UDCSFCOM - BSc (Hons) Cyber Security and Forensic Computing (Top-up)
|Highest award||Bachelor of Science||Level||Honours|
|Possible interim awards||Bachelor of Science|
|Total credits for course||120|
|Awarding institution||London Metropolitan University|
|Teaching institutions||London Metropolitan University|
|School||School of Computing and Digital Media|
|Subject Area||Computer Science and Applied Computing|
About the course and its strategy towards teaching and learning and towards blended learning/e-learning
The modules are delivered by employing face-to-face teaching in lectures that are supported by seminars, workshops and tutorials based on each module’s needs. All materials, teaching and learning, are provided online via the university’s VLE (Virtual Learning Environment). Furthermore, students are encouraged to engage in workshops and presentations presented by external guest speakers, as well as visit external institutions and organisations. In this effort students are supported by module leader blogs, use of video and role playing. Moreover, apart from timetabled use of PC workshops, students are encouraged to make use of PC provision in their personal study time, but also use the library and learning centre study facilities. Appropriate blended learning technologies, such as the University’s VLE WebLearn, Library’s e-books and Online Databases, are used to facilitate and support student learning, in particular to:
• deliver content;
• encourage active learning;
• provide formative and summative assessments with prompt feedback;
• enhance student engagement and learning.
Cyber Security and Forensic Computing are the two main themes that characterise the course. Specifically, the main aim of the course is to provide a general education in the theory and practice of computer, network and information security, with special emphasis in the field of cyber security and forensic computing. Furthermore, the course aims to develop specialist analytical, operational and developmental skills in both technical and socio-technical areas of cyber security.
The general aims of the course are:
• to prepare students for cyber security and forensic computing careers
• to help students develop independent-thinking, effective communication, and problem-solving skills that are applicable to variety of IT-related careers
• to prepare students for higher degrees studies in related subjects
• to continuously develop study skills that will enable students to become independent and lifelong learners
The specific aims of the course are:
• to develop students’ knowledge and industry-oriented skills of cyber security and forensic computing technologies
• to provide students with a solid background in the theoretical underpinnings and practical aspects of IT, Cyber Security and Digital Forensics
• to help students’ comprehend the key issues in preservation of information confidentiality, integrity, and availability
• to develop students’ understanding about professional, legal and ethics issues in cyber security and forensic computing
Course learning outcomes
On successful completion of this course students will be able:
LO 1. demonstrate a requisite understanding of the main body of knowledge in
LO 2. understand and apply essential concepts, principles and practice in the context of well
defined scenarios, showing judgment in the selection and application of tools and techniques to solve the issues with cyber security and forensic computing;
LO 3. produce work involving identification, the analysis, design and development of a cyber security and forensic computing system with accompanying documentation, recognising the important relationships between these stages and showing problem solving and evaluation skills drawing on supporting evidence;
LO 4. demonstrate transferable skills and an ability to work under guidance and as a cyber security and/or forensic computing team member;
LO 5. identify appropriate practices within professional and ethical framework of cyber security and forensic computing and understand the need for continuing professional development in this profession;
LO 6. Discuss cyber security and forensic computing practices/measures based upon the body of knowledge learned from this course.
ULO. Demonstrate confidence, resilience, ambition and creativity and will act as inclusive, collaborative and socially responsible practitioners/professionals in their discipline.
Principle QAA benchmark statements
Subject benchmark: Computing [October 2019]
A range of assessment methods is employed throughout the course. The method of assessment for each module in each level is clearly described in the individual ‘Module Guide’ which is made available to the students at the start of the semester. Modules employ a combination of the following forms of assessments:
• Case study focussed reports and presentations
• Research reports
• Meeting logs
• Online journal entries
• Unseen examinations
• Part seen examinations
• Individual vivas
Organised work experience, work based learning, sandwich year or year abroad
A work-related learning module is available as designate in Autumn semester. The module enables students to undertake an appropriate short period of professional activity, related to their course at level 6, with a business or community organization and to gain credit for their achievements. The activity can be a professional training, a volunteering activity, employment activity, placement or business start-up activity.
Modules required for interim awards
All modules are core-compulsory, except the choice of optional modules.
Arrangements for promoting reflective learning and personal development
There is strong encouragement to the students to produce blogs/logs in order to demonstrate what they have learned every week, as well as to maintain a personal development portfolio.
In addition, formative feedback is provided during the course of the academic year. Specifically, by conducting regular checkpoint meetings students are given the opportunity to present and discuss their coursework progress with their lectures in seminars and workshops. Through this process constructive feedback is provided to students to help them refine and improve their work before final submission.
Students are also asked to provide evidence reflecting on how formative feedback on checkpoint meetings has been implemented in the final submission.
Career, employability and opportunities for continuing professional development
Successful completion of this course offers improved career opportunities in law enforcement, government or other related agencies, and commercial IT departments or security consultancies. This course is also an excellent preparation for further research or studies such as MSc or PhD.
You’ll complete this course ready to pursue a career in computer forensics and/or cyber security arena, or in the wider IT industry. Previous graduates have gone on to find employment as security/cyber analysts at companies such as MWR InfoSecurity, CACI, Cisco Systems and LGC Group.
Potential employers include digital crime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.
Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work-related module.
This course is also an excellent preparation for further research or studies such as MSc or PhD either at London Met or another university.
In addition to the University's standard entry requirements, you should have one of the following:
- 240 credits with at least a Merit from a Higher National Diploma (HND), at least 2:2 (or equivalent) from a Foundation Degree (FdA/ FdSc) or equivalent international qualification in a relevant subject
- 240 credits at least 2:2 (or equivalent) from years 1 and 2 of an undergraduate degree (BA/BSc) in a relevant subject at a different institution
Applicants who do not meet the necessary classifications will be required to attend an interview.
Official use and codes
|Approved to run from||2019/20||Specification version||1||Specification status||Validated|
|Original validation date||23 May 2019||Last validation date||23 May 2019|
|Sources of funding||FUNDED ENTIRELY BY STUDENT TUITION FEES|
Stage 1 Level 06 September start Offered
|CC6004||Network and Cloud Security||Core||30||NORTH||AUT+SPR||WED||AM|
|CC6010||Digital Investigation and E-Discovery||Core||30||NORTH||AUT+SPR||MON||AM|
|CC5052||Risk, Crisis and Security Management||Option||15||NORTH||AUT||THU||PM|
|CC6052||Management Support Systems||Option||15|
|FC6W51||Work Related Learning II||Option||15||NORTH||AUT||WED||PM|