Course specification and structure
Undergraduate Course Structures Postgraduate Course Structures

UDCNITSC - BSc Computer Networking and IT Security

Course Specification


Validation status Validated
Highest award Bachelor of Science Level Honours
Possible interim awards Bachelor of Science, Diploma of Higher Education, Certificate of Higher Education, Bachelor of Science
Total credits for course 360
Awarding institution London Metropolitan University
Teaching institutions London Metropolitan University
School School of Computing and Digital Media
Subject Area Computer Science and Applied Computing
Attendance options
Option Minimum duration Maximum duration
Full-time 3 YEARS  
Part-time 4 YEARS  
Course leader  

About the course and its strategy towards teaching and learning and towards blended learning/e-learning

The Faculty of Computing is one of the first in UK to become a Cisco Academy in 1999. The course is designed around Cisco curriculum and all students study the complete CCNA modules which are embedded in the course. This means students are provided with the additional Cisco certifications throughout the course. This course includes substantial practical/hands-on content with increasing emphasis on project/group work as its students progress through the course.

The delivery for teaching for this course shall be 30 weeks formal scheduled contact time. Modules are mainly delivered through a combination of lectures (1 hour/week), tutorials/lab-based workshop (2 hour/week) sessions, and blended learning. Teaching materials such as lecture notes and other support learning materials are accessible on the university VLE network. Faculty network facilities (e.g. web server) are also available to support teaching and learning activities.

Appropriate blended learning approaches and technologies, such as, the University’s VLE, the Cisco Academy, and network security toolkits will be used to facilitate and support student learning, in particular, to:

  • deliver course content;
  • encourage active learning;
  • provide formative and summative assessments, and prompt feedback;
  • enhance student engagement and learning experience.

Course aims

This course is designed with our Cisco Academy to equip its graduates to work at a professional level in the areas of Telecommunications and Computer Networking with the emphasis on Network Security. It is also an excellent preparation for further research or studies such as MSc or PhD. The aims of the course are:

  • To apply analytical and design techniques used to solve problems in computer networking and IT Security.
  • To develop analytical, practical and ICT skills appropriate for the specification, design, implementation and testing of computer networks and security measures in network security.
  • To promote awareness of commercial and economic context, social and business factors that influence the choice of solution to engineering problems including health, safety and risk (including environmental risk) issues.
  • To promote awareness in students of ethical issues concerning their work, their potential roles to operate within the appropriate code of professional conduct, recognising their responsibilities and obligations to society, the profession and the environment.
  • To provide a broad educational base with an emphasis on project-oriented activities where students will gain appropriate skills, knowledge and understanding to prepare them for a professional career in the field of computer networking and IT Security.

Course learning outcomes

On successful completion of this course students will be able to

LO1. Understand the scientific, mathematical and ITC principles and methods relevant to Computer Networking and IT security;

LO2. Appreciate the problems and solutions in the relevant social, environmental, ethical and legislative context including health, safety and risks issues;

LO3. Be able to select and apply appropriate scientific, mathematical and technical methods to model, analyse and solve problems related to Computer Networking and IT Security;

LO4. Identify problems and create solutions using appropriate professional simulation and design tools;

LO5. Recognise the need for continuous personal development and plan to achieve this showing confidence and self-awareness, reflect on own learning, and be self-reliant and constructively self-critical;

LO6. Design a variety of different computer networking configuration taking account of industrial and commercial restraints and network security issues;

LO7. Evaluate and carry out performance analysis, critical appraisals and evaluation of computer networks and their security requirements;

Course learning outcomes / Module cross reference

LO1. Understand the scientific, mathematical and ITC principles and methods relevant
to Computer Networking and IT security:

 Programming
 Communications Engineering
 Information Systems
 Networking Concepts
 Security in Computing
 Networks & Operating Systems

LO2. Appreciate the problems and solutions in the relevant social, environmental, ethical
and legislative context including health,safety and risks issues:

 Information Systems
 Risk, Crisis and Security Management
 Professional Issues, Ethics and
Computer Law

LO3. Be able to select and apply appropriate scientific, mathematical and technical
methods to model, analyse and solve problems related to Computer Networking and IT Security:

 Programming
 Communications Engineering
 Networking Concepts
 LAN & WAN
 Security in Computing
 Computer & Network Security
 Project

LO4. Identify problems and create solutions using appropriate professional simulation
and design tools:

 Programming
 Communications Engineering
 Networking Concepts
 Wireless Networks
 Network Planning & Simulation
 Project

LO5. Recognise the need for continuous personal development and plan to
achieve this showing confidence and selfawareness, reflect on own learning, and
be self-reliant and constructively selfcritical:

 Information Systems
 Project

LO6. Design a variety of different computer networking configuration taking account
of industrial and commercial restraints and network security issues:

 Programming
 Communications Engineering
 Networking Concepts
 LAN & WAN
 Security in Computing
 Risk, Crisis and Security Management
 Computer & Network Security
 Wireless Networks
 Network Planning & Simulation
 Project

LO7. Evaluate and carry out performance analysis, critical appraisals and evaluation of computer networks and their security requirements:

 Programming
 Communications Engineering
 Networking Concepts
 LAN & WAN
 Security in Computing
 Risk, Crisis and Security Management
 Computer & Network Security
 Network Planning & Simulation
 Project

Principle QAA benchmark statements

6 Benchmark standards

6.1 Benchmark standards are defined at threshold and typical levels and some further comments are made about excellence.

Threshold level

6.2 The threshold level is interpreted to mean that all students (taken over all years), graduating with an honours degree in the discipline of computing will have achieved this level of performance.

6.3 On graduating with an honours degree in computing, students should be able to:

  • demonstrate a requisite understanding of the main body of knowledge for their programme of stud

  • understand and apply essential concepts, principles and practice of the subject in the context of well-defined scenarios, showing judgement in the selection and application of tools and techniques

  • produce work involving problem identification, the analysis, the design or the development of a system with appropriate documentation, recognising the important relationships between these. The work will show some problem-solving and evaluation skills drawing on some supporting evidence, and demonstrate a requisite understanding of the need for quality
  • demonstrate transferable skills and an ability to work under guidance and as a team member

  • identify appropriate practices within a professional, legal and ethical framework and understand the need for continuing professional development

  • discuss applications based upon the body of knowledge.

Typical level

6.4 This is the average standard attained (taken over all years) of all the students graduating with an honours degree in the discipline of computing.

6.5 On graduating with an honours degree in computing, students should be able to:

  • demonstrate a sound understanding of the main areas of the body of knowledge within their programme of study, with an ability to exercise critical judgement across a range of issues

  • critically analyse and apply a range of concepts, principles and practice of the subject in an appropriate manner in the context of loosely defined scenarios, showing effective judgement in the selection and use of tools and techniques

  • produce work involving problem identification, the analysis, the design or the development of a system, with accompanying documentation, recognising the important relationships between these. The work will show problem-solving and evaluation skills, draw upon supporting evidence and demonstrate a good understanding of the need for quality

  • demonstrate transferable skills with an ability to show organised work as an individual and as a team member and with minimum guidance
  • apply appropriate practices within a professional, legal and ethical framework and identify mechanisms for continuing professional development and lifelong learning

  • explain a wide range of applications based upon the body of knowledge.

Excellence

6.6 While the benchmark standards above are defined for just threshold and typical levels, it is nevertheless expected that programmes in computing will provide opportunities for students of the highest calibre to achieve their full potential.

6.7 Such students will be:

  • creative and innovative in their application of the principles covered in the curriculum, and may relish the opportunity to engage in entrepreneurial activity

  • able to contribute significantly to the analysis, design or the development of systems which are complex, and fit for purpose, recognising the important relationships between these

  • able to exercise critical evaluation and review of both their own work and the work of others.

6.8 In as much as human ingenuity and creativity has fostered the rapid development of the discipline of computing in the past, programmes in computing should not limit those who will lead the development of the discipline in the future.

Assessment strategy

  • Modules of this course are assessed mainly by the combination of coursework, case studies report and presentation, lab logbooks and workbooks, class-test, unseen examinations, and final-year project reports, presentation and viva.
  • A balanced assessment load per module and a careful distribution of concurrent assessment deadlines will be ensured;
  • Constructive and timely feedback in written and/or oral modes will be delivered, within 15 working days of completing/submitting an assessment;
  • Online submission of assessment will be used, as appropriate, via University VLE

Organised work experience, work based learning, sandwich year or year abroad

Work placement or Work Related Learning modules are available as options at level 6.

Course specific regulations

If attendance falls below 75% on a module, reassessment opportunities will not be available and instead the module will have to be retaken the following year with attendance and payment of fees. Mitigating circumstances cannot be claimed for missed classes; however Module Leaders will take account of absences that are a consequence of recorded disability or otherwise recorded as 'Authorised Absence' when applying the 75% threshold.

Modules required for interim awards

All modules are core-compulsory except one autumn 15-credit designate module and one spring 15-credit designate module at level six.

Professional Statutory and Regulatory Body (PSRB) accreditations & exemptions

This course is currently undergoing the accreditation process for the British Computer Society (BCS), and The Institiution of Engineering and Technology (IET), which has more than 150,000 members in 127 countries.

Career opportunities

You’ll complete this course ready to pursue a career in computer networking and/or IT security, or in the wider IT industry. Previous graduates have gone on to find employment as data analysts at companies such as CACI and Cisco Systems.

Potential employers include cybercrime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.

Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work placement module, and through our World of Work agency.

This course is also an excellent preparation for further study or research.

Entry requirements

In addition to the University's standard entry requirements, you should have:

  • English Language and Mathematics GCSE at grade C or above
  • 200 or more UCAS points from two or more A-levels, including at least 80 points should be in a maths, science or technology subject (or equivalent, eg BTEC Level 3 Extended Diploma, Advanced Diploma, Progression Diploma or Access to HE Diploma with 60 credits)

Applicants with relevant professional qualifications or extensive professional experience will also be considered.

All applicants must be able to demonstrate proficiency in the English language. Applicants who require a Tier 4 student visa may need to provide a Secure English Language Test (SELT) such as Academic IELTS. For more information about English qualifications please see our English language requirements.

Official use and codes

Approved to run from 2013/14 Specification version 1 Specification status Validated
Original validation date 01 Sep 2013 Last validation date 01 Sep 2013  
Sources of funding HE FUNDING COUNCIL FOR ENGLAND
JACS codes I250 (Systems Auditing): 100%
Route code CNITSC

Course Structure

Stage 1 Level 04 September start Offered

Code Module title Info Type Credits Location Period Day Time
CC4002 Information Systems Core 30        
CS4001 Programming Core 30 NORTH AUT+SPR TUE AM
CT4001 Communications Engineering Core 30 NORTH AUT+SPR FRI AM
CT4004 Networking Concepts (CCNA1 and 2) Core 30 NORTH AUT WED EV
          NORTH AUT MON EV
          NORTH AUT+SPR THU PM
          NORTH AUT+SPR THU PM

Stage 1 Level 04 January start Not currently offered

Code Module title Info Type Credits Location Period Day Time
CC4002 Information Systems Core 30        
CS4001 Programming Core 30        
CT4001 Communications Engineering Core 30        
CT4004 Networking Concepts (CCNA1 and 2) Core 30        

Stage 2 Level 05 September start Offered

Code Module title Info Type Credits Location Period Day Time
CC5004 Security in Computing Core 30        
CC5052 Risk, Crisis and Security Management Core 15 NORTH AUT THU PM
CS5001 Networks and Operating Systems Core 30        
CS5052 Professional Issues, Ethics and Computer Law Core 15        
CT5004 LAN & WAN (CCNA 3 & 4) Core 30        

Stage 3 Level 06 September start Offered

Code Module title Info Type Credits Location Period Day Time
CC6051 Ethical Hacking Core 15 NORTH SPR THU AM
CS6P05 Project Core 30 NORTH AUT+SPR WED PM
CT6004 Network Security (CISCO) Core 30        
FC6W51 Work Related Learning II Core 15        
CC6003 Digital Crime Investigation Option 30        
CC6004 Network and Cloud Security Option 30 NORTH AUT+SPR WED AM
CS6002 Distributed and Internet Systems Option 30