School of Computer Science and Informatics Faculty of Technology
|
|
- Gwen Susan Reeves
- 8 years ago
- Views:
Transcription
1 BSc (Hons) Computer Science BSc (Hons) Computer Security BSc (Hons) Forensic Computing BSc (Hons) Software Engineering School of Computer Science and Informatics Faculty of Technology
2 Table of Contents BSc (Hons) Computer Science... 2 First Year Topics... 2 Second Year Topics... 3 Industrial Placement... 3 Final Year Topics... 3 BSc (Hons) Computer Security... 3 First Year Topics... 4 Second Year Topics... 4 Industrial Placement... 4 Final Year Topics... 4 BSc (Hons) Forensic Computing... 4 First Year Topics... 5 Second Year Topics... 6 Industrial Placement... 6 Final Year Topics... 6 BSc (Hons) Software Engineering... 6 First Year Topics... 7 Second Year Topics... 7 Industrial Placement... 7 Final Year Topics... 7 First Year Modules... 8 Programming in C... 8 Computational Modelling... 9 Elements of Computing Computer Ethics, Law and Portfolio Second Year Modules Organisations, Project Management and Research Forensics and Security Object- Oriented Software Design and Development Multi- tier Web Development Data Structures and Algorithms Issues in Criminal Justice Final Year Modules Computing Project Professionalism in Forensics and Security Advanced Topics in Security Rigorous Systems Digital Evidence Course Structures First Year Second Year Final Year (Compulsory Modules)
3 BSc (Hons) Computer Science Computer Science is a course with a traditional title that covers modern approaches to software systems development. The subjects cover a mixture of both theory and practice. The theory is needed to understand the fundamental principles and includes discrete mathematics, programming language concepts, software design methods, secure web systems, computer architecture and computer networks. The emphasis is on the why as well as the what and you are encouraged to develop your critical thinking and problem-solving skills. Your critical analysis skills will be enhanced by undertaking a research project in your second year. Your problem solving skills will develop as you model, design and implement a variety of software systems. The practical element is needed to give you the experience you need in developing software systems using modern languages and environments. A particular example of this is the final year project which gives you the opportunity to apply all the stages of a software development method to produce a software system under the guidance of a project tutor. As well as all the technical aspects to your course, you will learn about the structure of organisations and gain an insight into the commercial context in which IT systems are comissioned and deployed. You will be introduced to computing ethics and computer law important subjects that will help you to develop as a computer professional. The first year is shared with three other courses (Software Engineering, Computer Security and Forensic Computing) which gives you the opportunity to change your course at the end of your first year if you so wish. The second year is fully shared with Software Engineering so a decision on whether to specialise in that subject can be made towards the end of the second year. The course offers you the chance to spend a year in industry. This (sandwich) experience takes place between the second and final years of study and gives you an opportunity to work in the real world gaining valuable professional experience. The study of computer science leads to a wide variety of careers upon graduation, examples of which include software development, database design and administration, network management, commercial web application development, software project management, computer science research and academia. First Year Topics Computer architecture Operating systems Computer networks Programming in C Scientific method Software testing Discrete mathematics Database fundamentals Functional programming Computer ethics Computer law 2
4 User-interface design (with Client-side web Technology) Second Year Topics Object-oriented software design Object-oriented programming Data structures and algorithms Secure web-development Database Design Software lifecycles Organisations Project management and tools Research project Industrial Placement Final Year Topics Software development project Software design methods Optional modules BSc (Hons) Computer Security Computer Security is a specialist course within the broad study of computer science, with particular emphasis on the CIA triad: confidentiality, integrity and availability of information. The curriculum covers the theory and practice of computer systems. The theory is needed to understand fundamental principles and includes computer networks, computer architecture, discrete mathematics, programming language concepts, cryptography and secure multi-tier web systems. The emphasis is on the why as well as the what and you are encouraged to develop your critical thinking and problem-solving skills. Your critical analysis skills will be enhanced by undertaking a research project in your second year. Your problem solving skills will develop as you develop a variety of protection schemes for information systems of increasing complexity. The practical element gives you experience configuring, protecting and attacking components of modern networked computers. Creative use of virtual environments gives opportunities and privilege to experiment in ways that are inconceivable on real hardware. This includes experimentation on the network fabric of switches, routers and firewalls, the operating systems of endpoint devices, and applications running on those endpoints. As well as the laboratory sessions that run throughout the curriculum, this practical work is particularly evident in the final year project. This gives you the opportunity to apply your computer security skills to a specific security problem under the guidance of a project tutor. As well as all the technical aspects to your course, you will learn about the structure of organisations and gain an insight into the commercial context in which IT systems are commissioned and deployed. You will be introduced to computing ethics and computer law critical subjects if you want to develop as a computer security professional. The first year is shared with three other courses (Forensic Computing, Computer Science and Software Engineering) which gives you the option to switch course at the end of your first year if you so wish. 3
5 We encourage all students to take advantage of the sandwich placement experience offered between the second and final years of study. This optional year out in industry gives you an opportunity to work in the real world gaining valuable professional experience. The study of computer security opens up many career paths upon graduation. These include specialist careers in security analysis and penetration testing as well as broader careers in the design, deployment and operation of IT systems of all scales and purposes. First Year Topics Computer architecture Operating systems Computer networks Programming in C Scientific method Software testing Discrete mathematics Database fundamentals Functional programming Computer ethics Computer law Forensics and Security Specialist Portfolio Second Year Topics Windows Forensics Linux Security Secure scripting for web-development Internet protocols Database design Data structures and algorithms IT system lifecycles Organisations Project management and tools Research project Industrial Placement Final Year Topics Computer security research and development project Computer security case studies and scenarios Professionalism Optional modules BSc (Hons) Forensic Computing Forensic Computing is a specialist course within the broad study of computer science, with particular emphasis on digital material that may be used as evidence. The curriculum covers the theory and practice of computer systems. The theory is needed to understand fundamental principles and includes handling digital evidence, computer networks, computer architecture, discrete mathematics, programming language concepts, cryptography and secure multi-tier web systems. This knowledge enables the appropriate analysis and interpretation of digital artefacts. 4
6 The emphasis is on the why as well as the what and you are encouraged to develop your critical thinking, scientific analysis and problem-solving skills. Your critical analysis skills will be enhanced by undertaking a research project in your second year. Your problem solving skills will develop as you analyse scenarios under investigation of increasing complexity. Your scientific analytical skills culminate in your final year individual project. The practical element gives you two types of experience: experience configuring, protecting and attacking components of modern networked computers and experience of capturing, preserving, analysing and interpreting digital residue from networked devices. Creative use of virtual environments gives opportunities and privilege to experiment in ways that are inconceivable on real hardware. This includes experimentation on the network fabric of switches, routers and firewalls, the operating systems of endpoint devices, and applications running on those endpoints. As well as the laboratory sessions that run throughout the curriculum, this practical work is particularly evident in the final year scenario case studies. These give you the opportunity to apply your investigative skills against a specific brief and the associated seized devices, presenting your findings in the form of an expert witness report. As well as all the technical aspects to your course, you will learn about the structure of organisations and gain an insight into the commercial context in which IT systems are commissioned and deployed. You will be introduced to computing ethics and computer law critical subjects if you want to develop as a forensic practitioner. The first year is shared with three other courses (Computer Security, Computer Science and Software Engineering) which gives you the option to switch course at the end of your first year if you so wish. We encourage all students to take advantage of the sandwich placement experience offered between the second and final years of study. This optional year out in industry gives you an opportunity to work in the real world gaining valuable professional experience. The study of computer security opens up many career paths upon graduation. These include specialist careers in security analysis and penetration testing as well as broader careers in the design, deployment and operation of IT systems of all scales and purposes. First Year Topics Computer architecture Operating systems Computer networks Programming in C Scientific method Software testing Discrete mathematics Database fundamentals Functional programming Computer ethics Computer law Forensics and Security Specialist Portfolio 5
7 Second Year Topics Windows Forensics Linux Security Secure scripting for web-development Internet protocols Database design Issues in criminal justice IT system lifecycles Organisations Project management and tools Research project Industrial Placement Final Year Topics Forensic computing research and development project Forensic Computing case studies and scenarios Professionalism Optional modules BSc (Hons) Software Engineering Software Engineering is a specialist pathway within BSc (Hons) Computer Science sharing the same subjects for the first two years of study. In the final year a distinction is made with the selection of a specialist module that introduces rigorous sofware development. This module covers material has been specially developed for the course by the Faculty s Software Technology Research Laboratory and is based on current research work in the field. The subjects covered on the course cover a mixture of both theory and practice. The theory is needed to understand the fundamental principles and includes discrete mathematics, programming language concepts, software design methods, secure web systems, computer architecture and computer networks. The emphasis is on the why as well as the what and you are encouraged to develop your critical thinking and problem-solving skills. Your critical analysis skills will be enhanced by undertaking a research project in your second year. Your problem solving skills will develop as you model, design and implement a variety of software systems. The practical element is needed to give you the experience you need in developing software systems using modern languages and environments. A particular example of this is the final year project which gives you the opportunity to apply all the stages of a software development method to produce a software system under the guidance of a project tutor. As well as all the technical aspects to your course, you will learn about the structure of organisations and gain an insight into the commercial context in which IT systems are comissioned and deployed. You will be introduced to computing ethics and computer law important subjects that will help you to develop as a computer professional. The first year is shared with three other courses (Computer Science, Computer Security and Forensic Computing) which gives you the opportunity to change your course at the end of 6
8 your first year if you so wish. The second year is fully shared with Software Engineering so a decision on whether to specialise in that subject can be made towards the end of the second year. The course offers you the chance to spend a year in industry. This (sandwich) experience takes place between the second and final years of study and gives you an opportunity to work in the real world gaining valuable professional experience. The study of software engineering leads to a wide variety of careers upon graduation, examples of which include software development, database design and administration, network management, commercial web application development, software project management, computer science research and academia. First Year Topics Computer architecture Operating systems Computer networks Programming in C Scientific method Software testing Discrete mathematics Database fundamentals Functional programming Computer ethics Computer law User-interface design (with Client-side web Technology) Second Year Topics Object-oriented software design Object-oriented programming Data structures and algorithms Secure web-development Database Design Software lifecycles Organisations Project management and tools Research project Industrial Placement Final Year Topics Software development project Software design methods Rigorous Systems Optional modules 7
9 First Year Modules Programming in C This module introduces two complementary topics: (1) traditional, imperative programming in C; and (2) the implementation of standard linear data structures and the algorithms that manipulate them. Key aspects of the core language are covered including major library functions and basic design and testing techniques. The module will be particularly suited to anyone who needs to understand how a computer can be controlled using software designed for a traditional Von-Neumann architecture. It is an introductory course in computer programming. Outline Content: Part I: Statements; types; operators; expressions; sequence; selection; iteration; arrays and strings. Part II: Functions; structs; pointers; variable scope and lifetime; header-files; libraries; separate compilation and linking; fundamental testing techniques Part III: Linked and contiguous storage; linear structures; ordered and unordered lists; searching and sorting Learning outcomes 1 Apply correctly each of the fundamental language components (including constants, types, variables, expressions, statements, control structures, and formatted IO). 2 Declare and use functions using pass-by-value and pass-by-reference parameters. 3 Define and use structured data types (including arrays, structures, and dynamically allocated data). 4 Structure programs using separately compiled units and header files. 5 Select appropriate algorithms for searching and sorting data and comment on their efficiency. 6 Design a suitable set of test data for a computer program. Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Other Coursework 2 hours 50% N 1,2,3 Unseen Exam 2 hours 50% Y 1,2,3,4,5,6 8
10 Notes Normally the other coursework component will take the form of two lab-based assessments. The first is designed to check understanding of basic language concepts and is normally a Blackboard test taking no more than an hour. The second test is design directory to check that the practical work has been undertaken and understood as such, it samples the practical work (either directly or indirectly) and may take the form of a viva voce to explain randomly selected practical exercises, or it may take the form of a time-constrained assessment based upon the practical exercises. The unseen examination checks programming ability and understanding of the theoretical aspects of the module. Expected Methods of Delivery Lectures will be used to introduce key practical and theoretical concepts. A series of demonstration lectures will be used to reinforce basic concepts and theories. Learning to write programs requires continuous practice using graded exercises. Practical C programming skills will be gained in weekly laboratory sessions: over the course of the module a large number and variety of C programming exercises will be undertaken. During the staffed lab sessions students will have the opportunity to get support with their programming exercises and receive verbal feedback on their progress. Computational Modelling Discrete mathematics is introduced as the foundational science underlying computing. In particular, students gain an understanding of logic, sets, tuples, relations and functions. The theoretical material is supported practically using a variety of declarative languages (providing a contrast with the imperative abstractions being covered on CTEC1401). Specifically, the relational abstraction is supported practically via SQL and this is contextualised by manipulating tables and realising queries using a practical database. The introduction of a functional language provides practical experience of functions, tuples and lists and permits the ideas of recursion (data and algorithms), composition and modularity to be presented succinctly and naturally. Students will apply mathematical models to represent a variety of real-world problems and translate these into appropriate computational solutions. Students will be introduced to the concepts of scientific reasoning, hypothesis generation and testing, and the principles of software testing. Topics include: 1. Numbers, logic, sets, tuples, relations 2. Relational programming: SQL; constructing, interrogating and modifying a small database 3. Functional programming: definitions; types; recursion; pattern matching; list processing. Composition and modularity. 4. Scientific reasoning: Hypothesis generation and testing 5. Principles of software testing 9
11 Learning outcomes 1 Develop and test scientific hypotheses. 2 Construct an appropriate test suite for a software component. 3 Construct and manipulate set-theoretical mathematical objects. 4 Write functions to perform calculations; process lists and tuples. 5 Write SQL to manipulate and interrogate a small database. 6 Develop functions using the concepts of type, data, algorithm, abstraction, composition and modularity. Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Other Coursework 50% N 2,4,5 Unseen Exam 50% Y 1,2,3,4,5,6 Notes Practical outcomes of the module are assessed by coursework assignments. The examination covers all parts of the syllabus, but will have a particular emphasis on assessing the understanding of theoretical aspects and their application. Examinations ensure the individuality of the assessment. Expected Methods of Delivery Lectures will be used to introduce the main topics. To gain full advantage of this module students are expected to hone their skills and understanding by working through progressive exercises. The exercises range from drill to problem solving tasks. The exercises provide the basis of tutorial and laboratory work. Students are expected to complete exercise in their own time. In tutorials students receive feedback on their progress, and engage in discussions on issues arising from the exercises. In laboratory sessions students gain practical experience by undertaking exercises that are designed to support the theoretical work. The department has well established bank of materials to support the mathematics part of the syllabus. 10
12 Elements of Computing This module is designed to provide a foundation in computer architecture, networks and operating systems with a specific emphasis on their security. Outline content: Theoretical foundations: Number systems, integer and real number representation, Syntax representation, finite state automata, Turing machines. Computer hardware: CPU components and operation, instruction sets, Computer architectures, Memory, Practical introduction to assembler programming. Systems software: Operating system fundamentals, processes, file systems, memory management, Shell scripting, Authentication and authorisation. Computer networks: Network architectures, data communication system fundamentals, Transmission schemes and technologies, error detection and management, Network components, LAN protocols, Internet protocols. Security issues: Network security, Operating system security, Architectural security. Learning outcomes 1 Explain computer hardware, software, operating systems and networking. 2 Demonstrate a practical knowledge of computer hardware, software, operating systems and networking. 3 Relate the abstract concepts of logic and number systems to their concrete representation on real machines. 4 Identify the security risks in common configurations of computer networks and suggest appropriate mitigations 5 Develop shell scripts 11
13 Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Examination 2 50 Y 1,2,3,4,5 Other Coursework 50 N 2,5 Notes Expected Methods of Delivery Lectures and tutorials will be used to introduce the main theoretical elements. Laboratory sessions will be used for practical application and experimentation. Computer Ethics, Law and Portfolio The module will introduce students to the ethical and moral basis which underpin our society. It will review how such ethical issues influence and shape the law. Students will be introduced to critical reflection on norms and will learn the basics of doing independent research. On the basis of the ethical foundations, students will be introduced to substantial and procedural law underpinning computing. Students will further develop their transferable skills by working within teams to construct a portfolio of evidence based upon research and practical application in a subject area set within the context of their programme of study. Outline content: 1 Ethics:- ethical and moral questions in forensic computing (introduction to ethics and morality, morality as an expression of social preferences, examples of moral problems in computing, intellectual property, privacy / surveillance, access, human - computer interaction), ethics as the theoretical reflection of morality (overview of ethical theory, classical Greek ethics, virtue ethics, deontology, teleology, ethical scepticism, modern approaches to ethics), application of ethical reasoning to moral cases, reading and understanding ethical texts 2. Foundation of the law:- historical development of legal systems, ethics, morality, and the law, sources of law (civil law, case law traditions, influence of the EU on UK law), understanding legal language, doing research in legal issues 3. Substantive Law in Computing:- introduction to computer crime, computer fraud, hacking - unauthorised access to computer materials, unauthorised modifications to computer data, piracy and related offences, computer pornography and harassment 12
14 4. Procedural Law in Forensic Computing:- introduction to forensic issues and computer crime, search and seizure of evidence of computer crime, interception of evidence of computer crime, preservation of evidence of computer crime, international harmonization and assistance in computer forensics. 5. Contextual lectures/seminars to support the development of the portfolios. Learning outcomes 1 recognise, contextualise and apply ethical arguments to cases relevant to computing 2 perform research to support arguments, 3 explain the relevant aspects of procedural and substantive law in a case involving ICT, 4 identify the most important statutes governing the use of ICT, 5 explain the correct procedures when handling digital evidence, 6 research, read and correctly interpret legal texts. 7 work as part of a team to investigate a topic relevant to their programme of study Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Coursework 100 Y 1,2,3,4,5,6 Notes Given the module's emphasis on critical understanding of ethical and legal issues in forensic computing and research skills, the assessment should be aimed at capturing the students' knowledge in these areas. therefore must cover a wide variety of topics but it must also test the practical and professional skills. This can best be done by coursework. Students will typically submit two major essays and a portfolio. Expected Methods of Delivery Core concepts will be introduced through conventional lectures. Students will develop their own ability to reason about legal and ethical concepts through formative essays and seminar discussions. Portfolio work will be supported by laboratory work and selected lectures. Guest lectures may be used to support some of the portfolio work. 13
15 Second Year Modules Organisations, Project Management and Research This module introduces the business contexts within which IT projects are procured and developed. This includes the feasibility of computer system development viewed from economic, technical, social, legal, and ethical perspectives. Students will develop an understanding of the roles of main organisational functions (including marketing, HR, finance) and the broader organisational structures in which they operate. The role of professional standards bodies and professional organisations is explained. Major components of the software lifecycle are considered from a theoretical perspective. The emphasis is on the overall process and comparing traditional and alternative lifecycle models. In this module specific emphasis is placed on two particularly important phases requirements analysis and maintenance. This will include a consideration of maintenance costs, system adaptation, and the management of the maintenance process. (The lifecycle phases of design and implementation are covered in more detail in other modules). The module covers risk factors during different phases of the lifecycle, and introduces students to the techniques used both to measure and to ensure software quality. These include software quality metrics, measures of reliability, software quality assurance standards, and issues of compliance. A variety of standard tools for supporting the management and development process are presented. A selection of supporting software tools will be used so that practical experience can be gained in their use. (For example, these may include version control, integrated development environments, documentation and project management tools.) Students will research an area relevant to their course of study and present their findings in a professional manner. (This may take the form, for example, of a research conference poster.) Learning Outcomes 1 Discuss the commercial and economic context of system development including the major phases of the lifecycle; the roles of the main organisational functions of a business organisation; and the role of professional standards bodies and professional organisations. 2 Describe the principal activities involved in performing a system requirements analysis. 3 Identify and assess appropriate risk factors involved in the management of software development projects. This includes a study of the factors affecting the feasibility of a software project. 4 Discuss the principal factors involved in ensuring software integrity including software quality assurance, and software maintenance. 5 Identify the major planning and staffing issues involved in Information Systems project management and recommend appropriate techniques and methods for a given project. 6 Undertake research into a relevant topic area and present the work to a professional standard. 14
16 Outline Content 1. The Business Context a. Commercial and economic context of IT b. Organisational structures c. Professional standards and professional bodies 2. The Software Lifecycle a. Traditional approaches (waterfall, V-model) b. Alternative approaches (e.g. agile, prototyping) c. Requirements analysis and project feasibility d. Software maintenance 3. Project Management a. The nature of the project, its components, risks, success factors and associated politics. b. Information Systems investment justifications. Approaches to investment appraisal. c. Identification and management of benefits. Assessing the intangibles. d. Organisation of systems development. Reporting structures. e. Project planning and control. Work breakdown structures. Estimation, budgeting, planning methods (PRINCE 2). f. Project administration. Tracking and reviewing. Configuration management and change control. g. Staff management, motivation, leadership. h. Quality Management. Standards and accreditation. i. Managing software project risks. j. Managing large-scale projects. Implementation and post-implementation review. 4. Software Development Tools a. Integrated Development Environments b. Version Control Tools c. Documentation Tools d. Management Support Tools 5. Research Project An area relevant to the student s course of study will be selected for research. The work will be presented to a professional standard. Type of Duration/ Final Minimum Essential Learning assessment volume weighting % assessment threshold mark % (if component outcome(s) assessed not 40%) Other 50% N 1,2,3,4,5,6 Coursework Unseen Exam 50% Y 1,2,3,4,5 15
17 Notes Students will typically undertake two pieces of coursework. The first piece will normally be a written report with the subject drawn from any of the main topics covered on the module. The second piece will be a piece of group work in which a topic will be researched and presented to a professional standard (this may, for example, take the form of a conference poster, or a report written in the style of an academic paper.) A two-hour examination will require students to demonstrate their understanding of the key concepts covered by the module. Expected Methods of Delivery A range of strategies will be used to facilitate student learning. Case studies with origins in the industry will be used as vehicles to enhance insight into key areas. Lectures will be used to introduce major topics, drawing together material from a variety of sources and providing the opportunity for interaction with short exercises. Tutorials will offer the opportunity for discussion of issues and will allow students to analyse different scenarios, focusing on particular systems building problems. Students will be expected to gain practical experience with a selection of software development support tools covered on the module. Students will be encouraged to read widely, using the reading list as a starting point and library resources and the Internet for further information. The coursework element of assessment will provide the opportunity for students to develop their research skills and their ability to communicate key findings and recommendations in a professional manner. The research and presentation assignment will take the form of a group activity. The Virtual Learning Environment (VLE) will provide essential module information such as a week by week teaching plan, copies of tutorial sheets so that students can prepare in advance, the reading list and assessment information. It will also be used to direct the students to useful sources of information and for essential updates such as drawing the students' attention to recently-published relevant papers. Forensics and Security This module develops the principles of forensics and the principles security as abstract concepts, then looks at two operating systems from two perspectives: Linux is studied from a security perspective with the overall aim of understanding how to make a Linux installation less vulnerable; Windows is studied from a forensic perspective with the overall aim of understanding what non-volatile digital residue is left which has evidential value. Learning Outcomes 1 Analyse how the principles of digital forensics should be or have been applied in a given context. 2 Identify the forensic significance of Windows operating system artefacts. 3 Perform a forensic investigation of a Windows device. 4 Analyse how the principles of digital security should be or have been applied in a given context. 16
18 5 Explain the major phases of the Linux boot sequence 6 Identify the major configuration settings that influence a machine's security posture. 7 Harden a Linux operating systems to suit various deployment scenarios such as a server operating in a DMZ or desktop workstation in a corporate environment. Outline Content 1. Principles of Digital Forensics: a. Handling of evidence, chain of custody, contemporaneous notes, ACPO guidelines, b. Cryptographic hashes in digital forensics, c. Validation and verification of tools and processes, d. Live vs dead system forensics, e. Forensic readiness 2. Principles of Digital Security: a. Confidentiality, integrity and availability, b. Security models, c. Trust, d. Policies, procedures, controls, governance, regulation and compliance. e. Cryptography 3. Windows Forensics: a. Important features of the system being investigated: Partitions, FAT and NTFS file systems, file data and meta data, present, deleted and overwritten files, the registry, hibernation files, b. Interpreting persistent artefacts, c. Order of volatility - what is lost when a live system is shut down, d. Tools with forensic value for preserving, analysing and interpreting. 4. Linux Security: a. Boot (grub) security b. Service management (rc.d file structure). c. CHROOT jails d. Apparmour (SELinux) e. /etc/ framework f. netstat / ps process management (kill etc). g. Java security policies. h. Monitoring and logging. i. Users groups permissions. Type of Duration/ Final Minimum Essential Learning assessment volume weighting % assessment threshold mark % (if component outcome(s) assessed not 40%) Other 50% N 2,3,6,7 Coursework Unseen Exam 2 50% Y 1,2,4,5,6 17
19 Notes Students will typically undertake two pieces of coursework: one relating to the forensic investigation of a Windows artefact, the other relating to the hardening of a Linux device The examination will require students to demonstrate their understanding of the key concepts covered by the module. Expected Methods of Delivery Virtualisation will pay a significant part in student learning on this module. Object- Oriented Software Design and Development Object-oriented software development is now the preferred approach of many established developers, typically using software tools based on Sun's Java 2 or Microsoft's.NET platforms. This module enables students to design and implement medium scale software systems using an object-oriented approach. The design notation used is the Unified Modelling Language (UML) and the implementation language is Java. It is essentially a programming module, with the emphasis on implementing OO designs. Students enrolling on this module will have a foundation in programming gained from the study of a Level 1 programming module. The first part of this module introduces UML and the Java language. Students learn how to write simple object-based programs, and how to exploit the extensive library packages provided by the Java 2 Software Development Kit (SDK). Fundamental OO concepts and design issues are discussed. Emphasis is placed on the design and structure of software, and the OO development process. UML is used to document designs, and the concept of software design patterns is introduced. Software quality, reliability, and maintainability are integral to the development of software, and these issues are discussed and applied as necessary. Outline Content: The Java programming language: Essential language constructs Ability to use the Java SDK API's Java collection classes, the data structures that underpin them, and using them to implement aggregations that appear in OO designs. A working knowledge of several programming domains, typically: GUI & event handling, exceptions, file handling, persistence, collections, utilities such as dates, formatting, tokenizing. It is not expected that all these features are covered in detail. By the end of the course students should have become more independent learners with the ability to learn features not covered in the course. OO software design: UML notation: class diagrams, collaboration diagrams, use 18
20 cases, state; relationship between an OO 'analysis' design and a program design; implementation of associations: composition and aggregation; user defined classes; data representation decisions; interfaces and abstraction. Identification and application of software architectures and design patterns as they arise in case studies. In particular: Model-View-Controller software architecture; Composite; Command; Decorator. Quality issues in software development, including: Documentation for maintainability and reusability, use of 'javadoc' tool; Unit and system testing; Correctness; Robustness; HCI issues. Learning outcomes 1 Use Java to implement standard object-oriented designs given in UML. 2 Use UML to document object-oriented designs. 3 Address issues of quality, maintainability, correctness, and robustness with respect to software design and development. 4 Make effective use the Java Software Development Kit Application Programming Interfaces. Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Other Coursework 50% N 1, 3, 4 Unseen Examination 50% Y 1, 2, 3, 4 Notes The coursework assessments are based on formative work carried out in lab and tutorial classes. The earlier assignment is biased towards using Java effectively (outcome 1). The later assignment uses more advanced features of the JDK (outcome 4) and additionally expects consideration of design issues (outcome 1) and quality issues (as outlined in learning outcome 3). The examination will verify a student's individual ability to write essential Java code (outcome 1); and their understanding of basic UML notation (outcome 2); and to demonstrate their understanding of OO implementation issues (outcomes 1 and 2); 19
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationSchool of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
More informationMasters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
More informationMasters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
More informationMasters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
More informationMasters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
More informationCourse Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document
More informationMasters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
More informationLOUGHBOROUGH UNIVERSITY
LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical
More informationStudents who successfully complete the Health Science Informatics major will be able to:
Health Science Informatics Program Requirements Hours: 72 hours Informatics Core Requirements - 31 hours INF 101 Seminar Introductory Informatics (1) INF 110 Foundations in Technology (3) INF 120 Principles
More informationLONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing
LONDON SCHOOL OF COMMERCE Programme Specification for the Cardiff Metropolitan University BSc (Hons) in Computing Contents Programme Aims and Objectives Programme Structure Programme Outcomes Mapping of
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationHonours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information
Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information 1 Awarding Institution / body: Lancaster University 2a Teaching institution: University
More informationSchool of Computer Science
School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Course record information Name and level of final award: Name and level of intermediate awards: The BSc (Hons) Computer Science is a B.Sc. BSc (Hons) Computer Science with Industrial
More informationDiploma Of Computing
Diploma Of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B
More informationMEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
More informationCOURSE TITLE COURSE DESCRIPTION
COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.
More informationProgramme Specification
LOUGHBOROUGH UNIVERSITY Programme Specification Information Technology & Physics Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes
More informationCourse Descriptions. preparation.
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
More informationProgramme Specification and Curriculum Map for BSc (Hons) Computer Forensics
Programme Specification and Curriculum Map for BSc (Hons) Computer Forensics 1. Programme title Computer Forensics 2. Awarding institution Middlesex University 3. Teaching institution 4. Programme accredited
More informationMSc Information Technology - E521
MSc Information Technology - E521 1. Aims and Objectives This conversion programme targets non-engineering graduates with a view of preparing them for the employment market where up-to-date IT skills represent
More informationSchool of Computer Science
Computer Science Honours Level 2013/14 August 2013 School of Computer Science Computer Science (CS) Modules CS3051 Software Engineering SCOTCAT Credits: 15 SCQF Level 9 Semester: 1 This module gives a
More informationASTON UNIVERSITY PROGRAMME SPECIFICATION
ASTON UNIVERSITY PROGRAMME SPECIFICATION Programme Title UCAS/JACS Code School/Subject Area Final Award Interim Awards Mode(s) of Study Normal Length of Programme Electronic Engineering and Computer Science
More informationHenley Business School at Univ of Reading. Henley Business School Board of Studies for
BA Business and Management For students entering Part 1 in 2013/4 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
More informationComputer and Information Sciences
Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,
More informationBachelor of Information Technology (Network Security)
Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking
More informationBA Management and Business (3 year) For students entering Part 1 in 2011/2. Henley Business School at Univ of Reading
BA Management and Business (3 year) For students entering Part 1 in 2011/2 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
More informationPROGRAMME DETAIL SPECIFICATION. Programme Summary
PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university Liverpool John Moores University 3a Programme accredited by: 3b
More informationProgramme Specification (Undergraduate) Date amended: 28 August 2015
Programme Specification (Undergraduate) Date amended: 28 August 2015 1. Programme Title(s) and UCAS code(s): BSc Mathematics and Actuarial Science (including year in industry option) 2. Awarding body or
More informationComputer Science Course Descriptions Page 1
CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,
More informationProgramme Specification for the. Cardiff Metropolitan University. Master of Science (MSc) in Information Technology
LONDON SCHOOL OF COMMERCE Programme Specification for the Cardiff Metropolitan University Master of Science (MSc) in Information Technology Contents Programme Aims and Objectives 3 Programme Structure
More informationSchool of Computer Science
School of Computer Science Computer Science - Honours Level - 2015/6 - August 2015 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
More informationBSc (Hons) Computer Animation
BSc (Hons) Computer Animation Programme Specification EDM-DJ-08/2014 Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and
More informationProgramme Specification and Curriculum Map for BSc Honours Information Technology
Programme Specification and urriculum Map for Sc Honours Information Technology 1. Programme title Sc Honours Information Technology 2. warding institution Middlesex University 3. Teaching institution
More informationDIABLO VALLEY COLLEGE CATALOG 2014-2015
COMPUTER SCIENCE COMSC The computer science department offers courses in three general areas, each targeted to serve students with specific needs: 1. General education students seeking a computer literacy
More informationCCA CYBER SECURITY TRACK
CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014
More informationPROGRAMME DETAIL SPECIFICATION. Programme Summary
PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university LIVERPOOL JOHN MOORES UNIVERSITY 3a Programme accredited by: 3b
More informationThe University s course specification template has been developed to fulfil three main functions; it shall act:
LONDON METROPOLITAN UNIVERSITY Course Specification BSc BIT The University s course specification template has been developed to fulfil three main functions; it shall act: as a source of information for
More informationM.S. Computer Science Program
M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer
More informationHonours Degree (top-up) Business Abbreviated Programme Specification Containing Both Core + Supplementary Information
Honours Degree (top-up) Business Abbreviated Programme Specification Containing Both Core + Supplementary Information 1 Awarding Institution / body: Lancaster University 2a Teaching institution: University
More information2015 2016 fashion pre-masters programme
2015 2016 fashion pre-masters programme fashion pre-masters programme 02 1. Award Programme: Mode of delivery: 2. Entry Route: Progression to: Fashion Pre-Masters Full time Fashion Pre-Masters Master in
More informationHenley Business School at Univ of Reading. Henley Business School Board of Studies for
BA Business and Management For students entering Part 1 in 2014/5 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
More informationBSc Business Information Technology For students entering Part 1 in 2008/9
BSc Business Information Technology For students entering Part 1 in 2008/9 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
More informationBSc Management with Information Technology For students entering Part 1 in 2012/3. Henley Business School at Univ of Reading
BSc Management with Information Technology For students entering Part 1 in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date
More informationTeaching, Learning and Assessment Policy
Teaching, Learning and Assessment Policy The purpose of this policy document is to explain the School of Psychology s strategy regarding teaching, learning and assessment and how the School seeks to develop
More informationBirmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification
Birmingham City University Faculty of Technology, Engineering and the Environment Undergraduate Programme Programme Specification Date of Course Approval/Review Version Number Version Date 7 May 2009 3.03
More informationCAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
More informationBSc Business Information Technology For students entering Part 1 in 2005
BSc Business Information Technology For students entering Part 1 in 2005 UCAS code: N2G5 Awarding Institution: The University of Reading Teaching Institution: The University of Reading Relevant QAA subject
More informationProgramme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games
Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games 1. Programme title BSc Honours Computing, Graphics and Games 2. Awarding institution Middlesex University 3. Teaching
More informationDivision of Mathematical Sciences
Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree
More informationProgramme Specification and Curriculum Map for MSci Sports Informatics & Data Analytics
Programme Specification and Curriculum Map for MSci Sports Informatics & Data Analytics 1. Programme title MSci in Sports Informatics & Data Analytics 2. Awarding institution Middlesex University 3. Teaching
More informationBachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)
Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6) Programme Structure STAGE ONE This stage makes up the Diploma in Information Technology (Level 5) 120
More informationMasters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationMSc in Computer and Information Security
MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
More informationDevelopment. G450 Multimedia Computing Science. Part time: COM5014
Programme Specification Programme Title: HND Computing and Website Development Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s):
More informationBSc Management with Information Technology For students entering Part 1 in 2015/6. Henley Business School at Univ of Reading
BSc Management with Information Technology For students entering Part 1 in 2015/6 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date
More informationProgramme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching
More informationCore Syllabus. Version 2.6 B BUILD KNOWLEDGE AREA: DEVELOPMENT AND IMPLEMENTATION OF INFORMATION SYSTEMS. June 2006
Core Syllabus B BUILD KNOWLEDGE AREA: DEVELOPMENT AND IMPLEMENTATION OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6,
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing
More informationMaster of Science in Software Engineering (MSC)
Master of Science in Software Engineering The MSc in Software Engineering provides a thorough grounding in how to apply rigorous engineering principles to deliver elegant, effective software solutions
More informationUNIVERSITY OF ULSTER: COLERAINE PROGRAMME SPECIFICATION. COURSE TITLE: B.Sc. (HONS) SOCIAL PSYCHOLOGY/ B.Sc. (HONS) SOCIAL PSYCHOLOGY with DPP
25 UNIVERSITY OF ULSTER: COLERAINE PROGRAMME SPECIFICATION COURSE TITLE: B.Sc. (HONS) SOCIAL PSYCHOLOGY/ B.Sc. (HONS) SOCIAL PSYCHOLOGY with DPP PLEASE NOTE: This specification provides a concise summary
More informationUNDERGRADUATE PROGRAMME SPECIFICATION
UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: JACS Code: Forensic Investigation
More informationInformation and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
More informationBachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
More information2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More informationHenley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for
BA Accounting and Business For students entering Part 1 in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
More informationDiploma of Website Development
Diploma of Website Development Program Description The BHCK Diploma of Website Development provides the skills and knowledge for a graduate to design, build and manage websites as an independent web developer
More informationBSc (Honours) Multimedia Computing and Animation BSc (Honours) Multimedia Computing and Animation with Foundation. Programme Specification 2011/12
BSc (Honours) Multimedia Computing and Animation BSc (Honours) Multimedia Computing and Animation with Foundation Programme Specification 2011/12 PROGRAMME SPECIFICATION Course Record Information Name
More informationProgramme Specification and Curriculum Map for BSc Honours Computer Networks (Network Programming)
Programme Specification and Curriculum Map for BSc Honours Computer Networks (Network Programming) 1. Programme title BSc Honours Computer Networks (Network Programming) 2. Awarding institution Middlesex
More informationMICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES FIELD 050: COMPUTER SCIENCE
MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES Subarea Educational Computing and Technology Literacy Computer Systems, Data, and Algorithms Program Design and Verification Programming Language
More informationProgramme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute:
Programme Specification BSc (Hons) Computer Networks and Security with Foundation Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s):
More informationQAA Subject Benchmarking Group: Business and Management (2007)
MSc in Facilities Management (for External Students) For students entering in 2012 Awarding Institution: The University of Reading Teaching Institution: The College of Estate Management QAA Subject Benchmarking
More informationProfessional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
More informationHenley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for
BA Accounting and Business For students entering Part 1 in 2014/5 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
More informationEastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
More informationHenley Business School at Univ of Reading. Chartered Institute of Management Accounting (CIMA) Certificate Level (C01 to C05)
MSc Accounting and International Management (full-time) For students entering in 2015/6 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length:
More informationCS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html
More informationHenley Business School at Univ of Reading. Postgraduate Pre-Experience Board of Studies
MSc in Accounting and Financial Management For students entering in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
More informationNottingham Trent University Course Specification
Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: Science & Technology, Clifton campus 3. Final Award, Course
More informationProgramme Specification and Curriculum Map for MSc Computer and Network Security
Programme Specification and Curriculum Map for MSc Computer and Network Security 1. Programme title MSc Computer and Network Security 2. Awarding institution Middlesex University 3. Teaching institution
More informationROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION
ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Doctorate in Clinical Psychology. This specification is valid for new entrants and current students from September
More informationBSc (Honours) Computing and Information Systems (Distance Learning)
BSc (Honours) Computing and Information Systems (Distance Learning) Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information
More informationBirmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification
Birmingham City University Faculty of Technology, Engineering and the Environment Undergraduate Programme Programme Specification BSc (Hons) Computer Networks and Security Date of Course Approval/Review
More informationCleveland College of Art & Design BA (Hons) Fashion Enterprise Programme Handbook 2013-2014 1
Cleveland College of Art & Design BA (Hons) Fashion Enterprise Programme Handbook 2013-2014 1 BA (Hons) Fashion Enterprise Programme Handbook 2013-2014 Your Programme Handbook provides you with a range
More informationHenley Business School at Univ of Reading
MSc in Marketing and International Management For students entering in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of
More informationHenley Business School at Univ of Reading. Henley Business School Board of Studies for
BSc in Accounting and Finance For students entering Part 1 in 2014/5 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
More informationBirmingham City University Faculty of Computing, Engineering and the Built Environment. Undergraduate Programme. Programme Specification
Birmingham City University Faculty of Computing, Engineering and the Built Environment Undergraduate Programme BSc (Hons) Digital Media Technology Date of Course Approval/Review Version Number Version
More informationCourse Descriptions. CS 101 Intro to Computer Science
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
More informationProgramme Specification and Curriculum Map for BSc Honours Network Management and Security
Programme Specification and Curriculum Map for BSc Honours Network Management and Security 1. Programme title BSc Honours Network Management and Security 2. Awarding institution Middlesex University 3.
More information1. Programme title and designation Advanced Software Engineering
PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Advanced Software Engineering 2. Final award Award Title Credit Value MSc Advanced Software Engineering
More informationComputer Security and Forensics
SCHOOL OF COMPUTING & MATHEMATICAL SCIENCESB Computer Security and Forensics BSc Hons Greenwich Campus www.gre.ac.uk/cms Why study this programme? This degree will equip you to become an ICT professional
More informationComputer Science. Computer Science 213. Faculty and Offices. Degrees and Certificates Awarded. AS Computer Science Degree Requirements
Computer Science 213 Computer Science (See Computer Information Systems section for additional computer courses.) Degrees and Certificates Awarded Associate in Science Degree, Computer Science Certificate
More informationProgramme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.
More informationContents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions
Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces
More informationCOMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.
More informationEastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
More informationINFORMATION TECHNOLOGY (INFO)
INFORMATION TECHNOLOGY (INFO) This is a list of the Information Technology (INFO) available at KPU. Please note: Access to 1000-level is limited to Bachelor of Technology in Information Technology, Computer
More informationComputer Science. 232 Computer Science. Degrees and Certificates Awarded. A.S. Degree Requirements. Program Student Outcomes. Department Offices
232 Computer Science Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface
More information