Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security

Size: px
Start display at page:

Download "Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security"

Transcription

1 OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes GCHQ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptions under other UK information legislation. Refer disclosure requests to GCHQ on x30306, infoleg@gchq.gsi.gov.uk

2 Welcome and Introductions Michael Kirton

3 Describe academic engagement programme motivation for setting up Master s certification application process and criteria Outline certification terms and conditions Answer questions and receive feedback Aims of Meeting

4 : Cyber security education and skills programmes, C. Ensor Agenda : Q&A session : Master s applications and criteria, M. Kirton : Q&A Session : Break : Outline of certification terms and conditions, E. England : Q&A Session : Next steps, G. Dykes : Q&A session 4

5 Housekeeping Meeting is not classified Fire alarm, toilets Slides

6 Cyber Security Skills Chris Ensor, Deputy Director National Technical Authority for Information Assurance WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

7 03/06/ Government Code and Cipher School established within FCO 1939 GCCS moves to Bletchley Park 1946 GCCS moves to Eastcote as GCHQ Intelligence arm moves to Cheltenham Security arm merges with GPO research and becomes CESD 1973 CESD becomes CESG and merges back with GCHQ 1978 CESG moves to Cheltenham 1994 GCHQ recognised under the Intelligence Services Act

8 GCHQ & Academia UK GCHQ needs Academia to support its security mission Enhancing UK NTA knowledge base through original research Providing NTA with top quality people UK Providing effective education and training. make the UK a safe place to do business in Cyber Space

9 NCSS and Our Objectives

10

11 Developing the Workforce of the Future Develop a Cyber Security Profession Outcome 1: There is an increased pipeline of a cyber capable workforce Cyber Security GCSE Cyber Security A Level Cyber & Cipher Challenges Apprenticeships (e-skills UK) Internships (e-skills UK) Certified Masters Bursaries (CSSA) Head of Profession Heads of Specialism Skills Framework CESG Certified Professional Learning Pathways (e-skill UK) Certified Training Outcome 2: There is a sustained supply of competent cyber security professionals available, adequate to meet growing demand levels ACE - CSE Increase Cyber Security Research Influence Associated Professions Outcome 4: UK is recognised as having a leading edge cyber security research capability that can be exploited where appropriate ACE-CSRs Research Institutes Funded PhDs Centres for Doctoral Training Project management Software engineering Procurement Legal Audit Outcome 3: Appropriate cyber security knowledge is part of the day job for relevant noncyber security professionals across the public and private sectors

12 Areas of Excellence Cryptography, Key Management and Security Protocols Information Risk Management Hardware Engineering Information Assurance Methodologies Operational Assurance Techniques Strategic Technologies and Products Electromagnetic Physics and Security Engineering processes and assurance

13 ACE Cyber Security Research

14 PhDs 1 st Tranche Bristol - Authentication, Ciphers, and Encryption Cryptographically Secure and Relevant - Information leakage aware verification Imperial - Joint Modelling of Edge Evolution in Dynamic Graphs Lancaster - Social and Technical Objects for Resilience and Cyber Security (STORC) Oxford - Combining Binary and Source Analysis for Scalable Exploit Generation Queen s - Novel Application of Advanced Machine Learning Techniques for use in Side Channel Attacks RHUL - Randomness in Complexity - Theory Meets Practice - Computational Algebra Approach to Learning with Errors UCL - Measuring and Influencing Cyber Security Risk Perceptions

15 PhDs 2 nd Tranche Birmingham - BaDSeED: Backdoor Detection Systems for Embedded Devices Bristol - Secure Application Programming Interfaces for Key Management - Game Theory of Cryptographic Threat Mitigation Cambridge - Model-Based Assessment of Compromising Emanations Lancaster - Weak Signals as Predictors of Sophisticated Social Engineering Attacks Newcastle - Scalability of Attacks in Identity Federation Leading to Cyber Threats Oxford - Graceful Security Degradation - Realistic, Strong and Provable Key Exchange Security RHUL - Cryptobugs Detecting Incorrect Use of Cryptographic Routines UCL - Towards a Discipline of Traffic Analysis - Access Control: Models and Compliance

16 Centres for Doctoral Training

17 Research Institutes Filling the excellence gaps RI1 - The Science of Cyber Security 2M GCHQ & 1.8M EPSRC How secure is my organisation? How do we make better security decisions? RI2 - Automated Program Analysis and Verification 2M GCHQ & 2.5M EPSRC Program analysis and verification for Binaries, source code, JavaScript and other mobile code RI3 Trustworthy Industrial Control Systems CPNI & EPSRC

18 The Science of Cyber Security

19 Automated Program Analysis and Verification

20 Trustworthy Industrial Control Systems

21 e-skills UK Cyber Apprenticeships Cyber Module A-level Trustworthy Software Initiative Schools cipher challenge Cyber Industry Internships Cyber Module GCSE Cyber in IT Management for Business Academic Centres of Excellence for Education MSc Certification Research Institutes CDTs 4/15/2014 GCHQ Funded PhDs

22 03/06/2013 ACE Cyber Security Education Identify universities taking a holistic approach to education in cyber security subjects. Based on offering at least one suitably recognised Undergraduate or Postgraduate qualification First step will need to establish a scheme for recognising relevant qualifications, starting with Master s.

23 03/06/2013 The right Master s qualification in a relevant area of Cyber Security provides: Mid career bridge STEM bridge Top-up Research bridge Why Start with Master s?

24 Thank You.

25 Q&A Session 1

26 Master s Applications and Criteria Michael Kirton

27 Background pan-government strategy BIS, OCSIA start with general Master s map indicative topics to IISP Framework not define syllabus started drafting call document in October 2013 extensive consultation with stakeholders 6 drafts for internal and external review

28 Call document main section + 4 appendices key sections scope: section 3 appendix B: topic coverage appendix D: application structure for full certification appendix E: application structure for provisional certification

29 Scope one-year postgraduate Master s degrees or part-time equivalent cyber security: sole or main focus at least 80% of taught modules can be mapped to Security Disciplines A to H breadth of coverage at least 10 of the Skills Groups (i to xiii) covered substantial original research component

30 Full certification student cohort completed in running in external examiner s report available for Provisional certification running in ; no cohort completed in start by October 2015

31 Full application letter of support (scored) sections C.2 to C.6 description of the applicant description of the Master s degree in cyber security assessment materials and external examiner s report original research dissertations student numbers and grades achieved

32 Provisional application letter of support (scored) sections D.2 to D.5 description of the applicant description of the Master s degree in cyber security assessment materials original research dissertations

33 Scoring 0: no evidence 1: very little evidence 2: some evidence 3: good evidence 4: excellent evidence each scored section must achieve a threshold score of 3

34 General suggestions address the points in the call document e.g., section 2: 2a, 2b,. 2f observe the page limits CVs off the shelf may not be suitable some customisation to the call may be necessary

35 Criteria - 1. HEI s letter of support for the application not scored use it wisely

36 Criteria 2. Description of the applicant coherent team team members with the appropriate knowledge and skills supported by the HEI Master s course regularly reviewed and kept up to date students have access to well-equipped computer laboratories

37 Criteria 3. Description of the Master s degree in cyber security quite a lot of detailed information required scope 80% of taught modules can be mapped to Security Disciplines taught modules cover at least 10 of the Skills Groups indicative topic coverage in Skills Group appendix B, point d, page 12 not required to cover all [indicative topics] explicitly sufficient weight of coverage..

38 Criteria 3. Description of the Master s degree in cyber security permitted combinations that do/do not satisfy scope identified research component > 45% of credits need to show remainder of degree adequately covers the Skills Groups

39 Criteria 4. Assessment materials and external examiner s report rigorous assessment of students knowledge external examiner full certification appropriate technical background positive report

40 Criteria 5. Original research dissertations well-defined process for allocation and monitoring well-defined and rigorous process for assessment dissertation topics must be in one or more Security Disciplines full certification representative dissertations full certification grade awarded should be appropriate research component < 25% need to show students gain sufficient understanding and experience of undertaking original research

41 Criteria 6. Student numbers and grades achieved full certification application expect majority of students to have 2-i STEM degree and/or relevant experience expect grade distribution to some extent reflect experience and entry qualifications consult with external examiner s report positive student survey results

42 Assessment process assessment panel meeting membership: academia, GCHQ, industry, wider government each proposal read by at least 3 panel members at least one academic agree consensus score for each scored section successful application HEI s letter of support threshold score or above for each scored section no prioritisation all who meet criteria achieve certification

43 Q&A Session 2 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptions under other UK information legislation. Refer disclosure requests to GCHQ on x30306, infoleg@gchq.gsi.gov.uk

44 Break This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptions under other UK information legislation. Refer disclosure requests to GCHQ on x30306,

45 Outline of Certification Terms and Conditions Ellie England Senior Commercial Manager

46 T&Cs characteristics Successful applicants will need to agree to T&Cs based on ACE-CSR T&Cs which 11 universities have signed Branding licence HEI can use the Marks to indicate certification non-exclusive, royalty free, revocable, worldwide, non-transferable Continuing obligations maintain standards inform GCHQ of any significant change provide information on student numbers etc.

47 T&Cs characteristics Term full certification: 5 years unless ended earlier if HEI seriously breaches T&Cs and breach can t be remedied provisional certification: from award until receipt of the full certification application time limit from first cohort finishing to submission of full application General no ability to assign confidentiality dispute resolution

48 Full Certification Mark

49 Provisional Certification Mark

50 Q&A Session 3

51 Next Steps Graeme Dykes

52 Next Steps Submitting Applications submission deadline 20 th June 2014, the relevant application documents to: Content beyond the prescribed limits will not be reviewed Application questions to be ed in, there will be FAQs in the CESG web site: Retrospective student awards

53 Next Steps Assessment Panel Will meet in July All qualifying applications will be reviewed Universities will be informed of the result Subject to agreeing the T&Cs National press announcement Individual press announcements

54 Next Steps Future Calls Plan to issue 2 nd call in autumn 2014 To include Master s with narrower focus 3 rd call early 2015 Considering Integrated Master s

55 Next Steps Future Plans Recognition of ACE-CSEs call late 2014 Criteria Consultation on-going Holistic view of the university To work with partners to manage the certification process IET & BCS

56 Q&A Session 4

57 Close This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptions under other UK information legislation. Refer disclosure requests to GCHQ on x30306,

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 27 February 2015, 16:00 Briefing Meeting: 14 January 2015, 13:00 Portions

More information

Certification of Masters Degrees Providing a General, Broad Foundation in Cyber Security

Certification of Masters Degrees Providing a General, Broad Foundation in Cyber Security Certified Masters in Cyber Security Certification of Masters Degrees Providing a General, Broad Foundation in Cyber Security Call for Applications Closing Date: 20 June 2014, 16:00 Briefing Meeting: 14

More information

Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security

Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certified Master s in Cyber Security Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Call for Applications Closing Date: 27 February 2015, 16:00 Briefing Meeting:

More information

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information

More information

Certification of Master s Degrees in Computer Science for Cyber Security

Certification of Master s Degrees in Computer Science for Cyber Security Certified Master s in Cyber Security Certification of Master s Degrees in Computer Science for Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015,

More information

Certification of Master s Degrees in Digital Forensics

Certification of Master s Degrees in Digital Forensics Certified Master s in Cyber Security Certification of Master s Degrees in Digital Forensics Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015, 13:00 The information

More information

Certified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security

Certified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certified Master s in Cyber Security Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certification of Master s Degrees in Digital Forensics Questions and Answers

More information

Certified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security

Certified Master s in Cyber Security. Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certified Master s in Cyber Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Questions and Answers from Briefing Day held on 14 th April 2014 1. To what extent is an undergraduate

More information

Certification of Integrated Master s Degrees in Computer Science and Cyber Security

Certification of Integrated Master s Degrees in Computer Science and Cyber Security Certified Master s in Cyber Security Certification of Integrated Master s Degrees in Computer Science and Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Certification of Integrated Master s Degrees in Computer Science and Cyber Security

Certification of Integrated Master s Degrees in Computer Science and Cyber Security Certified Master s in Cyber Security Certification of Integrated Master s Degrees in Computer Science and Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Cyber Security Skills. Business perspectives and Government s next steps

Cyber Security Skills. Business perspectives and Government s next steps Cyber Security Skills Business perspectives and Government s next steps March 2014 Contents Foreword... 3 Executive Summary... 4 Chapter 1: Introduction... 8 Chapter 2: Key Findings... 11 Chapter 3: NCSP

More information

Cyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives

Cyber Security Skills: a guide for business. Getting involved with skills, knowledge and capability initiatives Cyber Security Skills: a guide for business Getting involved with skills, knowledge and capability initiatives March 2014 Contents Introduction... 3 Index... 4 Initiatives supporting schools... 5 Initiatives

More information

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans

The UK Cyber Security Strategy. Report on progress December 2012. Forward Plans The UK Cyber Security Strategy Report on progress December 2012 Forward Plans We are at the end of the first year of meeting the objectives outlined in the National Cyber Security Strategy. A great deal

More information

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research

Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Scheme to Recognise Academic Centres of Excellence in Cyber Security Research Call type: Invitation for Applications Closing date: 16 December 2011, 16:00 Briefing meeting date 1 : 15 November 2011 Summary

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Management of Information Security and Risk

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Management of Information Security and Risk PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Masters in Management of Information Security and Risk Award MSc School School of Mathematics, Computer Science and Engineering

More information

Cyber Security in the University of Oxford: Collaborating without Conforming?

Cyber Security in the University of Oxford: Collaborating without Conforming? Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Information Security and Risk

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Masters in Information Security and Risk PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Masters in Information Security and Risk Award MSc School Informatics Department or equivalent Centre for Software Reliability Programme

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Application Guidance CCP Penetration Tester Role, Practitioner Level

Application Guidance CCP Penetration Tester Role, Practitioner Level August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing

More information

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS QUESTION General What is the Cyber Security Incident Response (CSIR) Scheme? What is the Cyber Incident Response (CIR) scheme? Why have

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

------------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------------ WRITTEN MINISTERIAL STATEMENT CABINET OFFICE 3 RD DECEMBER 2012 Minister for the Cabinet Office and Paymaster General: Progress on the UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital

More information

Professor John McCanny CBE FRS FREng

Professor John McCanny CBE FRS FREng Foundation for Science and Technology-debate How can UK intellectual property be better protected from cyber theft". Professor John McCanny CBE FRS FREng Research Challenges Everyday we create 2.5 quintillion

More information

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com Part-time MSc in Cyber Security from Northumbria University masters.qa.com Thank you for your interest in Northumbria University s part-time MSc in Cyber Security programme, delivered in Central London

More information

Programme Specification for the MSc in Computing (<Specialism>)

Programme Specification for the MSc in Computing (<Specialism>) Programme Specification for the MSc in Computing () include: Artificial Intelligence; Computational Management Science; Distributed Systems; Software Engineering and Visual Information

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.

More information

How To Help Cyber Security

How To Help Cyber Security Cyber Security Skills: a guide for business Getting involved with skills and research initiatives December 2014 2 Contents Introduction... 3 Executive Summary... 4 Initiatives supporting schools... 8 Secure

More information

Higher Education Commission Postgraduate Education Inquiry. Response from the Council for the Mathematical Sciences

Higher Education Commission Postgraduate Education Inquiry. Response from the Council for the Mathematical Sciences Higher Education Commission Postgraduate Education Inquiry Response from the Council for the Mathematical Sciences About the Council for the Mathematical Sciences (CMS) The CMS (www.cms.ac.uk) was established

More information

Australia. CREST in. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. September 2013. Also Inside

Australia. CREST in. The THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST. September 2013. Also Inside Script The September 2013 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST CREST in Australia Also Inside Update from Ian Glover CESG and CPNI launch new schemes CRESTCon 2014 The CCP Report New Members

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

Programme Specification and Curriculum Map for MSc Data and Knowledge Engineering

Programme Specification and Curriculum Map for MSc Data and Knowledge Engineering Programme Specification and Curriculum Map for MSc Data and Knowledge Engineering 1. Programme title Data and Knowledge Engineering 2. Awarding institution Middlesex University 3. Teaching institution

More information

ESKISP6064.03 Conducts vulnerability assessment under supervision

ESKISP6064.03 Conducts vulnerability assessment under supervision Conducts vulnerability assessment under supervision Overview This standard covers the competencies required to conduct vulnerability assessments under supervision. This includes following processes for

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Project Management, Finance and Risk

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Project Management, Finance and Risk PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Project Management, Finance and Risk Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School

More information

Briefing note: GCHQ Internships

Briefing note: GCHQ Internships Briefing note: GCHQ Internships GCHQ 1 is developing new capabilities in partnership with Industry and Academic Researchers to pursue their cyber security. GCHQ is partnering with the Smith Institute 2

More information

Programme Specification: MSc Electronic Commerce

Programme Specification: MSc Electronic Commerce Programme Specification: MSc Electronic Commerce 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification MSc 5. Programme

More information

UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.

UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved. CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION Version 1.0 Crown Copyright 2012 All Rights Reserved Page 1 Document History Version Date Description 0.1 June 2012 Initial Draft Version 1.0 July

More information

Programme Specification May 2012

Programme Specification May 2012 Faculty of Business Computing and Law Programme Specification May 2012 MSc Accounting and Finance Valid from September 2012 JACS code N400/N300 Programme code Valid for delivery at University of Derby

More information

Programme Specification

Programme Specification Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Clinical Research Award Masters in Research (MRes) School Health Sciences Department or equivalent Division of Health Services Research

More information

HEE/NIHR Integrated Clinical Academic (ICA) Programme for Non-Medical/Dental Healthcare Professionals

HEE/NIHR Integrated Clinical Academic (ICA) Programme for Non-Medical/Dental Healthcare Professionals HEE/NIHR Integrated Clinical Academic (ICA) Programme for Non-Medical/Dental Healthcare Professionals Invitation to Tender for Masters in Clinical Research Studentships Introduction Health Education England

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

ESKISP6046.02 Direct security architecture development

ESKISP6046.02 Direct security architecture development Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable

More information

School of Mathematics, Computer Science and Engineering Department or equivalent School of Engineering and Mathematical Sciences Programme code

School of Mathematics, Computer Science and Engineering Department or equivalent School of Engineering and Mathematical Sciences Programme code PROGRAMME SPECIFICATION KEY FACTS Programme name Systems and Control Award MSc School School of Mathematics, Computer Science and Engineering Department or equivalent School of Engineering and Mathematical

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Library Science Award MSc/MA School Mathematics, Computer Science and Engineering Department or equivalent Department of Library

More information

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level April 2015 Issue No:1.0 Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level Application Guidance CCP Security and Information Risk Advisor Role, Practitioner Level

More information

Cyber Security skills: Business perspectives and Government s next steps. Supporting Evidence

Cyber Security skills: Business perspectives and Government s next steps. Supporting Evidence Cyber Security skills: Business perspectives and Government s next steps Supporting Evidence 1 Contents Purpose of this Document... 3 Workshops... 4 Chapter 1: Questionnaire Outputs... 5 Chapter 2: Workshop

More information

THE EDUCATION FRAMEWORK FOR UNDERGRADUATE PROGRAMMES

THE EDUCATION FRAMEWORK FOR UNDERGRADUATE PROGRAMMES THE EDUCATION FRAMEWORK FOR UNDERGRADUATE PROGRAMMES INDEX REFERENCE SUBJECT PAGE REFERENCE Section 1 General Information about the CIOB Page 4 1.1 About the CIOB Page 4 1.2 About the Education Framework

More information

Approved by: Senate December 2005. University Framework for Professional Doctorates

Approved by: Senate December 2005. University Framework for Professional Doctorates Approved by: Senate December 2005 University Framework for Professional Doctorates FRAMEWORK FOR PROFESSIONAL DOCTORATES Introduction The Professional Doctorates Task Group was established by the Graduate

More information

ESKISP6053.01 Assist security testing, under supervision

ESKISP6053.01 Assist security testing, under supervision Overview This standard covers the competencies required to assist security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Psychology Award BSc (Hons) School School of Arts and Social Sciences Department or equivalent Department of Psychology UCAS Code

More information

Engineering Gateways degrees. Bachelors and MSc Professional Engineering

Engineering Gateways degrees. Bachelors and MSc Professional Engineering Engineering Gateways degrees Bachelors and MSc Professional Engineering A guide for Higher Education Institutions Flexible work-based pathways to being registered as a professionally qualified engineer

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy THCCGCG9 Version: 01 The information governance strategy outlines the CCG governance aims and the key objectives of its governance policies. The Chief officer has the overarching

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

MSc Computer Security & Resilience 2015-16. Steve Riddle Degree Programme Director

MSc Computer Security & Resilience 2015-16. Steve Riddle Degree Programme Director MSc Computer Security & Resilience 2015-16 Steve Riddle Degree Programme Director Welcome! 1. Computer Security & Resilience 2. Computing Science at Newcastle our School 3. Principles of Study at MSc Level

More information

CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0

CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0 CYBERSECURITY RESEARCH AND INNOVATION FOR A MORE SECURE BRITAIN CYBERSECURITY ISSUE 2.0 CYBERSECURITY Research and innovation for a more secure Britain 82 million of current EPSRC investments in research

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name MSc Project Management, Finance and Risk

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name MSc Project Management, Finance and Risk PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name MSc Project Management, Finance and Risk Award MSc School School of Mathematics, Computer Science and Engineering Department or

More information

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS. School of Arts and Social Sciences Department or equivalent Department of Psychology PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Psychology Award BSc (Hons) School School of Arts and Social Sciences Department or equivalent Department of Psychology UCAS Code

More information

Cyber Security Education, Qualifications and Training

Cyber Security Education, Qualifications and Training Cyber Security Education, Qualifications and Training Prof. Keith M. Martin Information Security Group, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK This paper is a postprint of a paper

More information

REVISED GRID FOR MICRO LEVEL APPROACH

REVISED GRID FOR MICRO LEVEL APPROACH Cover sheet Country: Sector: Level: United Kingdom Bank EQF Level: 6 IT NQF Level: 6 Institution (private/state): Name of the study program : Duration (in years/months): University (state) BSc Computer

More information

Programme Specification for the MSc in Computing Science

Programme Specification for the MSc in Computing Science Programme Specification for the MSc in Computing Science PLEASE NOTE. This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical student

More information

Quality Assurance of Medical Appraisers

Quality Assurance of Medical Appraisers Quality Assurance of Medical Appraisers Recruitment, training, support and review of medical appraisers in England www.revalidationsupport.nhs.uk Contents 1. Introduction 3 2. Purpose and overview 4 3.

More information

Jump! VAT Reg. No. 825 2331 53

Jump! VAT Reg. No. 825 2331 53 Jump! VAT Reg. No. 825 2331 53 University of Surrey Engineering Doctorates Market Review Executive summary Authors: Ian Cooper, Jason Palmer Researchers: Amy Tillson, Nic Rogers, Chris Lane 2010 Engineering

More information

Policy and Framework for Structured PhD Programmes. Adopted by Academic Council on 16 th February 2011

Policy and Framework for Structured PhD Programmes. Adopted by Academic Council on 16 th February 2011 Policy and Framework for Structured PhD Programmes Adopted by Academic Council on 16 th February 2011 INTRODUCTION The purpose of this policy document is to develop a framework along with a set of guidelines

More information

Advance with CIMA. Applying for CIMA Accreditation of Higher Education Programmes

Advance with CIMA. Applying for CIMA Accreditation of Higher Education Programmes Advance with CIMA Applying for CIMA Accreditation of Higher Education Programmes Education Directorate February 2014 Contents Contents... 2 Introduction... 3 1.0 Core Principles of Accreditation... 3 1.1

More information

Management. Imperial College Business School. Total Credits ECTS: 90 CATS: 180. 2 nd cycle. Veronica Russell Teaching & Quality Manager

Management. Imperial College Business School. Total Credits ECTS: 90 CATS: 180. 2 nd cycle. Veronica Russell Teaching & Quality Manager MSc Management This document provides a definitive record of the main features of the programme and the learning outcomes that a typical student may reasonably be expected to achieve and demonstrate if

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved CREST EXAMINATIONS This document and any information therein are the property of CREST and without infringement neither the whole nor any extract may be disclosed, loaned, copied or used for manufacturing,

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September

More information

MSc EuroMasters in Physics HANDBOOK 2015/16

MSc EuroMasters in Physics HANDBOOK 2015/16 POSTGRADUATE TAUGHT PROGRAMMES MSc EuroMasters in Physics HANDBOOK 2015/16 FACULTY OF SCIENCES CONTENTS 1 Introduction...3 2 Programme Structure and Requirements...4 3 Study at Two Institutions...6 4 PH754:

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Valid from: September 2012 Faculty of Technology, Design and Environment

Valid from: September 2012 Faculty of Technology, Design and Environment Programme Specification BSc (Hons) Information Technology Management for Business Valid from: September 2012 Faculty of Technology, Design and Environment SECTION 1: GENERAL INFORMATION Awarding body:

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

Practitioner Certificate in Information Assurance Architecture (PCiIAA) Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,

More information

Getting to know ECVET better Various Stakeholders Perspectives

Getting to know ECVET better Various Stakeholders Perspectives 2nd Seminar of the National Team of ECVET Experts 18th September 2013 European Credit System for Vocational Education and Training Getting to know ECVET better Various Stakeholders Perspectives Veronica

More information

University of the West of England, Bristol. Intellectual Property Policy

University of the West of England, Bristol. Intellectual Property Policy University of the West of England, Bristol Intellectual Property Policy 1 INTRODUCTION...2 1.1 EXTERNAL CONTEXT...2 1.2 CONTENT...2 1.3 STAKEHOLDERS...2 1.4 RAISING ISSUES...3 2 LEGAL OWNERSHIP OF INTELLECTUAL

More information

Quality Assurance and Enhancement Documentation. 1.0 Introduction. 2.0 Standard Format. 3.0 Programme Approval Form. 4.0 Validation Documentation

Quality Assurance and Enhancement Documentation. 1.0 Introduction. 2.0 Standard Format. 3.0 Programme Approval Form. 4.0 Validation Documentation Quality Assurance and Enhancement Documentation 1.0 Introduction 2.0 Standard Format 3.0 Programme Approval Form 4.0 Validation Documentation 5.0 Response to Conditions 6.0 Definitive Document 7.0 Programme

More information

University of York. The York Management School. Lecturer in International Business. Ref: UoY00919. Job Description and Person Specification

University of York. The York Management School. Lecturer in International Business. Ref: UoY00919. Job Description and Person Specification University of York The York Management School Lecturer in International Business Ref: UoY00919 Job Description and Person Specification Requirements of the post This is a new post arising from continuing

More information

Irish experiences of development of a new framework for PhD Education. Prof Alan Kelly, Dean of Graduate Studies University College Cork, Ireland

Irish experiences of development of a new framework for PhD Education. Prof Alan Kelly, Dean of Graduate Studies University College Cork, Ireland Irish experiences of development of a new framework for PhD Education Prof Alan Kelly, Dean of Graduate Studies University College Cork, Ireland The national ambition: A new model for PhD training in Ireland

More information

Programme name Civil Engineering, Civil Engineering with Industrial Placement

Programme name Civil Engineering, Civil Engineering with Industrial Placement PROGRAMME SPECIFICATION KEY FACTS Programme name Civil Engineering, Civil Engineering with Industrial Placement Award BEng (Hons) School School of Mathematics, Computer Science and Engineering Department

More information

Mathematics, Computer Science and Engineering Department or equivalent Computer Science

Mathematics, Computer Science and Engineering Department or equivalent Computer Science PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name MSc Health Informatics Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Computer Science

More information

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013

3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013 PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the

More information

/ Doctorate of Business Administration

/ Doctorate of Business Administration / Doctorate of Business Administration Sunderland Business School s Doctorate of Business Administration programme (DBA) is a stimulating, innovative programme which has been developed to strengthen your

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Clinical Engineering with Healthcare Technology

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Clinical Engineering with Healthcare Technology PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Clinical Engineering with Healthcare Technology Award MSc School School of Engineering and Mathematical Sciences Department or equivalent

More information

2.2 Assessors shall not be members of Boards or Joint Boards of Examiners and shall not be entitled unless invited to attend their meetings.

2.2 Assessors shall not be members of Boards or Joint Boards of Examiners and shall not be entitled unless invited to attend their meetings. Regulations for the Examination of Master s Level Degrees 1 Appointment of Examiners 1 Definition of Terms Used: Examiners 1.1 Members of Boards of Examiners shall be designated as Examiners, as follows:

More information

CBEST Implementation Guide

CBEST Implementation Guide CBEST Implementation Guide Introduction Existing penetration testing services conducted within the financial services sector are well understood and utilised. Whilst these services have provided a good

More information

PROGRAMME SPECIFICATION - UNDERGRADUATE PROGRAMMES. School of Mathematics, Computer Science and Engineering Department or equivalent Computer Science

PROGRAMME SPECIFICATION - UNDERGRADUATE PROGRAMMES. School of Mathematics, Computer Science and Engineering Department or equivalent Computer Science PROGRAMME SPECIFICATION - UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Software Engineering Award BSc (Hons) School School of Mathematics, Computer Science and Engineering Department or equivalent

More information

National Occupational Standards. Compliance

National Occupational Standards. Compliance National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them? National Occupational Standards (NOS) are statements

More information

Programme name Computer Science with Artificial Intelligence

Programme name Computer Science with Artificial Intelligence PROGRAMME SPECIFICATION KEY FACTS Programme name Computer Science with Artificial Intelligence Award BSc (Hons) School School of Informatics Department or equivalent School of Informatics UCAS Code G4G7

More information

University of Bradford. 1 year full time, 2 years part-time

University of Bradford. 1 year full time, 2 years part-time UNIVERSITY OF BRADFORD Faculty of Engineering and Informatics School of Electrical Engineering and Computer Science (EECS) Programme/course title: MSc Cyber Security Awarding and teaching institution:

More information

SUMMARY REPORT ON VALIDATION OF THE STRUCTURED ELEMENTS OF PhD PROGRAMME Q 3

SUMMARY REPORT ON VALIDATION OF THE STRUCTURED ELEMENTS OF PhD PROGRAMME Q 3 SUMMARY REPORT ON VALIDATION OF THE STRUCTURED ELEMENTS OF PhD PROGRAMME Q 3 Part 1 Programme details Proposed titles Nature and duration of programme DIT awards sought Classifications of award Parallel

More information

Programme Specification (2015-16)

Programme Specification (2015-16) Date of Revision Date of Previous Revision Programme Specification (2015-16) A programme specification is required for any programme on which a student may be registered. All programmes of the University

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. MSc Health Management in Strategic Management and Leadership

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. MSc Health Management in Strategic Management and Leadership PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Award School Department or equivalent Programme code Type of study Total UK credits 180 Total ECTS 90 PROGRAMME SUMMARY MSc Health

More information

Programme Specification and Regulations

Programme Specification and Regulations Programme Specification and Regulations 2013 2014 Economics, Management, Finance and Social Sciences Programmes (New Regulations) (BSc, Diploma for Graduates, Diplomas in Economics and Social Sciences)

More information

aprogramme SPECIFICATION POSTGRADUATE PROGRAMMES

aprogramme SPECIFICATION POSTGRADUATE PROGRAMMES aprogramme SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Counselling Psychology Award Graduate Certificate School School of Arts and Social Sciences Department or equivalent Department

More information