Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security
|
|
- Suzan Lloyd
- 8 years ago
- Views:
Transcription
1 OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes GCHQ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptions under other UK information legislation. Refer disclosure requests to GCHQ on x30306, infoleg@gchq.gsi.gov.uk
2 Welcome and Introductions Michael Kirton
3 Describe academic engagement programme motivation for setting up Master s certification application process and criteria Outline certification terms and conditions Answer questions and receive feedback Aims of Meeting
4 : Cyber security education and skills programmes, C. Ensor Agenda : Q&A session : Master s applications and criteria, M. Kirton : Q&A Session : Break : Outline of certification terms and conditions, E. England : Q&A Session : Next steps, G. Dykes : Q&A session 4
5 Housekeeping Meeting is not classified Fire alarm, toilets Slides
6 Cyber Security Skills Chris Ensor, Deputy Director National Technical Authority for Information Assurance WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK
7 03/06/ Government Code and Cipher School established within FCO 1939 GCCS moves to Bletchley Park 1946 GCCS moves to Eastcote as GCHQ Intelligence arm moves to Cheltenham Security arm merges with GPO research and becomes CESD 1973 CESD becomes CESG and merges back with GCHQ 1978 CESG moves to Cheltenham 1994 GCHQ recognised under the Intelligence Services Act
8 GCHQ & Academia UK GCHQ needs Academia to support its security mission Enhancing UK NTA knowledge base through original research Providing NTA with top quality people UK Providing effective education and training. make the UK a safe place to do business in Cyber Space
9 NCSS and Our Objectives
10
11 Developing the Workforce of the Future Develop a Cyber Security Profession Outcome 1: There is an increased pipeline of a cyber capable workforce Cyber Security GCSE Cyber Security A Level Cyber & Cipher Challenges Apprenticeships (e-skills UK) Internships (e-skills UK) Certified Masters Bursaries (CSSA) Head of Profession Heads of Specialism Skills Framework CESG Certified Professional Learning Pathways (e-skill UK) Certified Training Outcome 2: There is a sustained supply of competent cyber security professionals available, adequate to meet growing demand levels ACE - CSE Increase Cyber Security Research Influence Associated Professions Outcome 4: UK is recognised as having a leading edge cyber security research capability that can be exploited where appropriate ACE-CSRs Research Institutes Funded PhDs Centres for Doctoral Training Project management Software engineering Procurement Legal Audit Outcome 3: Appropriate cyber security knowledge is part of the day job for relevant noncyber security professionals across the public and private sectors
12 Areas of Excellence Cryptography, Key Management and Security Protocols Information Risk Management Hardware Engineering Information Assurance Methodologies Operational Assurance Techniques Strategic Technologies and Products Electromagnetic Physics and Security Engineering processes and assurance
13 ACE Cyber Security Research
14 PhDs 1 st Tranche Bristol - Authentication, Ciphers, and Encryption Cryptographically Secure and Relevant - Information leakage aware verification Imperial - Joint Modelling of Edge Evolution in Dynamic Graphs Lancaster - Social and Technical Objects for Resilience and Cyber Security (STORC) Oxford - Combining Binary and Source Analysis for Scalable Exploit Generation Queen s - Novel Application of Advanced Machine Learning Techniques for use in Side Channel Attacks RHUL - Randomness in Complexity - Theory Meets Practice - Computational Algebra Approach to Learning with Errors UCL - Measuring and Influencing Cyber Security Risk Perceptions
15 PhDs 2 nd Tranche Birmingham - BaDSeED: Backdoor Detection Systems for Embedded Devices Bristol - Secure Application Programming Interfaces for Key Management - Game Theory of Cryptographic Threat Mitigation Cambridge - Model-Based Assessment of Compromising Emanations Lancaster - Weak Signals as Predictors of Sophisticated Social Engineering Attacks Newcastle - Scalability of Attacks in Identity Federation Leading to Cyber Threats Oxford - Graceful Security Degradation - Realistic, Strong and Provable Key Exchange Security RHUL - Cryptobugs Detecting Incorrect Use of Cryptographic Routines UCL - Towards a Discipline of Traffic Analysis - Access Control: Models and Compliance
16 Centres for Doctoral Training
17 Research Institutes Filling the excellence gaps RI1 - The Science of Cyber Security 2M GCHQ & 1.8M EPSRC How secure is my organisation? How do we make better security decisions? RI2 - Automated Program Analysis and Verification 2M GCHQ & 2.5M EPSRC Program analysis and verification for Binaries, source code, JavaScript and other mobile code RI3 Trustworthy Industrial Control Systems CPNI & EPSRC
18 The Science of Cyber Security
19 Automated Program Analysis and Verification
20 Trustworthy Industrial Control Systems
21 e-skills UK Cyber Apprenticeships Cyber Module A-level Trustworthy Software Initiative Schools cipher challenge Cyber Industry Internships Cyber Module GCSE Cyber in IT Management for Business Academic Centres of Excellence for Education MSc Certification Research Institutes CDTs 4/15/2014 GCHQ Funded PhDs
22 03/06/2013 ACE Cyber Security Education Identify universities taking a holistic approach to education in cyber security subjects. Based on offering at least one suitably recognised Undergraduate or Postgraduate qualification First step will need to establish a scheme for recognising relevant qualifications, starting with Master s.
23 03/06/2013 The right Master s qualification in a relevant area of Cyber Security provides: Mid career bridge STEM bridge Top-up Research bridge Why Start with Master s?
24 Thank You.
25 Q&A Session 1
26 Master s Applications and Criteria Michael Kirton
27 Background pan-government strategy BIS, OCSIA start with general Master s map indicative topics to IISP Framework not define syllabus started drafting call document in October 2013 extensive consultation with stakeholders 6 drafts for internal and external review
28 Call document main section + 4 appendices key sections scope: section 3 appendix B: topic coverage appendix D: application structure for full certification appendix E: application structure for provisional certification
29 Scope one-year postgraduate Master s degrees or part-time equivalent cyber security: sole or main focus at least 80% of taught modules can be mapped to Security Disciplines A to H breadth of coverage at least 10 of the Skills Groups (i to xiii) covered substantial original research component
30 Full certification student cohort completed in running in external examiner s report available for Provisional certification running in ; no cohort completed in start by October 2015
31 Full application letter of support (scored) sections C.2 to C.6 description of the applicant description of the Master s degree in cyber security assessment materials and external examiner s report original research dissertations student numbers and grades achieved
32 Provisional application letter of support (scored) sections D.2 to D.5 description of the applicant description of the Master s degree in cyber security assessment materials original research dissertations
33 Scoring 0: no evidence 1: very little evidence 2: some evidence 3: good evidence 4: excellent evidence each scored section must achieve a threshold score of 3
34 General suggestions address the points in the call document e.g., section 2: 2a, 2b,. 2f observe the page limits CVs off the shelf may not be suitable some customisation to the call may be necessary
35 Criteria - 1. HEI s letter of support for the application not scored use it wisely
36 Criteria 2. Description of the applicant coherent team team members with the appropriate knowledge and skills supported by the HEI Master s course regularly reviewed and kept up to date students have access to well-equipped computer laboratories
37 Criteria 3. Description of the Master s degree in cyber security quite a lot of detailed information required scope 80% of taught modules can be mapped to Security Disciplines taught modules cover at least 10 of the Skills Groups indicative topic coverage in Skills Group appendix B, point d, page 12 not required to cover all [indicative topics] explicitly sufficient weight of coverage..
38 Criteria 3. Description of the Master s degree in cyber security permitted combinations that do/do not satisfy scope identified research component > 45% of credits need to show remainder of degree adequately covers the Skills Groups
39 Criteria 4. Assessment materials and external examiner s report rigorous assessment of students knowledge external examiner full certification appropriate technical background positive report
40 Criteria 5. Original research dissertations well-defined process for allocation and monitoring well-defined and rigorous process for assessment dissertation topics must be in one or more Security Disciplines full certification representative dissertations full certification grade awarded should be appropriate research component < 25% need to show students gain sufficient understanding and experience of undertaking original research
41 Criteria 6. Student numbers and grades achieved full certification application expect majority of students to have 2-i STEM degree and/or relevant experience expect grade distribution to some extent reflect experience and entry qualifications consult with external examiner s report positive student survey results
42 Assessment process assessment panel meeting membership: academia, GCHQ, industry, wider government each proposal read by at least 3 panel members at least one academic agree consensus score for each scored section successful application HEI s letter of support threshold score or above for each scored section no prioritisation all who meet criteria achieve certification
43 Q&A Session 2 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptions under other UK information legislation. Refer disclosure requests to GCHQ on x30306, infoleg@gchq.gsi.gov.uk
44 Break This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptions under other UK information legislation. Refer disclosure requests to GCHQ on x30306,
45 Outline of Certification Terms and Conditions Ellie England Senior Commercial Manager
46 T&Cs characteristics Successful applicants will need to agree to T&Cs based on ACE-CSR T&Cs which 11 universities have signed Branding licence HEI can use the Marks to indicate certification non-exclusive, royalty free, revocable, worldwide, non-transferable Continuing obligations maintain standards inform GCHQ of any significant change provide information on student numbers etc.
47 T&Cs characteristics Term full certification: 5 years unless ended earlier if HEI seriously breaches T&Cs and breach can t be remedied provisional certification: from award until receipt of the full certification application time limit from first cohort finishing to submission of full application General no ability to assign confidentiality dispute resolution
48 Full Certification Mark
49 Provisional Certification Mark
50 Q&A Session 3
51 Next Steps Graeme Dykes
52 Next Steps Submitting Applications submission deadline 20 th June 2014, the relevant application documents to: Content beyond the prescribed limits will not be reviewed Application questions to be ed in, there will be FAQs in the CESG web site: Retrospective student awards
53 Next Steps Assessment Panel Will meet in July All qualifying applications will be reviewed Universities will be informed of the result Subject to agreeing the T&Cs National press announcement Individual press announcements
54 Next Steps Future Calls Plan to issue 2 nd call in autumn 2014 To include Master s with narrower focus 3 rd call early 2015 Considering Integrated Master s
55 Next Steps Future Plans Recognition of ACE-CSEs call late 2014 Criteria Consultation on-going Holistic view of the university To work with partners to manage the certification process IET & BCS
56 Q&A Session 4
57 Close This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptions under other UK information legislation. Refer disclosure requests to GCHQ on x30306,
Certification of Master s Degrees in Digital Forensics
Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 27 February 2015, 16:00 Briefing Meeting: 14 January 2015, 13:00 Portions
More informationCertification of Masters Degrees Providing a General, Broad Foundation in Cyber Security
Certified Masters in Cyber Security Certification of Masters Degrees Providing a General, Broad Foundation in Cyber Security Call for Applications Closing Date: 20 June 2014, 16:00 Briefing Meeting: 14
More informationCertification of Master s Degrees Providing a General, Broad Foundation in Cyber Security
Certified Master s in Cyber Security Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Call for Applications Closing Date: 27 February 2015, 16:00 Briefing Meeting:
More informationCertification of Master s Degrees in Digital Forensics
Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information
More informationCertification of Master s Degrees in Computer Science for Cyber Security
Certified Master s in Cyber Security Certification of Master s Degrees in Computer Science for Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015,
More informationCertification of Master s Degrees in Digital Forensics
Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information
More informationCertified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security
Certified Master s in Cyber Security Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certification of Master s Degrees in Digital Forensics Questions and Answers
More informationCertified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security
Certified Master s in Cyber Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Questions and Answers from Briefing Day held on 14 th April 2014 1. To what extent is an undergraduate
More informationCertification of Integrated Master s Degrees in Computer Science and Cyber Security
Certified Master s in Cyber Security Certification of Integrated Master s Degrees in Computer Science and Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05
More informationCESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
More informationCertification of Integrated Master s Degrees in Computer Science and Cyber Security
Certified Master s in Cyber Security Certification of Integrated Master s Degrees in Computer Science and Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05
More informationMSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
More informationCyber Security Skills. Business perspectives and Government s next steps
Cyber Security Skills Business perspectives and Government s next steps March 2014 Contents Foreword... 3 Executive Summary... 4 Chapter 1: Introduction... 8 Chapter 2: Key Findings... 11 Chapter 3: NCSP
More informationCyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives
Cyber Security Skills: a guide for business Getting involved with skills, knowledge and capability initiatives March 2014 Contents Introduction... 3 Index... 4 Initiatives supporting schools... 5 Initiatives
More informationThe UK Cyber Security Strategy. Report on progress December 2012. Forward Plans
The UK Cyber Security Strategy Report on progress December 2012 Forward Plans We are at the end of the first year of meeting the objectives outlined in the National Cyber Security Strategy. A great deal
More informationScheme to Recognise Academic Centres of Excellence in Cyber Security Research
Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Call type: Invitation for Applications Closing date: 16 December 2011, 16:00 Briefing meeting date 1 : 15 November 2011 Summary
More informationWhy compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards
Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Management of Information Security and Risk
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Masters in Management of Information Security and Risk Award MSc School School of Mathematics, Computer Science and Engineering
More informationCyber Security in the University of Oxford: Collaborating without Conforming?
Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Information Security and Risk
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Masters in Information Security and Risk Award MSc School Informatics Department or equivalent Centre for Software Reliability Programme
More informationESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationApplication Guidance CCP Penetration Tester Role, Practitioner Level
August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing
More informationCESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS
CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS QUESTION General What is the Cyber Security Incident Response (CSIR) Scheme? What is the Cyber Incident Response (CIR) scheme? Why have
More informationNettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
More information------------------------------------------------------------------------------------------------------------------------
WRITTEN MINISTERIAL STATEMENT CABINET OFFICE 3 RD DECEMBER 2012 Minister for the Cabinet Office and Paymaster General: Progress on the UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital
More informationProfessor John McCanny CBE FRS FREng
Foundation for Science and Technology-debate How can UK intellectual property be better protected from cyber theft". Professor John McCanny CBE FRS FREng Research Challenges Everyday we create 2.5 quintillion
More informationPart-time MSc in Cyber Security from Northumbria University. masters.qa.com
Part-time MSc in Cyber Security from Northumbria University masters.qa.com Thank you for your interest in Northumbria University s part-time MSc in Cyber Security programme, delivered in Central London
More informationProgramme Specification for the MSc in Computing (<Specialism>)
Programme Specification for the MSc in Computing () include: Artificial Intelligence; Computational Management Science; Distributed Systems; Software Engineering and Visual Information
More informationMSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time
MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department
More informationProgramme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.
More informationHow To Help Cyber Security
Cyber Security Skills: a guide for business Getting involved with skills and research initiatives December 2014 2 Contents Introduction... 3 Executive Summary... 4 Initiatives supporting schools... 8 Secure
More informationHigher Education Commission Postgraduate Education Inquiry. Response from the Council for the Mathematical Sciences
Higher Education Commission Postgraduate Education Inquiry Response from the Council for the Mathematical Sciences About the Council for the Mathematical Sciences (CMS) The CMS (www.cms.ac.uk) was established
More informationAustralia. CREST in. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. September 2013. Also Inside
Script The September 2013 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST CREST in Australia Also Inside Update from Ian Glover CESG and CPNI launch new schemes CRESTCon 2014 The CCP Report New Members
More informationIT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
More informationProgramme Specification and Curriculum Map for MSc Data and Knowledge Engineering
Programme Specification and Curriculum Map for MSc Data and Knowledge Engineering 1. Programme title Data and Knowledge Engineering 2. Awarding institution Middlesex University 3. Teaching institution
More informationESKISP6064.03 Conducts vulnerability assessment under supervision
Conducts vulnerability assessment under supervision Overview This standard covers the competencies required to conduct vulnerability assessments under supervision. This includes following processes for
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Project Management, Finance and Risk
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Project Management, Finance and Risk Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School
More informationBriefing note: GCHQ Internships
Briefing note: GCHQ Internships GCHQ 1 is developing new capabilities in partnership with Industry and Academic Researchers to pursue their cyber security. GCHQ is partnering with the Smith Institute 2
More informationProgramme Specification: MSc Electronic Commerce
Programme Specification: MSc Electronic Commerce 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification MSc 5. Programme
More informationUNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION Version 1.0 Crown Copyright 2012 All Rights Reserved Page 1 Document History Version Date Description 0.1 June 2012 Initial Draft Version 1.0 July
More informationProgramme Specification May 2012
Faculty of Business Computing and Law Programme Specification May 2012 MSc Accounting and Finance Valid from September 2012 JACS code N400/N300 Programme code Valid for delivery at University of Derby
More informationProgramme Specification
Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Clinical Research Award Masters in Research (MRes) School Health Sciences Department or equivalent Division of Health Services Research
More informationHEE/NIHR Integrated Clinical Academic (ICA) Programme for Non-Medical/Dental Healthcare Professionals
HEE/NIHR Integrated Clinical Academic (ICA) Programme for Non-Medical/Dental Healthcare Professionals Invitation to Tender for Masters in Clinical Research Studentships Introduction Health Education England
More informationA Guide to the Cyber Essentials Scheme
A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane
More informationESKISP6046.02 Direct security architecture development
Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable
More informationSchool of Mathematics, Computer Science and Engineering Department or equivalent School of Engineering and Mathematical Sciences Programme code
PROGRAMME SPECIFICATION KEY FACTS Programme name Systems and Control Award MSc School School of Mathematics, Computer Science and Engineering Department or equivalent School of Engineering and Mathematical
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Library Science Award MSc/MA School Mathematics, Computer Science and Engineering Department or equivalent Department of Library
More informationApril 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level
April 2015 Issue No:1.0 Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level Application Guidance CCP Security and Information Risk Advisor Role, Practitioner Level
More informationCyber Security skills: Business perspectives and Government s next steps. Supporting Evidence
Cyber Security skills: Business perspectives and Government s next steps Supporting Evidence 1 Contents Purpose of this Document... 3 Workshops... 4 Chapter 1: Questionnaire Outputs... 5 Chapter 2: Workshop
More informationTHE EDUCATION FRAMEWORK FOR UNDERGRADUATE PROGRAMMES
THE EDUCATION FRAMEWORK FOR UNDERGRADUATE PROGRAMMES INDEX REFERENCE SUBJECT PAGE REFERENCE Section 1 General Information about the CIOB Page 4 1.1 About the CIOB Page 4 1.2 About the Education Framework
More informationApproved by: Senate December 2005. University Framework for Professional Doctorates
Approved by: Senate December 2005 University Framework for Professional Doctorates FRAMEWORK FOR PROFESSIONAL DOCTORATES Introduction The Professional Doctorates Task Group was established by the Graduate
More informationESKISP6053.01 Assist security testing, under supervision
Overview This standard covers the competencies required to assist security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
More informationPROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology
PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Psychology Award BSc (Hons) School School of Arts and Social Sciences Department or equivalent Department of Psychology UCAS Code
More informationEngineering Gateways degrees. Bachelors and MSc Professional Engineering
Engineering Gateways degrees Bachelors and MSc Professional Engineering A guide for Higher Education Institutions Flexible work-based pathways to being registered as a professionally qualified engineer
More informationInformation Governance Strategy
Information Governance Strategy THCCGCG9 Version: 01 The information governance strategy outlines the CCG governance aims and the key objectives of its governance policies. The Chief officer has the overarching
More informationCorporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
More informationMSc Computer Security & Resilience 2015-16. Steve Riddle Degree Programme Director
MSc Computer Security & Resilience 2015-16 Steve Riddle Degree Programme Director Welcome! 1. Computer Security & Resilience 2. Computing Science at Newcastle our School 3. Principles of Study at MSc Level
More informationCYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0
CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0 CYBERSECURITY Research and innovation for a more secure Britain 82 million of current EPSRC investments in research
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name MSc Project Management, Finance and Risk
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name MSc Project Management, Finance and Risk Award MSc School School of Mathematics, Computer Science and Engineering Department or
More informationPROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology
PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Psychology Award BSc (Hons) School School of Arts and Social Sciences Department or equivalent Department of Psychology UCAS Code
More informationCyber Security Education, Qualifications and Training
Cyber Security Education, Qualifications and Training Prof. Keith M. Martin Information Security Group, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK This paper is a postprint of a paper
More informationREVISED GRID FOR MICRO LEVEL APPROACH
Cover sheet Country: Sector: Level: United Kingdom Bank EQF Level: 6 IT NQF Level: 6 Institution (private/state): Name of the study program : Duration (in years/months): University (state) BSc Computer
More informationProgramme Specification for the MSc in Computing Science
Programme Specification for the MSc in Computing Science PLEASE NOTE. This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical student
More informationQuality Assurance of Medical Appraisers
Quality Assurance of Medical Appraisers Recruitment, training, support and review of medical appraisers in England www.revalidationsupport.nhs.uk Contents 1. Introduction 3 2. Purpose and overview 4 3.
More informationJump! VAT Reg. No. 825 2331 53
Jump! VAT Reg. No. 825 2331 53 University of Surrey Engineering Doctorates Market Review Executive summary Authors: Ian Cooper, Jason Palmer Researchers: Amy Tillson, Nic Rogers, Chris Lane 2010 Engineering
More informationPolicy and Framework for Structured PhD Programmes. Adopted by Academic Council on 16 th February 2011
Policy and Framework for Structured PhD Programmes Adopted by Academic Council on 16 th February 2011 INTRODUCTION The purpose of this policy document is to develop a framework along with a set of guidelines
More informationAdvance with CIMA. Applying for CIMA Accreditation of Higher Education Programmes
Advance with CIMA Applying for CIMA Accreditation of Higher Education Programmes Education Directorate February 2014 Contents Contents... 2 Introduction... 3 1.0 Core Principles of Accreditation... 3 1.1
More informationManagement. Imperial College Business School. Total Credits ECTS: 90 CATS: 180. 2 nd cycle. Veronica Russell Teaching & Quality Manager
MSc Management This document provides a definitive record of the main features of the programme and the learning outcomes that a typical student may reasonably be expected to achieve and demonstrate if
More informationProcuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
More informationCREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved
CREST EXAMINATIONS This document and any information therein are the property of CREST and without infringement neither the whole nor any extract may be disclosed, loaned, copied or used for manufacturing,
More informationPlymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification
Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September
More informationMSc EuroMasters in Physics HANDBOOK 2015/16
POSTGRADUATE TAUGHT PROGRAMMES MSc EuroMasters in Physics HANDBOOK 2015/16 FACULTY OF SCIENCES CONTENTS 1 Introduction...3 2 Programme Structure and Requirements...4 3 Study at Two Institutions...6 4 PH754:
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationValid from: September 2012 Faculty of Technology, Design and Environment
Programme Specification BSc (Hons) Information Technology Management for Business Valid from: September 2012 Faculty of Technology, Design and Environment SECTION 1: GENERAL INFORMATION Awarding body:
More informationUnit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
More informationPractitioner Certificate in Information Assurance Architecture (PCiIAA)
Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,
More informationGetting to know ECVET better Various Stakeholders Perspectives
2nd Seminar of the National Team of ECVET Experts 18th September 2013 European Credit System for Vocational Education and Training Getting to know ECVET better Various Stakeholders Perspectives Veronica
More informationUniversity of the West of England, Bristol. Intellectual Property Policy
University of the West of England, Bristol Intellectual Property Policy 1 INTRODUCTION...2 1.1 EXTERNAL CONTEXT...2 1.2 CONTENT...2 1.3 STAKEHOLDERS...2 1.4 RAISING ISSUES...3 2 LEGAL OWNERSHIP OF INTELLECTUAL
More informationQuality Assurance and Enhancement Documentation. 1.0 Introduction. 2.0 Standard Format. 3.0 Programme Approval Form. 4.0 Validation Documentation
Quality Assurance and Enhancement Documentation 1.0 Introduction 2.0 Standard Format 3.0 Programme Approval Form 4.0 Validation Documentation 5.0 Response to Conditions 6.0 Definitive Document 7.0 Programme
More informationUniversity of York. The York Management School. Lecturer in International Business. Ref: UoY00919. Job Description and Person Specification
University of York The York Management School Lecturer in International Business Ref: UoY00919 Job Description and Person Specification Requirements of the post This is a new post arising from continuing
More informationIrish experiences of development of a new framework for PhD Education. Prof Alan Kelly, Dean of Graduate Studies University College Cork, Ireland
Irish experiences of development of a new framework for PhD Education Prof Alan Kelly, Dean of Graduate Studies University College Cork, Ireland The national ambition: A new model for PhD training in Ireland
More informationProgramme name Civil Engineering, Civil Engineering with Industrial Placement
PROGRAMME SPECIFICATION KEY FACTS Programme name Civil Engineering, Civil Engineering with Industrial Placement Award BEng (Hons) School School of Mathematics, Computer Science and Engineering Department
More informationMathematics, Computer Science and Engineering Department or equivalent Computer Science
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name MSc Health Informatics Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Computer Science
More information3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013
PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the
More information/ Doctorate of Business Administration
/ Doctorate of Business Administration Sunderland Business School s Doctorate of Business Administration programme (DBA) is a stimulating, innovative programme which has been developed to strengthen your
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Clinical Engineering with Healthcare Technology
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Clinical Engineering with Healthcare Technology Award MSc School School of Engineering and Mathematical Sciences Department or equivalent
More information2.2 Assessors shall not be members of Boards or Joint Boards of Examiners and shall not be entitled unless invited to attend their meetings.
Regulations for the Examination of Master s Level Degrees 1 Appointment of Examiners 1 Definition of Terms Used: Examiners 1.1 Members of Boards of Examiners shall be designated as Examiners, as follows:
More informationCBEST Implementation Guide
CBEST Implementation Guide Introduction Existing penetration testing services conducted within the financial services sector are well understood and utilised. Whilst these services have provided a good
More informationPROGRAMME SPECIFICATION - UNDERGRADUATE PROGRAMMES. School of Mathematics, Computer Science and Engineering Department or equivalent Computer Science
PROGRAMME SPECIFICATION - UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Software Engineering Award BSc (Hons) School School of Mathematics, Computer Science and Engineering Department or equivalent
More informationNational Occupational Standards. Compliance
National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them? National Occupational Standards (NOS) are statements
More informationProgramme name Computer Science with Artificial Intelligence
PROGRAMME SPECIFICATION KEY FACTS Programme name Computer Science with Artificial Intelligence Award BSc (Hons) School School of Informatics Department or equivalent School of Informatics UCAS Code G4G7
More informationUniversity of Bradford. 1 year full time, 2 years part-time
UNIVERSITY OF BRADFORD Faculty of Engineering and Informatics School of Electrical Engineering and Computer Science (EECS) Programme/course title: MSc Cyber Security Awarding and teaching institution:
More informationSUMMARY REPORT ON VALIDATION OF THE STRUCTURED ELEMENTS OF PhD PROGRAMME Q 3
SUMMARY REPORT ON VALIDATION OF THE STRUCTURED ELEMENTS OF PhD PROGRAMME Q 3 Part 1 Programme details Proposed titles Nature and duration of programme DIT awards sought Classifications of award Parallel
More informationProgramme Specification (2015-16)
Date of Revision Date of Previous Revision Programme Specification (2015-16) A programme specification is required for any programme on which a student may be registered. All programmes of the University
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. MSc Health Management in Strategic Management and Leadership
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Award School Department or equivalent Programme code Type of study Total UK credits 180 Total ECTS 90 PROGRAMME SUMMARY MSc Health
More informationProgramme Specification and Regulations
Programme Specification and Regulations 2013 2014 Economics, Management, Finance and Social Sciences Programmes (New Regulations) (BSc, Diploma for Graduates, Diplomas in Economics and Social Sciences)
More informationaprogramme SPECIFICATION POSTGRADUATE PROGRAMMES
aprogramme SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Counselling Psychology Award Graduate Certificate School School of Arts and Social Sciences Department or equivalent Department
More information