Module Descriptors
ADVANCED CYBER SECURITY
COCS60731
Key Facts
Digital, Technology, Innovation and Business
Level 6
15 credits
Contact
Leader: Tomasz Bosakowski
Hours of Study
Scheduled Learning and Teaching Activities: 48
Independent Study Hours: 112
Total Learning Hours: 160
Assessment
  • REPORT weighted at 100%
Module Details
Module Learning Outcomes
1. Demonstrate a systematic understanding of, and critically evaluate enhanced and international aspects of cyber security including professional, legal and ethical issues relevant to computer security professionals. (MQF1)
2. Critically evaluate the impact of the dark web, on system security, showing critical understanding of the limits, ambiguities and uncertainties of relevant information sources. (MQF6)
3. Critically analyze global impact of Cyber security, Cyber warfare and Cyber terrorism using research at the forefront of the field (MQF4)
4. Demonstrate a systematic understanding of and critically evaluate professional, legal and ethical issues relevant to computer security professionals and communicate these issues and implications. (MQF5)
5. Demonstrate critical understanding of the legal aspects of cyber security, cybercrime and cyber warfare. (MQF1)
Module Learning Strategies
The module comprises lectures and lab sessions
Module Indicative Content
Advanced Concepts of cyber security - the Dark Web
Cybercrime profiling
Computer protection and countermeasures
Systems at risk
Cyberwarfare issues
Legal issues
Advanced Network security
The Dark Web and its impact on security
Module Additional Assessment Details
A single 6000 word report, based upon a case study. The report will, in part, contain some form of risk prevention/mitigation plan, based upon the analysis and evaluation of a given case study. This will be used to assess learning outcomes 1 to 5.

As part of a formative review of the assessment, there is a requirement for students to submit a plan of their report in week 8. It is not expected to be more than 500 words in length.
Module Texts
Essential Reading

• Stewart, J.M., Chapple, M., Gibson, D. (2016), CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide and Official ISC2 Practice Tests Kit. Sybex, 7th Edition, ISBN: 1119314011, 9781119314011

• Chou, E., (2017), Mastering Python Networking: Your one stop solution to using Python for network automation, DevOps, and SDN, Packt Publishing, ISBN: 1784397008, 978-1784397005

• Eddison, L. (2018). Tor And The Deep Web: The Complete Guide To Stay Anonymous In The Dark Net. CreateSpace Independent Publishing Platform. ISBN: 1986132943, 978-1986132947

Additional Reading

• Donaldson, S.,¿ Siegel, S., Williams, C., Abdul Aslam, (2018), Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats, Apress, 1st Edition, ISBN: 1484232577, 978-1484232576

• Kosseff, J. (2017), Cybersecurity Law, Wiley, 1st Edition, ISBN: 1119231507, 978-1119231509