PgDip Cybersecurity Journey

PgDip Cybersecurity Research Paper Journey

AI/ML Cybersecurity Research Papers

About Paper:

In an era where phishing and malware lurk behind seemingly harmless links, this project explores cutting-edge machine learning and AI techniques to detect malicious URLs in real time. From lexical analysis and feature engineering to advanced deep learning models achieving high accuracy, discover how these tools empower browsers, email filters, and security platforms to block threats before they strike ultimately paving the way for a noticeably safer online experience for everyone.

Paper Title : 

“How Can Machine Learning and Artificial Intelligence Be Used to Identify Malicious URLs, And How Does This Solve the Issue of a Safer Online Experience”.

Paper Link :  AI ML Proposal

Paper Link :  AI ML Project

 

Business Resilience and Incident Management Research Papers

About Paper:

When cyber incidents strike, business continuity hangs in the balance. This comprehensive project examines strategies for building organizational resilience, effective incident response frameworks, risk assessment models, and post-incident recovery planning equipping leaders with practical tools to minimize downtime, protect assets, and emerge stronger from security breaches.

Paper Title : 

“Evaluating an organization’s incident response plan”

Paper Link :  Business Project A

About Paper:

Resilience isn’t just recovery it’s preparation and adaptation. Building on incident management principles, this work explores real-world case studies, governance structures, business impact analysis, and crisis communication tactics, demonstrating how organizations can transform potential disasters into opportunities for improved security posture and operational maturity.

Paper Title : 

“Comparative study on Cyber Attacks”

Paper Link :  Business Project B

Forensics and eDiscovery Research Papers 

Forensics Project A 

About Paper:

Microsoft Teams has become a cornerstone of modern collaboration but what digital footprints does it leave behind? This forensic deep dive examines artifacts from the Teams desktop client (including Indexed DB storage, cache, logs, and communication metadata) across Windows environments, revealing how investigators can recover messages, contacts, call histories, and more to support corporate, legal, or criminal inquiries.

Paper Title : 

 “Investigating a Social Media Application, MS Teams”

Paper Link :  Forensics Project A

Forensics Project B

About Paper:

Traditional CCTV review is time-consuming and error-prone enter AI. This project investigates how machine learning and data analytics revolutionize forensic video analysis: from object detection and anomaly spotting to behavioral pattern recognition in footage. Explore practical applications that accelerate criminal investigations, enhance evidence extraction, and bring efficiency to law enforcement workflows.

Paper Title : 

“Application of Data Analytics and Machine Learning in CCTV Footage Analysis for Criminal Investigations”

Paper Link :  Forensics Project B

Malware Analysis  Research Papers 

Malware Project A 

About Paper:

Hands-on malware dissection meets rigorous research in this dual-focus project. Through lab-based reverse engineering, static/dynamic analysis, and behavioral observation, uncover the inner workings of real-world malware samples shedding light on infection vectors, persistence mechanisms, and evasion tactics that every cybersecurity professional needs to understand and defend against.

Paper Title : 

 “Create a malware analysis lab using Best Practices”

Paper Link :  Malware Project A

Malware Project B

About Paper:

Mirai the notorious IoT botnet that once crippled major internet services with massive DDoS attacks remains a landmark in cyber threats. This in-depth investigation breaks down Mirai’s architecture, propagation methods (telnet brute-forcing vulnerable devices), command-and-control operations, and forensic artifacts on infected systems and servers, offering timeless lessons on IoT security weaknesses and botnet defense strategies.

Paper Title : 

“Carry out an investigation into Mirai Botnet”

Paper Link :  Malware Project B

Network Security and PenTesting A Research Papers 

Network Security and PenTesting Project A 

About Paper’s:

From home labs to vulnerable online platforms like OWASP Juice Shop, this penetration testing project simulates real-world attacks: web exploitation, reverse shells from Kali Linux to Windows targets, privilege escalation, and network pivoting. Detailed findings highlight common vulnerabilities, exploitation chains, and defensive countermeasures providing actionable insights for securing modern networks against persistent threats.

Paper Title : 

 “Create  Your Own Lab”

Paper Link :  Network Security and PenTesting A

Network Security and PenTesting Project B

Paper Title : 

“Research techniques into defining a sample complex network setup for
home, business or enterprise use,”

Paper Link :  Network Security and PenTesting B

Scroll to Top