Certification of Master s Degrees in Computer Science for Cyber Security

Size: px
Start display at page:

Download "Certification of Master s Degrees in Computer Science for Cyber Security"

Transcription

1 Certified Master s in Cyber Security Certification of Master s Degrees in Computer Science for Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information contained within Appendix B of this Call Document about GCHQ s recommended content of degrees involving cyber security is aimed at all Higher Education Institutions (HEIs) who receive funding from HEFCE (England), HEFCW (Wales), SFC (Scotland) or Department for Employment and Learning (Northern Ireland) who may wish to seek GCHQ s certification of the relevant degrees taught in the UK. The information has been made available on GCHQ s web site for the sole purpose of making it easily accessible to this intended audience. Portions of this work are copyright The Institute of Information Security Professionals. All rights reserved. The copyright of this document is reserved and vested in the Crown. Page 1 of 48

2 Document History Issue Date Comment Issue August 2015 First issue Page 2 of 48

3 1 Introduction Reflecting the aims of the National Cyber Security Programme, UK Government and its delivery partners are working to increase the UK s academic capability in all fields of Cyber Security. Together BIS, EPSRC, GCHQ, CPNI and OCSIA have developed a joint approach and strategy for reaching this goal. As part of that strategy, GCHQ has initiated a programme to certify Master s degrees in cyber security subjects taught at UK Higher Education Institutions (HEIs). This Call for Applications is for the certification of Master's degrees that are addressing underpinning computer science relevant to cyber security please see section 3 for more details. In discussions with advisory groups from industry, academia and government, as well as technical personnel within GCHQ, it has become apparent that there is a need for graduates with a strong foundation in those elements of computer science that underpin many of the technical aspects of cyber security and related operations. Master s degrees in cyber security subjects can provide a number of benefits, providing for example: a deeper understanding of cyber security concepts, principles, technologies and practices a bridge between undergraduate degrees and careers in cyber security a platform for further research at Doctoral level an effective way for people in mid-career to enhance their knowledge of the subject or to move into cyber security as a change of career path There are now a significant number of Master s degrees run by UK HEIs with cyber security content. However, it can be difficult for students and employers alike to navigate the variety of Master s that is available in order to: understand the extent to which such degrees really have cyber security as their main or sole focus assess the quality of the degrees on offer identify which degrees best suit someone s career path. This Call (and any subsequent calls) will enable HEIs, should they wish, to apply to have their cyber security Master s degrees considered for certification. There are two types of certification (please see section 3 for further details): Full Certification and Provisional Certification. Certifications of individual Master s degrees by GCHQ will be subject to a set of terms and conditions (T&Cs). A copy of the T&Cs for Full and Provisional certification can be obtained by ing MastersCertification@gchq.gsi.gov.uk. Although applications for certification in response to this Call will be made directly to GCHQ, it is envisaged that future Calls may require applications to be made to a third party appointed by GCHQ to certify individual degrees against the GCHQ criteria for Master s certification. Page 3 of 48

4 HEIs should note that Master s certification (Full or Provisional) is anticipated to be one of the requirements for future recognition as an Academic Centre of Excellence in Cyber Security Education please see section Organisation of this document The remainder of this document is organised as follows: Section 2: General background information Section 3: Guidance on the scope of the Call Section 4: Eligibility of applicants Section 5: How to apply Section 6: Assessment process Section 7: Key dates Appendix A: Cyber terminology the National Technical Authority view Appendix B: Subject Areas and Topics to be covered in Master s degrees in Computer Science for Cyber Security Appendix C: Required structure of application for Full certification Appendix D: Required structure of application for Provisional certification Appendix E: Guidance on writing and submitting applications 2 Background 2.1 UK Cyber Security Strategy Objective 4 The vision of the UK Cyber Security Strategy is 1 : for the UK in 2015 to derive huge economic and social value from a vibrant, resilient and secure cyberspace, where our actions, guided by our core values of liberty, fairness and transparency and the rule of law, enhance prosperity, national security and a strong society Objective 4 of the UK Cyber Security Strategy requires: the UK to have the cross-cutting knowledge, skills and capability it needs to underpin all our cyber security objectives Working in partnership over the past few years, BIS, EPSRC, GCHQ, CPNI and OCSIA have initiated a number of programmes across academia designed to address the knowledge, skills and capability requirements for cyber security research in Objective 4, including: Academic Centres of Excellence in Cyber Security Research Academic Research Institutes in Cyber Security Centres for Doctoral Training in Cyber Security Research 1 Page 4 of 48

5 In the next two steps of the academic programme under Objective 4, GCHQ has initiated a programme to certify Master s degrees in Cyber Security and intends to identify Academic Centres of Excellence in Cyber Security Education. 2.2 Aims, benefits and vision of Certified Master s in Cyber Security The overall aim is to identify and recognise Master s degrees run by UK HEIs that provide well defined and appropriate content and that are delivered to an appropriate standard. This Call for Computer Science for Cyber Security is complementary to other calls for the certification of Master s degrees in general cyber security and other specialised topics. The anticipated key benefits include: providing guidance to prospective students and employers on the content and quality of such degrees providing Master s students who have completed their certified degree with an additional form of recognition i.e., that they have successfully completed a GCHQ certified degree helping to further enhance the quality, focus and relevance of Master s degrees helping universities with certified Master s degrees to attract additional numbers / higher quality students both from the UK and abroad helping employers (in industry, government and academia) during the recruitment process to better understand, and distinguish between, the Master s qualifications of job applicants 2.3 Academic Centres of Excellence in Cyber Security Education (ACEs-CSE) GCHQ and its government partners intend to set up a separate application process to recognise ACEs-CSE. It is anticipated that invitations for ACE-CSE applications will be issued to the academic community in summer It is likely that one of the assessment criteria that will have to be met for an HEI to become a recognised ACE-CSE is that it has, and continues to have, at least one GCHQ certified (Full or Provisional) Master s degree in cyber security. Further details will be issued in due course. 3 Scope of this Call for applications This Call for Applications is for the certification of Master's degrees that are addressing underpinning computer science for cyber security see Appendices A, B, C and D. This Call is for post-graduate Master s degrees (including distance learning degrees) delivered, examined and awarded in the UK by UK HEIs and which typically take one year of full-time study (or equivalent for part-time students). 3.1 In scope For a Master s degree to be in scope for this Call, each of the requirements i, ii and iii below must be met: Page 5 of 48

6 i. at least one of options a and b must be met: a. at least 70% of the taught modules in the Master s must be able to be mapped to Subject Areas 1 to 7 shown in Appendix B b. for Master s degrees that comprise a broad set of optional modules from which students can choose, it must be the case that students can select a set of taught modules in which at least 70% of the modules in the set can be mapped to Subject Areas 1 to 7 shown in Appendix B 2 ii. the taught modules must cover Subject Areas 1 (Security Fundamentals), 2 (Secure Programming), 3 (Low Level Techniques and Tools) and at least three of the Subject Areas 4 to 7 shown in Appendix B iii. there must be a substantial original research component and associated dissertation relevant to cyber security (corresponding to Security Discipline I, Appendix B) expected to account for 25% to 45% of the available credits. If the percentage of credits associated with the original research dissertation is higher than 45%, then an HEI will need to clarify how the taught modules of the degree adequately cover the required number of Subject Areas. If the percentage is less than 25% then an HEI will need to clarify how students are able to gain sufficient understanding and experience of undertaking original research Full certification To be in scope, applications for Full certification require: a cohort of students to have successfully completed the Master s degree in academic year the external examiner s report to be available 3 for academic year the Master s degree to be running in academic year Provisional certification GCHQ recognises that an HEI may prefer to apply for Provisional certification of its Master s degree even though a Full application would be within scope. To reflect this, the requirements for Provisional certification have been modified from previous call documents as shown below. To be in scope, applications for Provisional certification require either Option p1 or Option p2 to be met: 2 If option b is chosen, then the T&Cs associated with certification will require that the set of modules for which certification applies is identified. It will be the responsibility of the HEI to inform students that this is the set of modules for which the Master s degree is certified and that other combinations of modules are not certified. 3 Where the external examiner s report for is not available by the submission deadline please provide the most recent report and the HEI s response. Please state when the report and response will be available and submit them as soon as they are available. Page 6 of 48

7 Option p1: the Master s degree to be running in academic year , though a cohort of students did not complete the degree in academic year or the new/revised Master s degree has not yet started but will start by (up to and including) October 2017 Option p2: although the Master s degree meets the requirements for a Full certification to be applied for, an HEI may if it so wishes apply for Provisional certification 3.2 Out of scope The following Master s degrees are out of scope for this Call: Integrated Master s degrees which typically take 4 years of study starting at undergraduate level Master s degrees which are predominantly carried out by research leading to MRes degrees Master s degrees which provide a broad foundation in cyber security these are the subject of complementary calls Master s degrees with a narrow focus on a particular area of cyber security such as, by way of example only, digital forensics security these are the subject of complementary calls Master s degrees that are planned to start later than October Eligibility This Call is open to all UK Higher Education Institutions. Applicants should note that there will be no funding associated with successful certification of Master s degrees. 5 How to apply 5.1 Submitting applications Applications should be ed to MastersCertification@gchq.gsi.gov.uk by 16:00 on 15 January Applicants are solely responsible for ensuring that any application that they submit reaches GCHQ and for all costs of preparation of their applications. To help with the administration of submissions, please put Master s Comp Sci for Cyber Sec Certification application - <Name of your HEI>< n of m> on the subject line. Please also ensure that each file that is sent as part of the Page 7 of 48

8 submission is named in the order that it is to be printed: <Name of HEI><Comp Sci for Cyber Sec><File n of m>. 5.2 Guidance on writing applications Although applicants will be solely responsible for the content and accuracy of their applications, applicants are strongly encouraged to refer to the overall guidance on writing and submitting applications provided in Appendix E Applications for Full certification Applicants should note that their applications should be structured to follow the guidance in Appendix C. Applicants should also refer to Appendices A, B and E. If successful, Full applications will be awarded Certified status for a period of five years, subject to the HEI agreeing the T&Cs which will document the ongoing requirements for the HEI and GCHQ Applications for Provisional certification Applicants should note that their applications should be structured to follow the guidance in Appendix D. Applicants should also refer to Appendices A, B and E. If successful, Provisional applications will be awarded a Certification Pending status. This will be conditional on the applicant agreeing the T&Cs associated with Provisional applications, which will include a limit on the length of time a Certification Pending status can be held without obtaining Full Certification. 5.3 Briefing meeting and points of clarification A briefing meeting is planned for potential applicants on the afternoon of 05 November 2015 in Cheltenham 4. Please MastersCertification@gchq.gsi.gov.uk by 16:00 on 30 October 2015 to register attendance. To help with administration, please put Master s in Comp Sci for Cyber Sec Certification briefing day - <Name of your HEI> on the subject line. Please include the names and contact details of those wishing to attend the briefing meeting maximum of 3 per HEI. GCHQ will acknowledge s within two working days. Please contact Catherine Harkness on xtn if an acknowledgement has not been received. Call documents and a list of points of clarification regarding the application process will be maintained at: Applicants are advised to check this Web page regularly for any updates to the application process or changes to the version of the Call document. 4 Briefing meeting to be held at Cheltenham Civil Service Club, Tewkesbury Road, Uckington, Cheltenham, Gloucestershire, GL51 9SL. Page 8 of 48

9 6 Assessment Applications within scope will be assessed by an Assessment Panel that will include representatives from GCHQ, wider government, industry, professional bodies and academia. Each application will be read and scored independently by a minimum of three members of the Assessment Panel. At the Assessment Panel meeting, Panel members will present their scores and the rationale for their scores. The Assessment Panel will agree a consensus score for each application. The Panel s decision is final. There is no maximum number of successful applications for certification. 6.1 Full certification Each application will be assessed within the six areas shown below, and further described in Appendix C, against the set of assessment criteria also shown in Appendix C. i. HEI s letter of support for the application ii. Description of the applicant iii. Description of the Master s degree in Computer Science for Cyber Security iv. Assessment materials and external examiner s report v. Original research dissertations vi. Student numbers and grades achieved 6.2 Provisional certification Each application will be assessed within the five areas shown below, and further described in Appendix D, against the set of assessment criteria also shown in Appendix D. i. HEI s letter of support for the application ii. Description of the applicant iii. Description of the Master s degree in Computer Science for Cyber Security iv. Assessment materials v. Original research dissertations 6.3 Applications with a borderline fail on only one criterion If an application (Provisional or Full) is a borderline fail on only one criterion namely, a score of 2.9 is achieved on one criterion with all other criteria scoring 3.0 or higher then at the discretion of the Assessment Panel the HEI will be contacted by GCHQ after the Panel meeting and given 20 working days to re-submit a revised version of the relevant section. The Panel will then consider the new information provided by the HEI with the aim of responding to the HEI with the Panel s decision within a further 30 working days. It must be stressed that the Panel s decision is final and there will be no further opportunity to consider the application until the next Call for applications is issued. Page 9 of 48

10 7 Moving forwards 7.1 Key dates Activity Proposed Date Call issued 20 August 2015 Briefing meeting 05 November 2015 Proposals due to be submitted 15 January 2016 Assessment of proposals January March 2016 Announcement of results by 31 March After the assessment process All applicants will be notified individually whether their applications have been successful. 7.3 Successful applications The certification (whether Full or Provisional) of each individual Master s degree is conditional upon the HEI agreeing to the T&Cs of certification provided by GCHQ. The T&Cs describe the terms of use of the branding associated with certification such as in advertising/promotional material and the award documents given to students who have successfully completed the degree. The T&Cs also describe the ongoing requirements that the HEI must satisfy in order for the certification to remain valid. 7.4 Unsuccessful applications Applications that are not successful in this Call will be given feedback and, where appropriate, such applicants will be encouraged to submit in future calls. 8 Contact details Catherine Harkness GCHQ Hubble Road Cheltenham GL51 0AX Tel: xtn MastersCertification@gchq.gsi.gov.uk Page 10 of 48

11 Appendix A: Cyber terminology the National Technical Authority view 1 Introduction Today the term Cyber is used by everyone, and everyone has a different understanding as to what it means. This is causing confusion, inefficiency and misunderstanding. Whilst you can never control how others use this term, in this Appendix GCHQ as the National Technical Authority (NTA) for Information Assurance 5 clarifies the use of cyber terminology and the scope of cyber security both for the UK and this Call. In particular, the terms Information Assurance, Cyber Space, Cyber Security are described and a working definition of Cyber Security is presented. 2 Information Assurance Information Assurance (IA) is a discipline that seeks to manage (e.g. reduce as necessary) the risks and impacts to information and information-based systems. It is also known as Information Security. IA is carried out by the owner of the information or information system supported by organisations such as GCHQ and CPNI that provide many of the tools they need. The term Information Assurance was coined to emphasise the need for confidence (or assurance) that risks are being effectively managed. IA considers the full set of risks to information and information-based systems and includes the following activities: Protect reduces information risk through the reduction of vulnerabilities (whether physical, personnel, process or technical) Prepare enables the harm to be reduced when a risk is realised, i.e. contingency planning Detect identifies when a risk changes (new vulnerability discovered, change in threat level, etc.) or is realised, i.e. situation awareness Respond reduces the impact when a risk is realised, e.g. incident management GCHQ provides the overall framework for managing risks to information and information systems, as well as guidance on how technical risks can be mitigated. CPNI is responsible for providing guidance on mitigating physical and personnel vulnerabilities. All three aspects have to be addressed if an organisation is to effectively manage its information risks, even in cyber space. 3 Cyber Space The Cyber Security Strategy of the United Kingdom 6, dated June 2009, describes cyber space as encompassing all forms of networked, digital activities; this includes the content of and actions conducted through digital networks. It also states that the physical building blocks of cyber space 5 Technical areas within the scope of the NTA include: cryptography, key management and security protocols; information risk management; IA Science; hardware engineering and security analysis; information assurance methodologies; operational assurance techniques; strategic technologies and products; control systems; electromagnetic physics and security. 6 Page 11 of 48

12 are individual computers and communication systems [which] fundamentally support much of our national infrastructure and information. Cyber space is a key enabler for the UK and therefore a critical asset. In The UK Cyber Security Strategy 7, dated November 2011, this is picked up as a Tier 1 risk: namely, hostile attacks upon UK cyberspace by other states and large scale crime. These strategies effectively say that we need to put in place measures to reduce the risk and impact of such attacks, i.e. we need to defend ourselves in cyber space. 4 Cyber Security 4.1 General description The Cyber Security Strategy of the United Kingdom 8, dated June 2009, states that Cyber security embraces both the protection of UK interests in Cyber Space and also the pursuit of wider UK security policy through exploitation of the many opportunities that cyber space offers. Cyber security should be considered as an activity covering all aspects of UK well-being as they relate to cyber space. The complexity of cyber space and its relationship to the well-being of the UK means that cyber security includes a number of inter-related activities. At a general level, for the purposes of this Call, cyber security refers to those activities that relate to the defence of UK cyber space and are largely carried out by information and system owners in order to defend (reduce risk and impact) UK cyber space. Organisations operating in cyber space are responsible for managing their risks and impacts by undertaking Protect, Prepare, Detect and Respond through applying the discipline of Information Assurance. Part of GCHQ s role as the National Technical Authority for Information Assurance is to provide definitive, authoritative and expert-based guidance on all aspects of IA. However, it is absolutely clear that raising cyber security levels in the UK has to be a joint effort between government, industry and academia. Establishing Certified Master s degrees in cyber security is an example of this joint effort aimed at supporting the goals of the UK s Cyber Security Strategy. It should be noted that the Cyber Security Strategy considers national level risks that largely stem from malicious action or environmental hazard. Information risks also stem from accidental actions such as the loss of a laptop, inappropriate or loss of storage devices (as in recent well publicised security breaches). This is the broader scope of Information Assurance Page 12 of 48

13 4.2 Specific working definition of cyber security to be used for this Call The International Telecommunication Union has produced a definition of cyber security 9 which is consistent with the general descriptions above. For the purposes of this Call document, cyber security should be taken to mean: The collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and the assets of organisations and users. The assets of organisations and users include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the assets of organisations and users against relevant security risks in the cyber environment. 9 Page 13 of 48

14 Appendix B: Subject Areas and Topics to be covered in Master s degrees in Computer Science for Cyber Security The Security Discipline Principles and Skills Groups that form part of the tables in this Appendix B are derived from the IISP Information Security Skills Framework and are copyright The Institute of Information Security Professionals. All rights reserved. The tables in this Appendix show the Subject Areas to be covered in Master s degrees in Computer Science for Cyber Security. The tables draw on the ACM/IEEE Computer Science Curricula 10 and the Academic Requirements for Designation as a Centre of Excellence in Cyber Operations 11. The Indicative Topics Coverage highlights examples of the specific topics that one would expect to see represented within the syllabi of Master s modules in order for broad coverage of the Subject Area to be achieved. Given that they are indicative topics, programmes would not be required to cover all of them explicitly (and indeed other topics may additionally be relevant), but there would be expected to be sufficient weight of coverage within each area if the Subject Area was to be satisfactorily addressed. Subject Area Indicative Topics Coverage 1. Security Fundamentals foundational concepts principles of secure design threats and attacks cryptography security architecture Subject Area 2. Secure Programming Indicative Topics Coverage defensive programming memory corruption injection techniques privilege escalation user and kernel space vulnerabilities web applications static analysis 10 ACM computer science curricula 2013: 11 Requirements for Academic Centre of Excellence in Cyber Operations: Page 14 of 48

15 Subject Area 3. Low Level Techniques and Tools Indicative Topics Coverage assembly language programming machine-level instruction set and organisation compilers reverse engineering techniques reverse engineering for malware analysis reverse engineering communications de-obfuscation of obfuscated code common tools for reverse engineering Subject Area 4. Operating systems Indicative Topics Coverage concurrency and synchronisation processes and threads, process/thread management, synchronisation, inter-process communication scheduling and dispatch memory management security and protection file systems I/O system kernel security and reliability network file system network layer and transport layer protocols Windows kernel Linux kernel 5. Networking Subject Area Indicative Topics Coverage routing, network and application protocols network architectures network devices network security wireless network security network traffic analysis protocol analysis network mapping techniques Page 15 of 48

16 Subject Area 6. Systems Programming Indicative Topics Coverage advanced C programming kernel internals device drivers multi-threading file I/O process management file and directory management memory management signals Subject Area Indicative Topics Coverage 7. Embedded Systems hardware, design and fabrication software architectures programming and systems development security and reliability applications of embedded devices and systems Page 16 of 48

17 Security Discipline Skills Group Indicative Topics Coverage I. Information Systems Research Principle: Original investigation in order to gain knowledge and understanding relating to information security, including the invention and generation of ideas, performances and artefacts where these lead to new or substantially improved insights; and the use of existing knowledge in experimental development to produce new or substantially improved devices, products and processes. Research (I2) This aspect is likely to be reflected via the inclusion of a substantial research dissertation component within the Master s degree. Students would be expected to conduct research that is clearly focused upon one or more of the Subject Areas (1 to 7) listed above. Security Discipline Skills Group Indicative Topics Coverage J. Professional Skills These aspects are likely to be crosscutting within a programme and/or represented by a dedicated skills module. Overall, there should be evidence of the programme giving attention towards: teamworking, leadership, communication skills, decision making. Page 17 of 48

18 Appendix C: Required structure of application for Full certification This appendix provides details of the information that applicants should provide with their application along with the criteria that will be applied. Applicants should refer to section (page 6) which describes the requirements for an application for Full certification to be in scope. Applicants should also refer to Appendix E which provides advice and guidance on writing and submitting applications. Please note that an HEI should submit one application per Master s degree against this Call. An HEI can submit more than one Master s degree for certification against this Call if the HEI believes that more than one of its Master s degrees meets the criteria below. Each application for Full certification should comprise the following six sections: 1. Institution s letter of support for the application (up to one side of A4). 2. Description of the applicant (up to five sides of A4, excluding CVs) 3. Description of the Master s degree in Computer Science for Cyber Security (up to ten sides of A4, excluding the module descriptions) 4. Assessment materials and external examiner s report (up to five sides of A4, excluding copies of examination papers, copies of information provided for coursework and copy of external examiner s report) 5. Original research dissertations (up to five sides of A4, excluding list of dissertation titles and copies of dissertations) 6. Student numbers and grades achieved (up to five sides of A4) Documents should be in Word or pdf format with the font size no smaller than 10pt. Unless specifically asked for, additional pages and other material in addition to that outlined above will not be read and will not therefore form part of the assessment for certification. All information provided will be treated confidentially and used only for the purposes of assessing applications. 1 HEI s letter of support for the application Please provide a signed letter from the Vice Chancellor (or equivalent) showing support for the HEI s application to have a Master s degree in Computer Science for Cyber Security considered for certification by GCHQ. 2 Description of the applicant Please ensure that you cover the following points: a. The names and structure of the department(s)/group(s)/school(s) responsible for the Master s degree together with the names, seniority and roles of the members of staff Page 18 of 48

19 responsible for delivering the degree content, setting and marking examinations, supervising dissertations, etc. b. Please describe any recent investments from the HEI, government, industry etc. in the groups running the Master s degree programme. c. Please describe any external linkages that add value to the Master s degree: e.g., visiting lecturers with specialist knowledge from other academic departments, government or industry; projects suggested, and monitored, by industry; etc. d. Please describe the process used to review and re-new the course content in order to keep it up to date, for example: how often is the course content reviewed, by whom, and what external advice is taken (e.g., industrial advisory boards). e. Please describe the facilities available to Master s students in general and those dedicated to students undertaking the Master s degree specifically, for example: computer laboratories, dedicated equipment, library (access to text-books), on-line journal subscription (for research dissertations), etc. f. For each member of staff named above please provide a CV (up to 2 pages in length) which provides details of: academic background knowledge and expertise in computer science and/or cyber security e.g., references to recent publications, working with industry and/or government esteem indicators e.g., editorships, invited talks, membership of national and international advisory groups relevant professional certifications etc. CVs should go in an appendix to section Criteria to be applied i. There should be a coherent team responsible for delivering the Master s, with clear roles and responsibilities. ii. The team members delivering the modules, setting the examinations and marking papers should have the appropriate technical knowledge and skills. iii. The team should be well supported by the HEI. It would be desirable to see that the Master s degree programme has valuable external linkages. iv. There should be a well-defined process for keeping the Master s degree up to date that takes account of appropriate internal and external advice. v. Students undertaking the Master s should have access to well-equipped modern computer laboratories with easy access to information on the latest developments in computer science and cyber security. Page 19 of 48

20 3 Description of the Master s degree in Computer Science for Cyber Security Please ensure that you cover the following points: a. Please provide a high-level description of the Master s degree. This should include: the name of the degree and the specific degree awarded (e.g., MSc etc.) the objectives and expected learning outcomes of the degree as a grounding for a Master s qualification how the degree satisfies the QAA qualification framework for Master s level the number of academic years the degree has been running and whether it is being delivered in academic year the overall structure of the degree e.g., the set of taught modules, which modules are core and which are optional, the number of credits awarded for each module, the number of credits awarded for the original research dissertation any professional certifications attained as part of the degree, if applicable a description of how the degree is structured to accommodate part-time students, if applicable b. Please provide a table (Table 3.1) that shows for each taught module: the member(s) of staff delivering the module which Subject Area(s) (Appendix B) the module covers if it does not cover a Subject Area please state NONE the number of credits in the module the percentage of the module addressing the Subject Areas the number of credits in the module that can be considered to be addressing the Subject Areas obtained from the product of the answers to the 3 rd and 4 th bullet points c. Based on the above information, please provide an estimate of the total number of credits addressing the Subject Areas in the taught component of the degree. Please express the ratio of this figure and the total number of taught credits as your estimate of the percentage of the taught component of the Master s degree that can be mapped to the Subject Areas. Where students have a choice of optional taught modules (e.g., any 2 modules from a set of 5), please do not sum the credits from all of the optional modules but only the number that students would actually choose. It may help to refer to point 3f below regarding pathways. Page 20 of 48

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information

More information

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 27 February 2015, 16:00 Briefing Meeting: 14 January 2015, 13:00 Portions

More information

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information

More information

Certification of Masters Degrees Providing a General, Broad Foundation in Cyber Security

Certification of Masters Degrees Providing a General, Broad Foundation in Cyber Security Certified Masters in Cyber Security Certification of Masters Degrees Providing a General, Broad Foundation in Cyber Security Call for Applications Closing Date: 20 June 2014, 16:00 Briefing Meeting: 14

More information

Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security

Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certified Master s in Cyber Security Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Call for Applications Closing Date: 27 February 2015, 16:00 Briefing Meeting:

More information

Certification of Integrated Master s Degrees in Computer Science and Cyber Security

Certification of Integrated Master s Degrees in Computer Science and Cyber Security Certified Master s in Cyber Security Certification of Integrated Master s Degrees in Computer Science and Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05

More information

Certification of Integrated Master s Degrees in Computer Science and Cyber Security

Certification of Integrated Master s Degrees in Computer Science and Cyber Security Certified Master s in Cyber Security Certification of Integrated Master s Degrees in Computer Science and Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05

More information

Certified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security

Certified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certified Master s in Cyber Security Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certification of Master s Degrees in Digital Forensics Questions and Answers

More information

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security

Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes

More information

Certified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security

Certified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certified Master s in Cyber Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Questions and Answers from Briefing Day held on 14 th April 2014 1. To what extent is an undergraduate

More information

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Call type: Invitation for Applications Closing date: 16 December 2011, 16:00 Briefing meeting date 1 : 15 November 2011 Summary

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

ACADEMIC AWARD REGULATIONS Framework and Regulations for Professional Doctorates. Approval for this regulation given by :

ACADEMIC AWARD REGULATIONS Framework and Regulations for Professional Doctorates. Approval for this regulation given by : ACADEMIC AWARD REGULATIONS Framework and Regulations for Professional Doctorates Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing

More information

Advance with CIMA. Applying for CIMA Accreditation of Higher Education Programmes

Advance with CIMA. Applying for CIMA Accreditation of Higher Education Programmes Advance with CIMA Applying for CIMA Accreditation of Higher Education Programmes Education Directorate February 2014 Contents Contents... 2 Introduction... 3 1.0 Core Principles of Accreditation... 3 1.1

More information

Responding to feedback from students. Guidance about providing information for students

Responding to feedback from students. Guidance about providing information for students Responding to feedback from students Guidance about providing information for students Contents Introduction... 1 Policy developments since 2011... 3 How student feedback is used... 3 QAA findings of good

More information

Programme Specification for MSc Applied Sports Performance Analysis

Programme Specification for MSc Applied Sports Performance Analysis PROGRAMME SPECIFICATION Postgraduate Courses Programme Specification for MSc Applied 1. Awarding institution/body University of Worcester 2. Teaching institution University of Worcester 3. Programme accredited

More information

Programme Specification (Undergraduate) Date amended: 28 August 2015

Programme Specification (Undergraduate) Date amended: 28 August 2015 Programme Specification (Undergraduate) Date amended: 28 August 2015 1. Programme Title(s) and UCAS code(s): BSc Mathematics and Actuarial Science (including year in industry option) 2. Awarding body or

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Approved by: Senate December 2005. University Framework for Professional Doctorates

Approved by: Senate December 2005. University Framework for Professional Doctorates Approved by: Senate December 2005 University Framework for Professional Doctorates FRAMEWORK FOR PROFESSIONAL DOCTORATES Introduction The Professional Doctorates Task Group was established by the Graduate

More information

Henley Business School at Univ of Reading. Postgraduate Pre-Experience Board of Studies

Henley Business School at Univ of Reading. Postgraduate Pre-Experience Board of Studies MSc in Accounting and Financial Management For students entering in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

RESTRICTED. Professional Accreditation Handbook For Computer Science Programmes

RESTRICTED. Professional Accreditation Handbook For Computer Science Programmes Professional Accreditation Handbook For Computer Science Programmes Revised by authority of the Accreditation Committee for Computer Science Programmes as of August 2014 CONTENTS 1. FRAMEWORK FOR ACCREDITATION

More information

School of Mathematics, Computer Science and Engineering Department or equivalent School of Engineering and Mathematical Sciences Programme code

School of Mathematics, Computer Science and Engineering Department or equivalent School of Engineering and Mathematical Sciences Programme code PROGRAMME SPECIFICATION KEY FACTS Programme name Systems and Control Award MSc School School of Mathematics, Computer Science and Engineering Department or equivalent School of Engineering and Mathematical

More information

Course Specification MSc Information Management 2016-17 (INMAM)

Course Specification MSc Information Management 2016-17 (INMAM) LEEDS BECKETT UNIVERSITY Course Specification MSc Information Management 2016-17 (INMAM) Our courses undergo a process of review periodically, in addition to annual review and enhancement. Course Specifications

More information

Part one: Programme Specification

Part one: Programme Specification Part one: Programme Specification Course record information Name and level of final award: Name and level of intermediate awards: Awarding body/institution: Status of awarding body/institution: Location

More information

Programme Specification for the MSc in Computing Science

Programme Specification for the MSc in Computing Science Programme Specification for the MSc in Computing Science PLEASE NOTE. This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical student

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.

More information

Center of Academic Excellence Cyber Operations Program 2013 Application

Center of Academic Excellence Cyber Operations Program 2013 Application Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department

More information

Future Research Leaders call 2015/16 Guidance notes for non-academic reviewers

Future Research Leaders call 2015/16 Guidance notes for non-academic reviewers Future Research Leaders call 2015/16 Guidance notes for non-academic reviewers Introduction... 1 Aims and objectives... 1 Procedure... 3 Peer Review form on Je-S... 3 The decision-making process... 3 Assessment

More information

RESEARCH DEGREE REGULATIONS

RESEARCH DEGREE REGULATIONS RESEARCH DEGREE REGULATIONS These regulations apply to programmes of study leading to the award of Master of Philosophy and Doctor of Philosophy, including the Doctor of Philosophy awarded on the basis

More information

MSc in Computer and Information Security

MSc in Computer and Information Security MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September

More information

Henley Business School at Univ of Reading. Chartered Institute of Management Accounting (CIMA) Certificate Level (C01 to C05)

Henley Business School at Univ of Reading. Chartered Institute of Management Accounting (CIMA) Certificate Level (C01 to C05) MSc Accounting and International Management (full-time) For students entering in 2015/6 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length:

More information

REGULATIONS FOR RESEARCH DEGREE PROGRAMMES. MPhil PhD PhD by Published Work Professional Doctorates Higher Doctorates

REGULATIONS FOR RESEARCH DEGREE PROGRAMMES. MPhil PhD PhD by Published Work Professional Doctorates Higher Doctorates REGULATIONS FOR RESEARCH DEGREE PROGRAMMES MPhil PhD PhD by Published Work Professional Doctorates Higher Doctorates May 2013 Contents Page 1. Principles 4 2. Master of Philosophy/Doctor of Philosophy

More information

Henley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for

Henley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for BA Accounting and Business For students entering Part 1 in 2014/5 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

Programme Specification for the MSc in Computing (<Specialism>)

Programme Specification for the MSc in Computing (<Specialism>) Programme Specification for the MSc in Computing () include: Artificial Intelligence; Computational Management Science; Distributed Systems; Software Engineering and Visual Information

More information

REQUIREMENTS. for OMAN S SYSTEM OF QUALITY ASSURANCE IN HIGHER EDUCATION

REQUIREMENTS. for OMAN S SYSTEM OF QUALITY ASSURANCE IN HIGHER EDUCATION APPROVED VERSION Page 1 REQUIREMENTS for OMAN S SYSTEM OF QUALITY ASSURANCE IN HIGHER EDUCATION APPROVED VERSION Page 2 TABLE OF CONTENTS INTRODUCTION Part One: Standards I. Standards for Quality Assurance

More information

Henley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for

Henley Business School. Henley Business School at Univ of Reading. Henley Business School Board of Studies for BA Accounting and Business For students entering Part 1 in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

Application Guidance CCP Penetration Tester Role, Practitioner Level

Application Guidance CCP Penetration Tester Role, Practitioner Level August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document

More information

Programme Specification

Programme Specification Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics

More information

Henley Business School at Univ of Reading

Henley Business School at Univ of Reading MSc in Marketing and International Management For students entering in 2012/3 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of

More information

Programme Specification for Computer Systems Engineering (Software Systems) MSc

Programme Specification for Computer Systems Engineering (Software Systems) MSc Programme Specification for Computer Systems Engineering (Software Systems) MSc This programme is only recruiting at Linton Education Group, Malaysia and FTMS, Malaysia. Recruitment to this programme at

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching

More information

Programme Specification: MSc Electronic Commerce

Programme Specification: MSc Electronic Commerce Programme Specification: MSc Electronic Commerce 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification MSc 5. Programme

More information

Introduction 5. Section 1: Who is eligible to apply? 7. Section 2: The pre-application criteria 8. Section 3: Submitting an application 9

Introduction 5. Section 1: Who is eligible to apply? 7. Section 2: The pre-application criteria 8. Section 3: Submitting an application 9 TAUGHT DEGREE AWARDING POWERS AND RESEARCH DEGREE AWARDING POWERS Guidance for Higher Education Providers: Criteria and Process for applying for Taught Degree Awarding Powers and Research Degree Awarding

More information

2.2 Assessors shall not be members of Boards or Joint Boards of Examiners and shall not be entitled unless invited to attend their meetings.

2.2 Assessors shall not be members of Boards or Joint Boards of Examiners and shall not be entitled unless invited to attend their meetings. Regulations for the Examination of Master s Level Degrees 1 Appointment of Examiners 1 Definition of Terms Used: Examiners 1.1 Members of Boards of Examiners shall be designated as Examiners, as follows:

More information

PROGRAMME SPECIFICATION KEY FACTS. Programme name MSc Construction Management. Department or School of Engineering and Mathematical Sciences

PROGRAMME SPECIFICATION KEY FACTS. Programme name MSc Construction Management. Department or School of Engineering and Mathematical Sciences PROGRAMME SPECIFICATION KEY FACTS Programme name MSc Construction Management Award MSc School School of Engineering and Mathematical Sciences Department or School of Engineering and Mathematical Sciences

More information

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Master of Science, Postgraduate Diploma and Postgraduate Certificate in Business Information Systems. The specification

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Clinical Research Award Masters in Research (MRes) School Health Sciences Department or equivalent Division of Health Services Research

More information

Cyber Security Organisational Standards. Guidance

Cyber Security Organisational Standards. Guidance Cyber Security Organisational Standards Guidance April 2013 Contents Contents...2 Overview...3 Background...4 Definitions...5 Presentation and Layout...6 Submissions Guidance...7 Acceptance Criteria...8

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION 1 Awarding Institution Newcastle University 2 Teaching Institution Newcastle University 3 Final Award MA 4 Programme Title MA in the History of the Americas 5 UCAS/Programme Code

More information

How To Get A Masters Degree By Research

How To Get A Masters Degree By Research REGULATION 23 MASTERS DEGREES BY RESEARCH 1. General The University confers Masters Degrees by Research in line with the Framework for Higher Education Qualifications in England, Wales and Northern Ireland

More information

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Master of Science, Master of Science with a Year in Industry, Postgraduate Diploma, and Postgraduate Certificate

More information

Engineering Gateways degrees. Bachelors and MSc Professional Engineering

Engineering Gateways degrees. Bachelors and MSc Professional Engineering Engineering Gateways degrees Bachelors and MSc Professional Engineering A guide for Higher Education Institutions Flexible work-based pathways to being registered as a professionally qualified engineer

More information

Quality Assurance and Enhancement Documentation. 1.0 Introduction. 2.0 Standard Format. 3.0 Programme Approval Form. 4.0 Validation Documentation

Quality Assurance and Enhancement Documentation. 1.0 Introduction. 2.0 Standard Format. 3.0 Programme Approval Form. 4.0 Validation Documentation Quality Assurance and Enhancement Documentation 1.0 Introduction 2.0 Standard Format 3.0 Programme Approval Form 4.0 Validation Documentation 5.0 Response to Conditions 6.0 Definitive Document 7.0 Programme

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Library Science Award MSc/MA School Mathematics, Computer Science and Engineering Department or equivalent Department of Library

More information

Guidance by the General Board on the arrangements for External Examiners

Guidance by the General Board on the arrangements for External Examiners Guidance by the General Board on the arrangements for External Examiners Contents 1. Purpose... 2 2. Roles and responsibilities... 2 Setting and reviewing question papers... 2 Moderating examination scripts:...

More information

Programme Specification including programme description

Programme Specification including programme description Programme Specification including programme description Form QA3-2 GENERAL INFORMATION Awarding Institution//Body Teaching Institution Validated/Franchised (if appropriate) Programme accredited by (including

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

Programme name Civil Engineering, Civil Engineering with Industrial Placement

Programme name Civil Engineering, Civil Engineering with Industrial Placement PROGRAMME SPECIFICATION KEY FACTS Programme name Civil Engineering, Civil Engineering with Industrial Placement Award BEng (Hons) School School of Mathematics, Computer Science and Engineering Department

More information

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES. Programme BEng Computer Systems Engineering/BEng Computer Systems Engineering with Placement

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES. Programme BEng Computer Systems Engineering/BEng Computer Systems Engineering with Placement PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme BEng Computer Systems Engineering/BEng name Computer Systems Engineering with Placement Award BEng (Hons) School School of Engineering

More information

Teaching and Learning Methods

Teaching and Learning Methods Programme Specification (Postgraduate) Date amended: 1. Programme Title (EdD) 2. Awarding body or institution University of Leicester 3. a) Mode of Study part time b) Type of Study postgraduate research

More information

Programme Specification and Curriculum Map for MSc Data and Knowledge Engineering

Programme Specification and Curriculum Map for MSc Data and Knowledge Engineering Programme Specification and Curriculum Map for MSc Data and Knowledge Engineering 1. Programme title Data and Knowledge Engineering 2. Awarding institution Middlesex University 3. Teaching institution

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION 1 Awarding Institution Newcastle University 2 Teaching Institution Newcastle University 3 Final Award Master of Science (MSc) 4 Programme Title Advanced Computer Science 5 Programme

More information

Work with your prospective supervisors to complete your application.

Work with your prospective supervisors to complete your application. Guidance notes for ESRC applicants October 2016 Entry The deadline for applications is noon (GMT) on Friday 19 th February 2016. It is important that you allow yourself sufficient time to read these Guidance

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

Mode of Study The MPH course will be delivered full-time and part-time on campus at the Kedleston Road site

Mode of Study The MPH course will be delivered full-time and part-time on campus at the Kedleston Road site PROGRAMME SPECIFICATION DOCUMENT SECTION ONE: GENERAL INFORMATION Programme Title/ Subject Title: Master of Public Health Award title and Interim awards: Postgraduate Certificate in Public Health Postgraduate

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Public Health (Health Visiting, School Nursing or District Nursing) Award Postgraduate Diploma/MSc School School of Health Sciences

More information

Risk Implications There are no material risks to the University associated with the approval of these amendments.

Risk Implications There are no material risks to the University associated with the approval of these amendments. Title: Updates to Regulations for EdD Author: Dr Vivien Easson, Head of Postgraduate Research Service Date: 30 April 2015 Agenda: Learning and Teaching Committee, 13 May 2015 Version: Final Status: Open

More information

Quality Handbook. Part B: Assuring and Enhancing Quality. Section 11: Research degrees. Section11. Nottingham Trent University

Quality Handbook. Part B: Assuring and Enhancing Quality. Section 11: Research degrees. Section11. Nottingham Trent University Nottingham Trent University Quality Handbook Part B: Assuring and Enhancing Quality Section : Research degrees Contents. The postgraduate research environment... 2 2. Course monitoring and reporting...

More information

MSc in Physics Research For students entering in 2006

MSc in Physics Research For students entering in 2006 MSc in Physics Research For students entering in 2006 Awarding Institution: The University of Reading Teaching Institution: The University of Reading Faculty of Science Programme length: 12 or 24 months

More information

Programme Specification

Programme Specification Hertfordshire Business School Title of Programme: Programme Code: MSc Marketing BSMSCMK Programme Specification This programme specification is relevant to students entering: 01 September 2015 Associate

More information

University of Cambridge: Programme Specifications UNDERGRADUATE ADVANCED DIPLOMA IN PHILOSOPHY

University of Cambridge: Programme Specifications UNDERGRADUATE ADVANCED DIPLOMA IN PHILOSOPHY University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information in this programme specification. Programme specifications are produced and then reviewed

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Clinical Engineering with Healthcare Technology

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Clinical Engineering with Healthcare Technology PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Clinical Engineering with Healthcare Technology Award MSc School School of Engineering and Mathematical Sciences Department or equivalent

More information

Programme Specification and Curriculum Map for MSc Business Information Systems Management

Programme Specification and Curriculum Map for MSc Business Information Systems Management Programme Specification and Curriculum Map for MSc Business Information Systems Management 1. Programme title Business Information Systems Management 2. Awarding institution Middlesex University 3. Teaching

More information

Programme Specification and Curriculum Map for MSc Computer and Network Security

Programme Specification and Curriculum Map for MSc Computer and Network Security Programme Specification and Curriculum Map for MSc Computer and Network Security 1. Programme title MSc Computer and Network Security 2. Awarding institution Middlesex University 3. Teaching institution

More information

PROGRAMME SPECIFICATION University Certificate Psychology. Valid from September 2012. Faculty of Education, Health and Sciences -1 -

PROGRAMME SPECIFICATION University Certificate Psychology. Valid from September 2012. Faculty of Education, Health and Sciences -1 - Faculty of Education, Health and Sciences PROGRAMME SPECIFICATION University Certificate Valid from September 2012-1 - www.derby.ac.uk/ehs CONTENTS SECTION ONE: GENERAL INFORMATION... 1 SECTION TWO: OVERVIEW

More information

The educational aims provide the over-arching structure to the course, together with also establishing its key philosophical underpinnings.

The educational aims provide the over-arching structure to the course, together with also establishing its key philosophical underpinnings. PROGRAMME SPECIFICATION MSc Applied Sport Science 1 Awarding institution/body University of Worcester 2 Teaching institution University of Worcester 3 Programme accredited by N/A 4 Final award MSc 5 Programme

More information

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016 Digital Industries Apprenticeship: Assessment Plan Cyber Security Technologist April 2016 1 Digital Industries Apprenticeships: Assessment Plan 1. General Introduction and Overview The apprenticeship Standard

More information

Previous Approvals: April 5, 2005; May 6, 2008; November 2, 2010; May 3, 2011, May 3, 2011, May 7, 2013

Previous Approvals: April 5, 2005; May 6, 2008; November 2, 2010; May 3, 2011, May 3, 2011, May 7, 2013 RYERSON UNIVERSITY POLICY OF SENATE PERIODIC PROGRAM REVIEW OF GRADUATE AND UNDERGRADUATE PROGRAMS Policy Number 126 Previous Approvals: April 5, 2005; May 6, 2008; November 2, 2010; May 3, 2011, May 3,

More information

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013 PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the

More information

The Diploma Supplement is issued as two elements by the University of Central Lancashire as follows:

The Diploma Supplement is issued as two elements by the University of Central Lancashire as follows: Diploma Supplement The Diploma Supplement issued by the University of Central Lancashire follows the model developed by the European Commission, Council of Europe and UNESCO/CEPES. The purpose of the supplement

More information

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Electrical & Electronic Engineering/ Electrical & Electronic Engineering with Placement Award MEng School School of Engineering

More information

Programme Specifications

Programme Specifications Programme Specifications MASTER OF RESEARCH: INTEGRATED PHOTONIC AND ELECTRONIC SYSTEMS 1 Awarding body University of Cambridge 2 Teaching institution Department of Engineering 3 Accreditation details

More information

Programme Specification and Curriculum Map for MSc Computer Networks

Programme Specification and Curriculum Map for MSc Computer Networks Programme Specification and urriculum Map for MSc omputer Networks 1. Programme title MSc omputer Networks 2. Awarding institution Middlesex University 3. Teaching institution Middlesex University 4. Programme

More information

Teaching institution: Institute of Education, University of London

Teaching institution: Institute of Education, University of London PROGRAMME SPECIFICATION MA Geography in Education Awarding body: Institute of Education, University of London Teaching institution: Institute of Education, University of London Name of the final award:

More information

PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology

PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology Faculty of Education, Health and Sciences PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology Valid from September 2012 www.derby.ac.uk/ehs 1 CONTENTS SECTION ONE: GENERAL INFORMATION...

More information

Programme Specifications

Programme Specifications Programme Specifications ADVANCED DIPLOMA IN THE STUDY OF RELIGION 1 Awarding body University of Cambridge 2 Teaching institution University of Cambridge Institute of Continuing Education * 3 Accreditation

More information

Programme Specification. MSc Health Psychology (On Campus) Valid from: September 2015 Programme Code: MC8AA

Programme Specification. MSc Health Psychology (On Campus) Valid from: September 2015 Programme Code: MC8AA Programme Specification MSc Health Psychology (On Campus) Valid from: September 2015 Programme Code: MC8AA CONTENTS SECTION ONE: GENERAL INFORMATION... 1 SECTION TWO: OVERVIEW AND PROGRAMME AIMS... 3 SECTION

More information

BSc (Honours) Computing and Information Systems (Distance Learning)

BSc (Honours) Computing and Information Systems (Distance Learning) BSc (Honours) Computing and Information Systems (Distance Learning) Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information

More information

Procedures for the Review of New and Existing Undergraduate Programmes

Procedures for the Review of New and Existing Undergraduate Programmes Procedures for the Review of New and Existing Undergraduate Programmes 1. Quality Assurance at Imperial College 1.1 The Senate of Imperial College has established a number of principal committees which

More information

Henley Business School at Univ of Reading. Henley Business School Board of Studies for

Henley Business School at Univ of Reading. Henley Business School Board of Studies for BA Business and Management For students entering Part 1 in 2013/4 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

REGISTRATION AND PROGRESSION REGULATIONS FOR THE AWARD OF. DOCTOR OF PROFESSIONAL STUDIES (DProf) MASTER OF PROFESSIONAL STUDIES (MProf)

REGISTRATION AND PROGRESSION REGULATIONS FOR THE AWARD OF. DOCTOR OF PROFESSIONAL STUDIES (DProf) MASTER OF PROFESSIONAL STUDIES (MProf) RDC-C REGISTRATION AND PROGRESSION REGULATIONS FOR THE AWARD OF DOCTOR OF PROFESSIONAL STUDIES (DProf) MASTER OF PROFESSIONAL STUDIES (MProf) 2015-16 ACADEMIC YEAR TO BE USED IN CONJUNCTION WITH: RDC-A

More information

UK Position Statement

UK Position Statement UK Position Statement Bergen ministerial summit - May 2005 UK support for the Bologna Process 1. The UK welcomes the Bologna Process in providing the potential to strengthen institutions and to widen student

More information

How To Write A Degree Degree

How To Write A Degree Degree TAUGHT DEGREE REGULATIONS These regulations apply to programmes of study leading to undergraduate awards and taught postgraduate awards at Master s Level except in cases where professional body requirements

More information

Programme Specification

Programme Specification Programme Specification (please see the notes at the end of this document for a summary of uses of programme specifications) Fields marked with * must be completed for the initial submission for Stage

More information

Regulations and Procedures Governing the Award of the Degrees of: Doctor of Philosophy by Published Work

Regulations and Procedures Governing the Award of the Degrees of: Doctor of Philosophy by Published Work Regulations and Procedures Governing the Award of the Degrees of: Doctor of Philosophy by Published Work and Doctor of Philosophy by Practice 2014-15 Issued by the Standards and Enhancement Office, September

More information

POSTGRADUATE PROGRAMME SPECIFICATION

POSTGRADUATE PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Masters Computing Degrees Scheme Staffordshire University Faculty of Computing, Engineering and Sciences at Staffordshire

More information