Module Learning Outcomes
1. DEMOMSTRATESOUND KNOWLEDGE AND CRITICAL KNOWLEDGE AND UNDERSTANDING OF PROFESSIONAL, ETHICAL, LEGAL AND GLOBAL ISSUES SURROUNDING THE USE OF CYBER SECURITY TECHNOLOGIES TO RESOLVE A RANGE OF PROBLEMS
Knowledge & Understanding
Learning
2. DEMONSTRATE THE ABILITY TO UTILISE MODELS OF REFLECTION AS PART OF REFLECTIVE PRACTICE AND PORTFOLIO DEVELOPMENT
Application
Analysis
Reflection
3. EVIDENCE SUCCESSFUL APPLICATION IN THE WORKPLACE OF THE TECHNICAL KNOWLEDGE AND SKILLS COMPETENCIES SPECFIED IN THE LEARNING AGREEMENT
Enquiry
Problem Solving
Application
4. DEMONSTRATE AN APPRECIATION OF ENTERPRISE AND ENTREPRENEURSHIP AS WELL AS AN AWARENESS OF GLOBAL ISSUES IN THE CONTEXT OF CYBER SECURITY.
Knowledge and Understanding
5. COMMUNICATE COMPLEX CYBER SECURITY PROBLEMS AND POTENTIAL SOLUTIONS TO BOTH SPECIALIST AND NON-SPECIALIST AUDIENCES USING SOPHISTICATED MODELS, DOCUMENTATION TECHNIQUES AND REPORT FORMATS
Communication
Module Additional Assessment Details
Portfolio specification and mapping documentation (all learning outcomes)
25% 1500 words
Summative reflection of learning (all learning outcomes)
75% 4500 words
The link to university outcomes is shown in the above table. This module starts at the beginning of level 5. The module tutor will work with the workplace mentor to draw up a learning agreement setting out a series of work-based tasks to be completed during the year which will enable apprentices to meet the following apprenticeship outcomes as well as the learning outcomes of this module. A full specification of each task and an implementation log will be will be stored in an electronic portfolio together with evidence of task completion. Each task will be accompanied by a reflection of the learning experience against the outcomes below.
Technical Competencies Technical Knowledge and understanding
TCK15 Undertake risk modelling, analysis and trade Management of cyber risk, tools and techniques.
TCK16 Undertake risk assessment to an external standard. Quantitative and qualitative risk management theory & practice, role of risk stakeholders.
TCK19 Design & evaluate a system to a security case. How to compose a justified security case.
TCK21 Develop an assurance strategy. Assurance concepts & approaches.
TCK23 Manage intrusion response, including with 3rd parties. Cyber incident response, management, escalation, investigation & 3rd party involvement.
TCK26 Develop & apply information security policy to implement legal or regulatory requirements. Legal responsibilities of system owners, users, employers, employees.
Module Indicative Content
The delivered content will cover portfolio development, models of reflection and reflective practice. The module tutor will work with the workplace mentor to draw up a learning agreement setting out a series of work-based tasks to be completed during the year which will enable apprentices to meet the following apprenticeship outcomes as well as the learning outcomes of this module. A full specification of each task and an implementation log will be will be stored in an electronic portfolio together with evidence of task completion. Each task will be accompanied by a reflection of the learning experience against the apprenticeship outcomes.
Module Learning Strategies
There will be a module launch during which the module leader will outline the nature of this module and you will be introduced to your tutor. Time will be set aside for you to work with your tutor and workplace mentor to consider the type of tasks that might be included in your portfolio. There will be a group discussion during which initial queries wiill be addressed by the module leader. The portfolio package will be introduced and you will have the opportunity to set up your portfolio template.
This module will not have a formal learning timetable. Instead, you, your module tutor and your mentor will work together to create a learning agreement and project plan which will outline responsibilities and requirements. You will be required to keep a detailed log book. Regular review sessions will be scheduled with your workplace mentor and module tutor to ensure that you are on track with your portfolio. At these sessions your log book will be reviewed and formative feedback provided on any completed tasks. you will create an action plan to inform your future portfolio work
Module Texts
Bolton, G, Delderfield, R. (2018) Reflective Practice, writing and professional development, Sage Publications LTD. ISBN: 9781526411709
Roffey-Barentsen, Jodi ; Malthouse, Richard (2009) Reflective practice in the lifelong learning sector [electronic book], Exeter : Learning Matters, ISBN: 0857253344 (e-book); 9780857253347 (e-book).
Module Resources
Specialised hardware and software located in the workplace – specific requirements will be agreed through a learning contract.
Module Special Admissions Requirements
To be on level 5 of a Cyber Security (or similar) award.