The course will be taught through a mixture of interactive workshops, lectures and seminars that aim to engage students with real life and virtual technical issues, enabling the study of key aspects of security and cloud computing. The lectures and workshops are designed to convey the broad outlines of knowledge pertinent to each module. The seminar sessions are built around student activity in response to a set of prepared tasks that require students to apply knowledge, discuss and analyse information security problems. Students will also have the opportunity to practise and apply knowledge through simulations focussing on security scenarios. Formal contact time will on average make up 30% of total study time, the remainder consisting of self-study or directed activities.
A Problem Based Learning (PBL) approach will be used in a number of workshops designed to foster student-centred learning and engagement. This approach enables students to analyse and discuss core principles and provides opportunities for students to present their work and obtain formative feedback. Within the PBL context, task exercises will be used to focus on student-centred learning requiring synthesis and analysis of key issues generated through student research.
The principal aims of the programme are to:
- Develop academic and professional skills to allow for an opportunity to study at higher levels and enhance career development.
- Provide students with a broad education in computer networks and security, with a special emphasis on the technical specification, design, implementation and maintenance of computer networks, architecture, applications and security systems
- Ensure that the students have access and exposure to the latest innovations and technology in computer networks, architecture and security systems.
- Equip students with the skills and knowledge necessary to pursue a successful career in a variety of areas such as IT, computer networks, security and telecommunications industries.
- Gain familiarity with a wide range of computer network deployments and database applications. Studies will cover networks used in such diverse areas as banking, utilities, hospitals, public telecoms and all aspects of the industry from small to large enterprises.
- Develop students with Computer Forensics skills which involves the analysis and interpretation of digital evidence from computers and associated devices.
- Prepare students for direct employment or postgraduate study.
- Develop and improve interpersonal and communications skills, particularly writing formal reports and giving presentations, as these skills are essential in the information security industry.
- Equip students with the knowledge necessary to understand the ethical and environmental issues they will encounter in the industry in general.
- Fundamentals of Computer Networking (20 Credits)
- Introduction of Object Oriented Programming (20 Credits)
- Internet Security (20 Credits)
- Operating Systems, Algorithms and Data Structures (20 Credits)
- Information Security Fundamentals (20 Credits)
- Information Risk Management (20 Credits)
- Business Continuity and Disaster Recovery (20 Credits)
- Information Security Architecture Fundamentals (20 Credits)
- Cryptography and Information Assurance (20 Credits)
- Computer Forensic and Investigation (20 Credits)
- Security and Assurance Level 5 Project (40 Credits)
- Information Security Management and Governance (20 Credits)
- Network Security and Penetration Testing (20 Credits)
- Virtualisation and Distributed Systems (20 Credits)
- Security Implications of Emerging Technologies (20 Credits)
- Level 6 Project (40 Credits)
- A Levels / 12 years education / Intermediate / Level 3
- IELTS 5.5 or equivalent (only for International students with no English language background)
- Fee deposit
- Interview (for international students, the interview can be conducted on skype)
About the School
The School of Information Risk Management (SIRM) is a renowned centre who offers programs both at Undergraduate and Postgraduate levels in various disciplines including Cyber Security, Information Sec ... Read More