Academic Handbook Course Descriptors and Programme Specifications

LCSCI52100A Cyber Security Course Descriptor

Course code LCSCI52100A Discipline Computer Science
UK Credit 15 US Credit N/A
FHEQ level 5 Date approved

 

October 2023
Compulsory/
Optional
Compulsory
Pre-requisites None
Co-requisites None

Course Overview

This course explores questions such as: Are your information technology systems built, used and managed according to organisational policies? Are they in compliance with international, national, and local legal requirements? What are the potential risks and legal liabilities associated with your IT systems and procedures, including those introduced by the physical environment? What are ethical principles and codes of good practice of main cyber security professional bodies and what are the ethical responsibilities of a cyber security professional? The course seeks to develop frameworks for assessing gaps between what your organisation is doing and should be doing to protect the organisation and its stakeholders, considering key legislative frameworks and the regulatory landscape for cyber security, such as Data Protection Act 2018, Network Information System Directive 2018, Regulation of Investigatory Powers Act 2000, ISO 27001.  Learners will have the opportunity to apply their knowledge of cyber security using industry-standard cloud-based technology.

This course aims to provide learners with an understanding of cyber security and how it impacts on various computer systems: operating systems, embedded systems, distributed applications. It also imparts knowledge about legal and ethical responsibilities relating to accessibility, data protection and security. Moreover, the course encourages learners to examine the relationship between user trust and the design of computer systems and solutions.

Learning Outcomes

On successful completion of the course, learners will be able to:

Knowledge and Understanding

K1b Explain how computer systems are built, critically evaluate their vulnerabilities to cyber attacks and security breaches, and critically analyse the physical environment.
K2b Illustrate and critically argue how cyber security measures can be designed and built into modern computer systems, including embedded and distributed systems.
K3b Explain and critically analyse modern information technology security regulations and ethical considerations and reflect on how they affect computer systems and users.

Subject Specific Skills

S1b Conceptually design secure computer systems.
S2b Advise organisations and/or users on data protection regulations and ethics.

Transferable and Professional Skills

T1bi Obtain and use robust information from a variety of sources as part of self-directed learning.
T2b Develop logical analysis and conceptual thinking.
T3b Critically evaluate different approaches to problem solving within this field of study.

Teaching and Learning

This is an e-learning course, taught throughout the year.

This course can be offered as a standalone short course.

Teaching and learning strategies for this course will include: 

  • On-line learning
  • On-line discussion groups
  • On-line assessment

Course information and supplementary materials will be available on the University’s Virtual Learning Environment (VLE).

Learners are required to attend and participate in all the formal and timetabled sessions for this course. Learners are also expected to manage their self-directed learning and independent study in support of the course.

The course learning and teaching hours will be structured as follows:

  • Off-the-job learning and teaching (6 days x 7 hours) = 42 hours
  • On-the-job learning (12 days x 7 hours) = 84 hours (e.g. 2 days per week for 6 weeks)
  • Private study (4 hours per week) = 24 hours

Total = 150 hours

Workplace assignments (see below) will be completed as part of on-the-job learning.

Assessment

Formative

Learners will be formatively assessed during the course by means of set assignments. These will not count towards the final degree but will provide learners with developmental feedback. 

Summative

Assessment will be in two forms:

AE  Assessment Type Weighting Online submission Duration Length
1 Written assignment 50% Yes 2,000 words, excluding data tables
2 Written Assignment 50% Yes 2,000 words, excluding data tables

Feedback

Learners will receive formal feedback in a variety of ways: written (via email or VLE correspondence) and indirectly through online discussion groups. Learners will also attend a formal meeting with their Academic Mentor (and for apprentices, including their Line Manager). These bi- or tri-partite reviews will monitor and evaluate the learner’s progress.

Feedback is provided on summatively assessed assignments and through generic internal examiners’ reports, both of which are posted on the VLE.

Indicative Reading

Note: Comprehensive and current reading lists for courses are produced annually in the Course Syllabus or other documentation provided to learners; the indicative reading list provided below is used as part of the approval/modification process only.

Books 

  • Cranor, L.F. and Garfinkel, S., (2005), Security and Usability: Designing Secure Systems that People Can Use, Beijing: Farnham: O’Reilly
  • Pfleeger, C.P., (2007), Security in Computing, Harlow: Prentice Hall
  • Summers, R.C., (1997), Secure Computing: Threats and Safeguards, New York; London : McGraw-Hill

Journals

Learners are encouraged to consult relevant journals on cybersecurity. 

Electronic Resources

Learners are encouraged to consult relevant electronic resources on cybersecurity, such as the British Computing Society Code of Conduct: www.bcs.org.uk.

Indicative Topics

  • Computer systems and threats
  • Embedded and distributed systems
  • Legal and ethical data protection regulations

Version History

Title: LCSCI52100A Cyber Security Course Descriptor

Approved by: Academic Board

Location: Academic Handbook/BSc (Hons) Digital & Technology Solutions 

Version number Date approved Date published Owner Proposed next review date Modification (As per AQF4) & category number
4.0 October 2023 October 2023 Dr. Alexandros Koliousis October 2028 Category 1: Corrections/clarifications to documents which do not change approved content.

Category 3: Changes to Learning Outcomes

3.0 October 2022 January 2023 Scott Wildman June 2025 Category 1: Corrections/clarifications to documents which do not change approved content.

Category 3: Changes to Learning Outcomes

2.1 May 2022 May 2022 Scott Wildman June 2025 Category 1: Corrections/clarifications to documents which do not change approved content.
2.0 January 2022 April 2022 Scott Wildman June 2025 Category 3: Changes to Learning Outcomes
1.0 June 2020 June 2020 Scott Wildman June 2025
Print/Save PDF