Module Descriptors
CYBER SECURITY FUNDAMENTALS
COMP40042
Key Facts
Digital, Technology, Innovation and Business
Level 4
20 credits
Contact
Leader: Alistair Mcloughlin-Goldstraw
Hours of Study
Scheduled Learning and Teaching Activities: 28
Independent Study Hours: 172
Total Learning Hours: 200
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 3 to UG Semester 1
  • Occurrence B, The Development Manager, UG Semester 3 to UG Semester 1
Sites
  • Stoke Campus
  • The Development Manager
Assessment
  • COURSEWORK -PART A CYBER SECURITY RELATED RESEARCH REPORT 1500 WORDS weighted at 50%
  • COURSEWORK - PART B RISK ASSESSMENT REPORT weighted at 50%
Module Details
INDICATIVE CONTENT
Key concepts of computer security (Confidentiality, Integrity, Availability)



Indicative topics include:

Security Models and Computer Security Properties

Security Policies and Standards

Access Control

Information Risk Management

Cryptography Fundamentals

Network Security

Risk Assessment

Linux Introduction

Introduction to Ethical Hacking Concepts

Introduction to Operating System Security

Introduction to Malware

Introduction to Cloud Computing Security

DDoS and DoS attacks

Disaster Recovery



(Module content is indicative only and may change based on industry standards and technology developments)



This module will support the development and assessment of the following Core Knowledge, Skills and Behaviours from the DTSP Apprenticeship Standard:

Knowledge

K3 Principles of estimating the risks and opportunities of digital and technology solutions.

K5 A range of digital technology solution development techniques and tools.

K11 The nature and scope of common vulnerabilities in digital and technology solutions. For example, the risks of unsecure coding and unprotected networks

Skills

S2 Identify risks, determine mitigation strategies and opportunities for improvement in a digital and technology solutions project.

S3 Analyse a business problem to specify an appropriate digital and technology solution.

S15 Apply relevant legal, ethical, social and professional standards to a digital and technology solution.



Behaviours

B1 Has a strong work ethic and commitment to meet the standards required.

B3 Acts with integrity with respect to ethical, legal and regulatory requirements ensuring the protection of personal data, safety and security.

B5 Interacts professionally with people from technical and non-technical backgrounds. Presents data and conclusions in an evidently truthful, concise and appropriate manner.

B7 Maintains awareness of trends and innovations in the subject area, utilising a range of academic literature, online sources, community interaction, conference attendance and other methods which can deliver business value.



This module will support the development and assessment of the following Specialist Route Knowledge, Skills and Behaviours from the DTSP Apprenticeship Standard:



Cyber Security Analyst

Knowledge

K45 Principles of cyber security tools and techniques.

K6 Principles of quantitative and qualitative risk management theory including the role of risk stakeholders.

K47 Concepts and approaches to cyber security assurance

K51 Principles of common security architectures and methodologies.

K52 Approaches to deployment of cyber security technology components in digital systems to provide security functionality. For example, hardware and software to implement security controls.
LEARNING OUTCOMES
1. Identify and describe basic cyber security concepts and techniques.
Knowledge and Understanding
Problem Solving
Application

2. Demonstrate a fundamental understanding of how cyber security fits into the wider IT landscape in both commercial and domestic scenarios.
Knowledge and Understanding
Application

3. Demonstrate an understanding of the tools and techniques used by cyber security professionals to protect a variety of computer systems and networks.
Knowledge and Understanding

4. Demonstrate an ability to conduct risk assessment and analysis to identify and evaluate security threats and hazards in relation to both planned and install IT systems.
Knowledge and Understanding
Problem Solving
Communication

5. Demonstrate an ability to undertake academic-level research.
Knowledge and Understanding



ADDITIONAL ASSESSMENT DETAILS
Part A

The students are required, in Part A, to conduct academic research in relation to a relevant cyber security topic. They are to produce a research report of 2000 words in which they demonstrate their ability to conduct academic research as well as their understanding of core cyber security concepts, technologies and techniques.

This assessment is designed to address LO’s 1, 3 and 5

Assessing the following Core KSBs

Knowledge

K11 The nature and scope of common vulnerabilities in digital and technology solutions. For example, the risks of unsecure coding and unprotected networks

Skills

S15 Apply relevant legal, ethical, social and professional standards to a digital and technology solution.

Behaviours

B3 Acts with integrity with respect to ethical, legal and regulatory requirements ensuring the protection of personal data, safety and security.

B7 Maintains awareness of trends and innovations in the subject area, utilising a range of academic literature, online sources, community interaction, conference attendance and other methods which can deliver business value.


Part B

The students are required, in Part B, to conduct academic research into the risk assessment process and how this relates to cyber security, as well as what issues could be identified within such an assessment and how it would be used. This report is expected to be in the region of 2,000 words.

This assessment is designed to address LO’s 1, 2, 4 and 5

Assessing the following Core KSBs

Knowledge

K3 Principles of estimating the risks and opportunities of digital and technology solutions.

K11 The nature and scope of common vulnerabilities in digital and technology solutions. For example, the risks of unsecure coding and unprotected networks

Skills

S2 Identify risks, determine mitigation strategies and opportunities for improvement in a digital and technology solutions project.

S15 Apply relevant legal, ethical, social and professional standards to a digital and technology solution.

Behaviours

B3 Acts with integrity with respect to ethical, legal and regulatory requirements ensuring the protection of personal data, safety and security.

B7 Maintains awareness of trends and innovations in the subject area, utilising a range of academic literature, online sources, community interaction, conference attendance and other methods which can deliver business value.
LEARNING STRATEGIES
The module will be delivered in a Blended Learning Mode consisting of face to face, online and guided learning sessions.



Teaching sessions will blend theory and practical learning and most importantly where possible contextualised in your workplace as part of your apprenticeship. Learners will be introduced to curriculum concepts and ideas and will then be able to apply theory to practical examples. In addition, students will be provided with a range of resources for independent study such as case studies, academic papers and industry case studies. There will be a mixture of practical and theoretical formative (mock or practice) exercises which will help students build knowledge and confidence in preparation for summative (formal) assessment.



The delivery will be delivered as follows:



Module Launch week: 12 hours.

There will be a module launch session consisting of up to 12 hours face to face contact time devoted to developing your understanding of the core purpose and assessment of the module. Learners will be presented with details of how the learning will be structure and how to access to the learning materials for the remainder of the module.



Structured Learning Sessions: 15 hours

Following the module launch week you will have a further 15 hours of contact time as a class with the module team. This will typically be as 10 x 1.5-hour online classes which will be a combination of activities including lectures, demonstrations, discussions, tutorials and seminars. Some sessions are likely to be in flipped classroom style, where you will be expected to watch online recordings, read materials or respond to practical activities in preparation for active engagement with problem solving in the online session.



1:1 Progress Checks: 1 hour

As a Blended Learner understanding your progress can be a challenge so you are allocated an hour of 1:1 time with your tutor (typically 3 x 20 minute). Some of these may be in small groups if appropriate. These sessions may be used to discuss key topics, troubleshoot solutions, review working drafts etc.



Guided Independent Learning: 178 hours.

The module leader will provide resources through the virtual learning environment which will include videos and presentations as well as links to useful websites and other resources. Additional academic learning will be achieved through reading around the subject area, module tutors will suggest useful texts, though many others will be suitable and can be found in our e-library. You should also draw on the expertise in your workplace via your workplace mentor and other colleagues. If you require help understanding any of the concepts, you should contact your module tutor for assistance.

As an apprentice you are constantly developing your Digital Skills as part of your substantial role, and this applies to the development of the knowledge for your modules too. In some cases, there will be a significant cross over between the module content and in others less so depending on the nature of your work place duties, this will have a direct impact on to the number of Independent Learning required.



Within the Independent learning time you will be expected to complete your assignments, as a guide a typical module assignment should take around 60 hours to complete.

RESOURCES
Access to the internet

Access to Staffordshire University online academic material

A computer capable of accessing the internet

Word processing software
REFERENCE TEXTS
All texts and electronic resources will be updated and refreshed on an annual basis and available for students via the online Study Links resource platform. All reference materials will be collated and curated and aligned to Equality, Diversity & Inclusion indicators.

Core Text/Resource:

Ozkaya, E. (2019) Cybersecurity: The Beginner’s Guide. 1st edn. Packt Publishing Ltd.

Optional Text/Resource:

The National Cyber Security Centre (2019) CyBOK: The Cyber Security Body of Knowledge. Version 1.0. The National Cyber Security Centre.

Advanced/Supplementary Text/Resource:

N/A
WEB DESCRIPTOR
Within this module, you will learn fundamental principles of cyber security, as well as how these fits into the wider computing landscape. You will also learn about core cyber security technologies and techniques, and how these are used to secure a wide range of computational systems and networks.