University of Chester

Programme Specification
Cybersecurity BSc (Hons) (Single Honours)
2017 - 2018

Bachelor of Science (Single Honours)

Cybersecurity

Cybersecurity

University of Chester

University of Chester, University College Isle of Man.

Thornton Science Park, University College Isle of Man.

Undergraduate Modular Programme

Full-time and Part-time

Classroom / Laboratory,

3

7 Years

Annual - September

G406

I290

No

17a. Faculty

17b. Department

Science & Engineering Computer Science

Computing (2007)

None

Computer Science Undergraduate Board

Tuesday 14th April 2015

To promote the academic, vocational and personal development of students.

To encourage a critically and theoretically informed and reflective approach to academic study.

To foster learning and research related to the academic, personal and vocational concerns of students and staff.

To facilitate access to higher education and lifelong learning by flexibility in admissions procedures, and learning and teaching styles.

To develop skills and knowledge appropriate to preparation for postgraduate study or further research, and to a range of vocations and careers, particularly in the area of Cybersecurity.

To provide effective, structured learning opportunities for undergraduate study in Cybersecurity which promote the development of knowledge and understanding, research skills, skills of analysis and interpretation, skills of coherent argument, skills of communication and presentation.

To increase self-awareness and insight into both professional and ethical issues relevant to the discipline of Cybersecurity.

To develop a clear understanding of how intelligence and investigative agencies integrate within global and national Cybersecurity structures.

To provide the student with the understanding, knowledge and skills to facilitate ethical and professional investigations that would withstand robust examination and scrutiny in the criminal justice system.

The educational aims of the professional investigation element of the programme are to develop students' ability to utilise their research skills, evaluate existing bodies of knowledge, critically evaluate new information and ideas, and accept accountability for their actions and conclusions. Students will have therefore developed transferable graduate level skills in research, analysis, synthesis, problem solving, communication (oral and in writing) and the ability to work autonomously and as part of a team. 

The programme will also equip students with the relevant knowledge, understanding, skills, attitude and behaviour necessary to conduct impartial, fair and objective investigations, while maintaining an approach that recognises the concerns and needs of all parties involved by promoting ethical and professional investigations that withstand robust examination and scrutiny in the criminal justice system.  

To foster knowledge, understanding and skills appropriate to graduate employment and specifically to employment within law enforcement and related areas.

For a given information system – such as an individual service, application, server, network device, laptop, smartphone or network or combinations thereof – students will be expected to show knowledge and understanding of the following core concepts and principles:

 

FHEQ Level 4

FHEQ Level 5

FHEQ Level 6

1. Information and its attributes: models including confidentiality, integrity and availability

CO4611

CO5607

CO6602

2. Information risk and its components such as likelihood, probability, impact, consequence, harm, threat and vulnerability

CO4224 CO4611

CO5608

CO6604

3. Threats and attacks: threats, how they materialise, typical attacks and how those attacks exploit vulnerabilities

CO4612 CO4613

CO5607 CO5606 CO5608

CO6603 CO6604

4. Information risk management and associated processes/methodologies: components including risk identification, assessment, prioritisation and treatment

CO4611 CO4224

CO5607

 

5. Cybersecurity arrangements and their application: policies, standards, guidelines and controls to protect information and its attributes

CO4611 CO4612

 

 

6. Resilience: incident management, organisational continuity and disaster recovery and their associated plans and processes

CO4611

CO5606

CO6603

7. Cybersecurity management: understanding the personal, organisational, and legal/regulatory context in which information systems could be used, the risks of such use and the constraints (such as time, finance and people) that may affect how Cybersecurity is implemented.

 

 

CO6603 CO6601

8. Knowledge, understanding and skills appropriate to graduate employment and specifically to employment within law enforcement and related areas.

CO4608

CO5608

CO6603 CO6604

9. Knowledge and understanding of criminal law, evidence and criminal procedure. Understanding of the key concepts and theoretical approaches that have developed and are developing in relation to crime, responses to crime, policing and protecting people in relation to Cybersecurity.

CO4608

CO5608

CO6603 CO6604

10. Knowledge, understanding and skills in relation to the theoretical and practical aspects of investigation; interviewing witnesses and victims.

CO4608

CO5608

CO6604

 

FHEQ Level 4

FHEQ Level 5

FHEQ Level 6

1. Solving problems and communicating solutions in a professional and rigorous fashion

CO4201 CO4202 CO4224 CO4611 CO4608 CO4625

CO5019 CO5023 CO5606 CO5607 CO5608 CO5625

CO6009 CO6203 CO6601 CO6602 CO6603 CO6604

2. Making connections between subjects taught in separate modules

 

CO5019 WB5101

CO6009 CO6203 CO6602 CO6603 CO6604

3. Evaluating methodologies within the discipline

 

CO5023

CO6203 CO6009 CO6601

4. Planning and conducting a research project; synthesis and integration of information from a variety of sources

 

 

CO6009 CO6203 CO6602 CO6603 CO6604

5. Critically analysing evidence and intelligence and assessing its value in the investigation process balanced against criminal legislation, procedure and human rights. 

CO4608 

CO5608

CO6603 CO6604

6. Acting independently, managing and critically reflecting upon learning, but also being aware of team dynamics and how to be an effective team player 

 

CO5608 

CO6604

7. Evaluating and implementing investigative processes and the planning required to conduct an investigation relating to Cybersecurity offences 

CO4608

CO5608 

CO6604

8. Applying the investigative mind-set and demonstrating how to make and record decisions during an investigation. 

CO4608 

CO5608

CO6604

 9. Explaining how investigative and evidential evaluation can assist to determine the value of material gathered in an investigation.

 

 CO5608

CO6604 CO6603

 

 

FHEQ Level 4

FHEQ Level 5

FHEQ Level 6

1. Regarding Information and its Attributes :

Privacy protection and Cybersecurity are closely linked. Privacy has a legal and regulatory aspect, and that places certain obligations and requirements on individuals and organisations. Information has a lifecycle – from creation through to deletion – and protection may be required and may change throughout that lifecycle.

CO4611 CO4612

CO5019 CO5606 CO5607

CO6601 CO6602 CO6603

2. Regarding Threats and Attacks :

A threat landscape created for an organisation is required to be dynamic.

CO4611 CO4612 CO4613

CO5606 CO5607

CO6601 CO6602 CO6603

3. Regarding Information Risk and Cybersecurity Arrangements :

The concept of a risk landscape, its dynamic nature, and how to create a landscape for an organisation in order to classify threats.

CO4611 CO4612

CO5606 CO5607

CO6601 CO6602 CO6603

4. Regarding Resilience :

Understanding the components and metrics of a BCP/DRP. The presentation and appraisal of recovery strategies and understanding how to support investigations and forensics during and after an incident or organisation disruption.

CO4611

CO5606 CO5607

CO6601 CO6602 CO6603

5. Regarding Cybersecurity Management :

Key elements of governance and its role standards such as ISO/IEC 27014 Cybersecurity governance, ITGI Cybersecurity Governance. How skills can be developed and professional recognition gained.

CO4611

CO5606 CO5607

CO6601 CO6602 CO6603

6. The use of core investigative strategies common to most investigations including victim and witness, suspect and scene strategies.

 

CO5608

CO6604

7. Recognising how evidenced-based research can influence effective policing strategy.

 

 

CO6603 CO6604

8. Understanding working with the community in multi-agency partnerships and solving local community problems.

 

CO5608

CO6603 CO6604

 

FHEQ Level 4

FHEQ Level 5

FHEQ Level 6

1. Ability to communicate with multiple stakeholders in an appropriate way, in a variety of forms .

CO4201 CO4611

CO5019 CO5606 CO5607

CO6601 CO6602 CO6603

2. Ability to work as an individual and as part of a team to develop to deliver professional Cybersecurity services and systems.

CO4201 CO4611 CO4625

CO5019 CO5606 CO5607 CO5625

CO6601 CO6602 CO6603 

3. Ability to negotiate and compromise as necessary to deliver professional Cybersecurity services and systems.

 

 

CO6601 CO6602 CO6603 

4. Recording decision-making processes and justifying actions in criminal and civil proceedings.

 

CO5608

CO6604 

5. Justifying the investigative and decision making process in an evidential setting.

CO4608 

CO5608

CO6604

Cybersecurity Modules

IMPORTANT NOTE:

At Level 4 students take all modules.

At Level 5 students must choose one of CO5019 or WB5101.

At Level 6 students must take CO6009, they must then choose four of the remaining five modules.

Mod-Code Level Title Credit Single
CO4201 4 Professional Skills for Computing 10 Comp
CO4202 4 Mathematics for Computing 20 Comp
CO4224 4 Operating Systems and Hardware 20 Comp
CO4608 4 Cyber Legislation and Introduction to Professional Investigation 20 Comp
CO4609 4 Foundations of Cybersecurity - Business 10 Comp
CO4610 4 Foundations of Cybersecurity - Concepts 10 Comp
CO4611 4 Foundations of Cybersecurity - Tools & Techniques 10 Comp
CO4625 4 Fundamentals of Programming 20 Comp
CO5019 5 Experiential Learning (Computing) 20 Optional
CO5023 5 Computer Systems and Networks 20 Comp
CO5606 5 Digital Forensics 20 Comp
CO5607 5 Ethical Hacking 20 Comp
CO5608 5 Conducting Cyber Crime Investigations 20 Comp
CO5625 5 Further Programming and Algorithms 20 Comp
WB5101 5 Enhancing your Employability through Work Based Learning 20 Optional
CO6009 6 Dissertation 40 Comp
CO6203 6 Network Protocols and Methods 20 Optional
CO6601 6 Advanced Programming for Cybersecurity 20 Optional
CO6602 6 Cryptography and Security 20 Optional
CO6603 6 Cyber Intelligence 20 Optional
CO6604 6 Law Enforcement of Cybersecurity 20 Optional

Graduation criteria and exit awards:

  • 120 credits at Level 4 entitles the student to a Certificate of Higher Education.
  • 240 credits at Level 5 entitles the student to a Diploma of Higher Education.
  • 360 credits at Level 6 entitles the student to a Bachelor’s degree.

N/A

Students are encouraged to apply to a professional body such as the British Computer Society but there are no formal requirements to do so.

The admissions data provided below is correct as of July 2017. Please refer to the prospectus pages on the corporate website www.chester.ac.uk for the most recent data.

UK/EU Entry Requirements:

  • A minimum of 112 UCAS points with GCSE Maths grade C or above (or equivalent)

The University has a strategy for Widening Access and Participation and seeks to recruit students from backgrounds and areas which might not be viewed as 'traditional'. Applicants who do not meet the above criteria, but for example, have prior experience such as time spent working in a related field will be subject to individual consideration.

For international entry requirements, you will need to visit http://www.chester.ac.uk/international/your-country and select the appropriate country.

Cybersecurity does not have its own Benchmarking Statements. In developing the programme the Department of Computer Science took into account both the Computing and the General Business and Management criteria in ensuring that students would graduate with appropriate levels in these. Likewise Policing does not have its own Benchmarking statements - the most relevant academic benchmarks with respect to Investigation are those of Criminology, and professionally the National Occupational Standards are identified by the sector skills council’.

In line with the current benchmark statement the course matches the typical outcomes for a programme in a computing related discipline, namely that students should be able to:

  • demonstrate a sound understanding of the main areas of the body of knowledge within Cybersecurity, with an ability to exercise critical judgement across a range of issues
  • critically analyse and apply a range of concepts, principles and practice of the Computer Science and Cybersecurity in an appropriate manner in the context of defined scenarios, showing effective judgement in the selection and use of tools and techniques
  • produce work involving problem identification, the analysis, the design and the development of a system, with accompanying documentation. The work will show problem solving and evaluation skills, draw upon supporting evidence and demonstrate a good understanding of the need for quality
  • demonstrate transferable skills with an ability to show organised work as an individual and as a team member and with minimum guidance
  • apply appropriate practices within a professional, legal and ethical framework and identify mechanisms for continuing professional development and lifelong learning
  • explain a wide range of applications based upon the body of knowledge.
  • develop Professional Investigative and criminology related cognitive abilities and practical skills.

Reference QAA (2006) “Computing benchmark statement” QAA for Higher Education

Level 4: Learning is predominantly tutor-designed and guided, though students are offered opportunities for individual initiative within this framework, which provides groundwork in subject-specific and transferable study skills and encouragement to communicate accurately.

Level 5: Learning remains largely tutor-guided and students are encouraged to work in collaboration with tutors and fellow-students. There is opportunity for consolidation and development of appropriate study skills and for experiencing a range of appropriate methods for tasks in hand.

Level 6: Students develop a greater responsibility for their own learning, both independent and collaborative. There is a consolidation of appropriate study skills and their application to independent enquiry in the form of a major individual research development project. Methods: lectures, seminars, supervised practical workshops, IT based learning, guided reading and resource-based learning, dissertation support programme, work-based learning, oral presentations, essays, reflection and group work.

In order to achieve an appropriate mix of assessment of knowledge, understanding and skills, a blend of assessment methods is required:

1. Knowledge and understanding: Unseen examination, appraisal of literature and systems, projects, presentations.

2. Thinking or cognitive skills: Unseen examination, coursework exercises, projects/dissertation, presentations.

3. Practical skills: Coursework exercises, project work.

4. Transferable/key skills: Reports, presentations, decision-making and problem-solving reflection through work-based learning support and group presentation.

Subject to the overall pattern of assessment conforming to this strategy, each module is assessed by the most appropriate types of assessment, suitably weighted. Assessment and reassessment methods are detailed in the module outlines. There are clear assessment criteria and a marking scheme for every assessment. Marking schemes identify levels of performance against specific learning outcomes. They indicate how the final mark will be derived, and are designed to facilitate second marking and constructive feedback to students from the tutor.

The programme clearly offers students the opportunity to achieve the characteristics of a graduate. Successful achievement of the learning outcomes as mapped to benchmarks throughout this document will evidence the level that students have achieved. On completion of their study, a graduate will be able to enter a range of careers, typically:

  • Network Security.
  • Computing Forensics.
  • Cryptography and System Security.
  • Policing and other law enforcement agencies.
  • Financial and Corporate Cyber and security and risk prevention.

The University is committed to the promotion of diversity, equality and inclusion in all its forms; through different ideas and perspectives, age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex and sexual orientation. We are, in particular, committed to widening access to higher education. Within an ethically aware and professional environment, we acknowledge our responsibilities to promote freedom of enquiry and scholarly expression.

The programme is delivered in English and provided the student has attained the defined standard there are no other cultural issues.

As a technology-oriented degree there is a high likelihood that the majority of disabilities can be addressed using appropriate specialist hardware and software; individual applicants will be invited to discuss their individual needs with the programme leader and the applicant will be advised as to the provision that can be made for them, prior to accepting a place.

None.

Back - to previous page  Print - launches the print options panel