Business Information Management

Our portfolio includes Business Studies, Business Administration, Tourism and Hospitality Management and Public Services Management. There are strong vocational elements within these courses and many students gain experience working in placements relevant to their future career structure.

MSc Marketing Management and Strategy at Plymouth University

Hugh Conway, Lecturer in Marketing, School of Management and Dr John White, Associate Professor, School of Management discuss the MSc Marketing Management and Strategy course at Plymouth University [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]

06-26
14:47

Placements2011

Microsoft Placement Interviews by Kellie Smith for Plymouth Business School [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]

07-19
17:50

08 - Multi-Level Login 1

This is the eighth of a series of videos that consider a range of security vulnerabilities. In this video we look at a weakness in a multi-factor authentication mechanism. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-19
03:22

09 - Multi-Level Login 2

This is the ninth of a series of videos that consider a range of security vulnerabilities. In this video we look at a weakness in a multi-factor authentication mechanism. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-19
02:43

07 - Basic Authentication

This is the seventh of a series of videos that consider a range of security vulnerabilities. In this video we look at how credentials are transferred using basic HTTP authentication. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-19
04:16

06 - Remote Admin Access

This is the sixth of a series of videos that consider a range of security vulnerabilities. In this video we look at how to gain administrative access to a website. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-19
04:07

05 - Path Based Access Control

This is the fifth of a series of videos that consider a range of security vulnerabilities. In this video we manipulate server side file handling. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-19
05:47

04 - Password Recovery

This is the fourth of a series of videos that consider a range of security vulnerabilities. In this video, the Password Recovery mechanism is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-18
03:18

03 - Basic SQL String Injection

This is the third of a series of videos that consider a range of security vulnerabilities. In this video, the concept of SQL Injection is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-18
07:34

02 - HTTP Splitting

This is the second of a series of videos that consider a range of security vulnerabilities. In this video, the concept of HTTP Splitting is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-18
15:52

01 - Introduction to WebGoat

This is the first of a series of videos that consider a range of security vulnerabilities. In this video, the use of WebGoat and WebScarab is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]

02-18
10:04

Recommend Channels