Discuss the ethical, moral and professional issues relating to computer security, ethical hacking and incident response.
|
|
|
- Franklin Todd
- 10 years ago
- Views:
Transcription
1 Unit Information Form (UIF) UIF1011 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information Forms before completing the details below SECTION 1 - Changes made to Section 1 of the UIF will require Faculty level approval. If substantial changes to Units/Courses are required, consult with Sub Dean (Quality Enhancement) for advice Unit Name Unit Code Security Testing and Forensic Investigation CIS019-2 Level FHEQ 5 Credit Value 30 Location of Delivery Park Square Summary/Overview This unit provides students with a wide range of essential theoretical, conceptual and pragmatic hands-on skills underpinning modern computer systems in the closely related areas of ethical hacking and forensic investigation and it requires good numeracy skills and knowledge of computer hardware architecture. Thus, topics areas such as attack techniques, concealing access and tracks, computer investigations, incident response and forensic analysis form the essential building blocks of the unit. The primary aim of the unit is: To advance the students knowledge about the judicial process within the UK, the law of evidence and laws relevant to Computer or IT security. Aims Upon successful completion of the unit the students should be able to :- Understand the procedures behind UK Judicial System and understand the role of the Crown prosecution service and the differences between Magistrate and Crown Courts. Demonstrate an understanding the concept of process to be used to safeguard evidence and in particular digital evidence gathered through computer forensic techniques. Demonstrate knowledge of the legal issues surrounding the use of computers and IT and be able to understand major pieces of UK and European legislation concerning issues with computer security.
2 Core Learning Outcomes Learning Outcomes On completion of this unit you should be able to: Assessment Criteria To achieve the learning outcome you must demonstrate the ability to: 1 2 Discuss the ethical, moral and professional issues relating to computer security, ethical hacking and incident response. To understand the concept of phases in a penetration test and the various open source frameworks. Demonstrate the understanding of concept of different codes of conduct issued by organisations with others and how to apply to ethical hacking. Show an understanding of the phases of a penetration test and discuss the individual phases and including methodologies and expected outcomes; Discuss and compare the different methodologies To know the tools and their usage to conduct a penetration test. Understand the concept of computer forensic investigation in an incident response, including an understanding of the procedures and techniques involved in scene of crime investigation. Understand the concept of conducting evidence gathering and forensic analysis and knowledge of tools to conduct computer forensic investigation. 6 Fundamentally understand the concept of different witnesses. Understand the concepts of tools availability and the phase they are used; Discuss the different tools and their advantages and disadvantages. Describe what a computer forensic investigation is; Outline the proper response to various incident scenarios; Describe procedures for evidence gathering and protection during a Crime Scene Investigation. Identify different types of forensic analysis techniques and describe the problems associated with them; Understand the concept of a range of opens source and commercial tools and discuss the availability for computer forensic analysis. Understand the role of different witnesses and their duties.
3 SECTION 2 - Any changes made to Section 2 of the UIF will normally require Faculty level approval Period of Delivery Pre-requisites/Restrictions Student Activity Year long n/a Activity Notional Learning Hours Lectures 40 Seminars/tutorials 20 Lab/Field work 20 Workshops Rehearsals 4 Assessment 10 e-learning 10 Self-directed study 196 Group work Other (specify) Total 300 This unit will be delivered using formal lectures, lab-based practical exercises and tutorial sessions to help students to understand fundamentals of ethical hacking and forensic investigation and to develop their problem-solving skills. The following specific elements are included: Lectures introduce the basic concepts of ethical hacking and forensic investigation, together with a variety of techniques needed to implement penetration testing and forensic investigation. Approach to Learning Lab-based practical sessions and tutorials provide students opportunities of consolidating the concepts and techniques introduced in the lectures and in the use of these concepts and technique to develop solutions to problems which are designed based on real-world environment. Guided and self-directed review of research papers on modern ethical hacking and forensic investigation techniques using electronic and paper based resources is expected and encouraged. Students self-directed study using a variety of information sources is expected. Communication To help with the development of this you will Skills Development Develop oral communication skills via the oral informal group work activities and in practical lab-based sessions, Written skills are developed via critical and evaluative report writing in support of their Assignment (assessment point 2). Information Literacy To help with the development of this you will:-
4 Be encouraged to access and critically review information sources via access to the web, via the Learning Resource Centre and through on-line access to scholarly Journals and articles. Where appropriate students are encouraged to critically review papers written by members of the unit team. Research and Evaluation To help with the development of this you will:- Be encouraged to evaluate academic literature whilst completing the first two assessment points and be encouraged to search for state of the art information sources to support your study. Where appropriate students are encouraged to critically review papers written by members of the unit team. Creativity and Critical Thinking To help with the development of this you will:- Be encouraged to creative problem-solving, not only in relation to specific assessment, but also towards wider issues that relate to real-world concerns in relation to real-world testing requirements and incident response. Each of the assessment points provides ample opportunities for students to demonstrate creativity and critical awareness. 1. The first assessment point is a short in class test conducted in class on UK and European legislation and legal issues and basic Forensic tests to provide formative feedback as to student s progress. Assessment Strategy 2. The second assessment point is designed to test students understanding of computer forensics and problem-solving skills development in terms of solving problems design in real-world environment. This assignment is practical-based. Students are expected to complete this assignment within a small group. A supportive written commentary and discussion are encouraged. 3. This assessment point comprises a three hour unseen written examination covering all aspects of this unit. No Learning Outcomes Submission week Assessment Description of Assessment Weight Assessed (assignments) or Method* Method % length (exam) 1 CB In-unit test 20 X X Week 10 2 CS,GR Case Study 40 X X X Week 20 3 EX Exam 40 X X X X X X 2 hours *The following codes for assessment methods apply:- AR Artifact PC Practical CB Computer-based PF Performance CS Case Study PL Placement DI Dissertation or Project PO Portfolio
5 EX Exam PR Presentation GR Group Report RE Individual Report IT In-unit Test OR Oral LR Literature Review OT Other SECTION 3 - Once initial approval of the unit has been given, the Unit Co-ordinator may make changes to this section, following appropriate consultation Outline Teaching Schedule Overview and introduction (2 weeks) Background knowledge (2 weeks) Ethics of Penetration Testing (1 week) Penetration Testing (2 weeks) Tools (2 weeks) Understanding Computer Investigations (3 weeks): First Response to Incidents (1 week): Digital Evidence Preservation (2 weeks) Understanding Operating systems & File Storage (2 weeks) Data Acquisition (3 weeks) Forensic Analysis (5 weeks) Revision (2 Weeks) Recommended Resources Essential Hands-on Ethical Hacking and Network Defence, Michael t. Simpson, Thompson,ISBN Guide to Computer Forensics and Investigation, Second Edition, Bill Nelson et al, Thomson, ISBN File System Forensic Analysis, Brian Carrier, Addison Wesley, ISBN Cole E (2008): Network Security Fundamentals, Wiley, ISBN 13: Background Penetration Testers Open Source Toolkit, Johnny Long et al, Syngress, ISBN Wi-Foo The secrets of wireless hacking, Andrew Vladimirov, Addison-Wesley, ISBN Cole Eric (2009): Network Security Bible, John Wiley & Sons; 2nd ed. ISBN-10: Harlan Carvey (2009): Windows Forensic Analysis DVD Toolkit, Edition 2, Elsevier Science, ISBN: ,
6 Catherine Bond, et al. (2007): The Expert Witness: A Practical Guide, Third Edition, Shaw & Sons, ISBN X William Stallings (2003): Cryptography and Network Security: Principles and Practice, Prentice Hall, ISBN Ross Anderson (2008): Security Engineering, 2nd Ed. Wiley Dieter Gollmann (2005): Computer Security, 2nd Ed. John Wiley and Sons Ltd. ISBN: Security Computer Forensics Principles and practices, Linda Volonino et al, Pearson, ISBN Computer Forensics Jump Start, Michael Solomon, Sybex, ISBN X Real Digital Forensics, Keith Jones el al, Addison Wesley, ISBN Journals Computers and Security International Journals of Information Management and Computer Security SECTION 4 Administrative Information Faculty Field Department/School/Division Unit Co-ordinator CATS Undergraduate Computer Science and Technology Department of Computer Science and Technology Xiaohua Feng Version Number Body approving this version FTQSC (Periodic Review 2012) Date of University approval of this version (dd/mm/yyyy) Shared Units Indicate below all courses which include this Unit in their diet BSc (Hons) Computer Security and Forensics Form completed by: Name: Marc Conrad Date: 27/02/2012 Authorisation on behalf of the Faculty Teaching Quality and Standards Committee (FTQSC) Chair: Date:... Unit Updates Date (dd/mm/yyyy) Nature of Update FTQSC Minute Ref:
7
Unit Information Form (UIF)
Unit Information Form (UIF) UIF1112 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
Unit Information Form (UIF)
Unit Information Form (UIF) UIF1112 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
Unit Information Form (UIF)
Unit Information Form (UIF) UIF0708 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
Unit Information Form (UIF)
Unit Information Form (UIF) UIF0708 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
Unit Information Form (UIF)
Unit Information Form (UIF) UIF1213 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
Unit Information Form (UIF)
Unit Information Form (UIF) UIF1314 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
Unit Information Form (UIF)
Unit Information Form (UIF) UIF1112 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
Unit Name. Management Accounting. Unit Code. AAF006-2 Level 5. Credit Value 30. Location of Delivery. University Square (Luton) and Bedford
Unit information form (UIF) The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information Forms before
How To Teach Marketing
Unit Information Form (UIF) UIF1314 The UIF provides essential information to students, staff teams and others on a particular Unit. Please refer to the University s Guidance notes on Unit Information
Unit Information Form (UIF) UIF0708
Unit Information Form (UIF) UIF0708 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
Course Information Form (CIF)
Course Information Form (CIF) CIF1112 The CIF provides essential information to students, staff teams and others on a particular course of study and is designed to meet the University s own expectations
Course information form (CIF) PMB
Course information form (CIF) PMB CIF13/14 The CIF provides essential information to students, staff teams and others on a particular course of study and is designed to meet the University s own expectations
Programme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute:
Programme Specification BSc (Hons) Computer Networks and Security with Foundation Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s):
The University s course specification template has been developed to fulfil three main functions; it shall act:
LONDON METROPOLITAN UNIVERSITY Course Specification BSc BIT The University s course specification template has been developed to fulfil three main functions; it shall act: as a source of information for
City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015
City University of Hong Kong Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015 Part I Course Title: Topics on Computer Security Course Code: CS4293
For UCAS tariff points please refer to our website (www.bolton.ac.uk).
Programme Specification BSc (Hons) Games Programming with Foundation Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation The University of Bolton The
Digital forensics Unit number: 30 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: D/601/1939.
Unit title: Digital forensics Unit number: 30 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: D/601/1939 UNIT AIM AND PURPOSE To provide learners with an understanding of digital
The University s course specification template has been developed to fulfil three main functions; it shall act:
LONDON METROPOLITAN UNIVERSITY BEng Software Engineering (top-up) Specification The University s course specification template has been developed to fulfil three main functions; it shall act: as a source
Programme Specification and Curriculum Map for BA Criminology (Criminal Justice)
Programme Specification and Curriculum Map for BA Criminology (Criminal Justice) 1. Programme title BA Criminology (Criminal Justice) 2. Awarding institution Middlesex University 3. Teaching institution
Section 1 - General Course Information
Course Information Form (CIF) The CIF provides core information to students, staff teams and others on a particular course of study. Section 1 - General Course Information Course Title Qualification Intermediate
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching
F21CN: Computer Network Security: Overview
F21CN: Computer Network Security: Overview Hans-Wolfgang Loidl http://www.macs.hw.ac.uk/~hwloidl School of Mathematical and Computer Sciences Heriot-Watt University, Edinburgh Hans-Wolfgang Loidl (Heriot-Watt
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
NORTHBROOK COLLEGE SUSSEX AND UNIVERSITY OF BRIGHTON PROGRAMME SPECIFICATION HERB /ADC/ASC/FINAL 1 PART 1: PROGRAMME SUMMARY INFORMATION
NORTHBROOK COLLEGE SUSSEX AND UNIVERSITY OF BRIGHTON PROGRAMME SPECIFICATION HERB /ADC/ASC/FINAL 1 PART 1: PROGRAMME SUMMARY INFORMATION Awarding body University of Brighton Department Art, Design & Media
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
The CIF provides core information to students, staff teams and others on a particular course of study. Web Design and Software Development
Course Information Form (CIF) The CIF provides core information to students, staff teams and others on a particular course of study. Section 1 - General Course Information Course Title Qualification Intermediate
2012/2013 Programme Specification Data. Public Relations
2012/2013 Programme Specification Data Programme Name Public Relations Programme Number Programme Award QAA Subject Benchmark Statements n/a Masters The QAA benchmarking statements for Masters of Business
Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall 2011 - MWF 1:00-2:300, BRIM 301
Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall 2011 - MWF 1:00-2:300, BRIM 301 Instructor: Dr. C. L. Chen Office: In the office complex Phone: 727-8554
UNDERGRADUATE PROGRAMME SPECIFICATION
UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Benchmarks: Music Business and Production Staffordshire
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document
BSc (Hons) Computer Animation
BSc (Hons) Computer Animation Programme Specification EDM-DJ-08/2014 Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and
Programme Specification and Curriculum Map for MSc Business Information Systems Management
Programme Specification and Curriculum Map for MSc Business Information Systems Management 1. Programme title Business Information Systems Management 2. Awarding institution Middlesex University 3. Teaching
Programme Specification and Curriculum Map for
Programme Specification and Curriculum Map for BSc Honours Computer Networks 1. Programme title BSc Honours Computer Networks 2. Awarding institution Middlesex University 3. Teaching institution Middlesex
Information Security Systems
Information Security Systems This programme is no longer recruiting. Final award BSc (Hons) Intermediate awards available Cert HE, Dip HE UCAS code - Details of professional body accreditation N/A Relevant
BSc Management with Information Technology For students entering Part 1 in 2012/3. Henley Business School at Univ of Reading
BSc Management with Information Technology For students entering Part 1 in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date
BA (Hons) Early Childhood Studies
BA (Hons) Early Childhood Studies Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
CIF2015/16 FOR USE IN RELATION TO NMC COURSES (WHERE REQUIRED) UNTIL THE NEXT REVIEW POINT. Nursing with Registered Nurse Mental Health
Course Information Form (CIF) CIF2015/16 FOR USE IN RELATION TO NMC COURSES (WHERE REQUIRED) UNTIL THE NEXT REVIEW POINT SECTION 1 - General Course Information Qualification (award type) BSc (Hons) Course
LONDON METROPOLITAN UNIVERSITY Course Specification template
LONDON METROPOLITAN UNIVERSITY Course Specification template The University s course specification template has been developed to fulfil three main functions; it shall act: as a source of information for
Section 1 - General Course Information
Course Information Form (CIF) The CIF provides core information to students, staff teams and others on a particular course of study. Section 1 - General Course Information Course Title Qualification Intermediate
Section 1 - General Course Information
Course Information Form (CIF) The CIF provides core information to students, staff teams and others on a particular course of study. Section 1 - General Course Information Course Title Qualification Intermediate
UNDERGRADUATE PROGRAMME SPECIFICATION
UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: JACS Code: Forensic Investigation
Full time 2 years Part time 3 years
Programme Specification Programme Title: HND Computer Networks and Security Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s): Interim
All LJMU programmes are delivered and assessed in English
PROGRAMME SPECIFICATION Master of Science in Cyber Security Awarding institution Teaching institution JACS Code Programme Duration Language of Programme Subject benchmark statement Programme accredited
BA (Hons) Air Transport with Commercial Pilot Training (Top-up)
PROGRAMME SPECIFICATION This Programme Specification is correct as of the date indicated; however, minor amendments may be made throughout the year and will be incorporated in the annual updating process.
BSc Management with Information Technology For students entering Part 1 in 2015/6. Henley Business School at Univ of Reading
BSc Management with Information Technology For students entering Part 1 in 2015/6 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date
BSc Business Information Technology For students entering Part 1 in 2008/9
BSc Business Information Technology For students entering Part 1 in 2008/9 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
BSc (Hons) Computer Networks
BSc (Hons) Computer Networks Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers. Current
PROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Programme title: Final award (BSc, MA etc): (where stopping off points exist they should be detailed here and defined later in the document) Cohort(s) to
Principal Lecturer in Cyber Security. 9 47,328-54,841 per annum. School of Computing & Technology. 1.0 FTE (part-time or Job share will be considered)
JOB DESCRIPTION Post Title Post No: Salary Grade Department Base Location FTE Principal Lecturer in Cyber Security A885 9 47,328-54,841 per annum School of Computing & Technology Park Campus 1.0 FTE (part-time
BA Hons Sports Business, Sponsorship and Advertising. Design, Media & ManagementDesign, Media & Management
PROGRAMME SPECIFICATION This Programme Specification is correct as of the date indicated; however, minor amendments may be made throughout the year and will be incorporated in the annual updating process.
MA Design for Digital Media
MA Design for Digital Media Programme Specification EDM-DJ-08/2015 Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and
Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification
Birmingham City University Faculty of Technology, Engineering and the Environment Undergraduate Programme Programme Specification Date of Course Approval/Review Version Number Version Date 7 May 2009 3.03
MSc in Computer and Information Security
MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
Programme Specification
Programme Specification Title: Accounting Final Award: Master of Science (MSc) With Exit Awards at: Postgraduate Certificate (PG Cert) Postgraduate Diploma (PG Dip) Master of Science (MSc) To be delivered
Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
Programme Specification: MSc Computing (Information Security)
Programme Specification: MSc Computing (Information Security) 1. Awarding Institution/Body University of Gloucestershire 2. Teaching Institution University of Gloucestershire 3. Recognition by Professional
Australian School of Business School of Information Systems, Technology and Management INFS4806 / INFS5906 INFORMATION SYSTEMS FORENSICS
Australian School of Business School of Information Systems, Technology and Management INFS4806 / INFS5906 INFORMATION SYSTEMS FORENSICS COURSE OUTLINE SEMESTER 1, 2009 TABLE OF CONTENTS 1. STAFF CONTACT
Programme Specification: BA (Hons) Strategic Sports Management
Programme Specification: BA (Hons) Strategic Sports Management About the course 1 Name of course and highest award 2 Level of highest award (according to FHEQ) Strategic Sports Management (Single Honours,
CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University
Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University Course Description: Concepts and issues in physical and cyber security; technological vulnerabilities
Nursing Programs and Skills - Tutorials
Course Information Form (CIF) Section 1 - General Course Information Course Title Qualification Intermediate Qualification(s) Specialist Community Public Health Nursing (School Nursing) Postgraduate Diploma
MBA in Construction and Real Estate. Date of specification: September 2011-12
MBA in Construction and Real Estate UCAS Code: N/A For continuing students entering in: September 2011 Awarding Institution: The University of Reading Teaching Institution: College of Estate Management
PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Creative Industries (Music Event Management and Production) Award Foundation Degree School School of Arts and Social Sciences Department
Creative Lighting Control
School of Design, Management and Technical Arts Bachelor of Arts (Honours) Creative Lighting Control Programme Specification 6 May 2011 (Updated August 2014) Introduction: What are programme specifications?
UNIVERSITY OF ULSTER COURSE SPECIFICATION COURSE TITLE: Postgraduate Diploma/MSc in Political Lobbying and Public Affairs 1.
UNIVERSITY OF ULSTER COURSE SPECIFICATION COURSE TITLE: Postgraduate Diploma/MSc in Political Lobbying and Public Affairs 1. AWARDING University of Ulster INSTITUTION/BODY 2. TEACHING INSTITUTION University
BSc Business Information Systems. BSc (Hons) Business Information Systems
BSc Business Information Systems BSc (Hons) Business Information Systems Programme Specification Primary Purpose Course management, monitoring and quality assurance. Secondary Purpose Detailed information
Information, Network & Cyber Security
School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options
Nottingham Trent University Course Specification
Nottingham Trent University Course Specification 1. 2. 3. 4. 5. Basic Course Information Awarding Institution: School/Campus: Final Award, Course Title and Modes of Study: Normal Duration: UCAS Code: Nottingham
Network Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
MSc Forensic Accounting
MSc Forensic Accounting Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers. Current
LONDON SCHOOL OF COMMERCE. Programme Specifications for the. Cardiff Metropolitan University. MSc in International Hospitality Management
LONDON SCHOOL OF COMMERCE Programme Specifications for the Cardiff Metropolitan University MSc in International Hospitality Management 1 Contents Programme Aims and Objectives 3 Programme Learning Outcomes
QAA Subject Benchmarking Group: Business and Management (2007)
MSc in Facilities Management (for External Students) For students entering in 2012 Awarding Institution: The University of Reading Teaching Institution: The College of Estate Management QAA Subject Benchmarking
Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code
Date of Revision Date of Previous Revision Programme Specification (2015-16) A programme specification is required for any programme on which a student may be registered. All programmes of the University
Programme length: Date of specification: December 2008. CEM Board for the Undergraduate Courses Accreditation:
BSc Construction Management For students entering Level 1 in December 2008 UCAS code: N/A Awarding Institution: The University of Reading Teaching Institution: College of Estate Management Relevant QAA
Arts, Humanities and Social Science Faculty
MFA in Fine Art (full-time) For students entering in 2015/6 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification: Programme
Programme Specification 2015/16
Programme Specification 2015/16 1. Awarding body University of Surrey 2. Teaching institution (if different) N/A 3. Final award MSc 4. Programme title/route/pathway Criminology, Criminal Justice and Social
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Section 1 - General Course Information
Course Information Form (CIF) The CIF provides core information to students, staff teams and others on a particular course of study. Section 1 - General Course Information Course Title Qualification MA
Section 1 - General Course Information
ourse nformation Form (F) The F provides core information to students, staff teams and others on a particular course of study. Section 1 - General ourse nformation ourse Title Qualification omputer Networking
Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification
Birmingham City University Faculty of Technology, Engineering and the Environment Undergraduate Programme Programme Specification BSc (Hons) Computer Networks and Security Date of Course Approval/Review
Faculty of Organizational Sciences
Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: Serbian/ degree: M A S TER The Master s degree study program of Management is the continuation of undergraduate studies
