School of Computer Science and Informatics Faculty of Technology

Size: px
Start display at page:

Download "2013-2014 School of Computer Science and Informatics Faculty of Technology"

Transcription

1 BSc (Hons) Computer Science BSc (Hons) Computer Security BSc (Hons) Forensic Computing BSc (Hons) Software Engineering School of Computer Science and Informatics Faculty of Technology

2 Table of Contents BSc (Hons) Computer Science... 2 First Year Topics... 2 Second Year Topics... 3 Industrial Placement... 3 Final Year Topics... 3 BSc (Hons) Computer Security... 3 First Year Topics... 4 Second Year Topics... 4 Industrial Placement... 4 Final Year Topics... 4 BSc (Hons) Forensic Computing... 4 First Year Topics... 5 Second Year Topics... 6 Industrial Placement... 6 Final Year Topics... 6 BSc (Hons) Software Engineering... 6 First Year Topics... 7 Second Year Topics... 7 Industrial Placement... 7 Final Year Topics... 7 First Year Modules... 8 Programming in C... 8 Computational Modelling... 9 Elements of Computing Computer Ethics, Law and Portfolio Second Year Modules Organisations, Project Management and Research Forensics and Security Object- Oriented Software Design and Development Multi- tier Web Development Data Structures and Algorithms Issues in Criminal Justice Final Year Modules Computing Project Professionalism in Forensics and Security Advanced Topics in Security Rigorous Systems Digital Evidence Course Structures First Year Second Year Final Year (Compulsory Modules)

3 BSc (Hons) Computer Science Computer Science is a course with a traditional title that covers modern approaches to software systems development. The subjects cover a mixture of both theory and practice. The theory is needed to understand the fundamental principles and includes discrete mathematics, programming language concepts, software design methods, secure web systems, computer architecture and computer networks. The emphasis is on the why as well as the what and you are encouraged to develop your critical thinking and problem-solving skills. Your critical analysis skills will be enhanced by undertaking a research project in your second year. Your problem solving skills will develop as you model, design and implement a variety of software systems. The practical element is needed to give you the experience you need in developing software systems using modern languages and environments. A particular example of this is the final year project which gives you the opportunity to apply all the stages of a software development method to produce a software system under the guidance of a project tutor. As well as all the technical aspects to your course, you will learn about the structure of organisations and gain an insight into the commercial context in which IT systems are comissioned and deployed. You will be introduced to computing ethics and computer law important subjects that will help you to develop as a computer professional. The first year is shared with three other courses (Software Engineering, Computer Security and Forensic Computing) which gives you the opportunity to change your course at the end of your first year if you so wish. The second year is fully shared with Software Engineering so a decision on whether to specialise in that subject can be made towards the end of the second year. The course offers you the chance to spend a year in industry. This (sandwich) experience takes place between the second and final years of study and gives you an opportunity to work in the real world gaining valuable professional experience. The study of computer science leads to a wide variety of careers upon graduation, examples of which include software development, database design and administration, network management, commercial web application development, software project management, computer science research and academia. First Year Topics Computer architecture Operating systems Computer networks Programming in C Scientific method Software testing Discrete mathematics Database fundamentals Functional programming Computer ethics Computer law 2

4 User-interface design (with Client-side web Technology) Second Year Topics Object-oriented software design Object-oriented programming Data structures and algorithms Secure web-development Database Design Software lifecycles Organisations Project management and tools Research project Industrial Placement Final Year Topics Software development project Software design methods Optional modules BSc (Hons) Computer Security Computer Security is a specialist course within the broad study of computer science, with particular emphasis on the CIA triad: confidentiality, integrity and availability of information. The curriculum covers the theory and practice of computer systems. The theory is needed to understand fundamental principles and includes computer networks, computer architecture, discrete mathematics, programming language concepts, cryptography and secure multi-tier web systems. The emphasis is on the why as well as the what and you are encouraged to develop your critical thinking and problem-solving skills. Your critical analysis skills will be enhanced by undertaking a research project in your second year. Your problem solving skills will develop as you develop a variety of protection schemes for information systems of increasing complexity. The practical element gives you experience configuring, protecting and attacking components of modern networked computers. Creative use of virtual environments gives opportunities and privilege to experiment in ways that are inconceivable on real hardware. This includes experimentation on the network fabric of switches, routers and firewalls, the operating systems of endpoint devices, and applications running on those endpoints. As well as the laboratory sessions that run throughout the curriculum, this practical work is particularly evident in the final year project. This gives you the opportunity to apply your computer security skills to a specific security problem under the guidance of a project tutor. As well as all the technical aspects to your course, you will learn about the structure of organisations and gain an insight into the commercial context in which IT systems are commissioned and deployed. You will be introduced to computing ethics and computer law critical subjects if you want to develop as a computer security professional. The first year is shared with three other courses (Forensic Computing, Computer Science and Software Engineering) which gives you the option to switch course at the end of your first year if you so wish. 3

5 We encourage all students to take advantage of the sandwich placement experience offered between the second and final years of study. This optional year out in industry gives you an opportunity to work in the real world gaining valuable professional experience. The study of computer security opens up many career paths upon graduation. These include specialist careers in security analysis and penetration testing as well as broader careers in the design, deployment and operation of IT systems of all scales and purposes. First Year Topics Computer architecture Operating systems Computer networks Programming in C Scientific method Software testing Discrete mathematics Database fundamentals Functional programming Computer ethics Computer law Forensics and Security Specialist Portfolio Second Year Topics Windows Forensics Linux Security Secure scripting for web-development Internet protocols Database design Data structures and algorithms IT system lifecycles Organisations Project management and tools Research project Industrial Placement Final Year Topics Computer security research and development project Computer security case studies and scenarios Professionalism Optional modules BSc (Hons) Forensic Computing Forensic Computing is a specialist course within the broad study of computer science, with particular emphasis on digital material that may be used as evidence. The curriculum covers the theory and practice of computer systems. The theory is needed to understand fundamental principles and includes handling digital evidence, computer networks, computer architecture, discrete mathematics, programming language concepts, cryptography and secure multi-tier web systems. This knowledge enables the appropriate analysis and interpretation of digital artefacts. 4

6 The emphasis is on the why as well as the what and you are encouraged to develop your critical thinking, scientific analysis and problem-solving skills. Your critical analysis skills will be enhanced by undertaking a research project in your second year. Your problem solving skills will develop as you analyse scenarios under investigation of increasing complexity. Your scientific analytical skills culminate in your final year individual project. The practical element gives you two types of experience: experience configuring, protecting and attacking components of modern networked computers and experience of capturing, preserving, analysing and interpreting digital residue from networked devices. Creative use of virtual environments gives opportunities and privilege to experiment in ways that are inconceivable on real hardware. This includes experimentation on the network fabric of switches, routers and firewalls, the operating systems of endpoint devices, and applications running on those endpoints. As well as the laboratory sessions that run throughout the curriculum, this practical work is particularly evident in the final year scenario case studies. These give you the opportunity to apply your investigative skills against a specific brief and the associated seized devices, presenting your findings in the form of an expert witness report. As well as all the technical aspects to your course, you will learn about the structure of organisations and gain an insight into the commercial context in which IT systems are commissioned and deployed. You will be introduced to computing ethics and computer law critical subjects if you want to develop as a forensic practitioner. The first year is shared with three other courses (Computer Security, Computer Science and Software Engineering) which gives you the option to switch course at the end of your first year if you so wish. We encourage all students to take advantage of the sandwich placement experience offered between the second and final years of study. This optional year out in industry gives you an opportunity to work in the real world gaining valuable professional experience. The study of computer security opens up many career paths upon graduation. These include specialist careers in security analysis and penetration testing as well as broader careers in the design, deployment and operation of IT systems of all scales and purposes. First Year Topics Computer architecture Operating systems Computer networks Programming in C Scientific method Software testing Discrete mathematics Database fundamentals Functional programming Computer ethics Computer law Forensics and Security Specialist Portfolio 5

7 Second Year Topics Windows Forensics Linux Security Secure scripting for web-development Internet protocols Database design Issues in criminal justice IT system lifecycles Organisations Project management and tools Research project Industrial Placement Final Year Topics Forensic computing research and development project Forensic Computing case studies and scenarios Professionalism Optional modules BSc (Hons) Software Engineering Software Engineering is a specialist pathway within BSc (Hons) Computer Science sharing the same subjects for the first two years of study. In the final year a distinction is made with the selection of a specialist module that introduces rigorous sofware development. This module covers material has been specially developed for the course by the Faculty s Software Technology Research Laboratory and is based on current research work in the field. The subjects covered on the course cover a mixture of both theory and practice. The theory is needed to understand the fundamental principles and includes discrete mathematics, programming language concepts, software design methods, secure web systems, computer architecture and computer networks. The emphasis is on the why as well as the what and you are encouraged to develop your critical thinking and problem-solving skills. Your critical analysis skills will be enhanced by undertaking a research project in your second year. Your problem solving skills will develop as you model, design and implement a variety of software systems. The practical element is needed to give you the experience you need in developing software systems using modern languages and environments. A particular example of this is the final year project which gives you the opportunity to apply all the stages of a software development method to produce a software system under the guidance of a project tutor. As well as all the technical aspects to your course, you will learn about the structure of organisations and gain an insight into the commercial context in which IT systems are comissioned and deployed. You will be introduced to computing ethics and computer law important subjects that will help you to develop as a computer professional. The first year is shared with three other courses (Computer Science, Computer Security and Forensic Computing) which gives you the opportunity to change your course at the end of 6

8 your first year if you so wish. The second year is fully shared with Software Engineering so a decision on whether to specialise in that subject can be made towards the end of the second year. The course offers you the chance to spend a year in industry. This (sandwich) experience takes place between the second and final years of study and gives you an opportunity to work in the real world gaining valuable professional experience. The study of software engineering leads to a wide variety of careers upon graduation, examples of which include software development, database design and administration, network management, commercial web application development, software project management, computer science research and academia. First Year Topics Computer architecture Operating systems Computer networks Programming in C Scientific method Software testing Discrete mathematics Database fundamentals Functional programming Computer ethics Computer law User-interface design (with Client-side web Technology) Second Year Topics Object-oriented software design Object-oriented programming Data structures and algorithms Secure web-development Database Design Software lifecycles Organisations Project management and tools Research project Industrial Placement Final Year Topics Software development project Software design methods Rigorous Systems Optional modules 7

9 First Year Modules Programming in C This module introduces two complementary topics: (1) traditional, imperative programming in C; and (2) the implementation of standard linear data structures and the algorithms that manipulate them. Key aspects of the core language are covered including major library functions and basic design and testing techniques. The module will be particularly suited to anyone who needs to understand how a computer can be controlled using software designed for a traditional Von-Neumann architecture. It is an introductory course in computer programming. Outline Content: Part I: Statements; types; operators; expressions; sequence; selection; iteration; arrays and strings. Part II: Functions; structs; pointers; variable scope and lifetime; header-files; libraries; separate compilation and linking; fundamental testing techniques Part III: Linked and contiguous storage; linear structures; ordered and unordered lists; searching and sorting Learning outcomes 1 Apply correctly each of the fundamental language components (including constants, types, variables, expressions, statements, control structures, and formatted IO). 2 Declare and use functions using pass-by-value and pass-by-reference parameters. 3 Define and use structured data types (including arrays, structures, and dynamically allocated data). 4 Structure programs using separately compiled units and header files. 5 Select appropriate algorithms for searching and sorting data and comment on their efficiency. 6 Design a suitable set of test data for a computer program. Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Other Coursework 2 hours 50% N 1,2,3 Unseen Exam 2 hours 50% Y 1,2,3,4,5,6 8

10 Notes Normally the other coursework component will take the form of two lab-based assessments. The first is designed to check understanding of basic language concepts and is normally a Blackboard test taking no more than an hour. The second test is design directory to check that the practical work has been undertaken and understood as such, it samples the practical work (either directly or indirectly) and may take the form of a viva voce to explain randomly selected practical exercises, or it may take the form of a time-constrained assessment based upon the practical exercises. The unseen examination checks programming ability and understanding of the theoretical aspects of the module. Expected Methods of Delivery Lectures will be used to introduce key practical and theoretical concepts. A series of demonstration lectures will be used to reinforce basic concepts and theories. Learning to write programs requires continuous practice using graded exercises. Practical C programming skills will be gained in weekly laboratory sessions: over the course of the module a large number and variety of C programming exercises will be undertaken. During the staffed lab sessions students will have the opportunity to get support with their programming exercises and receive verbal feedback on their progress. Computational Modelling Discrete mathematics is introduced as the foundational science underlying computing. In particular, students gain an understanding of logic, sets, tuples, relations and functions. The theoretical material is supported practically using a variety of declarative languages (providing a contrast with the imperative abstractions being covered on CTEC1401). Specifically, the relational abstraction is supported practically via SQL and this is contextualised by manipulating tables and realising queries using a practical database. The introduction of a functional language provides practical experience of functions, tuples and lists and permits the ideas of recursion (data and algorithms), composition and modularity to be presented succinctly and naturally. Students will apply mathematical models to represent a variety of real-world problems and translate these into appropriate computational solutions. Students will be introduced to the concepts of scientific reasoning, hypothesis generation and testing, and the principles of software testing. Topics include: 1. Numbers, logic, sets, tuples, relations 2. Relational programming: SQL; constructing, interrogating and modifying a small database 3. Functional programming: definitions; types; recursion; pattern matching; list processing. Composition and modularity. 4. Scientific reasoning: Hypothesis generation and testing 5. Principles of software testing 9

11 Learning outcomes 1 Develop and test scientific hypotheses. 2 Construct an appropriate test suite for a software component. 3 Construct and manipulate set-theoretical mathematical objects. 4 Write functions to perform calculations; process lists and tuples. 5 Write SQL to manipulate and interrogate a small database. 6 Develop functions using the concepts of type, data, algorithm, abstraction, composition and modularity. Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Other Coursework 50% N 2,4,5 Unseen Exam 50% Y 1,2,3,4,5,6 Notes Practical outcomes of the module are assessed by coursework assignments. The examination covers all parts of the syllabus, but will have a particular emphasis on assessing the understanding of theoretical aspects and their application. Examinations ensure the individuality of the assessment. Expected Methods of Delivery Lectures will be used to introduce the main topics. To gain full advantage of this module students are expected to hone their skills and understanding by working through progressive exercises. The exercises range from drill to problem solving tasks. The exercises provide the basis of tutorial and laboratory work. Students are expected to complete exercise in their own time. In tutorials students receive feedback on their progress, and engage in discussions on issues arising from the exercises. In laboratory sessions students gain practical experience by undertaking exercises that are designed to support the theoretical work. The department has well established bank of materials to support the mathematics part of the syllabus. 10

12 Elements of Computing This module is designed to provide a foundation in computer architecture, networks and operating systems with a specific emphasis on their security. Outline content: Theoretical foundations: Number systems, integer and real number representation, Syntax representation, finite state automata, Turing machines. Computer hardware: CPU components and operation, instruction sets, Computer architectures, Memory, Practical introduction to assembler programming. Systems software: Operating system fundamentals, processes, file systems, memory management, Shell scripting, Authentication and authorisation. Computer networks: Network architectures, data communication system fundamentals, Transmission schemes and technologies, error detection and management, Network components, LAN protocols, Internet protocols. Security issues: Network security, Operating system security, Architectural security. Learning outcomes 1 Explain computer hardware, software, operating systems and networking. 2 Demonstrate a practical knowledge of computer hardware, software, operating systems and networking. 3 Relate the abstract concepts of logic and number systems to their concrete representation on real machines. 4 Identify the security risks in common configurations of computer networks and suggest appropriate mitigations 5 Develop shell scripts 11

13 Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Examination 2 50 Y 1,2,3,4,5 Other Coursework 50 N 2,5 Notes Expected Methods of Delivery Lectures and tutorials will be used to introduce the main theoretical elements. Laboratory sessions will be used for practical application and experimentation. Computer Ethics, Law and Portfolio The module will introduce students to the ethical and moral basis which underpin our society. It will review how such ethical issues influence and shape the law. Students will be introduced to critical reflection on norms and will learn the basics of doing independent research. On the basis of the ethical foundations, students will be introduced to substantial and procedural law underpinning computing. Students will further develop their transferable skills by working within teams to construct a portfolio of evidence based upon research and practical application in a subject area set within the context of their programme of study. Outline content: 1 Ethics:- ethical and moral questions in forensic computing (introduction to ethics and morality, morality as an expression of social preferences, examples of moral problems in computing, intellectual property, privacy / surveillance, access, human - computer interaction), ethics as the theoretical reflection of morality (overview of ethical theory, classical Greek ethics, virtue ethics, deontology, teleology, ethical scepticism, modern approaches to ethics), application of ethical reasoning to moral cases, reading and understanding ethical texts 2. Foundation of the law:- historical development of legal systems, ethics, morality, and the law, sources of law (civil law, case law traditions, influence of the EU on UK law), understanding legal language, doing research in legal issues 3. Substantive Law in Computing:- introduction to computer crime, computer fraud, hacking - unauthorised access to computer materials, unauthorised modifications to computer data, piracy and related offences, computer pornography and harassment 12

14 4. Procedural Law in Forensic Computing:- introduction to forensic issues and computer crime, search and seizure of evidence of computer crime, interception of evidence of computer crime, preservation of evidence of computer crime, international harmonization and assistance in computer forensics. 5. Contextual lectures/seminars to support the development of the portfolios. Learning outcomes 1 recognise, contextualise and apply ethical arguments to cases relevant to computing 2 perform research to support arguments, 3 explain the relevant aspects of procedural and substantive law in a case involving ICT, 4 identify the most important statutes governing the use of ICT, 5 explain the correct procedures when handling digital evidence, 6 research, read and correctly interpret legal texts. 7 work as part of a team to investigate a topic relevant to their programme of study Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Coursework 100 Y 1,2,3,4,5,6 Notes Given the module's emphasis on critical understanding of ethical and legal issues in forensic computing and research skills, the assessment should be aimed at capturing the students' knowledge in these areas. therefore must cover a wide variety of topics but it must also test the practical and professional skills. This can best be done by coursework. Students will typically submit two major essays and a portfolio. Expected Methods of Delivery Core concepts will be introduced through conventional lectures. Students will develop their own ability to reason about legal and ethical concepts through formative essays and seminar discussions. Portfolio work will be supported by laboratory work and selected lectures. Guest lectures may be used to support some of the portfolio work. 13

15 Second Year Modules Organisations, Project Management and Research This module introduces the business contexts within which IT projects are procured and developed. This includes the feasibility of computer system development viewed from economic, technical, social, legal, and ethical perspectives. Students will develop an understanding of the roles of main organisational functions (including marketing, HR, finance) and the broader organisational structures in which they operate. The role of professional standards bodies and professional organisations is explained. Major components of the software lifecycle are considered from a theoretical perspective. The emphasis is on the overall process and comparing traditional and alternative lifecycle models. In this module specific emphasis is placed on two particularly important phases requirements analysis and maintenance. This will include a consideration of maintenance costs, system adaptation, and the management of the maintenance process. (The lifecycle phases of design and implementation are covered in more detail in other modules). The module covers risk factors during different phases of the lifecycle, and introduces students to the techniques used both to measure and to ensure software quality. These include software quality metrics, measures of reliability, software quality assurance standards, and issues of compliance. A variety of standard tools for supporting the management and development process are presented. A selection of supporting software tools will be used so that practical experience can be gained in their use. (For example, these may include version control, integrated development environments, documentation and project management tools.) Students will research an area relevant to their course of study and present their findings in a professional manner. (This may take the form, for example, of a research conference poster.) Learning Outcomes 1 Discuss the commercial and economic context of system development including the major phases of the lifecycle; the roles of the main organisational functions of a business organisation; and the role of professional standards bodies and professional organisations. 2 Describe the principal activities involved in performing a system requirements analysis. 3 Identify and assess appropriate risk factors involved in the management of software development projects. This includes a study of the factors affecting the feasibility of a software project. 4 Discuss the principal factors involved in ensuring software integrity including software quality assurance, and software maintenance. 5 Identify the major planning and staffing issues involved in Information Systems project management and recommend appropriate techniques and methods for a given project. 6 Undertake research into a relevant topic area and present the work to a professional standard. 14

16 Outline Content 1. The Business Context a. Commercial and economic context of IT b. Organisational structures c. Professional standards and professional bodies 2. The Software Lifecycle a. Traditional approaches (waterfall, V-model) b. Alternative approaches (e.g. agile, prototyping) c. Requirements analysis and project feasibility d. Software maintenance 3. Project Management a. The nature of the project, its components, risks, success factors and associated politics. b. Information Systems investment justifications. Approaches to investment appraisal. c. Identification and management of benefits. Assessing the intangibles. d. Organisation of systems development. Reporting structures. e. Project planning and control. Work breakdown structures. Estimation, budgeting, planning methods (PRINCE 2). f. Project administration. Tracking and reviewing. Configuration management and change control. g. Staff management, motivation, leadership. h. Quality Management. Standards and accreditation. i. Managing software project risks. j. Managing large-scale projects. Implementation and post-implementation review. 4. Software Development Tools a. Integrated Development Environments b. Version Control Tools c. Documentation Tools d. Management Support Tools 5. Research Project An area relevant to the student s course of study will be selected for research. The work will be presented to a professional standard. Type of Duration/ Final Minimum Essential Learning assessment volume weighting % assessment threshold mark % (if component outcome(s) assessed not 40%) Other 50% N 1,2,3,4,5,6 Coursework Unseen Exam 50% Y 1,2,3,4,5 15

17 Notes Students will typically undertake two pieces of coursework. The first piece will normally be a written report with the subject drawn from any of the main topics covered on the module. The second piece will be a piece of group work in which a topic will be researched and presented to a professional standard (this may, for example, take the form of a conference poster, or a report written in the style of an academic paper.) A two-hour examination will require students to demonstrate their understanding of the key concepts covered by the module. Expected Methods of Delivery A range of strategies will be used to facilitate student learning. Case studies with origins in the industry will be used as vehicles to enhance insight into key areas. Lectures will be used to introduce major topics, drawing together material from a variety of sources and providing the opportunity for interaction with short exercises. Tutorials will offer the opportunity for discussion of issues and will allow students to analyse different scenarios, focusing on particular systems building problems. Students will be expected to gain practical experience with a selection of software development support tools covered on the module. Students will be encouraged to read widely, using the reading list as a starting point and library resources and the Internet for further information. The coursework element of assessment will provide the opportunity for students to develop their research skills and their ability to communicate key findings and recommendations in a professional manner. The research and presentation assignment will take the form of a group activity. The Virtual Learning Environment (VLE) will provide essential module information such as a week by week teaching plan, copies of tutorial sheets so that students can prepare in advance, the reading list and assessment information. It will also be used to direct the students to useful sources of information and for essential updates such as drawing the students' attention to recently-published relevant papers. Forensics and Security This module develops the principles of forensics and the principles security as abstract concepts, then looks at two operating systems from two perspectives: Linux is studied from a security perspective with the overall aim of understanding how to make a Linux installation less vulnerable; Windows is studied from a forensic perspective with the overall aim of understanding what non-volatile digital residue is left which has evidential value. Learning Outcomes 1 Analyse how the principles of digital forensics should be or have been applied in a given context. 2 Identify the forensic significance of Windows operating system artefacts. 3 Perform a forensic investigation of a Windows device. 4 Analyse how the principles of digital security should be or have been applied in a given context. 16

18 5 Explain the major phases of the Linux boot sequence 6 Identify the major configuration settings that influence a machine's security posture. 7 Harden a Linux operating systems to suit various deployment scenarios such as a server operating in a DMZ or desktop workstation in a corporate environment. Outline Content 1. Principles of Digital Forensics: a. Handling of evidence, chain of custody, contemporaneous notes, ACPO guidelines, b. Cryptographic hashes in digital forensics, c. Validation and verification of tools and processes, d. Live vs dead system forensics, e. Forensic readiness 2. Principles of Digital Security: a. Confidentiality, integrity and availability, b. Security models, c. Trust, d. Policies, procedures, controls, governance, regulation and compliance. e. Cryptography 3. Windows Forensics: a. Important features of the system being investigated: Partitions, FAT and NTFS file systems, file data and meta data, present, deleted and overwritten files, the registry, hibernation files, b. Interpreting persistent artefacts, c. Order of volatility - what is lost when a live system is shut down, d. Tools with forensic value for preserving, analysing and interpreting. 4. Linux Security: a. Boot (grub) security b. Service management (rc.d file structure). c. CHROOT jails d. Apparmour (SELinux) e. /etc/ framework f. netstat / ps process management (kill etc). g. Java security policies. h. Monitoring and logging. i. Users groups permissions. Type of Duration/ Final Minimum Essential Learning assessment volume weighting % assessment threshold mark % (if component outcome(s) assessed not 40%) Other 50% N 2,3,6,7 Coursework Unseen Exam 2 50% Y 1,2,4,5,6 17

19 Notes Students will typically undertake two pieces of coursework: one relating to the forensic investigation of a Windows artefact, the other relating to the hardening of a Linux device The examination will require students to demonstrate their understanding of the key concepts covered by the module. Expected Methods of Delivery Virtualisation will pay a significant part in student learning on this module. Object- Oriented Software Design and Development Object-oriented software development is now the preferred approach of many established developers, typically using software tools based on Sun's Java 2 or Microsoft's.NET platforms. This module enables students to design and implement medium scale software systems using an object-oriented approach. The design notation used is the Unified Modelling Language (UML) and the implementation language is Java. It is essentially a programming module, with the emphasis on implementing OO designs. Students enrolling on this module will have a foundation in programming gained from the study of a Level 1 programming module. The first part of this module introduces UML and the Java language. Students learn how to write simple object-based programs, and how to exploit the extensive library packages provided by the Java 2 Software Development Kit (SDK). Fundamental OO concepts and design issues are discussed. Emphasis is placed on the design and structure of software, and the OO development process. UML is used to document designs, and the concept of software design patterns is introduced. Software quality, reliability, and maintainability are integral to the development of software, and these issues are discussed and applied as necessary. Outline Content: The Java programming language: Essential language constructs Ability to use the Java SDK API's Java collection classes, the data structures that underpin them, and using them to implement aggregations that appear in OO designs. A working knowledge of several programming domains, typically: GUI & event handling, exceptions, file handling, persistence, collections, utilities such as dates, formatting, tokenizing. It is not expected that all these features are covered in detail. By the end of the course students should have become more independent learners with the ability to learn features not covered in the course. OO software design: UML notation: class diagrams, collaboration diagrams, use 18

20 cases, state; relationship between an OO 'analysis' design and a program design; implementation of associations: composition and aggregation; user defined classes; data representation decisions; interfaces and abstraction. Identification and application of software architectures and design patterns as they arise in case studies. In particular: Model-View-Controller software architecture; Composite; Command; Decorator. Quality issues in software development, including: Documentation for maintainability and reusability, use of 'javadoc' tool; Unit and system testing; Correctness; Robustness; HCI issues. Learning outcomes 1 Use Java to implement standard object-oriented designs given in UML. 2 Use UML to document object-oriented designs. 3 Address issues of quality, maintainability, correctness, and robustness with respect to software design and development. 4 Make effective use the Java Software Development Kit Application Programming Interfaces. Type of assessment Duration/ volume weighting % Final assessment Minimum threshold mark % (if not 40%) Essential component Learning outcome(s) assessed Other Coursework 50% N 1, 3, 4 Unseen Examination 50% Y 1, 2, 3, 4 Notes The coursework assessments are based on formative work carried out in lab and tutorial classes. The earlier assignment is biased towards using Java effectively (outcome 1). The later assignment uses more advanced features of the JDK (outcome 4) and additionally expects consideration of design issues (outcome 1) and quality issues (as outlined in learning outcome 3). The examination will verify a student's individual ability to write essential Java code (outcome 1); and their understanding of basic UML notation (outcome 2); and to demonstrate their understanding of OO implementation issues (outcomes 1 and 2); 19

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

LOUGHBOROUGH UNIVERSITY

LOUGHBOROUGH UNIVERSITY LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical

More information

Students who successfully complete the Health Science Informatics major will be able to:

Students who successfully complete the Health Science Informatics major will be able to: Health Science Informatics Program Requirements Hours: 72 hours Informatics Core Requirements - 31 hours INF 101 Seminar Introductory Informatics (1) INF 110 Foundations in Technology (3) INF 120 Principles

More information

LONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing

LONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing LONDON SCHOOL OF COMMERCE Programme Specification for the Cardiff Metropolitan University BSc (Hons) in Computing Contents Programme Aims and Objectives Programme Structure Programme Outcomes Mapping of

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information

Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information 1 Awarding Institution / body: Lancaster University 2a Teaching institution: University

More information

School of Computer Science

School of Computer Science School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Course record information Name and level of final award: Name and level of intermediate awards: The BSc (Hons) Computer Science is a B.Sc. BSc (Hons) Computer Science with Industrial

More information

Diploma Of Computing

Diploma Of Computing Diploma Of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

Programme Specification

Programme Specification LOUGHBOROUGH UNIVERSITY Programme Specification Information Technology & Physics Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes

More information

Course Descriptions. preparation.

Course Descriptions. preparation. Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

Programme Specification and Curriculum Map for BSc (Hons) Computer Forensics

Programme Specification and Curriculum Map for BSc (Hons) Computer Forensics Programme Specification and Curriculum Map for BSc (Hons) Computer Forensics 1. Programme title Computer Forensics 2. Awarding institution Middlesex University 3. Teaching institution 4. Programme accredited

More information

MSc Information Technology - E521

MSc Information Technology - E521 MSc Information Technology - E521 1. Aims and Objectives This conversion programme targets non-engineering graduates with a view of preparing them for the employment market where up-to-date IT skills represent

More information

School of Computer Science

School of Computer Science Computer Science Honours Level 2013/14 August 2013 School of Computer Science Computer Science (CS) Modules CS3051 Software Engineering SCOTCAT Credits: 15 SCQF Level 9 Semester: 1 This module gives a

More information

ASTON UNIVERSITY PROGRAMME SPECIFICATION

ASTON UNIVERSITY PROGRAMME SPECIFICATION ASTON UNIVERSITY PROGRAMME SPECIFICATION Programme Title UCAS/JACS Code School/Subject Area Final Award Interim Awards Mode(s) of Study Normal Length of Programme Electronic Engineering and Computer Science

More information

Henley Business School at Univ of Reading. Henley Business School Board of Studies for

Henley Business School at Univ of Reading. Henley Business School Board of Studies for BA Business and Management For students entering Part 1 in 2013/4 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

Computer and Information Sciences

Computer and Information Sciences Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

BA Management and Business (3 year) For students entering Part 1 in 2011/2. Henley Business School at Univ of Reading

BA Management and Business (3 year) For students entering Part 1 in 2011/2. Henley Business School at Univ of Reading BA Management and Business (3 year) For students entering Part 1 in 2011/2 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

PROGRAMME DETAIL SPECIFICATION. Programme Summary

PROGRAMME DETAIL SPECIFICATION. Programme Summary PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university Liverpool John Moores University 3a Programme accredited by: 3b

More information

Programme Specification (Undergraduate) Date amended: 28 August 2015

Programme Specification (Undergraduate) Date amended: 28 August 2015 Programme Specification (Undergraduate) Date amended: 28 August 2015 1. Programme Title(s) and UCAS code(s): BSc Mathematics and Actuarial Science (including year in industry option) 2. Awarding body or

More information

Computer Science Course Descriptions Page 1

Computer Science Course Descriptions Page 1 CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,

More information

Programme Specification for the. Cardiff Metropolitan University. Master of Science (MSc) in Information Technology

Programme Specification for the. Cardiff Metropolitan University. Master of Science (MSc) in Information Technology LONDON SCHOOL OF COMMERCE Programme Specification for the Cardiff Metropolitan University Master of Science (MSc) in Information Technology Contents Programme Aims and Objectives 3 Programme Structure

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2015/6 - August 2015 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

BSc (Hons) Computer Animation

BSc (Hons) Computer Animation BSc (Hons) Computer Animation Programme Specification EDM-DJ-08/2014 Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and

More information

Programme Specification and Curriculum Map for BSc Honours Information Technology

Programme Specification and Curriculum Map for BSc Honours Information Technology Programme Specification and urriculum Map for Sc Honours Information Technology 1. Programme title Sc Honours Information Technology 2. warding institution Middlesex University 3. Teaching institution

More information

DIABLO VALLEY COLLEGE CATALOG 2014-2015

DIABLO VALLEY COLLEGE CATALOG 2014-2015 COMPUTER SCIENCE COMSC The computer science department offers courses in three general areas, each targeted to serve students with specific needs: 1. General education students seeking a computer literacy

More information

CCA CYBER SECURITY TRACK

CCA CYBER SECURITY TRACK CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014

More information

PROGRAMME DETAIL SPECIFICATION. Programme Summary

PROGRAMME DETAIL SPECIFICATION. Programme Summary PROGRAMME DETAIL SPECIFICATION Programme Summary 1 Awarding institution Liverpool John Moores University 2 Teaching institution university LIVERPOOL JOHN MOORES UNIVERSITY 3a Programme accredited by: 3b

More information

The University s course specification template has been developed to fulfil three main functions; it shall act:

The University s course specification template has been developed to fulfil three main functions; it shall act: LONDON METROPOLITAN UNIVERSITY Course Specification BSc BIT The University s course specification template has been developed to fulfil three main functions; it shall act: as a source of information for

More information

M.S. Computer Science Program

M.S. Computer Science Program M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer

More information

Honours Degree (top-up) Business Abbreviated Programme Specification Containing Both Core + Supplementary Information

Honours Degree (top-up) Business Abbreviated Programme Specification Containing Both Core + Supplementary Information Honours Degree (top-up) Business Abbreviated Programme Specification Containing Both Core + Supplementary Information 1 Awarding Institution / body: Lancaster University 2a Teaching institution: University

More information

2015 2016 fashion pre-masters programme

2015 2016 fashion pre-masters programme 2015 2016 fashion pre-masters programme fashion pre-masters programme 02 1. Award Programme: Mode of delivery: 2. Entry Route: Progression to: Fashion Pre-Masters Full time Fashion Pre-Masters Master in

More information

Henley Business School at Univ of Reading. Henley Business School Board of Studies for

Henley Business School at Univ of Reading. Henley Business School Board of Studies for BA Business and Management For students entering Part 1 in 2014/5 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

BSc Business Information Technology For students entering Part 1 in 2008/9

BSc Business Information Technology For students entering Part 1 in 2008/9 BSc Business Information Technology For students entering Part 1 in 2008/9 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

BSc Management with Information Technology For students entering Part 1 in 2012/3. Henley Business School at Univ of Reading

BSc Management with Information Technology For students entering Part 1 in 2012/3. Henley Business School at Univ of Reading BSc Management with Information Technology For students entering Part 1 in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date

More information

Teaching, Learning and Assessment Policy

Teaching, Learning and Assessment Policy Teaching, Learning and Assessment Policy The purpose of this policy document is to explain the School of Psychology s strategy regarding teaching, learning and assessment and how the School seeks to develop

More information

Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification

Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification Birmingham City University Faculty of Technology, Engineering and the Environment Undergraduate Programme Programme Specification Date of Course Approval/Review Version Number Version Date 7 May 2009 3.03

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

BSc Business Information Technology For students entering Part 1 in 2005

BSc Business Information Technology For students entering Part 1 in 2005 BSc Business Information Technology For students entering Part 1 in 2005 UCAS code: N2G5 Awarding Institution: The University of Reading Teaching Institution: The University of Reading Relevant QAA subject

More information

Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games

Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games 1. Programme title BSc Honours Computing, Graphics and Games 2. Awarding institution Middlesex University 3. Teaching

More information

Division of Mathematical Sciences

Division of Mathematical Sciences Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree

More information

Programme Specification and Curriculum Map for MSci Sports Informatics & Data Analytics

Programme Specification and Curriculum Map for MSci Sports Informatics & Data Analytics Programme Specification and Curriculum Map for MSci Sports Informatics & Data Analytics 1. Programme title MSci in Sports Informatics & Data Analytics 2. Awarding institution Middlesex University 3. Teaching

More information

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6) Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6) Programme Structure STAGE ONE This stage makes up the Diploma in Information Technology (Level 5) 120

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

MSc in Computer and Information Security

MSc in Computer and Information Security MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

Development. G450 Multimedia Computing Science. Part time: COM5014

Development. G450 Multimedia Computing Science. Part time: COM5014 Programme Specification Programme Title: HND Computing and Website Development Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s):

More information

BSc Management with Information Technology For students entering Part 1 in 2015/6. Henley Business School at Univ of Reading

BSc Management with Information Technology For students entering Part 1 in 2015/6. Henley Business School at Univ of Reading BSc Management with Information Technology For students entering Part 1 in 2015/6 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching

More information

Core Syllabus. Version 2.6 B BUILD KNOWLEDGE AREA: DEVELOPMENT AND IMPLEMENTATION OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 B BUILD KNOWLEDGE AREA: DEVELOPMENT AND IMPLEMENTATION OF INFORMATION SYSTEMS. June 2006 Core Syllabus B BUILD KNOWLEDGE AREA: DEVELOPMENT AND IMPLEMENTATION OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6,

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing

More information

Master of Science in Software Engineering (MSC)

Master of Science in Software Engineering (MSC) Master of Science in Software Engineering The MSc in Software Engineering provides a thorough grounding in how to apply rigorous engineering principles to deliver elegant, effective software solutions

More information

UNIVERSITY OF ULSTER: COLERAINE PROGRAMME SPECIFICATION. COURSE TITLE: B.Sc. (HONS) SOCIAL PSYCHOLOGY/ B.Sc. (HONS) SOCIAL PSYCHOLOGY with DPP

UNIVERSITY OF ULSTER: COLERAINE PROGRAMME SPECIFICATION. COURSE TITLE: B.Sc. (HONS) SOCIAL PSYCHOLOGY/ B.Sc. (HONS) SOCIAL PSYCHOLOGY with DPP 25 UNIVERSITY OF ULSTER: COLERAINE PROGRAMME SPECIFICATION COURSE TITLE: B.Sc. (HONS) SOCIAL PSYCHOLOGY/ B.Sc. (HONS) SOCIAL PSYCHOLOGY with DPP PLEASE NOTE: This specification provides a concise summary

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: JACS Code: Forensic Investigation

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce 2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Henley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for

Henley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for BA Accounting and Business For students entering Part 1 in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

Diploma of Website Development

Diploma of Website Development Diploma of Website Development Program Description The BHCK Diploma of Website Development provides the skills and knowledge for a graduate to design, build and manage websites as an independent web developer

More information

BSc (Honours) Multimedia Computing and Animation BSc (Honours) Multimedia Computing and Animation with Foundation. Programme Specification 2011/12

BSc (Honours) Multimedia Computing and Animation BSc (Honours) Multimedia Computing and Animation with Foundation. Programme Specification 2011/12 BSc (Honours) Multimedia Computing and Animation BSc (Honours) Multimedia Computing and Animation with Foundation Programme Specification 2011/12 PROGRAMME SPECIFICATION Course Record Information Name

More information

Programme Specification and Curriculum Map for BSc Honours Computer Networks (Network Programming)

Programme Specification and Curriculum Map for BSc Honours Computer Networks (Network Programming) Programme Specification and Curriculum Map for BSc Honours Computer Networks (Network Programming) 1. Programme title BSc Honours Computer Networks (Network Programming) 2. Awarding institution Middlesex

More information

MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES FIELD 050: COMPUTER SCIENCE

MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES FIELD 050: COMPUTER SCIENCE MICHIGAN TEST FOR TEACHER CERTIFICATION (MTTC) TEST OBJECTIVES Subarea Educational Computing and Technology Literacy Computer Systems, Data, and Algorithms Program Design and Verification Programming Language

More information

Programme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute:

Programme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute: Programme Specification BSc (Hons) Computer Networks and Security with Foundation Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s):

More information

QAA Subject Benchmarking Group: Business and Management (2007)

QAA Subject Benchmarking Group: Business and Management (2007) MSc in Facilities Management (for External Students) For students entering in 2012 Awarding Institution: The University of Reading Teaching Institution: The College of Estate Management QAA Subject Benchmarking

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Henley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for

Henley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for BA Accounting and Business For students entering Part 1 in 2014/5 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

Henley Business School at Univ of Reading. Chartered Institute of Management Accounting (CIMA) Certificate Level (C01 to C05)

Henley Business School at Univ of Reading. Chartered Institute of Management Accounting (CIMA) Certificate Level (C01 to C05) MSc Accounting and International Management (full-time) For students entering in 2015/6 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length:

More information

CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)

CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html

More information

Henley Business School at Univ of Reading. Postgraduate Pre-Experience Board of Studies

Henley Business School at Univ of Reading. Postgraduate Pre-Experience Board of Studies MSc in Accounting and Financial Management For students entering in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

Nottingham Trent University Course Specification

Nottingham Trent University Course Specification Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: Science & Technology, Clifton campus 3. Final Award, Course

More information

Programme Specification and Curriculum Map for MSc Computer and Network Security

Programme Specification and Curriculum Map for MSc Computer and Network Security Programme Specification and Curriculum Map for MSc Computer and Network Security 1. Programme title MSc Computer and Network Security 2. Awarding institution Middlesex University 3. Teaching institution

More information

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Doctorate in Clinical Psychology. This specification is valid for new entrants and current students from September

More information

BSc (Honours) Computing and Information Systems (Distance Learning)

BSc (Honours) Computing and Information Systems (Distance Learning) BSc (Honours) Computing and Information Systems (Distance Learning) Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information

More information

Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification

Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification Birmingham City University Faculty of Technology, Engineering and the Environment Undergraduate Programme Programme Specification BSc (Hons) Computer Networks and Security Date of Course Approval/Review

More information

Cleveland College of Art & Design BA (Hons) Fashion Enterprise Programme Handbook 2013-2014 1

Cleveland College of Art & Design BA (Hons) Fashion Enterprise Programme Handbook 2013-2014 1 Cleveland College of Art & Design BA (Hons) Fashion Enterprise Programme Handbook 2013-2014 1 BA (Hons) Fashion Enterprise Programme Handbook 2013-2014 Your Programme Handbook provides you with a range

More information

Henley Business School at Univ of Reading

Henley Business School at Univ of Reading MSc in Marketing and International Management For students entering in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of

More information

Henley Business School at Univ of Reading. Henley Business School Board of Studies for

Henley Business School at Univ of Reading. Henley Business School Board of Studies for BSc in Accounting and Finance For students entering Part 1 in 2014/5 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

Birmingham City University Faculty of Computing, Engineering and the Built Environment. Undergraduate Programme. Programme Specification

Birmingham City University Faculty of Computing, Engineering and the Built Environment. Undergraduate Programme. Programme Specification Birmingham City University Faculty of Computing, Engineering and the Built Environment Undergraduate Programme BSc (Hons) Digital Media Technology Date of Course Approval/Review Version Number Version

More information

Course Descriptions. CS 101 Intro to Computer Science

Course Descriptions. CS 101 Intro to Computer Science Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

Programme Specification and Curriculum Map for BSc Honours Network Management and Security

Programme Specification and Curriculum Map for BSc Honours Network Management and Security Programme Specification and Curriculum Map for BSc Honours Network Management and Security 1. Programme title BSc Honours Network Management and Security 2. Awarding institution Middlesex University 3.

More information

1. Programme title and designation Advanced Software Engineering

1. Programme title and designation Advanced Software Engineering PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Advanced Software Engineering 2. Final award Award Title Credit Value MSc Advanced Software Engineering

More information

Computer Security and Forensics

Computer Security and Forensics SCHOOL OF COMPUTING & MATHEMATICAL SCIENCESB Computer Security and Forensics BSc Hons Greenwich Campus www.gre.ac.uk/cms Why study this programme? This degree will equip you to become an ICT professional

More information

Computer Science. Computer Science 213. Faculty and Offices. Degrees and Certificates Awarded. AS Computer Science Degree Requirements

Computer Science. Computer Science 213. Faculty and Offices. Degrees and Certificates Awarded. AS Computer Science Degree Requirements Computer Science 213 Computer Science (See Computer Information Systems section for additional computer courses.) Degrees and Certificates Awarded Associate in Science Degree, Computer Science Certificate

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

INFORMATION TECHNOLOGY (INFO)

INFORMATION TECHNOLOGY (INFO) INFORMATION TECHNOLOGY (INFO) This is a list of the Information Technology (INFO) available at KPU. Please note: Access to 1000-level is limited to Bachelor of Technology in Information Technology, Computer

More information

Computer Science. 232 Computer Science. Degrees and Certificates Awarded. A.S. Degree Requirements. Program Student Outcomes. Department Offices

Computer Science. 232 Computer Science. Degrees and Certificates Awarded. A.S. Degree Requirements. Program Student Outcomes. Department Offices 232 Computer Science Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface

More information