UDCOMNCS - BSc Computer Networking and Cyber Security
|Highest award||Bachelor of Science||Level||Honours|
|Possible interim awards||Bachelor of Science, Diploma of Higher Education, Certificate of Higher Education, Bachelor of Science|
|Total credits for course||360|
|Awarding institution||London Metropolitan University|
|Teaching institutions||London Metropolitan University|
|School||School of Computing and Digital Media|
|Subject Area||Computer Science and Applied Computing|
|Course leader||Myasar Tabany|
About the course and its strategy towards teaching and learning and towards blended learning/e-learning
The School of Computing and Digital Media is one of the first in the UK to become a Cisco Academy in 1999. The course is designed around Cisco curriculum and all students study the complete CCNA modules which are embedded in the course. This means students are provided with the additional Cisco certification trainings throughout the course. This course includes substantial practical/hands-on content with increasing emphasis on project/group work as its students’ progress through the course.
The delivery for teaching for this course shall be 30 weeks formal scheduled contact time. Modules are mainly delivered through a combination of lectures (1 hour/week), tutorials/lab-based workshop (2 hours/week) sessions, and blended learning. Teaching materials such as lecture notes and other support learning materials are accessible on the university VLE network (e.g. WebLearn, Blackboard); School’s network facilities (e.g. web server) are also available to support teaching and learning activities.
Appropriate blended learning approaches and technologies, such as, the University’s VLE, the Cisco Academy, and network security toolkits will be used to facilitate and support student learning, in particular, to:
• deliver course content;
• encourage active learning;
• provide formative and summative assessments, and prompt feedback;
• enhance student engagement and learning experience.
This course is designed with our Cisco Academy to equip its graduates to work at a professional level in the areas of Telecommunications and Computer Networking with the emphasis on Network Security. It is also an excellent preparation for further research or studies such as MSc or PhD. The aims of the course are:
• To apply analytical and design techniques used to solve problems in computer networking and IT Security.
• To develop analytical, practical and ICT skills appropriate for the specification, design, implementation and testing of computer networks and security measures in network security.
• To promote awareness of commercial and economic context, social and business factors that influence the choice of solution to engineering problems including health,
• To promote awareness in students of ethical issues concerning their work, their potential roles to operate within the appropriate code of professional conduct, recognising their responsibilities and obligations to society, the profession and the environment.
• To provide a broad educational base with an emphasis on project-oriented activities where students will gain appropriate skills, knowledge and understanding to prepare them for a professional career in the field of computer networking and cyber security.
Course learning outcomes
On successful completion of this course students will be able to
LO1. Understand the scientific, mathematical and ITC principles and methods relevant to Computer Networking and Cyber Security;
LO2. Appreciate the problems and solutions in the relevant social, environmental, ethical and legislative context including health, safety and risks issues;
LO3. Be able to select and apply appropriate scientific, mathematical and technical methods to model, analyse and solve problems related to Computer Networking and Cyber Security;
LO4. Identify problems and create solutions using appropriate professional simulation and design tools;
LO5. Recognise the need for continuous personal development and plan to achieve this showing confidence and self-awareness, reflect on own learning, and be self-reliant and constructively self-critical;
LO6. Design a variety of different computer networking configuration taking account of industrial and commercial restraints and network security issues;
LO7. Evaluate and carry out performance analysis, critical appraisals and evaluation of computer networks and their security requirements;
Course learning outcomes / Module cross reference
Module Code Module Title
CT4001 Communications Engineering
CC4057 Introduction to Information Systems
CS4051 Fundamentals of Computing
CT4004 Networking Concepts (CCNA1 &2 )
CT5004 LAN & WAN (CCNA 3 & 4)
CC5004 Security in Computing
CS5001 Networks & Operating Systems
CC5052 Risk, Crisis and Security Management
CS5052 Professional Issues, Ethics and Computer Law
CT6004 Network Security(Cisco)
FC6W51 Work Related Learning II
MN6W50 Creating a Winning Business
CC6051 Ethical Hacking
Learning Outcomes 1 - 7
Principle QAA benchmark statements
Benchmarking standards are defined at threshold and modal:
This is interpreted to mean that all students (taken over all years) graduating with an honours degree in the discipline of Computing will have achieved this. Students who reach this will be characterised by being able to:
• demonstrate a requisite understanding of the main body of knowledge for their program of study;
• understand and apply essential concepts, principles and practice of the subject in the context of well-defined scenarios, showing judgment in the selection and application of tools and techniques;
• produce work involving problem identification, the analysis, the design and the development of a system with appropriate documentation. The work will show some problem solving and evaluation skills drawing on some supporting evidence, and demonstrate a requisite understanding of the need for quality;
• demonstrate transferable skills and an ability to work under guidance and as a team member;
• identify appropriate practices within a professional and ethical framework and understand the need for continuing professional development;
• discuss applications based upon the body of knowledge.
This is the average (taken over all years) of all the students graduating with an honours degree in the discipline of Computer Forensics and IT Security. Students reaching this will be able to:
• demonstrate a sound understanding of the main areas of the body of knowledge within their programme of study, with an ability to exercise critical judgment across a range of issues;
• critically analyse and apply a range of concepts, principles and practice of the subject in an appropriate manner in the context of loosely defined scenarios, showing effective judgment in the selection and use of tools and techniques;
• produce work involving problem identification, the analysis, the design and the development of a system, with accompanying documentation. The work will show problem solving and evaluation skills, draw upon supporting evidence and demonstrate a good understanding of the need for quality;
• demonstrate transferable skills with an ability to show organised work as an individual and as a team member and with minimum guidance;
• apply appropriate practices within a professional and ethical framework and identify mechanisms for continuing professional development and lifelong learning;
• explain a wide range of applications based upon the body of knowledge.
• Modules of this course are assessed mainly by the combination of coursework, case studies report and presentation, lab logbooks and workbooks, class-test, unseen examinations, and final-year project reports, presentation and viva.
• A balanced assessment load per module and a careful distribution of concurrent assessment deadlines will be ensured;
• Constructive and timely feedback in written and/or oral modes will be delivered, with 15 working days of completing/submitting an assessment;
• Online submission of assessment will be used, as appropriate, via University VLE
Organised work experience, work based learning, sandwich year or year abroad
In addition to the work related core module FC6W51 Work Related Learning II, students have the opportunity to apply for a sandwich year at the end of Level 5 during the course. The School provides support in finding relevant employers.
Course specific regulations
If attendance falls below 75% on a module, reassessment opportunities will not be available and instead the module will have to be retaken the following year with attendance and payment of fees. Mitigating circumstances cannot be claimed for missed classes; however Module Leaders will take account of absences that are a consequence of recorded disability or otherwise recorded as 'Authorised Absence' when applying the 75% threshold.
Modules required for interim awards
All modules are core-compulsory except one 30-credit year long module at level six.
Arrangements for promoting reflective learning and personal development
• A process of personal development planning takes place throughout the course to help students to think about and make sense of what is being learnt and why, plan ahead and relate to what has been learned and their own future.
• Students will be expected and encouraged to produce such as reflective commentaries and graduation statements on the learning activities and tasks that they carry out to complete their work.
• Students are invited to include PDP via learning journals, case books, annotated sketchbooks, and/or blog environment.
Career, employability and opportunities for continuing professional development
Successful completion of this course offers improved career opportunities in law enforcement, government or other related agencies, and commercial IT departments or security consultancies. This course is also an excellent preparation for further research or studies such as MSc or PhD.
Professional Statutory and Regulatory Body (PSRB) accreditations & exemptions
You’ll complete this course ready to pursue a career in computer networking and/or cyber security, or within the wider IT industry. Previous graduates have gone on to find employment as data analysts at companies such as CACI and Cisco Systems.
Potential employers include cybercrime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.
Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work placement module.
This course is also an excellent preparation for further study or research.
In addition to the University's standard entry requirements, you should have:
- a minimum of grades BB or CCE (or a minimum of 80 UCAS points from an equivalent Level 3 qualification, eg BTEC Level 3 Extended Diploma/Diploma; or Advanced Diploma; or Progression Diploma; or Access to HE Diploma of 60 credits)
- English Language and Mathematics GCSE at grade C/grade 4 or above
If you do not have traditional qualifications or cannot meet the entry requirements for this undergraduate degree, you may still be able to gain entry by completing the Cyber Security Extended Degree.
Applicants with relevant professional qualifications or extensive professional experience will also be considered on a case by case basis.
All applicants must be able to demonstrate proficiency in the English language. Applicants who require a Tier 4 student visa may need to provide a Secure English Language Test (SELT) such as Academic IELTS. For more information about English qualifications please see our English language requirements.
Official use and codes
|Approved to run from||2016/17||Specification version||1||Specification status||Validated|
|Original validation date||11 Jan 2017||Last validation date||18 Jan 2017|
|Sources of funding||HE FUNDING COUNCIL FOR ENGLAND|
|JACS codes||I250 (Systems Auditing): 100%|
Stage 1 Level 04 September start Offered
|CC4057||Introduction to Information Systems||Core||15||NORTH||AUT||TUE||PM|
|CS4051||Fundamentals of Computing||Core||15||NORTH||SPR||TUE||PM|
|CT4004||Networking Concepts (CCNA1 and 2)||Core||30||NORTH||AUT+SPR||THU||PM|
Stage 2 Level 05 September start Offered
|CC5004||Security in Computing||Core||30||NORTH||AUT+SPR||TUE||AM|
|CC5052||Risk, Crisis and Security Management||Core||15||NORTH||AUT||THU||PM|
|CS5001||Networks and Operating Systems||Core||30||NORTH||AUT+SPR||FRI||AM|
|CS5052||Professional Issues, Ethics and Computer Law||Core||15||NORTH||SPR||THU||PM|
|CT5004||LAN & WAN (CCNA 3 & 4)||Core||30||NORTH||AUT+SPR||TUE||PM|
Stage 3 Level 06 September start Offered
|CT6004||Network Security (CISCO)||Core||30||NORTH||AUT+SPR||TUE||AM|
|FC6W51||Work Related Learning II||Alt Core||15||NORTH||AUT||WED||PM|
|MN6W50||Creating a Winning Business 2||Alt Core||15||NORTH||AUT||THU||AM|
|CC6003||Digital Crime Investigation||Option||30||NORTH||AUT+SPR||MON||AM|
|CC6004||Network and Cloud Security||Option||30||NORTH||AUT+SPR||WED||AM|
|CS6002||Distributed and Internet Systems||Option||30||NORTH||AUT+SPR||MON||AM|