N/A. Computer Science. Software Engineering. Electrical and/or Electronic Engineering. Mathematics with Computer Science



Similar documents
N/A. Prior Qualifications. Aptitude Test. International Applicants (Non-INTO Queen s applicants) An overall average of 60%. All modules passed.

Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code

Programme Specification ( )

Programme Specification ( )

Final Award. (exit route if applicable for Postgraduate Taught Programmes) GN51 JACS Code. The entry qualifications are:

Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. UCAS Code. Length of Programme. Queen s University Belfast

Programme Specification ( )

Programme Specification ( )

Programme Specification ( )

Programme Specification ( )

Programme Specification ( )

Final Award. (exit route if applicable for Postgraduate Taught Programmes) H204 JACS Code

Programme Specification ( ): MSc in Bioinformatics and Computational Genomics

Masters in Early Childhood studies. Early Childhood Studies. Full Time and Part Time. Queens University, Belfast Stranmillis University College

Programme Specification ( )

Programme Specification ( )

Programme Specification ( )

Early Childhood Studies FT Programme Code ECS-FND-S UCAS Code Criteria for Admissions (Please see General Regulations)

UNIVERSITY OF ULSTER PROGRAMME SPECIFICATION. PgCert/PgDip/MSc in Healthcare informatics

Final Award. (exit route if applicable for Postgraduate Taught Programmes) D991 JACS Code

PROGRAMME SPECIFICATION

LOUGHBOROUGH UNIVERSITY Programme Specification Digital Imaging, Computer Graphics and Vision

COURSE OR HONOURS SUBJECT TITLE: BSc Hons Information Technologies with/without DPP/DPP(I)/DIAS with CertHE and AB exit awards (FT)

BA Early Childhood Studies FT

PROGRAMME SPECIFICATION COURSE TITLE: MSc Advanced Accounting

1. Programme title and designation Advanced Software Engineering

MSc Multimedia Systems and Communications Engineering. Programme Specification

Programme Specification 2015/16

Henley Business School at Univ of Reading. Eligible for British Computer Society Professional Certificate in Business Analysis Practice

N/A. 1 year. 6 years

All LJMU programmes are delivered and assessed in English

Programme Specification and Curriculum Map for MSc Design Engineering and Manufacturing Management

Any special criteria equivalent MA Public Policy N/A 3. Nested award Award Title Credit value ECTS

B1.2 PROGRAMME SPECIFICATION. COURSE TITLE: MSc SPORT MANAGEMENT

UNIVERSITY OF EAST LONDON. POSTGRADUATE PROGRAMME SPECIFICATION MSc Business Psychology. Alternative locations for studying this programme:

Value equivalent. ECTS equivalent. Value

Programme Specification

FOUNDATION DEGREE - BUSINESS MANAGEMENT PROGRAMME SPECIFICATION

MSc in Computer and Information Security

COURSE OR HONOURS SUBJECT TITLE: PgDip / MSc in Health Psychology (with PGCert exit award)

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Computer and Network Security

COURSE OR HONOURS SUBJECT TITLE: PG Cert/Diploma/MSc Communication, Advertising and Public Relations

Programme Specification: MSc Electronic Commerce

All LJMU programmes are delivered and assessed in English. Psychology

Value equivalent. ECTS equivalent. Value N/A

PROGRAMME SPECIFICATION MSc Psychology

COURSE SUBJECT TITLE: MASTER OF SCIENCE IN INTERNATIONAL BUSINESS

Develop an entrepreneurial approach to working supported by autonomous thinking and accountability.

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Knowledge and Understanding

Programme Specification: MSc Computing (Information Security)

Programme approval 2006/07 PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION. ECTS equivalent

Programme Specification (Postgraduate) Date amended: 25 th March 2015

Henley Business School at Univ of Reading. Accreditation from the British Computer Society will be sought

School of Biological & Chemical Sciences

LOUGHBOROUGH UNIVERSITY

N/A N/A. Programme duration: 1 year full time - September (semester 1) and January (Semester 2) starts, 2 years parttime N/A.

value equivalent value

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing

Programme Specification PG Cert/ PG Dip/ MA Integrative Counselling

1. Awarding Institution: Imperial College London. 2. Teaching Institution: Imperial College London

Programme Specification 2015/16

Programme Specification for Computer Systems Engineering (Software Systems) MSc

PROGRAMME SPECIFICATION

MSc Research (Human Geography):

Programme Specification (Undergraduate) Date amended: 28 August 2015

1. Programme title and designation Human Resource Management and Organisational Analysis. value equivalent. value

UNIVERSITY OF ULSTER: COLERAINE PROGRAMME SPECIFICATION. COURSE TITLE: B.Sc. (HONS) SOCIAL PSYCHOLOGY/ B.Sc. (HONS) SOCIAL PSYCHOLOGY with DPP

Programme Specification 2015/16

Henley Business School at Univ of Reading. Postgraduate Pre-Experience Board of Studies

Henley Business School at Univ of Reading. Post-Experience Postgraduate Programmes

Programme Specification and Curriculum Map for PG Cert/PG Dip/MA in Human Resource Management

continue to advance their Manufacturing Management knowledge and understanding, and develop new skills to a high level;

PROGRAMME SPECIFICATION

Programme Specification: Master of Business Administration

Programme Specification and Curriculum Map for MSc Business Information Systems Management

School of Informatics Department or equivalent Department of Computer Science Programme code

COURSE SUBJECT TITLE: Master of Science in Management & Corporate Governance/Grad ICSA. 1. Awarding Institution/Body University of Ulster

MA in Health and Social Care

International Relations

How To Get A Masters Degree In Management At University Of Bromford

MSc in Physics Research For students entering in 2006

1. Programme title and designation Public Policy. For undergraduate programmes only Single honours Joint Major/minor

Programme Specification

Programme Specification

BA Community Health and Nursing Studies

Transcription:

Date of Revision Date of Previous Revision Programme Specification A programme specification is required for any programme on which a student may be registered. All programmes of the University are subject to the University s Quality Assurance and Enhancement processes as set out in the DASA Policies and Procedures Manual. Programme Title MSc in Cyber Security Final Award (exit route if applicable for Postgraduate Taught Programmes) Programme Code ELE-MSC- CS UCAS Code N/A JACS Code MSc (exit route PGDip and PGCert) I120 Criteria for Admissions (Please see General Regulations) Minimum entry requirement is normally a 2.1 UK Honours-equivalent first degree in: Computer Science Software Engineering Mode of Study (Full-time, Part-time, other) Type of Programme Single subject Electrical and/or Electronic Engineering Mathematics with Computer Science Physics with Computer Science Or A Related Discipline All applicants will be expected to have mathematical ability and significant programming experience as evidenced either through the content of their primary degree or through another appropriate formal qualification. Applicants with non-standard qualifications may be considered on an individual basis. Full-time and part-time Length of Programme 1 or 2 years Total Credits for Programme 180 Awarding Institution/Body Teaching Institution School/Department Framework for Higher Education Qualification Level http://www.qaa.ac.uk/publications/informationan dguidance Queen s University Belfast Queen s University Belfast Electronics Electrical Engineering and Computer Science Level 7 1

QAA Benchmark Group http://www.qaa.ac.uk/assuringstandardsandqualit y/subject-guidance/pages/subject-benchmarkstatements Collaborative Organisation and form of Collaboration (if applicable) Accreditations (PSRB) ATAS Clearance External Examiner Name: Professor Awais Rashid Currently not applicable. Not required Computing N/A Date of next scheduled accreditation visit External Examiner Institution/Organisation Lancaster University Does the Programme have any approved exemptions from the University General Regulations (Please see General Regulations) Programme Specific Regulations Yes No X (If yes, please state here any exemptions to regulations which have been approved for this programme) Examinations The programme is subject to the University General Regulations which can be found at: http://www.qub.ac.uk/directorates/academicstudentaffairs/academi caffairs/ Assessment criteria are linked to the learning outcomes for each module. A range of assessment instruments are used including laboratory-based assignments, individual projects, practical exams, presentations, written coursework and unseen written exams. Exam-based assessment is carried out in January and May and marks for the taught modules are finalised at the Board of Examiners meeting in May/June. The pass mark for all taught modules is 50%. Students are normally permitted one further attempt to pass a failed module with the mark used in calculating the final award capped at 50%. Students who, at the first attempt, have failed taught modules to the value of more than 40 CATS points, or who have failed the same module twice, will be referred to the Pastoral Care Committee. The Individual Research Project is assessed in September. Projects may be assessed by the external examiner, and marks finalised at the Board of Examiners meeting in November. The pass mark for the individual research project module is 50% and there is no resit. Progression Students who obtain 120 CATS points in the taught modules are required to undertake an individual security related research project and submit a dissertation in September. The Individual Research Project must be passed at 50% or more for the award of the MSc. All students must have satisfactorily completed all of the required taught modules (120 CATS points) before they will be permitted to begin their Individual Research Project. If students want to defer the submission of their project and submit in December they must inform the Programme Secretary by the first week of the second semester. If they do not follow this time frame they may be charged an additional fee for the project. Students who, at the first attempt, have failed taught modules with a combined value greater than 40 CATS points or who have failed the same module twice will normally not be permitted to proceed to the individual research project and will be required to transfer to the Postgraduate Diploma in Cyber Security. Students who fail one or more taught modules up to the value of 40 2

CATS points will only have the opportunity to resit failed modules once at the next available opportunity. Awards Postgraduate Master s awards will be made in accordance with the following mark scale, as set out in the University s Study Regulations for Postgraduate Taught Programmes: 70+ Pass with distinction* 60+ Pass with commendation 50+ Pass Below 50 Fail *For Master s Degrees, a pass with distinction will be awarded only when the following three conditions have been satisfied: an overall average of 70+ is achieved and a mark of 70+ is achieved in the Individual Research Project module and an average of 65+ is achieved in the other modules. Students who fail the Individual Research Project will not be eligible for the MSc award. Students with protected characteristics Students who have failed the Individual Research Project will be considered for the award of Postgraduate Diploma. Normally, students who fail the Individual Research Project will not have the opportunity to resubmit their original project or retake a new project. Students, who have achieved at least 60 CATS points, may opt to be considered for the award of the Postgraduate Certificate. Support For Students And Their Learning Systems Designed to Provide General Pastoral and Academic Guidance: 1.All students are allocated a project supervisor who provides general academic and personal support and encouragement, and advice on pastoral issues. 2.The Course Co-ordinator provides advice and support for 'students at risk' (i.e., those considered to be at risk of failing examinations or who have serious personal, academic or health problems). The Course Co-ordinator will also deal with cases referred by Project Supervisors. 3.A female member of staff is available for consultation by female students. 4.All students have access to the University Health and Counselling Services, Students' Union, University Careers Service and Student Support Services. 5.All students have access to the University Harassment Advisers. 6.Under University Regulations designated procedures are in place to process complaints made by students. Systems Designed to Support Students' Experience of the Learning and Teaching Process 1.An induction programme for new students is held during the first week of Semester 1. 2.All students receive a copy of the handbook for the course. 3.All students have access to the Queen's intranet services which offers: (i)e-mail communication with staff. (ii)access to learning and teaching materials (i.e., syllabi, lecture and tutorial outlines and other course materials). (iii)opportunities to participate in discussion with teachers and other students. 4.Students have access to University libraries and Student Computer Centres. 5.Staff/Student Consultative Committee provides a forum for consultation and discussion between staff and students. SCC is convened at least once each semester. 6.Staff will communicate regularly with students during their period of internship to provide support and guidance. 7.Facilities are available within the School and adjacent teaching 3

Are students subject to Fitness to Practise Regulations (Please see General Regulations) facilities to aid students with physical disabilities; the School also adheres to University policy concerning the support of students with sensory, learning and physical disabilities. No Fitness to Practise programmes are those which permit students to enter a profession which is itself subject to Fitness to Practise rules 4

Educational Aims of Programme The aim of the programme is to offer a multi-disciplinary education in cyber security that prepares graduates with key knowledge, skills and competencies necessary for employment in technical development, cyber risk analysis, managerial positions such as Chief Information Security Officer, or as preparation for further research. On completion of the programme the student will be able to: Comprehensive knowledge and understanding of the fundamental principles of cyber security, which will remain applicable through changes in technology. Advanced knowledge and practical skills in the theory and practice of cyber security. The necessary skills, tools and techniques needed to embark on careers as security analysts, cyber security officers, or professional developers skilled in cyber security. Skills in a range of practices, processes, tools and methods applicable to cyber security in commercial and research contexts. Timely exposure to, and practical experience in, a range of current technologies and emerging trends at the forefront of cyber security. Opportunities for the development of practical skills in a commercial context. Consistent with the general Educational Aims of the Programme and the specific requirements of the Benchmarking Statement for Master s degrees in Computing, this specification provides a concise summary of the main features of the Masters in Cyber Security programme, and the learning outcomes that a typical student might reasonably be expected to achieve and demonstrate if he/she takes advantage of the learning opportunities that are provided. Specifically, students graduating from the Masters in Cyber Security programme will have achieved the following learning outcomes, commensurate with degree classification, relating to subject specific knowledge and understanding; intellectual, practical and key transferable skills. Learning Outcomes: Cognitive Skills On the completion of this course successful students will be able to: Teaching/Learning Methods and Methods of Assessment Strategies IC1. Describe potential cyber-attacks and the actors that might perform them. Knowledge primarily developed in modules where specific security issues are presented, as well as project. IC2. Critically evaluate security failures and identify specific cyber security principles that have been violated IC3. Critically evaluate appropriate options available to mitigate threats within a system. IC4. Critically evaluate a given system design, and identify significant vulnerabilities, risks, and points at which specific cyber security methods and technologies should be employed Learning Outcomes: Transferable Skills On the completion of this course successful students will be able to: Strongly addressed in Software Assurance and Ethics modules, and addressed to a moderate extent in most other modules. Strongly developed as a key part of the majority of modules. Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project. Teaching/Learning Methods and Strategies TE1. Work effectively with and for others, including as part of a team. Strongly developed in practical project work, particularly where undertaken with industry. Also developed in technical modules with shared laboratory work elements, and Ethics group coursework. TE2. Retrieve information independently, from a variety of sources and by a variety of Very strongly developed in project work, but also techniques. moderately developed through coursework in taught modules. TE3. Use information technology effectively. Forms a core part of the whole programme and is Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4). Methods of Assessment Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7). 5

strongly developed throughout all modules. TE4. Communicate effectively using various modes/media and with a variety of audiences. Strongly developed in project work, Ethics coursework, and also moderately developed through coursework in several technical focussed modules. TE5. Understand and present information involving a quantitative dimension. Forms a core part of the majority of the programme and is strongly developed across the programme TE6. Manage one s own learning and development including time management and organisational skills. Very strongly developed in project work and Ethics coursework, but also moderately developed through TE7. Learn independently in familiar and unfamiliar situations with open-mindedness and a spirit of critical enquiry. Learning Outcomes: Knowledge and Understanding On the completion of this course successful students will be able to: coursework in other taught modules. Very strongly developed in project work, but also moderately developed through coursework in taught modules. Teaching/Learning Methods and Strategies KU1. The underpinning principles of cyber security. Forms a core part of the whole programme and is developed across all modules. KU2. The essential theories, practices, languages and tools that may be deployed for Forms a core part of the whole programme and is the specification, design, implementation, evaluation and maintenance of secure strongly developed throughout all modules. cyber systems. KU3. KU4. KU5. KU6. Good cyber security practice in the specification, design, implementation, evaluation and maintenance of security solutions. Security threats that exist in the cyber realm, different types of cyber-attacks and their characteristics. Design fundamentals and cyber defence methods that help create trustworthy systems. The interaction between security and system usability and the importance of minimising the effects of security mechanisms. Learning Outcomes: Subject Specific Skills P1. Apply a range of concepts, tools and techniques to the solution of complex cyber security problems. P2. Deploy appropriate cyber security theory and practices for the specification, design and evaluation of a system. Practical skills developed throughout all modules, with key skills delivered through laboratory work in Crypto, NetSec and Software Assurance Knowledge primarily developed in Crypto, NetSec, Malware and MediaSec modules, where specific security technologies are presented. Developed across modules dealing with specific security technologies, but primarily achieved through Software Assurance and Project. Strongly addressed in Software Assurance and Ethics modules, where this is a key learning outcome. Teaching/Learning Methods and Strategies Very strongly addressed across the whole programme. P3. Effectively use tools for development and testing of cyber secure systems. Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project. P4. Implement algorithms, scripts and programs using programming languages to solve complex cyber security problems. Strongly addressed across the whole programme, particularly those with components addressing P5. Articulate and effectively communicate the design and technological rationale for a given cyber security component or design through appropriate technical reports and presentations. verifying cyber security. Strongly addressed across the whole programme, particularly those with a major software aspect. Methods of Assessment Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6). Methods of Assessment Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5). 6

P1. Apply a range of concepts, tools and techniques to the solution of complex cyber security problems. Strongly developed in the research project and well developed in all other modules. 7

Programme Requirements Module Title Module Code Level/ stage Credits Availability Duration Pre-requisite Assessment S1 S2 Core Option Coursework % Examination % Applied Cryptography ELE8090 20 X 12 weeks x Coursework Practical 30% Computer Forensics ELE8091 20 X 12 weeks x Coursework Practical 30% Ethical & Legal Issues in CSC7065 20 X 12 weeks x 30% 70% Cyber Security Network Security & Monitoring ELE8093 20 X 12 weeks x Coursework Practical 30% Malware ELE8092 20 X 12 weeks x Practical 40% Software Assurance ELE8094 20 X 12 weeks x Coursework Practical 30% Media Security ELE7066 20 X 12 weeks x Coursework 30% Practical Advanced Intelligent Information Systems Individual Research Project Approved by Director of Education: ELE7067 20 X 12 weeks x Assignment1 Assignment 2 Group Work 20% ELE8095 60 X X 24 weeks x Continual Assessment 35% Dissertation 50% Oral 15% Print Name: Dr Lillian Greenwood.. Signature: Date: 28/08/14.. 8