Please note
This document only provides information for the academic year selected and does not form part of the student contract
School:
School of Computing and Engineering
Credit Rating:
15
Level (including FHEQ):
M (FHEQ Level 7)
Graded or Non Graded:
Graded
Version Valid From:
2022-09-01
Module Leader:
Soufiene Djahel
Version Number
2023.02
Learning Methods
Guided Independent Study
Practical Classes and Demonstrations
Lecture
Professional Body Requirements
Institution of Engineering and Technology
Synopsis
Upon successful completion of this module, you will have a systematic understanding of knowledge, and critical awareness of current cyber security challenges and how they are exploited through cybercrime. This includes gaining practical knowledge of how to perform and critically evaluate a crime scene from a digital perspective. You will … For more content click the Read More button below.
Learning Strategy
Lectures and practicals will be delivered and supported by unsupervised study.
Outline Syllabus
• Security weakness within digital systems. This will include aspects from the end-user’s perceptivity, for example Confidentiality, Integrity, and Availability (CIA) Model.• Cybercrime and the most prominent attacks, including technical aspects of how they occur, as well as how they can be detected and prevented against. • Legal and ethical … For more content click the Read More button below.
Learning Outcomes
On successful completion of this module students will
1.
Formulate a systematic understanding of knowledge, and critical awareness of current cyber security challenges and how they are exploited through cybercrime.
2.
Demonstrate originality in the application of practical knowledge and critical evaluation of crime scene from a digital perspective.
3.
Critically evaluate and engage in scholarship in the discipline, including proposing and testing both research and investigative hypotheses.
4.
Deal with complex issues and make sound judgment in the absence of complete data, such as assessing vulnerable/compromised security to determine security implications, including mitigation actions.
5.
Communicate conclusions and work to specialist and non-specialist audiences.
6.
Demonstrate self-direction and originality in tackling and solving problems, including autonomously planning and implementing tasks at a professional level.
Formative Assessment
Assessment 1: Quizzes / polls
Assessment 2: Written draft
Assessment 3: Focused classwork observations
Summative Assessment
Assessment 1: Practical Skills Assessment
Assessment 2: Portfolio
Assessment Criteria
Assessment for both Task 1 and Task 2 will be based on norm-referenced criteria.
My Reading
Reading List