UDCNITSC - BSc Computer Networking and IT Security
Course Specification
Validation status | Validated | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Highest award | Bachelor of Science | Level | Honours | |||||||||
Possible interim awards | Bachelor of Science, Diploma of Higher Education, Certificate of Higher Education, Bachelor of Science | |||||||||||
Total credits for course | 360 | |||||||||||
Awarding institution | London Metropolitan University | |||||||||||
Teaching institutions | London Metropolitan University | |||||||||||
School | School of Computing and Digital Media | |||||||||||
Subject Area | Computer Science and Applied Computing | |||||||||||
Attendance options |
|
|||||||||||
Course leader |
About the course and its strategy towards teaching and learning and towards blended learning/e-learning
The Faculty of Computing is one of the first in UK to become a Cisco Academy in 1999. The course is designed around Cisco curriculum and all students study the complete CCNA modules which are embedded in the course. This means students are provided with the additional Cisco certifications throughout the course. This course includes substantial practical/hands-on content with increasing emphasis on project/group work as its students progress through the course.
The delivery for teaching for this course shall be 30 weeks formal scheduled contact time. Modules are mainly delivered through a combination of lectures (1 hour/week), tutorials/lab-based workshop (2 hour/week) sessions, and blended learning. Teaching materials such as lecture notes and other support learning materials are accessible on the university VLE network. Faculty network facilities (e.g. web server) are also available to support teaching and learning activities.
Appropriate blended learning approaches and technologies, such as, the University’s VLE, the Cisco Academy, and network security toolkits will be used to facilitate and support student learning, in particular, to:
- deliver course content;
- encourage active learning;
- provide formative and summative assessments, and prompt feedback;
- enhance student engagement and learning experience.
Course aims
-
To apply analytical and design techniques used to solve problems in computer networking and IT Security.
-
To develop analytical, practical and ICT skills appropriate for the specification, design, implementation and testing of computer networks and security measures in network security.
-
To promote awareness of commercial and economic context, social and business factors that influence the choice of solution to engineering problems including health, safety and risk (including environmental risk) issues.
-
To promote awareness in students of ethical issues concerning their work, their potential roles to operate within the appropriate code of professional conduct, recognising their responsibilities and obligations to society, the profession and the environment.
- To provide a broad educational base with an emphasis on project-oriented activities where students will gain appropriate skills, knowledge and understanding to prepare them for a professional career in the field of computer networking and IT Security.
Course learning outcomes
On successful completion of this course students will be able to
LO1. Understand the scientific, mathematical and ITC principles and methods relevant to Computer Networking and IT security;
LO2. Appreciate the problems and solutions in the relevant social, environmental, ethical and legislative context including health, safety and risks issues;
LO3. Be able to select and apply appropriate scientific, mathematical and technical methods to model, analyse and solve problems related to Computer Networking and IT Security;
LO4. Identify problems and create solutions using appropriate professional simulation and design tools;
LO5. Recognise the need for continuous personal development and plan to achieve this showing confidence and self-awareness, reflect on own learning, and be self-reliant and constructively self-critical;
LO6. Design a variety of different computer networking configuration taking account of industrial and commercial restraints and network security issues;
LO7. Evaluate and carry out performance analysis, critical appraisals and evaluation of computer networks and their security requirements;
Course learning outcomes / Module cross reference
LO1. Understand the scientific, mathematical and ITC principles and methods relevant
to Computer Networking and IT security:
Programming
Communications Engineering
Information Systems
Networking Concepts
Security in Computing
Networks & Operating Systems
LO2. Appreciate the problems and solutions in the relevant social, environmental, ethical
and legislative context including health,safety and risks issues:
Information Systems
Risk, Crisis and Security Management
Professional Issues, Ethics and
Computer Law
LO3. Be able to select and apply appropriate scientific, mathematical and technical
methods to model, analyse and solve problems related to Computer Networking and IT Security:
Programming
Communications Engineering
Networking Concepts
LAN & WAN
Security in Computing
Computer & Network Security
Project
LO4. Identify problems and create solutions using appropriate professional simulation
and design tools:
Programming
Communications Engineering
Networking Concepts
Wireless Networks
Network Planning & Simulation
Project
LO5. Recognise the need for continuous personal development and plan to
achieve this showing confidence and selfawareness, reflect on own learning, and
be self-reliant and constructively selfcritical:
Information Systems
Project
LO6. Design a variety of different computer networking configuration taking account
of industrial and commercial restraints and network security issues:
Programming
Communications Engineering
Networking Concepts
LAN & WAN
Security in Computing
Risk, Crisis and Security Management
Computer & Network Security
Wireless Networks
Network Planning & Simulation
Project
LO7. Evaluate and carry out performance analysis, critical appraisals and evaluation of computer networks and their security requirements:
Programming
Communications Engineering
Networking Concepts
LAN & WAN
Security in Computing
Risk, Crisis and Security Management
Computer & Network Security
Network Planning & Simulation
Project
Principle QAA benchmark statements
6 Benchmark standards
6.1 Benchmark standards are defined at threshold and typical levels and some further comments are made about excellence.
Threshold level
6.2 The threshold level is interpreted to mean that all students (taken over all years), graduating with an honours degree in the discipline of computing will have achieved this level of performance.
6.3 On graduating with an honours degree in computing, students should be able to:
- demonstrate a requisite understanding of the main body of knowledge for their programme of stud
- understand and apply essential concepts, principles and practice of the subject in the context of well-defined scenarios, showing judgement in the selection and application of tools and techniques
- produce work involving problem identification, the analysis, the design or the development of a system with appropriate documentation, recognising the important relationships between these. The work will show some problem-solving and evaluation skills drawing on some supporting evidence, and demonstrate a requisite understanding of the need for quality
- demonstrate transferable skills and an ability to work under guidance and as a team member
- identify appropriate practices within a professional, legal and ethical framework and understand the need for continuing professional development
- discuss applications based upon the body of knowledge.
Typical level
6.4 This is the average standard attained (taken over all years) of all the students graduating with an honours degree in the discipline of computing.
6.5 On graduating with an honours degree in computing, students should be able to:
- demonstrate a sound understanding of the main areas of the body of knowledge within their programme of study, with an ability to exercise critical judgement across a range of issues
- critically analyse and apply a range of concepts, principles and practice of the subject in an appropriate manner in the context of loosely defined scenarios, showing effective judgement in the selection and use of tools and techniques
- produce work involving problem identification, the analysis, the design or the development of a system, with accompanying documentation, recognising the important relationships between these. The work will show problem-solving and evaluation skills, draw upon supporting evidence and demonstrate a good understanding of the need for quality
- demonstrate transferable skills with an ability to show organised work as an individual and as a team member and with minimum guidance
- apply appropriate practices within a professional, legal and ethical framework and identify mechanisms for continuing professional development and lifelong learning
- explain a wide range of applications based upon the body of knowledge.
Excellence
6.6 While the benchmark standards above are defined for just threshold and typical levels, it is nevertheless expected that programmes in computing will provide opportunities for students of the highest calibre to achieve their full potential.
6.7 Such students will be:
- creative and innovative in their application of the principles covered in the curriculum, and may relish the opportunity to engage in entrepreneurial activity
- able to contribute significantly to the analysis, design or the development of systems which are complex, and fit for purpose, recognising the important relationships between these
- able to exercise critical evaluation and review of both their own work and the work of others.
6.8 In as much as human ingenuity and creativity has fostered the rapid development of the discipline of computing in the past, programmes in computing should not limit those who will lead the development of the discipline in the future.
Assessment strategy
- Modules of this course are assessed mainly by the combination of coursework, case studies report and presentation, lab logbooks and workbooks, class-test, unseen examinations, and final-year project reports, presentation and viva.
- A balanced assessment load per module and a careful distribution of concurrent assessment deadlines will be ensured;
-
Constructive and timely feedback in written and/or oral modes will be delivered, within 15 working days of completing/submitting an assessment;
-
Online submission of assessment will be used, as appropriate, via University VLE
Organised work experience, work based learning, sandwich year or year abroad
Work placement or Work Related Learning modules are available as options at level 6.
Course specific regulations
If attendance falls below 75% on a module, reassessment opportunities will not be available and instead the module will have to be retaken the following year with attendance and payment of fees. Mitigating circumstances cannot be claimed for missed classes; however Module Leaders will take account of absences that are a consequence of recorded disability or otherwise recorded as 'Authorised Absence' when applying the 75% threshold.
Modules required for interim awards
All modules are core-compulsory except one autumn 15-credit designate module and one spring 15-credit designate module at level six.
Professional Statutory and Regulatory Body (PSRB) accreditations & exemptions
This course is currently undergoing the accreditation process for the British Computer Society (BCS), and The Institiution of Engineering and Technology (IET), which has more than 150,000 members in 127 countries.
Career opportunities
You’ll complete this course ready to pursue a career in computer networking and/or IT security, or in the wider IT industry. Previous graduates have gone on to find employment as data analysts at companies such as CACI and Cisco Systems.
Potential employers include cybercrime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.
Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work placement module, and through our World of Work agency.
This course is also an excellent preparation for further study or research.
Entry requirements
In addition to the University's standard entry requirements, you should have:
- English Language and Mathematics GCSE at grade C or above
- 200 or more UCAS points from two or more A-levels, including at least 80 points should be in a maths, science or technology subject (or equivalent, eg BTEC Level 3 Extended Diploma, Advanced Diploma, Progression Diploma or Access to HE Diploma with 60 credits)
Applicants with relevant professional qualifications or extensive professional experience will also be considered.
All applicants must be able to demonstrate proficiency in the English language. Applicants who require a Tier 4 student visa may need to provide a Secure English Language Test (SELT) such as Academic IELTS. For more information about English qualifications please see our English language requirements.
Official use and codes
Approved to run from | 2013/14 | Specification version | 1 | Specification status | Validated |
---|---|---|---|---|---|
Original validation date | 01 Sep 2013 | Last validation date | 01 Sep 2013 | ||
Sources of funding | HE FUNDING COUNCIL FOR ENGLAND | ||||
JACS codes | I250 (Systems Auditing): 100% | ||||
Route code | CNITSC |
Stage 1 Level 04 September start Offered
Code | Module title | Info | Type | Credits | Location | Period | Day | Time |
---|---|---|---|---|---|---|---|---|
CC4002 | Information Systems | Core | 30 | |||||
CS4001 | Programming | Core | 30 | NORTH | AUT+SPR | TUE | AM | |
CT4001 | Communications Engineering | Core | 30 | NORTH | AUT+SPR | FRI | AM | |
CT4004 | Networking Concepts (CCNA1 and 2) | Core | 30 | NORTH | AUT | WED | EV | |
NORTH | AUT | MON | EV | |||||
NORTH | AUT+SPR | THU | PM | |||||
NORTH | AUT+SPR | THU | PM |
Stage 1 Level 04 January start Not currently offered
Code | Module title | Info | Type | Credits | Location | Period | Day | Time |
---|---|---|---|---|---|---|---|---|
CC4002 | Information Systems | Core | 30 | |||||
CS4001 | Programming | Core | 30 | |||||
CT4001 | Communications Engineering | Core | 30 | |||||
CT4004 | Networking Concepts (CCNA1 and 2) | Core | 30 |
Stage 2 Level 05 September start Offered
Code | Module title | Info | Type | Credits | Location | Period | Day | Time |
---|---|---|---|---|---|---|---|---|
CC5004 | Security in Computing | Core | 30 | |||||
CC5052 | Risk, Crisis and Security Management | Core | 15 | NORTH | AUT | THU | PM | |
CS5001 | Networks and Operating Systems | Core | 30 | |||||
CS5052 | Professional Issues, Ethics and Computer Law | Core | 15 | |||||
CT5004 | LAN & WAN (CCNA 3 & 4) | Core | 30 |
Stage 3 Level 06 September start Offered
Code | Module title | Info | Type | Credits | Location | Period | Day | Time |
---|---|---|---|---|---|---|---|---|
CC6051 | Ethical Hacking | Core | 15 | NORTH | SPR | THU | AM | |
CS6P05 | Project | Core | 30 | NORTH | AUT+SPR | WED | PM | |
CT6004 | Network Security (CISCO) | Core | 30 | |||||
FC6W51 | Work Related Learning II | Core | 15 | |||||
CC6003 | Digital Crime Investigation | Option | 30 | |||||
CC6004 | Network and Cloud Security | Option | 30 | NORTH | AUT+SPR | WED | AM | |
CS6002 | Distributed and Internet Systems | Option | 30 |