detail

MSc (T) Cyber Security including Professional Internship

Academic Year 2016/17

A programme specification is required for any programme on which a student may be registered. All programmes of the University are subject to the University's Quality Assurance and Enhancement processes as set out in the DASA Policies and Procedures Manual.

Programme Title

MSc (T) Cyber Security including Professional Internship

Final Award
(exit route if applicable for Postgraduate Taught Programmes)

Master of Science

Programme Code

ELE-MSC-CT

UCAS Code

JACS Code

H610 (DESCR) 100

Criteria for Admissions

Minimum entry requirement is normally a 2.1 UK Honours-equivalent first degree in:
Computer Science
Software Engineering
Electrical and/or Electronic Engineering
Mathematics with Computer Science
Physics with Computer Science
Or A Related Discipline
All applicants will be expected to have mathematical ability and significant programming experience as evidenced either through the content of their primary degree or through another appropriate formal qualification.
Applicants with non-standard qualifications may be considered on an individual basis.

ATAS Clearance Required

No

Health Check Required

No

Portfolio Required

Interview Required

Mode of Study

Full Time

Type of Programme

Postgraduate

Length of Programme

2 Academic Year(s)

Total Credits for Programme

180

Exit Awards available

INSTITUTE INFORMATION

Awarding Institution/Body

Queen's University Belfast

Teaching Institution

Queen's University Belfast

School/Department

Electronics, Electrical Engineering & Computer Sci

Framework for Higher Education Qualification Level 
http://www.qaa.ac.uk/publications/information-and-guidance

Level 7

QAA Benchmark Group
http://www.qaa.ac.uk/assuring-standards-and-quality/the-quality-code/subject-benchmark-statements

Computing (2007)

Accreditations (PSRB)

Date of most recent Accreditation Visit

External Examiner Name:

External Examiner Institution/Organisation

Professor Awais Rashid

Lancaster University

REGULATION INFORMATION

Does the Programme have any approved exemptions from the University General Regulations
(Please see General Regulations)

No

Programme Specific Regulations

Examinations
The programme is subject to the University General Regulations which can be found at:
http://www.qub.ac.uk/directorates/AcademicStudentAffairs/AcademicAffairs/

Assessment criteria are linked to the learning outcomes for each module. A range of assessment instruments are used including laboratory-based assignments, individual projects, practical exams, presentations, written coursework and unseen written exams.
Exam-based assessment is carried out in January and May and marks for the taught modules are finalised at the Board of Examiners meeting in May/June.

The pass mark for all taught modules is 50%. Students are normally permitted one further attempt to pass a failed module with the mark used in calculating the final award capped at 50%.

Students who, at the first attempt, have failed taught modules to the value of more than 40 CATS points, or who have failed the same module twice, will be referred to the Pastoral Care Committee.
The Individual Research Project is assessed in September.

Projects may be assessed by the external examiner, and marks finalised at the Board of Examiners meeting in November. The pass mark for the individual research project module is 50% and there is no resit.

Progression
Students who obtain 120 CATS points in the taught modules are required to undertake an individual security related research project and submit a dissertation in September. The Individual Research Project must be passed at 50% or more for the award of the MSc.
All students must have satisfactorily completed all of the required taught modules (120 CATS points) before they will be permitted to begin their Individual Research Project.

If students want to defer the submission of their project and submit in December they must inform the Programme Secretary by the first week of the second semester. If they do not follow this time frame they may be charged an additional fee for the project.

Students who, at the first attempt, have failed taught modules with a combined value greater than 40 CATS points or who have failed the same module twice will normally not be permitted to proceed to the individual research project and will be required to transfer to the Postgraduate Diploma in Cyber Security.

Students who fail one or more taught modules up to the value of 40 CATS points will only have the opportunity to resit failed modules once at the next available opportunity.
The School will, where possible, facilitate students to apply for suitable Professional Internships normally lasting up to 1 year, with local, national and international employers. At least 6 months of the internship must be research focused, and forms an integral part of the Individual Research Project module. Internships are offered on a competitive basis, as determined by employers, and are not guaranteed. Students enrolled on the MSc Cyber Security with Professional Internship, who have not secured an Internship before the start of their first semester will be required to transfer to the standard 1-year MSc Cyber Security.

Awards
Postgraduate Master’s awards will be made in accordance with the following mark scale, as set out in the University’s Study Regulations for Postgraduate Taught Programmes:
70+ Pass with distinction*
60+ Pass with commendation
50+ Pass
Below 50 Fail

*For Master’s Degrees, a pass with distinction will be awarded only when the following three conditions have been satisfied: an overall average of 70+ is achieved and a mark of 70+ is achieved in the Individual Research Project module and an average of 65+ is achieved in the other modules.

Students who fail the Individual Research Project will not be eligible for the MSc award.

Students who have failed the Individual Research Project will be considered for the award of Postgraduate Diploma. Normally, students who fail the Individual Research Project will not have the opportunity to resubmit their original project or retake a new project.
Students, who have achieved at least 60 CATS points, may opt to be considered for the award of the Postgraduate Certificate.

Students with protected characteristics

Support For Students And Their Learning
Systems Designed to Provide General Pastoral and Academic Guidance:
1.All students are allocated a project supervisor who provides general academic and personal support and encouragement, and advice on pastoral issues.

2.The Course Co-ordinator provides advice and support for 'students at risk' (i.e., those considered to be at risk of failing examinations or who have serious personal, academic or health problems). The Course Co-ordinator will also deal with cases referred by Project Supervisors.

3.A female member of staff is available for consultation by female students.

4.All students have access to the University Health and Counselling Services, Students' Union, University Careers Service and Student Support Services.

5.All students have access to the University Harassment Advisers.

6.Under University Regulations designated procedures are in place to process complaints made by students.

Systems Designed to Support Students' Experience of the Learning and Teaching Process

1.An induction programme for new students is held during the first week of Semester 1.

2.All students receive a copy of the handbook for the course.

3.All students have access to the Queen's intranet services which offers:

(i)E-mail communication with staff.
(ii)Access to learning and teaching materials (i.e., syllabi, lecture and tutorial outlines and other course materials).
(iii)Opportunities to participate in discussion with teachers and other students.

4.Students have access to University libraries and Student Computer Centres.

5.Staff/Student Consultative Committee provides a forum for consultation and discussion between staff and students. SCC is convened at least once each semester.

6.Staff will communicate regularly with students during their period of internship to provide support and guidance.

7.Facilities are available within the School and adjacent teaching facilities to aid students with physical disabilities; the School also adheres to University policy concerning the support of students with sensory, learning and physical disabilities.

Are students subject to Fitness to Practise Regulations

(Please see General Regulations)

No

EDUCATIONAL AIMS OF PROGRAMME

The aim of the programme is to offer a multi-disciplinary education in cyber security that prepares graduates with key knowledge, skills and competencies necessary for employment in technical development, cyber risk analysis, managerial positions such as Chief Information Security Officer, or as preparation for further research.

On completion of the programme the student will be able to:

Comprehensive knowledge and understanding of the fundamental principles of cyber security, which will remain applicable through changes in technology.

Advanced knowledge and practical skills in the theory and practice of cyber security.

The necessary skills, tools and techniques needed to embark on careers as security analysts, cyber security officers, or professional developers skilled in cyber security.

Skills in a range of practices, processes, tools and methods applicable to cyber security in commercial and research contexts.

Timely exposure to, and practical experience in, a range of current technologies and emerging trends at the forefront of cyber security.

Opportunities for the development of practical skills in a commercial context.

Consistent with the general Educational Aims of the Programme and the specific requirements of the Benchmarking Statement for Master’s degrees in Computing, this specification provides a concise summary of the main features of the Masters in Cyber Security programme, and the learning outcomes that a typical student might reasonably be expected to achieve and demonstrate if he/she takes advantage of the learning opportunities that are provided.

Specifically, students graduating from the Masters in Cyber Security programme will have achieved the following learning outcomes, commensurate with degree classification, relating to subject specific knowledge and understanding; intellectual, practical and key transferable skills.

LEARNING OUTCOMES

Learning Outcomes: Cognitive Skills

On the completion of this course successful students will be able to:

IC1. Describe potential cyber-attacks and the actors that might perform them.

Teaching/Learning Methods and Strategies

Knowledge primarily developed in modules where specific security issues are presented, as well as project.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC2. Critically evaluate security failures and identify specific cyber security principles that have been violated

Teaching/Learning Methods and Strategies

Strongly addressed in Software Assurance and Ethics modules, and addressed to a moderate extent in most other modules.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC3. Critically evaluate appropriate options available to mitigate threats within a system.

Teaching/Learning Methods and Strategies

Strongly developed as a key part of the majority of modules.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC4. Critically evaluate a given system design, and identify significant vulnerabilities, risks, and points at which specific cyber security methods and technologies should be employed

Teaching/Learning Methods and Strategies

Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

Learning Outcomes: Transferable Skills

On the completion of this course successful students will be able to:

TE1. Work effectively with and for others, including as part of a team.

Teaching/Learning Methods and Strategies

Strongly developed in practical project work, particularly where undertaken with industry. Also developed in technical modules with shared laboratory work elements, and Ethics group coursework.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE2. Retrieve information independently, from a variety of sources and by a variety of techniques.

Teaching/Learning Methods and Strategies

Very strongly developed in project work, but also moderately developed through coursework in taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE3. Use information technology effectively.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is strongly developed throughout all modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE4. Communicate effectively using various modes/media and with a variety of audiences.

Teaching/Learning Methods and Strategies

Strongly developed in project work, Ethics coursework, and also moderately developed through coursework in several technical focussed modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE5. Understand and present information involving a quantitative dimension.

Teaching/Learning Methods and Strategies

Forms a core part of the majority of the programme and is strongly developed across the programme

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE6. Manage one’s own learning and development including time management and organisational skills.

Teaching/Learning Methods and Strategies

Very strongly developed in project work and Ethics coursework, but also moderately developed through coursework in other taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE7. Learn independently in familiar and unfamiliar situations with open-mindedness and a spirit of critical enquiry.

Teaching/Learning Methods and Strategies

Very strongly developed in project work, but also moderately developed through coursework in taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

Learning Outcomes: Knowledge & Understanding

On the completion of this course successful students will be able to:

KU1. The underpinning principles of cyber security.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is developed across all modules.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU2. The essential theories, practices, languages and tools that may be deployed for the specification, design, implementation, evaluation and maintenance of secure cyber systems.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is strongly developed throughout all modules.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU3. Good cyber security practice in the specification, design, implementation, evaluation and maintenance of security solutions.

Teaching/Learning Methods and Strategies

Practical skills developed throughout all modules, with key skills delivered through laboratory work in Crypto, NetSec and Software Assurance

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU4. Security threats that exist in the cyber realm, different types of cyber-attacks and their characteristics.

Teaching/Learning Methods and Strategies

Knowledge primarily developed in Crypto, NetSec, Malware and MediaSec modules, where specific security technologies are presented.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU5. Design fundamentals and cyber defence methods that help create trustworthy systems.

Teaching/Learning Methods and Strategies

Developed across modules dealing with specific security technologies, but primarily achieved through Software Assurance and Project.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU6. The interaction between security and system usability and the importance of minimising the effects of security mechanisms.

Teaching/Learning Methods and Strategies

Strongly addressed in Software Assurance and Ethics modules, where this is a key learning outcome.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

Learning Outcomes: Subject Specific

On the completion of this course successful students will be able to:

P1. Apply a range of concepts, tools and techniques to the solution of complex cyber security problems.

Teaching/Learning Methods and Strategies

TBC

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P2. Deploy appropriate cyber security theory and practices for the specification, design and evaluation of a system.

Teaching/Learning Methods and Strategies

Very strongly addressed across the whole programme.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P3. Effectively use tools for development and testing of cyber secure systems.

Teaching/Learning Methods and Strategies

Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P4. Implement algorithms, scripts and programs using programming languages to solve complex cyber security problems.

Teaching/Learning Methods and Strategies

Strongly addressed across the whole programme, particularly those with components addressing verifying cyber security.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P5. Articulate and effectively communicate the design and technological rationale for a given cyber security component or design through appropriate technical reports and presentations.

Teaching/Learning Methods and Strategies

Strongly addressed across the whole programme, particularly those with a major software aspect.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P1. Apply a range of concepts, tools and techniques to the solution of complex cyber security problems.

Teaching/Learning Methods and Strategies

Strongly developed in the research project and well developed in all other modules.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

MODULE INFORMATION

Programme Requirements

Module Title

Module Code

Level/ stage

Credits

Availability

Duration

Pre-requisite

 

Assessment

 

 

 

 

S1

S2

 

 

Core

Option

Coursework %

Practical %

Examination %

Applied Cryptography

ELE8090

7

20

YES

12 weeks

N

YES

15%

25%

60%

Computer Forensics

ELE8091

7

20

YES

12 weeks

N

YES

40%

60%

0%

Malware

ELE8092

7

20

YES

12 weeks

N

YES

15%

25%

60%

Network Security and Monitoring

ELE8093

7

20

YES

12 weeks

N

YES

15%

35%

50%

Software Assurance

ELE8094

7

20

YES

12 weeks

N

YES

15%

25%

60%

Individual Research Project

ELE8095

7

60

24 weeks

N

YES

100%

0%

0%

Cyber Security Professional Internship

ELE8098

7

60

24 weeks

N

YES

100%

0%

0%

Ethical & Legal Issues in Cyber Security

ECS8065

7

20

YES

12 weeks

N

YES

40%

0%

60%

7

20

YES

12 weeks

N

YES

40%

0%

60%

Notes