module specification

CC3101 - Cyber Security Fundamentals (2025/26)

Module specification Module approved to run in 2025/26
Module title Cyber Security Fundamentals
Module level Foundation (03)
Credit rating for module 30
School School of Computing and Digital Media
Total study hours 300
 
90 hours Scheduled learning & teaching activities
139 hours Guided independent study
71 hours Assessment Preparation / Delivery
Assessment components
Type Weighting Qualifying mark Description
Coursework 50%   2000 words
In-Course Test 50%   60 min
Running in 2025/26

(Please note that module timeslots are subject to change)
Period Campus Day Time Module Leader
Year North Wednesday Afternoon
Year North Wednesday Morning

Module summary

In this module students will learn the fundamental knowledge concerning computer security, basic cyber threats and the corresponding detection and defence techniques. Core security concepts, terminology, technologies and professional cyber security skills will be introduced via case studies and laboratory experiments.

Syllabus

(LO1) Introduction to cyberspace and cyber security: computer security, web security, operating system security, wireless/network security, mobile security, programming security.

(LO2) Concepts and terminology of cyber security: basics of encryption and cryptography, virtual platform, cloud, protocols, hacking, malware, virus, botnets, pentest, information security practice/standards.

(LO3) Basic coverage of security software: anti-virus software, packet sniffers, anti-spyware, intrusion detection/protection software, digital forensics software, pentest software.

(LO4) Introductory overview of network security: types of networks, network protocols, network security and protection, VPNs, firewall configuration/maintenance, network intrusion and detection systems.

(LO5) Basics of digital forensics: computer crime investigation and its legal issues, use of digital forensic tools and applications.

(LO6) The human factor in security: authorisation mechanisms, usability issues, risk analysis and control, cyber-ethics, cyber bullying, social media attacks.

Balance of independent study and scheduled teaching activity

Students will develop understanding and practical investigative skills based on weekly lectures, tutorials and supervised workshops.  The teaching sessions will utilise examples/case studies as a platform for understanding security threats and how to counter them. The workshops, in particular, are provided to support students in gaining practical experience in computer security and digital forensic investigations, within a dedicated laboratory.

Appropriate blended learning approaches and technologies, such as, the University’s VLE and computer security tools, will be used to facilitate and support student learning, in particular, to:
• deliver content;
• encourage active learning;
• provide formative and summative assessments, and prompt feedback;
• enhance student engagement and learning experience.

Students will be expected and encouraged to produce reflective commentaries on the learning activities and tasks that they carry out to complete their work.

Students will be expected and encouraged to produce reflective commentaries and an action plan for personal development on the learning activities and tasks that they carry out to complete their work, e.g. in the form of an assessed section of their coursework report/essay

Learning outcomes

On successful completion of this module, students should be able to:

LO1: Understand the basic concepts, terminology and technologies of cyber security;
LO2: Develop a basic knowledge of cyber threats and the corresponding detection and defence techniques;
LO3: Consider the human factor in computer security;
LO4: Acquire an appreciation of  different types and use of available security software;
LO5: Understand at an introductory level the forensic and investigative aspects of countering cyber-attacks.
LO6: Reflect on their learning and development within the context of cyber security.

Bibliography

https://rl.talis.com/3/londonmet/lists/5C5C8DB7-BA81-C45D-E413-EA347445E1E5.html

Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls, Christopher J Hodson, 2024.
Cybersecurity For Beginners - Jack Mallow, 2023
Cryptography and Network Security – William Stallings, 2023
Book | Additional Reading
Steganography - The Art of Hiding Information, 2024, ISBN: 978-0-85466-901-1
Cybersecurity: the essential body of knowledge - Dan Shoemaker, Wm. Arthur Conklin,
2012
Book | Additional Reading
Cyber security management: a governance, risk and compliance framework - Peter R. J.
Trim, Yang-Im Lee, 2014
Book | Additional Reading

Journals: Taylor and Francis online Journal

Websites:
Lynda.com
Department for Business, Innovation and Skills. (2023). CyberSecurity. Available: https://www.gov.uk/government/publications/cyber-essentials-scheme-overview. Last accessed 14/02/24

Regular cyber security related articles from the BCS, Chartered Institute of IT, publication ITNOW will be made available to students.

Electronic Databases: ACM Digital Library, IEEE Xplore/IET Digital Library