UDDIFOCS - BSc Digital Forensics and Cyber Security
Course Specification
Validation status | Validated | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Highest award | Bachelor of Science | Level | Honours | |||||||||
Possible interim awards | Bachelor of Science, Diploma of Higher Education, Certificate of Higher Education, Bachelor of Science | |||||||||||
Total credits for course | 360 | |||||||||||
Awarding institution | London Metropolitan University | |||||||||||
Teaching institutions | London Metropolitan University | |||||||||||
School | School of Computing and Digital Media | |||||||||||
Subject Area | Computer Science and Applied Computing | |||||||||||
Attendance options |
|
|||||||||||
Course leader |
About the course and its strategy towards teaching and learning and towards blended learning/e-learning
This course is designed to meet the new and rapidly growing demand for the professionals in Digital Forensics and Cyber Security. It’s designed in particular for those who wish to specialise in the protection against and detection and conviction of digital crimes. Successful completion of this course offers improved career opportunities in law enforcement, government or other related agencies, and commercial IT departments or security consultancies. This course is also an excellent preparation for further research or studies such as MSc or PhD.
Appropriate blended learning approaches and technologies, such as, the University’s VLE and the digital forensics and network security toolkits will be used to facilitate and support student learning, in particular, to:
• deliver course content;
• encourage active learning;
• provide formative and summative assessments, and prompt feedback;
• enhance student engagement and learning experience.
In this course, students are also provided with the study towards the certification of CompTIA Security +, an international, vendor-neutral certification that demonstrates competency in:
• Network security
• Compliance and operational security
• Threats and vulnerabilities
• Application, data and host security
• Access control and identity management
• Cryptography
Course aims
The primary aim of this course is to provide a broad, general education in the theory and practice of computing with special emphasis in the subject field of digital forensics and cyber security. It also covers the underlying computing principles of programming, problem-solving, communication networks and information systems, and as such has much in common with other courses in our Computing course portfolio. Three major themes are therefore characterised by the course: Digital Forensics, Cyber Security, and Computing.
The general aims of the course are:
to prepare students for careers in digital forensics and/or cyber security
to develop students skill’s in problem-solving, communication and other transferable skills applicable to a variety of careers
to prepare students in study for higher degrees in related subjects
to continue the development of those general study skills that will enable students to become independent and lifelong learners
The specific aims of the course are:
to develop student’s knowledge of computer hardware and software systems
to provide students with a solid background in the theoretical and practical aspects of Digital Forensics
to develop student’s understanding of the key issues in preservation of information confidentiality, integrity, and availability
to introduce the professional, legal and ethics issues in digital forensics and cyber security
Course learning outcomes
On successful completion of this course students will be able to
LO 1. demonstrate a requisite understanding of the main body of knowledge in Computing;
LO 2. understand and apply essential concepts, principles and practice in the context of well-defined scenarios, showing judgment in the selection and application of tools and techniques to solve the issues with digital forensics and cyber security;
LO 3. produce work involving identification, analysis, design and development of an digital forensics and cyber security system with appropriate documentation. The work will show problem solving and evaluation skills drawing on supporting evidence, and demonstrate a requisite understanding of the need for quality;
LO 4. demonstrate transferable skills and an ability to work under guidance and as an digital forensics and/or cyber security team member;
LO 5. identify appropriate practices within professional and ethical framework of digital forensics and cyber security and understand the need for continuing professional development in this profession;
LO 6. Discuss digital forensics and cyber security practices/measures based upon the body of knowledge learned from this course.
ULO. Demonstrate confidence, resilience, ambition and creativity and will act as inclusive, collaborative and socially responsible practitioners/professionals in their discipline.
Principle QAA benchmark statements
Subject benchmark: Computing [March 2022]
https://www.qaa.ac.uk/the-quality-code/subject-benchmark-statements/computing
Assessment strategy
A range of assessment methods is employed throughout the course. The method of assessment for each module in each level is clearly described in the individual ‘Module Guide’ which is made available to the students at the start of the semester. Modules employ a combination of the following forms of assessments:
• Case study reports and presentations
• Laboratory workbooks
• Laboratory logbooks
• Unseen examinations
• Part seen examinations
• Individual vivas
Organised work experience, work based learning, sandwich year or year abroad
Students take the module CS6W50 Career Development Learning at Level 6. The School works with the Employability Service and Careers Service teams to provide support in finding relevant opportunities. The module enables students to undertake an appropriate short period of professional activity, related to their course at level 6, with a business or community organization and to gain credit for their achievements. The activity can be a professional training, a volunteering activity, employment activity, placement or business start-up activity.
Course specific regulations
British Computer Society (BCS) accreditation is awarded according to the following additional course regulation:
The project must be passed in order for a student to obtain BSc (Hons) Digital Forensics and Cyber Security.
The project must be passed without compensation.
Modules required for interim awards
All modules are core-compulsory.
Arrangements for promoting reflective learning and personal development
• A process of personal development planning takes place throughout the course to help students to think about and make sense of what is being learnt and why, plan ahead and relate to what has been learned and their own future.
• Students will be expected and encouraged to produce such as reflective commentaries and graduation statements on the learning activities and tasks that they carry out to complete their work.
• Students are invited to include PDP via learning journals, case books, annotated sketchbooks, and/or blog environment.
Career, employability and opportunities for continuing professional development
Successful completion of this course offers improved career opportunities in law enforcement, government or other related agencies, and commercial IT departments or security consultancies. This course is also an excellent preparation for further research or studies such as MSc or PhD.
Professional Statutory and Regulatory Body (PSRB) accreditations & exemptions
This course is accredited as fully meeting the educational requirement for Chartered IT Professional (CITP) registration.
On graduating, you'll be eligible to apply for Membership of the British Computer Society (MBCS).
Career opportunities
You’ll complete this course ready to pursue a career in computer forensics and/or IT security, or in the wider IT industry. Previous graduates have gone on to find employment as data analysts at companies such as MWR InfoSecurity.
Potential employers include digital crime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.
Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work placement module.
This course is also an excellent preparation for further research or studies such as MSc or PhD either at London Met or another university.
Entry requirements
In addition to the University's standard entry requirements, you should have:
- a minimum grades CCD in three A levels, one of which must be from a relevant subject (or a minimum of 88 UCAS points from an equivalent Level 3 qualification, eg BTEC Level 3 Extended Diploma/Diploma; or Advanced Diploma; or Progression Diploma; or Access to HE Diploma of 60 credits)
- English Language and Mathematics GCSE at grade C/grade 4 or above
Applicants with relevant professional qualifications or extensive professional experience will also be considered on a case by case basis.
If you don't have traditional qualifications or can't meet the entry requirements for this undergraduate degree, you may still be able to gain entry by completing our Digital Forensics and Cyber Security (including foundation year) BSc (Hons) degree.
Official use and codes
Approved to run from | 2016/17 | Specification version | 2 | Specification status | Validated |
---|---|---|---|---|---|
Original validation date | 11 Jan 2017 | Last validation date | 13 Apr 2023 | ||
Sources of funding | HE FUNDING COUNCIL FOR ENGLAND | ||||
JACS codes | I250 (Systems Auditing): 100% | ||||
Route code | DIFOCS |
Stage 1 Level 04 September start Offered
Code | Module title | Info | Type | Credits | Location | Period | Day | Time |
---|---|---|---|---|---|---|---|---|
CC4057 | Introduction to Information Systems | Core | 15 | NORTH | AUT | TUE | PM | |
CS4001 | Programming | Core | 30 | NORTH | AUT+SPR | TUE | AM | |
CS4051 | Fundamentals of Computing | Core | 15 | NORTH | SPR | TUE | PM | |
CT4005 | Computer Hardware and Software Architectures | Core | 30 | NORTH | AUT+SPR | MON | PM | |
MA4001 | Logic and Problem Solving | Core | 30 | NORTH | AUT+SPR | FRI | AM |
Stage 2 Level 05 September start Offered
Code | Module title | Info | Type | Credits | Location | Period | Day | Time |
---|---|---|---|---|---|---|---|---|
CC5004 | Security in Computing | Core | 30 | |||||
CC5052 | Risk, Crisis and Security Management | Core | 15 | NORTH | AUT | THU | PM | |
CC5065 | Computer and Mobile Forensics | Core | 15 | NORTH | AUT | FRI | PM | |
CC5066 | Network Forensics and Incident Response | Core | 15 | NORTH | SPR | FRI | PM | |
CC5067 | Smart Data Discovery | Core | 15 | NORTH | SPR | FRI | AM | |
CS5052 | Professional Issues, Ethics and Computer Law | Core | 15 | |||||
CS5053 | Cloud Computing and the Internet of Things | Core | 15 | NORTH | AUT | FRI | AM |
Stage 3 Level 06 September start Offered
Code | Module title | Info | Type | Credits | Location | Period | Day | Time |
---|---|---|---|---|---|---|---|---|
CC6004 | Network and Cloud Security | Core | 30 | NORTH | AUT+SPR | WED | AM | |
CC6010 | Digital Investigation and E-Discovery | Core | 30 | NORTH | AUT+SPR | MON | PM | |
CC6051 | Ethical Hacking | Core | 15 | NORTH | SPR | THU | AM | |
CS6P05 | Project | Core | 30 | NORTH | AUT+SPR | WED | PM | |
CS6W50 | Career Development Learning | Core | 15 | NORTH | SPR | WED | PM | |
NORTH | AUT | WED | PM |