CC7178 - Cyber Security Management (2026/27)
| Module specification | Module approved to run in 2026/27 | ||||||||||||
| Module title | Cyber Security Management | ||||||||||||
| Module level | Masters (07) | ||||||||||||
| Credit rating for module | 20 | ||||||||||||
| School | School of Computing and Digital Media | ||||||||||||
| Total study hours | 200 | ||||||||||||
|
|||||||||||||
| Assessment components |
|
||||||||||||
| Running in 2026/27(Please note that module timeslots are subject to change) | No instances running in the year |
Module summary
This module focuses on various aspects of Cybersecurity Management and deals mainly with the protection of information assets over the cyber space by concerted measures.
This module aims to provide students with an appreciation of the benefits Cybersecurity Management provides within a business environment and over cyber space. This includes the choice and application of appropriate risk assessment and risk control techniques, the understanding of security standards & procedures, coupled with the application of cybersecurity technology & security measures in a business setting.
Prior learning requirements
Successful completion of level 6 or equivalent. Available for Study Abroad? NO
Syllabus
1. Cybersecurity overview: assessing why cybersecurity is required, for example: threats from cyber space and necessities for protection of company assets from threats, etc; [LO1-LO5]
2. Security risk assessment: an overview of security risk assessment techniques, assessing, selecting and implementing security risk assessment techniques, development of a prioritised list of information security threats; [LO1-LO5]
3. Security risk management: assessing, selecting and implementing controls for particular security threats; [LO1-LO5]
4. Cybersecurity technologies and security mechanisms; [LO1-LO5]
5. Cybersecurity audit; [LO1-LO5]
6. Legal, ethical, and professional Issues; [LO1-LO5]
7. Security standards and procedures: reviewing relevant standards and procedures for information/cybersecurity. [LO1-LO5]
Balance of independent study and scheduled teaching activity
Topics will be introduced through appropriate mediums.
Theoretical content will usually be supported by multimedia technologies (e.g., slides, videos, podcasts, and screencasts) or asynchronous materials (e.g., videos, reading tasks, and small formative or summative tests). Tutorials will typically involve in-class discussions to encourage reflective learning. Workshops will typically involve hands-on experience. Students are strongly encouraged to engage in independent study prior to attending any scheduled sessions.
Theoretical understanding will be developed and reinforced through provided learning materials and appropriate methods of delivery.
Appropriate blended learning approaches and technologies, such as, the University’s VLE and online tools, will be used to facilitate and support student learning, in particular, to:
• deliver content;
• encourage active learning;
• provide formative and summative assessments, and prompt feedback;
• enhance student engagement and learning experience.
Students will be expected and encouraged to produce reflective commentaries and an action plan for personal development on the learning activities and tasks that they carry out to complete their work, e.g. in the form of an assessed section of their coursework report/essay.
Learning outcomes
The student should be able to:
LO1. appreciate the vital role of and understand the complexities of cybersecurity management in today’s business environment and cyber space;
LO2. appreciate the issues related to information security standards and procedures;
LO3. Evaluate and assess main stream companies attempts to solve their cybersecurity problems;
LO4. evaluate critically the suitability of security risk assessment techniques in a particular context;
LO5. evaluate critically the suitability of controls for a particular security threat in a particular context;
