MSc (T) Applied Cyber Security
Academic Year 2017/18
A programme specification is required for any programme on which a student may be registered. All programmes of the University are subject to the University's Quality Assurance and Enhancement processes as set out in the DASA Policies and Procedures Manual.
Programme Title |
MSc (T) Applied Cyber Security |
Final Award |
Master of Science |
|||||||||||
Programme Code |
ELE-MSC-CY |
UCAS Code |
|
JACS Code |
H610 (DESCR) 100 |
Criteria for Admissions A 2.1 Honours degree (or equivalent qualification acceptable to the University) in Computer Science, Software Engineering, Electrical and/or Electronic Engineering, Mathematics with Computer Science, Physics with Computer Science, or a related discipline. |
ATAS Clearance Required |
No |
Health Check Required |
No |
|||||||||||
Portfolio Required |
Interview Required |
|||||||||||||
Mode of Study |
Part Time |
|||||||||||||
Type of Programme |
Postgraduate |
Length of Programme |
2 Academic Year(s) |
Total Credits for Programme |
180 |
|||||||||
Exit Awards available |
|
INSTITUTE INFORMATION
Awarding Institution/Body |
Queen's University Belfast |
|||||||||||||
Teaching Institution |
Queen's University Belfast |
|||||||||||||
School/Department |
Electronics, Electrical Engineering & Computer Sci |
|||||||||||||
Framework for Higher Education Qualification Level |
Level 7 |
|||||||||||||
QAA Benchmark Group |
Computing (2007) |
|||||||||||||
Accreditations (PSRB) |
REGULATION INFORMATION
Does the Programme have any approved exemptions from the University General Regulations No |
Programme Specific Regulations No |
Students with protected characteristics Support For Students And Their Learning Systems Designed to Provide General Pastoral and Academic Guidance: |
Are students subject to Fitness to Practise Regulations (Please see General Regulations) No |
EDUCATIONAL AIMS OF PROGRAMME
The aim of the programme is to offer a multi-disciplinary education in cyber security that prepares graduates with key knowledge, skills and competencies necessary for employment in technical development, cyber risk analysis, managerial positions such as Chief Information Security Officer, or as preparation for further research.
On completion of the programme the student will be able to:
• Demonstrate comprehensive knowledge and understanding of the fundamental principles of cyber security, which will remain applicable through changes in technology.
• Apply advanced knowledge and practical skills in the theory and practice of cyber security.
• Demonstrate skills and techniques necessary to embark on careers as security analysts, cyber security officers, or professional developers skilled in cyber security.
• Apply skills in a range of practices, processes, tools and methods applicable to cyber security in commercial and research contexts.
• Solve problems based on exposure to, and practical experience in, a range of current technologies and emerging trends at the forefront of cyber security.
• Demonstrate the development of practical skills in a commercial or research context.
Consistent with the general Educational Aims of the Programme and the specific requirements of the Benchmarking Statement for Master’s degrees in Computing, this specification provides a concise summary of the main features of the programme, and the learning outcomes that a typical student might reasonably be expected to achieve and demonstrate if he/she takes advantage of the learning opportunities that are provided.
Specifically, students graduating from the programme will have achieved the following learning outcomes, commensurate with degree classification, relating to subject specific knowledge and understanding; intellectual, practical and key transferable skills.
LEARNING OUTCOMES
Learning Outcomes: Cognitive SkillsOn the completion of this course successful students will be able to: |
|
Describe potential cyber-attacks and the actors that might perform them. |
Teaching/Learning Methods and Strategies Knowledge primarily developed in modules where specific security issues are presented, as well as project. Methods of Assessment Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4). |
IC2. Critically evaluate security failures and identify specific cyber security principles that have been violated |
Teaching/Learning Methods and Strategies Strongly addressed in Software Assurance and Ethics modules, and addressed to a moderate extent in most other modules. Methods of Assessment Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4). |
IC3. Critically evaluate appropriate options available to mitigate threats within a system. |
Teaching/Learning Methods and Strategies Strongly developed as a key part of the majority of modules. Methods of Assessment Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4). |
IC4. Critically evaluate a given system design, and identify significant vulnerabilities, risks, and points at which specific cyber security methods and technologies should be employed |
Teaching/Learning Methods and Strategies Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project. Methods of Assessment Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4). |
Learning Outcomes: Transferable SkillsOn the completion of this course successful students will be able to: |
|
TE1. Work effectively with and for others, including as part of a team. |
Teaching/Learning Methods and Strategies Strongly developed in practical project work, particularly where undertaken with industry. Also developed in technical modules with shared laboratory work elements, and Ethics group coursework. Methods of Assessment Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6,TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7). |
TE2. Retrieve information independently, from a variety of sources and by a variety of techniques. |
Teaching/Learning Methods and Strategies Very strongly developed in project work, but also moderately developed through coursework in taught modules. Methods of Assessment Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7). |
TE3. Use information technology effectively. |
Teaching/Learning Methods and Strategies Forms a core part of the whole programme and is strongly developed throughout all modules. Methods of Assessment Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7). |
TE4. Communicate effectively using various modes/media and with a variety of audiences. |
Teaching/Learning Methods and Strategies Strongly developed in project work, Ethics coursework, and also moderately developed through coursework in several technical focused modules. Methods of Assessment Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7). |
TE5. Understand and present information involving a quantitative dimension. |
Teaching/Learning Methods and Strategies Forms a core part of the majority of the programme and is strongly developed across the programme Methods of Assessment Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7). |
TE6. Manage one’s own learning and development including time management and organisational skills. |
Teaching/Learning Methods and Strategies Very strongly developed in project work and Ethics coursework, but also moderately developed through coursework in other taught modules. Methods of Assessment Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7). |
TE7. Learn independently in familiar and unfamiliar situations with open-mindedness and a spirit of critical enquiry. |
Teaching/Learning Methods and Strategies Very strongly developed in project work, but also moderately developed through coursework in taught modules. Methods of Assessment Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7). |
Learning Outcomes: Knowledge & UnderstandingOn the completion of this course successful students will be able to: |
|
KU1. The underpinning principles of cyber security. |
Teaching/Learning Methods and Strategies Forms a core part of the whole programme and is developed across all modules. Methods of Assessment Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6). |
KU2. The essential theories, practices, languages and tools that may be deployed for the specification, design, implementation, evaluation and maintenance of secure cyber systems. |
Teaching/Learning Methods and Strategies Forms a core part of the whole programme and is strongly developed throughout all modules. Methods of Assessment Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6). |
KU3. Good cyber security practice in the specification, design, implementation, evaluation and maintenance of security solutions. |
Teaching/Learning Methods and Strategies Practical skills developed throughout all modules, with key skills delivered through laboratory work in Crypto, NetSec and Software Assurance Methods of Assessment Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6). |
KU4. Security threats that exist in the cyber realm, different types of cyber-attacks and their characteristics. |
Teaching/Learning Methods and Strategies Knowledge primarily developed in Crypto, NetSec, and Malware modules, where specific security technologies are presented. Methods of Assessment Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6). |
KU5. Design fundamentals and cyber defence methods that help create trustworthy systems. |
Teaching/Learning Methods and Strategies Developed across modules dealing with specific security technologies, but primarily achieved through Software Assurance and Project. Methods of Assessment Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6). |
KU6. The interaction between security and system usability and the importance of minimising the effects of security mechanisms. |
Teaching/Learning Methods and Strategies Strongly addressed in Software Assurance and Ethics modules, where this is a key learning outcome. Methods of Assessment Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6). |
Learning Outcomes: Subject SpecificOn the completion of this course successful students will be able to: |
|
P1. Apply a range of concepts, tools and techniques to the solution of complex cyber security problems. |
Teaching/Learning Methods and Strategies Strongly developed in the research project and well developed in all other modules. Methods of Assessment Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5). |
P2. Deploy appropriate cyber security theory and practices for the specification, design and evaluation of a system. |
Teaching/Learning Methods and Strategies Very strongly addressed across the whole programme. Methods of Assessment Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5). |
P3. Effectively use tools for development and testing of cyber secure systems. |
Teaching/Learning Methods and Strategies Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project. Methods of Assessment Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5). |
P4. Implement algorithms, scripts and programs using programming languages to solve complex cyber security problems. |
Teaching/Learning Methods and Strategies Strongly addressed across the whole programme, particularly those with components addressing verifying cyber security. Methods of Assessment Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5). |
P5. Articulate and effectively communicate the design and technological rationale for a given cyber security component or design through appropriate technical reports and presentations. |
Teaching/Learning Methods and Strategies Strongly addressed across the whole programme, particularly those with a major software aspect. Methods of Assessment Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5). |
MODULE INFORMATION
Programme Requirements
Module Title |
Module Code |
Level/ stage |
Credits |
Availability |
Duration |
Pre-requisite |
|
Assessment |
||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
S1 |
S2 |
|
|
Core |
Option |
Coursework % |
Practical % |
Examination % |
Applied Cryptography |
ELE8090 |
7 |
20 |
YES |
12 weeks |
N |
YES |
15% |
25% |
60% |
||
Computer Forensics |
ELE8091 |
7 |
20 |
YES |
12 weeks |
N |
YES |
40% |
60% |
0% |
||
Malware |
ELE8092 |
7 |
20 |
YES |
12 weeks |
N |
YES |
60% |
0% |
40% |
||
Network Security and Monitoring |
ELE8093 |
7 |
20 |
YES |
12 weeks |
N |
YES |
25% |
35% |
40% |
||
Software Assurance |
ELE8094 |
7 |
20 |
YES |
12 weeks |
N |
YES |
20% |
20% |
60% |
||
Individual Research Project |
ELE8095 |
7 |
60 |
YES |
YES |
24 weeks |
N |
YES |
70% |
30% |
0% |
|
Ethical & Legal Issues in Cyber Security |
ECS8065 |
7 |
20 |
YES |
12 weeks |
N |
YES |
40% |
0% |
60% |
||
Notes
|