Skip to Content

Courses

Postgraduate Programme Specification

MSc Applied Cyber Security

Academic Year 2022/23

A programme specification is required for any programme on which a student may be registered. All programmes of the University are subject to the University's Quality Assurance processes. All degrees are awarded by Queen's University Belfast.

Programme Title MSc Applied Cyber Security Final Award
(exit route if applicable for Postgraduate Taught Programmes)
Master of Science
Programme Code ELE-MSC-CY UCAS Code HECoS Code 100376 - Computer and information secur - 100

ATAS Clearance Required

No

Health Check Required

No

Portfolio Required

--

Interview Required

--

Mode of Study Part Time or Full Time
Type of Programme Postgraduate Length of Programme Part Time - 2 Academic Years
Full Time - 1 Academic Year
Total Credits for Programme 180
Exit Awards available No

Institute Information

Teaching Institution

Queen's University Belfast

School/Department

Electronics, Electrical Engineering & Computer Science

Quality Code
https://www.qaa.ac.uk/quality-code

Higher Education Credit Framework for England
https://www.qaa.ac.uk/quality-code/higher-education-credit-framework-for-england

Level 7

Subject Benchmark Statements
https://www.qaa.ac.uk/quality-code/subject-benchmark-statements

The Frameworks for Higher Education Qualifications of UK Degree-Awarding Bodies
https://www.qaa.ac.uk/docs/qaa/quality-code/qualifications-frameworks.pdf

Computing (2016)

Accreditations (PSRB)

Government Communications Headquarters (GCHQ)

Date of most recent Accreditation Visit 23-08-17

Regulation Information

Does the Programme have any approved exemptions from the University General Regulations
(Please see General Regulations)

No

Programme Specific Regulations

Taught modules and block mode (timetable to be made available) .

The pass mark for taught modules is 50%.

Students will only have the opportunity to resit failed modules once at the next available opportunity, with the mark used in calculating the final award capped at 50%.

Students who, at the first attempt, have not achieved satisfactory performance in all specified compulsory elements in modules with a combined value greater than 40 CATS points will normally be required to transfer to the Postgraduate Certificate.

Students who fail the same module twice will normally be required to transfer to the Postgraduate Certificate, and may not progress to complete the Individual Research Project.

Normally, students must have satisfactorily completed all required taught modules (120 CATS points) to be permitted to complete the individual research project.

The school will facilitate a process for students to apply for summer project internships but does not guarantee that students will be placed.

The pass mark for the research project module is 50%. Projects may be assessed by the external examiner, and marks finalised at the board of examiners meeting.

Students with protected characteristics

Support For Students And Their Learning Systems Designed to Provide General Pastoral and Academic Guidance:
1. All students are allocated a project supervisor who provides general academic and personal support and encouragement, and advice on pastoral issues.
2. The Course Co-ordinator provides advice and support for 'students at risk' (i.e., those considered to be at risk of failing examinations or who have serious personal, academic or health problems). The Course Co-ordinator will also deal with cases referred by Project Supervisors.
3. A female member of staff is available for consultation by female students.
4. All students have access to the University Health and Counselling Services, Students' Union, University Careers Service and Student Support Services.
5. All students have access to the University Harassment Advisers.
6. Under University Regulations designated procedures are in place to process complaints made by students.

Systems Designed to Support Students' Experience of the Learning and Teaching Process
1. An induction programme for new students is held during the first week of Semester 1.
2. All students receive a copy of the handbook for the course.
3. All students have access to the Queen's intranet services which offers:
(i) E-mail communication with staff.
(ii) Access to learning and teaching materials (i.e., syllabi, lecture and tutorial outlines and other course materials).
(iii) Opportunities to participate in discussion with teachers and other students.
4. Students have access to University libraries and Student Computer Centres.
5. Staff/Student Consultative Committee provides a forum for consultation and discussion between staff and students. SCC is convened at least once each semester.
6. Staff will communicate regularly with students during any any period of summer internship to provide support and guidance.
7. Facilities are available within the School and adjacent teaching facilities to aid students with physical disabilities; the School also adheres to University policy concerning the support of students with sensory, learning and physical disabilities

Are students subject to Fitness to Practise Regulations

(Please see General Regulations)

No

Educational Aims Of Programme

The aim of the programme is to offer a multi-disciplinary education in cyber security that prepares graduates with key knowledge, skills and competencies necessary for employment in technical development, cyber risk analysis, managerial positions such as Chief Information Security Officer, or as preparation for further research.

On completion of the programme the student will be able to:
•Demonstrate comprehensive knowledge and understanding of the fundamental principles of cyber security, which will remain applicable through changes in technology.
•Apply advanced knowledge and practical skills in the theory and practice of cyber security.
•Demonstrate skills and techniques necessary to embark on careers as security analysts, cyber security officers, or professional developers skilled in cyber security.
•Apply skills in a range of practices, processes, tools and methods applicable to cyber security in commercial and research contexts.
•Solve problems based on exposure to, and practical experience in, a range of current technologies and emerging trends at the forefront of cyber security.
•Demonstrate the development of practical skills in a commercial or research context.

Consistent with the general Educational Aims of the Programme and the specific requirements of the Benchmarking Statement for Master’s degrees in Computing, this specification provides a concise summary of the main features of the programme, and the learning outcomes that a typical student might reasonably be expected to achieve and demonstrate if he/she takes advantage of the learning opportunities that are provided.

Specifically, students graduating from the programme will have achieved the following learning outcomes, commensurate with degree classification, relating to subject specific knowledge and understanding; intellectual, practical and key transferable skills.

Learning Outcomes

Learning Outcomes: Cognitive Skills

On the completion of this course successful students will be able to:

Describe potential cyber-attacks and the actors that might perform them.

Teaching/Learning Methods and Strategies

Knowledge primarily developed in modules where specific security issues are presented, as well as project.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC2.Critically evaluate security failures and identify specific cyber security principles that have been violated

Teaching/Learning Methods and Strategies

Strongly addressed in Software Assurance and Ethics modules, and addressed to a moderate extent in most other modules.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC3.Critically evaluate appropriate options available to mitigate threats within a system.

Teaching/Learning Methods and Strategies

Strongly developed as a key part of the majority of modules.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC4.Critically evaluate a given system design, and identify significant vulnerabilities, risks, and points at which specific cyber security methods and technologies should be employed

Teaching/Learning Methods and Strategies

Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

Learning Outcomes: Transferable Skills

On the completion of this course successful students will be able to:

TE1.Work effectively with and for others, including as part of a team.

Teaching/Learning Methods and Strategies

Strongly developed in practical project work, particularly where undertaken with industry. Also developed in technical modules with shared laboratory work elements, and Ethics group coursework.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6,TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE2.Retrieve information independently, from a variety of sources and by a variety of techniques.

Teaching/Learning Methods and Strategies

Very strongly developed in project work, but also moderately developed through coursework in taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE3.Use information technology effectively.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is strongly developed throughout all modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE4.Communicate effectively using various modes/media and with a variety of audiences.

Teaching/Learning Methods and Strategies

Strongly developed in project work, Ethics coursework, and also moderately developed through coursework in several technical focused modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE5.Understand and present information involving a quantitative dimension.

Teaching/Learning Methods and Strategies

Forms a core part of the majority of the programme and is strongly developed across the programme

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE6.Manage one’s own learning and development including time management and organisational skills.

Teaching/Learning Methods and Strategies

Very strongly developed in project work and Ethics coursework, but also moderately developed through coursework in other taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE7.Learn independently in familiar and unfamiliar situations with open-mindedness and a spirit of critical enquiry.

Teaching/Learning Methods and Strategies

Very strongly developed in project work, but also moderately developed through coursework in taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

Learning Outcomes: Knowledge & Understanding

On the completion of this course successful students will be able to:

KU1.The underpinning principles of cyber security.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is developed across all modules.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU2.The essential theories, practices, languages and tools that may be deployed for the specification, design, implementation, evaluation and maintenance of secure cyber systems.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is strongly developed throughout all modules.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU3.Good cyber security practice in the specification, design, implementation, evaluation and maintenance of security solutions.

Teaching/Learning Methods and Strategies

Practical skills developed throughout all modules, with key skills delivered through laboratory work in Crypto, NetSec and Software Assurance

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU4.Security threats that exist in the cyber realm, different types of cyber-attacks and their characteristics.

Teaching/Learning Methods and Strategies

Knowledge primarily developed in Crypto, NetSec, and Malware modules, where specific security technologies are presented.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU5.Design fundamentals and cyber defence methods that help create trustworthy systems.

Teaching/Learning Methods and Strategies

Developed across modules dealing with specific security technologies, but primarily achieved through Software Assurance and Project.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU6.The interaction between security and system usability and the importance of minimising the effects of security mechanisms.

Teaching/Learning Methods and Strategies

Strongly addressed in Software Assurance and Ethics modules, where this is a key learning outcome.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

Learning Outcomes: Subject Specific

On the completion of this course successful students will be able to:

P1.Apply a range of concepts, tools and techniques to the solution of complex cyber security problems.

Teaching/Learning Methods and Strategies

Strongly developed in the research project and well developed in all other modules.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P2.Deploy appropriate cyber security theory and practices for the specification, design and evaluation of a system.

Teaching/Learning Methods and Strategies

Very strongly addressed across the whole programme.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P3.Effectively use tools for development and testing of cyber secure systems.

Teaching/Learning Methods and Strategies

Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P4. Implement algorithms, scripts and programs using programming languages to solve complex cyber security problems.

Teaching/Learning Methods and Strategies

Strongly addressed across the whole programme, particularly those with components addressing verifying cyber security.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P5.Articulate and effectively communicate the design and technological rationale for a given cyber security component or design through appropriate technical reports and presentations.

Teaching/Learning Methods and Strategies

Strongly addressed across the whole programme, particularly those with a major software aspect.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

Module Information

Stages and Modules

Module Title Module Code Level/ stage Credits

Availability

Duration Pre-requisite

Assessment

S1 S2 Core Option Coursework % Practical % Examination %
Individual Research Project ELE8095 7 60 -- YES 12 weeks N YES -- 90% 10% 0%
Computer Forensics ELE8091 7 20 -- YES 12 weeks N YES -- 100% 0% 0%
Network Security and Monitoring ELE8093 7 20 YES -- 12 weeks N YES -- 100% 0% 0%
Software Assurance ELE8094 7 20 YES -- 12 weeks N YES -- 100% 0% 0%
Cryptography ELE8090 7 20 -- YES 12 weeks N YES -- 100% 0% 0%
Pen-testing & Ethical Hacking ELE8072 7 20 -- YES 12 weeks N YES -- 100% 0% 0%
Foundations of Cyber Security ELE8071 7 10 YES -- 12 weeks N YES -- 100% 0% 0%
Data, Privacy and the Law LAW7848 7 10 -- YES 12 weeks N YES -- 100% 0% 0%

Notes

No notes found.