keyboard; his monitor resembles something from the Matrix. All of a sudden, “[Access Granted]” flashes on the screen and Tom, unbeknownst to the bankers and its users, now has access to every customer’s details. A security breach of overwhelming proportions is now on our hands; and it all happened from within Canterbury Christ Church University’s Invicta building.

App Security Masterclass

Nick Murison from Cigital presents to students

This scenario may sound like something from a Hollywood movie, but it’s precisely what our students from the second and third years did under the watchful eyes of Nick Murison and Alexander Evans from Cigital. Of course, the bank was fictitious, but the attacks were very real and could pose serious problems to everyone concerned. Continue reading

Networking and Security Masterclass

To kick off the New Year, Canterbury Christ Church University invited Jonathan Haddock, a Network and Security engineer in local government, to join our third-year Networking class. He showed us a glimpse of his world by demonstrating ARP poisoning which is, for those of us not in the know, intercepting and modifying traffic between two hosts. Continue reading