UDCSFCOM - BSc (Hons) Cyber Security and Forensic Computing (Top-up)
|Highest award||Bachelor of Science||Level||Honours|
|Possible interim awards||Bachelor of Science|
|Total credits for course||120|
|Awarding institution||London Metropolitan University|
|Teaching institutions||London Metropolitan University|
|School||School of Computing and Digital Media|
|Subject Area||Computer Science and Applied Computing|
|Course leader||Alexandros Chrysikos|
About the course and its strategy towards teaching and learning and towards blended learning/e-learning
The modules are delivered by employing face-to-face teaching in lectures that are supported by seminars, workshops and tutorials based on each module’s needs. All materials, teaching and learning, are provided online via the university’s VLE (Virtual Learning Environment). Furthermore, students are encouraged to engage in workshops and presentations presented by external guest speakers, as well as visit external institutions and organisations. In this effort students are supported by module leader blogs, use of video and role playing. Moreover, apart from timetabled use of PC workshops, students are encouraged to make use of PC provision in their personal study time, but also use the library and learning centre study facilities. Appropriate blended learning technologies, such as the University’s VLE WebLearn, Library’s e-books and Online Databases, are used to facilitate and support student learning, in particular to:
• deliver content;
• encourage active learning;
• provide formative and summative assessments with prompt feedback;
• enhance student engagement and learning.
Cyber Security and Forensic Computing are the two main themes that characterise the course. Specifically, the main aim of the course is to provide a general education in the theory and practice of computer, network and information security, with special emphasis in the field of cyber security and forensic computing. Furthermore, the course aims to develop specialist analytical, operational and developmental skills in both technical and socio-technical areas of cyber security.
The general aims of the course are:
• to prepare students for cyber security and forensic computing careers
• to help students develop independent-thinking, effective communication, and problem-solving skills that are applicable to variety of IT-related careers
• to prepare students for higher degrees studies in related subjects
• to continuously develop study skills that will enable students to become independent and lifelong learners
The specific aims of the course are:
• to develop students’ knowledge and industry-oriented skills of cyber security and forensic computing technologies
• to provide students with a solid background in the theoretical underpinnings and practical aspects of IT, Cyber Security and Digital Forensics
• to help students’ comprehend the key issues in preservation of information confidentiality, integrity, and availability
• to develop students’ understanding about professional, legal and ethics issues in cyber security and forensic computing
Course learning outcomes
On successful completion of this course students will be able:
LO 1. demonstrate a requisite understanding of the main body of knowledge in
LO 2. understand and apply essential concepts, principles and practice in the context of well
defined scenarios, showing judgment in the selection and application of tools and techniques to solve the issues with cyber security and forensic computing;
LO 3. produce work involving identification, the analysis, design and development of a cyber security and forensic computing system with accompanying documentation, recognising the important relationships between these stages and showing problem solving and evaluation skills drawing on supporting evidence;
LO 4. demonstrate transferable skills and an ability to work under guidance and as a cyber security and/or forensic computing team member;
LO 5. identify appropriate practices within professional and ethical framework of cyber security and forensic computing and understand the need for continuing professional development in this profession;
LO 6. Discuss cyber security and forensic computing practices/measures based upon the body of knowledge learned from this course.
Course learning outcomes / Module cross reference
LO 01 LO 02 LO 03 LO 04 LO 05 LO 06
Module Title Module Code
CS6PO5 Project LO1,2,5 LO4,6 LO6 LO7 LO3,5
CC6003 Digital Crime Investigation LO4-6 LO3-6 LO1,2,7 LO1,2,7
CC6004 Network and Cloud Security LO6 LO1-4 LO4-5 LO7 LO5
CC6051 Ethical Hacking LO1,2 LO2,3 LO4,5 LO3
FC6W51 Work Related Learning LO4 LO3,4 LO2 LO5,6 LO1,4
CC5052 Risk, Crisis and Security Management LO1,2 LO2-4 LO5,7 LO2,3,6
CC6052 Management Support Systems LO1,2 LO3,4 LO4
Principle QAA benchmark statements
QAA Subject Benchmark for Computing, February 2016 (https://www.qaa.ac.uk/docs/qaa/subject-benchmark-statements/sbs-computing-16.pdf?sfvrsn=26e1f781_12)
Benchmark standards (page 16) are defined at threshold and typical levels.
1. The threshold level is interpreted to mean that all students (taken over all years), graduating with an honours degree in the discipline of computing will have achieved this level of performance.
2. On graduating with an honours degree in computing, students should be able to:
• demonstrate a requisite understanding of the main body of knowledge for their programme of study
• understand and apply essential concepts, principles and practice of the subject in the context of well-defined scenarios, showing judgement in the selection and application of tools and techniques
• produce work involving problem identification, the analysis, design and development of a system with accompanying documentation, recognising the important relationships between these stages and showing problem solving and evaluation skills drawing on supporting evidence
• produce small well-constructed programmes to solve well-specified problems
• demonstrate generic skills, an ability to work under guidance and as a team member
• identify appropriate practices within a professional, legal and ethical framework and understand the need for continuing professional development
3. This is the average standard attained (taken over all years) of all the students graduating with an honours degree in the discipline of computing.
4. On graduating with an honours degree in computing, students should be able to:
• demonstrate a sound understanding of the main areas of the body of knowledge within their programme of study, with an ability to exercise critical judgement across a range of issues
• critically analyse and apply a range of concepts, principles and practice of the subject in an appropriate manner in the context of loosely defined scenarios, showing effective judgement in the selection and use of tools and techniques
• produce work involving problem identification, the analysis, the design or the development of a system, with accompanying documentation, recognising the important relationships between these. The work will show problem-solving and evaluation skills, draw upon supporting evidence and demonstrate a good understanding of the need for quality
• demonstrate transferable skills with an ability to show organised work as an individual and as a team member and with minimum guidance
• apply appropriate practices within a professional, legal and ethical framework and identify mechanisms for continuing professional development and lifelong learning
• explain a wide range of applications based upon the body of knowledge.
A range of assessment methods is employed throughout the course. The method of assessment for each module in each level is clearly described in the individual ‘Module Guide’ which is made available to the students at the start of the semester. Modules employ a combination of the following forms of assessments:
• Case study focussed reports and presentations
• Research reports
• Meeting logs
• Online journal entries
• Unseen examinations
• Part seen examinations
• Individual vivas
Organised work experience, work based learning, sandwich year or year abroad
A work-related learning module is available as designate in Autumn semester. The module enables students to undertake an appropriate short period of professional activity, related to their course at level 6, with a business or community organization and to gain credit for their achievements. The activity can be a professional training, a volunteering activity, employment activity, placement or business start-up activity.
Modules required for interim awards
All modules are core-compulsory, except the choice of optional modules.
Arrangements for promoting reflective learning and personal development
There is strong encouragement to the students to produce blogs/logs in order to demonstrate what they have learned every week, as well as to maintain a personal development portfolio.
In addition, formative feedback is provided during the course of the academic year. Specifically, by conducting regular checkpoint meetings students are given the opportunity to present and discuss their coursework progress with their lectures in seminars and workshops. Through this process constructive feedback is provided to students to help them refine and improve their work before final submission.
Students are also asked to provide evidence reflecting on how formative feedback on checkpoint meetings has been implemented in the final submission.
Other external links providing expertise and experience
FHEQ October 2014 (https://www.qaa.ac.uk/docs/qaa/quality-code/qualifications-frameworks.pdf)
Career, employability and opportunities for continuing professional development
Successful completion of this course offers improved career opportunities in law enforcement, government or other related agencies, and commercial IT departments or security consultancies. This course is also an excellent preparation for further research or studies such as MSc or PhD.
You’ll complete this course ready to pursue a career in computer forensics and/or cyber security arena, or in the wider IT industry. Previous graduates have gone on to find employment as security/cyber analysts at companies such as MWR InfoSecurity, CACI, Cisco Systems and LGC Group.
Potential employers include digital crime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.
Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work-related module.
This course is also an excellent preparation for further research or studies such as MSc or PhD either at London Met or another university.
In addition to the University's standard entry requirements, you should have one of the following:
- 240 credits from a Higher National Diploma (HND), Foundation Degree (FdA/ FdSc) or equivalent international qualification in a relevant subject
- 240 credits from years 1 and 2 of an undergraduate degree (BA/BSc) in a relevant subject at a different institution
To study a degree at London Met, you must be able to demonstrate proficiency in the English language. If you require a Tier 4 student visa you may need to provide the results of a Secure English Language Test (SELT) such as Academic IELTS. For more information about English qualifications please see our English language requirements.
If you need (or wish) to improve your English before starting your degree, the University offers a Pre-sessional Academic English course to help you build your confidence and reach the level of English you require.
Official use and codes
|Approved to run from||2019/20||Specification version||1||Specification status||Validated|
|Original validation date||23 May 2019||Last validation date||23 May 2019|
|Sources of funding||FUNDED ENTIRELY BY STUDENT TUITION FEES|
Stage 1 Level 06 September start Offered
|CC6003||Digital Crime Investigation||Core||30|
|CC6004||Network and Cloud Security||Core||30||NORTH||AUT+SPR||WED||AM|
|CC5052||Risk, Crisis and Security Management||Option||15||NORTH||AUT||THU||PM|
|CC6052||Management Support Systems||Option||15||NORTH||AUT||THU||AM|
|FC6W51||Work Related Learning II||Option||15||NORTH||AUT||WED||PM|