Skip to Content

detail

MSc (T) Applied Cyber Security

Academic Year 2017/18

A programme specification is required for any programme on which a student may be registered. All programmes of the University are subject to the University's Quality Assurance and Enhancement processes as set out in the DASA Policies and Procedures Manual.

Programme Title

MSc (T) Applied Cyber Security

Final Award
(exit route if applicable for Postgraduate Taught Programmes)

Master of Science

Programme Code

ELE-MSC-CY

UCAS Code

JACS Code

H610 (DESCR) 100

Criteria for Admissions

A 2.1 Honours degree (or equivalent qualification acceptable to the University) in Computer Science, Software Engineering, Electrical and/or Electronic Engineering, Mathematics with Computer Science, Physics with Computer Science, or a related discipline.
Applicants who hold a 2.2 Honours degree and a Master’s degree (or equivalent qualifications acceptable to the University) in one of the above disciplines will be considered on a case-by-case basis.
All applicants will be expected to have mathematical ability and significant programming experience as evidenced either through the content of their primary degree or through another appropriate formal qualification.
Applications may be considered from those who do not meet the above requirements but can provide evidence of recent relevant technical experience in industry, for example, in programming. An application under Recognition of Prior Experiential Learning (RPEL) may be required.

ATAS Clearance Required

No

Health Check Required

No

Portfolio Required

Interview Required

Mode of Study

Part Time

Type of Programme

Postgraduate

Length of Programme

2 Academic Year(s)

Total Credits for Programme

180

Exit Awards available

INSTITUTE INFORMATION

Awarding Institution/Body

Queen's University Belfast

Teaching Institution

Queen's University Belfast

School/Department

Electronics, Electrical Engineering & Computer Sci

Framework for Higher Education Qualification Level 
www.qaa.ac.uk

Level 7

QAA Benchmark Group
www.qaa.ac.uk/quality-code/subject-benchmark-statements

Computing (2007)

Accreditations (PSRB)

REGULATION INFORMATION

Does the Programme have any approved exemptions from the University General Regulations
(Please see General Regulations)

No

Programme Specific Regulations

No
The pass mark for taught modules is 50%.
Students will only have the opportunity to resit failed modules once at the next available opportunity, with the mark used in calculating the final award capped at 50%.
Students who, at the first attempt, have not achieved satisfactory performance in all specified compulsory elements in modules with a combined value greater than 40 CATS points will normally be required to transfer to the Postgraduate Certificate.
Students who fail the same module twice will normally be required to transfer to the Postgraduate Certificate, and may not progress to complete the Individual Research Project.
Normally, students must have satisfactorily completed all required taught modules (120 CATS points) to be permitted to complete the individual research project.
The school will facilitate a process for students to apply for summer project internships but does not guarantee that students will be placed.
The pass mark for the research project module is 50%. There is no resit or possibility to resubmit the original project. Students who fail the individual research project will not be eligible for the MSc award. Students who fail the individual research project will be considered for the award of PGDip. Projects may be assessed by the external examiner, and marks finalised at the board of examiners meeting.

Students with protected characteristics

Support For Students And Their Learning Systems Designed to Provide General Pastoral and Academic Guidance:
1. All students are allocated a project supervisor who provides general academic and personal support and encouragement, and advice on pastoral issues.
2. The Course Co-ordinator provides advice and support for 'students at risk' (i.e., those considered to be at risk of failing examinations or who have serious personal, academic or health problems). The Course Co-ordinator will also deal with cases referred by Project Supervisors.
3. A female member of staff is available for consultation by female students.
4. All students have access to the University Health and Counselling Services, Students' Union, University Careers Service and Student Support Services.
5. All students have access to the University Harassment Advisers.
6. Under University Regulations designated procedures are in place to process complaints made by students.

Systems Designed to Support Students' Experience of the Learning and Teaching Process
1. An induction programme for new students is held during the first week of Semester 1.
2. All students receive a copy of the handbook for the course.
3. All students have access to the Queen's intranet services which offers:
(i) E-mail communication with staff.
(ii) Access to learning and teaching materials (i.e., syllabi, lecture and tutorial outlines and other course materials).
(iii) Opportunities to participate in discussion with teachers and other students.
4. Students have access to University libraries and Student Computer Centres.
5. Staff/Student Consultative Committee provides a forum for consultation and discussion between staff and students. SCC is convened at least once each semester.
6. Staff will communicate regularly with students during any any period of summer internship to provide support and guidance.
7. Facilities are available within the School and adjacent teaching facilities to aid students with physical disabilities; the School also adheres to University policy concerning the support of students with sensory, learning and physical disabilities

Are students subject to Fitness to Practise Regulations

(Please see General Regulations)

No

EDUCATIONAL AIMS OF PROGRAMME

The aim of the programme is to offer a multi-disciplinary education in cyber security that prepares graduates with key knowledge, skills and competencies necessary for employment in technical development, cyber risk analysis, managerial positions such as Chief Information Security Officer, or as preparation for further research.

On completion of the programme the student will be able to:
• Demonstrate comprehensive knowledge and understanding of the fundamental principles of cyber security, which will remain applicable through changes in technology.
• Apply advanced knowledge and practical skills in the theory and practice of cyber security.
• Demonstrate skills and techniques necessary to embark on careers as security analysts, cyber security officers, or professional developers skilled in cyber security.
• Apply skills in a range of practices, processes, tools and methods applicable to cyber security in commercial and research contexts.
• Solve problems based on exposure to, and practical experience in, a range of current technologies and emerging trends at the forefront of cyber security.
• Demonstrate the development of practical skills in a commercial or research context.

Consistent with the general Educational Aims of the Programme and the specific requirements of the Benchmarking Statement for Master’s degrees in Computing, this specification provides a concise summary of the main features of the programme, and the learning outcomes that a typical student might reasonably be expected to achieve and demonstrate if he/she takes advantage of the learning opportunities that are provided.

Specifically, students graduating from the programme will have achieved the following learning outcomes, commensurate with degree classification, relating to subject specific knowledge and understanding; intellectual, practical and key transferable skills.

LEARNING OUTCOMES

Learning Outcomes: Cognitive Skills

On the completion of this course successful students will be able to:

Describe potential cyber-attacks and the actors that might perform them.

Teaching/Learning Methods and Strategies

Knowledge primarily developed in modules where specific security issues are presented, as well as project.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC2. Critically evaluate security failures and identify specific cyber security principles that have been violated

Teaching/Learning Methods and Strategies

Strongly addressed in Software Assurance and Ethics modules, and addressed to a moderate extent in most other modules.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC3. Critically evaluate appropriate options available to mitigate threats within a system.

Teaching/Learning Methods and Strategies

Strongly developed as a key part of the majority of modules.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

IC4. Critically evaluate a given system design, and identify significant vulnerabilities, risks, and points at which specific cyber security methods and technologies should be employed

Teaching/Learning Methods and Strategies

Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project.

Methods of Assessment

Combination of unseen written examinations (IC1, IC2, IC4), practical work (IC3, IC4), coursework (IC1, IC2), presentations (IC1, IC3) and dissertation (IC2, IC3, IC4).

Learning Outcomes: Transferable Skills

On the completion of this course successful students will be able to:

TE1. Work effectively with and for others, including as part of a team.

Teaching/Learning Methods and Strategies

Strongly developed in practical project work, particularly where undertaken with industry. Also developed in technical modules with shared laboratory work elements, and Ethics group coursework.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6,TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE2. Retrieve information independently, from a variety of sources and by a variety of techniques.

Teaching/Learning Methods and Strategies

Very strongly developed in project work, but also moderately developed through coursework in taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE3. Use information technology effectively.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is strongly developed throughout all modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE4. Communicate effectively using various modes/media and with a variety of audiences.

Teaching/Learning Methods and Strategies

Strongly developed in project work, Ethics coursework, and also moderately developed through coursework in several technical focused modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE5. Understand and present information involving a quantitative dimension.

Teaching/Learning Methods and Strategies

Forms a core part of the majority of the programme and is strongly developed across the programme

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE6. Manage one’s own learning and development including time management and organisational skills.

Teaching/Learning Methods and Strategies

Very strongly developed in project work and Ethics coursework, but also moderately developed through coursework in other taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

TE7. Learn independently in familiar and unfamiliar situations with open-mindedness and a spirit of critical enquiry.

Teaching/Learning Methods and Strategies

Very strongly developed in project work, but also moderately developed through coursework in taught modules.

Methods of Assessment

Combination of unseen written examinations (TE5), practical work (TE1, TE2, TE3, TE4, TE5, TE6, TE7), coursework (TE2, TE3, TE4, TE5, TE6, TE7), presentations (TE3, TE4, TE5) and dissertation (TE1, TE2, TE3, TE4, TE5, TE6, TE7).

Learning Outcomes: Knowledge & Understanding

On the completion of this course successful students will be able to:

KU1. The underpinning principles of cyber security.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is developed across all modules.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU2. The essential theories, practices, languages and tools that may be deployed for the specification, design, implementation, evaluation and maintenance of secure cyber systems.

Teaching/Learning Methods and Strategies

Forms a core part of the whole programme and is strongly developed throughout all modules.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU3. Good cyber security practice in the specification, design, implementation, evaluation and maintenance of security solutions.

Teaching/Learning Methods and Strategies

Practical skills developed throughout all modules, with key skills delivered through laboratory work in Crypto, NetSec and Software Assurance

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU4. Security threats that exist in the cyber realm, different types of cyber-attacks and their characteristics.

Teaching/Learning Methods and Strategies

Knowledge primarily developed in Crypto, NetSec, and Malware modules, where specific security technologies are presented.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU5. Design fundamentals and cyber defence methods that help create trustworthy systems.

Teaching/Learning Methods and Strategies

Developed across modules dealing with specific security technologies, but primarily achieved through Software Assurance and Project.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

KU6. The interaction between security and system usability and the importance of minimising the effects of security mechanisms.

Teaching/Learning Methods and Strategies

Strongly addressed in Software Assurance and Ethics modules, where this is a key learning outcome.

Methods of Assessment

Combination of unseen written examinations (KU1, KU2, KU3, KU4), practical work (KU2, KU3, KU5, KU6), coursework (KU2, KU3, KU5), presentations (KU1, KU2) and dissertation (KU3, KU5, KU6).

Learning Outcomes: Subject Specific

On the completion of this course successful students will be able to:

P1. Apply a range of concepts, tools and techniques to the solution of complex cyber security problems.

Teaching/Learning Methods and Strategies

Strongly developed in the research project and well developed in all other modules.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P2. Deploy appropriate cyber security theory and practices for the specification, design and evaluation of a system.

Teaching/Learning Methods and Strategies

Very strongly addressed across the whole programme.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P3. Effectively use tools for development and testing of cyber secure systems.

Teaching/Learning Methods and Strategies

Strongly developed in modules with an emphasis on laboratory work and strongly developed in the project.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P4. Implement algorithms, scripts and programs using programming languages to solve complex cyber security problems.

Teaching/Learning Methods and Strategies

Strongly addressed across the whole programme, particularly those with components addressing verifying cyber security.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

P5. Articulate and effectively communicate the design and technological rationale for a given cyber security component or design through appropriate technical reports and presentations.

Teaching/Learning Methods and Strategies

Strongly addressed across the whole programme, particularly those with a major software aspect.

Methods of Assessment

Combination of unseen written examinations (P1), practical work (P1, P2, P3, P4, P5), coursework (P2, P4, P5), presentations (P5) and dissertation (P1, P2, P3, P4, P5).

MODULE INFORMATION

Programme Requirements

Module Title

Module Code

Level/ stage

Credits

Availability

Duration

Pre-requisite

 

Assessment

 

 

 

 

S1

S2

 

 

Core

Option

Coursework %

Practical %

Examination %

Applied Cryptography

ELE8090

7

20

YES

12 weeks

N

YES

15%

25%

60%

Computer Forensics

ELE8091

7

20

YES

12 weeks

N

YES

40%

60%

0%

Malware

ELE8092

7

20

YES

12 weeks

N

YES

60%

0%

40%

Network Security and Monitoring

ELE8093

7

20

YES

12 weeks

N

YES

25%

35%

40%

Software Assurance

ELE8094

7

20

YES

12 weeks

N

YES

20%

20%

60%

Individual Research Project

ELE8095

7

60

YES

YES

24 weeks

N

YES

70%

30%

0%

Ethical & Legal Issues in Cyber Security

ECS8065

7

20

YES

12 weeks

N

YES

40%

0%

60%

Notes