Module Descriptors
IOT SYSTEMS DEVELOPMENT AND SECURITY
COMP63049
Key Facts
Digital, Technology, Innovation and Business
Level 6
20 credits
Contact
Leader: Rakan Aldmour
Hours of Study
Scheduled Learning and Teaching Activities:
Independent Study Hours:
Total Learning Hours:
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 2
  • Occurrence B, Stoke Campus, UG Semester 3
Sites
  • Stoke Campus
Assessment
  • DEMONSTRATION - 30 MINUTES weighted at 30%
  • REPORT - 2000 WORDS weighted at 70%
Module Details
LEARNING OUTCOMES
1. Demonstrate a systematic understanding of the limitations and challenges presented by using technologies and services to collect, store and analyse data by embedding IoT devices

Knowledge & Understanding

Learning

Analysis

2. Apply and use low-level programming techniques for direct management and control of IoT devices

Knowledge & Understanding

Application

3. Select and deploy techniques using ideas and techniques,
some of which are at the forefront of the discipline. to integrate IoT devices into complex digital systems conforming to security requirements and governance

Problem Solving

Enquiry

Application

4. Develop and undertake technical reviews and risk assessments of IoT solutions to ensure security compliance and mitigate risk

Application

Reflection

ADDITIONAL ASSESSMENT DETAILS
Demonstration 30%

You will design, demonstrate and evaluate the functionality and security considerations of an IoT system (ideally from a potential work context and either deployed or within a dev/sandbox type environment) generating data for cleansing, checking and analysis. (Learning Outcomes 2, 3 and 4)



Report 70%

You will produce a technical report outlining the potential of IoT solutions including security assurance reflecting on practical experience. (Learning Outcomes 1 and 4)–



Assessing aspects of the following KSBs from the CSTP Apprenticeship Standard:

K4: Computer architecture, digital logic, machine level representation of data

S4: Build test and debug a digital system to a specification

K5: Operating System principles, architectures, features, mechanisms, security features and exploits

S5: Configure an Operating System in accordance with security policy. Identify threats and features

K6: Algorithm and program design, concepts, compilers and logic. Programming languages

S6: Write, test, debug programs in high- and low-level languages and scripts

K8: How software interacts with the hardware and real-world environment and security issues

S8: Construct software to interact with the real world and analyse for security exploits

B1: Fluent in written communications and able to articulate complex issues

B2: Makes concise, engaging and well-structured verbal presentations, arguments and explanations

B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations

B10: Can conduct effective research, using literature and other media

B11: Logical thinking and creative approach to problem solving

B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make)
INDICATIVE CONTENT
IoT, AI and ML

IoT Architecture

Cloud based solutions

Edge based solutions

IoT hardware, sensors and smart devices and connectivity

IoT Operating Systems

Protocols and Standards for IoT such as HTTPS, AMQP, DDS, MQTT, LoRaWAN

Device identity and authentication

Low level design techniques and programming for IoT solutions

IoT Platforms and Development environments

Deploying and Monitoring IoT Solutions

Scalability, availability and disaster recovery

Security issues in hardware, IoT and Smart devices

IoT Risk Assessment models

Cyber-attacks in an IoT world

Secure IoT System Architecture and Design

IoT Data and Cloud Security

IoT Supply Chain and Operational Resilience



This module will support the development and assessment of the following KSBs from the CSTP Apprenticeship Standard:

K4: Computer architecture, digital logic, machine level representation of data

S4: Build test and debug a digital system to a specification

K5: Operating System principles, architectures, features, mechanisms, security features and exploits

S5: Configure an Operating System in accordance with security policy. Identify threats and features

K6: Algorithm and program design, concepts, compilers and logic. Programming languages

S6: Write, test, debug programs in high- and low-level languages and scripts

K8: How software interacts with the hardware and real-world environment and security issues

S8: Construct software to interact with the real world and analyse for security exploits

K12: Threats, vulnerabilities, impacts and mitigations in ICT systems and the enterprise environment

S12: Discover, identify and analyse threats, attack techniques, vulnerabilities and mitigations

K14: Structured and ethical intelligence analysis, methods, techniques

S14: Undertake ethical system reconnaissance and intelligence analysis

K25: Applicability of laws regulations & ethical standards

S25: Organise testing & investigation work in accordance with legal & ethical requirements

K26: Legal responsibilities of system owners, users, employers, employees

S26: Develop & apply information security policy to implement legal or regulatory requirements

B1: Fluent in written communications and able to articulate complex issues

B2: Makes concise, engaging and well-structured verbal presentations, arguments and explanations

B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations

B10: Can conduct effective research, using literature and other media

B11: Logical thinking and creative approach to problem solving

B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make)



Learning within this module maps to the following Fundamental British Values:¿¿

Democracy

Rule of law



Learning within this module maps to the following principles of Safeguarding & Prevent:¿

Protecting from harm

Reporting and accountability



Learning within this module maps to the following principles of Equality, Diversity & Inclusion:¿

Challenging discrimination
WEB DESCRIPTOR
The Internet of Things (IoT) is a network of physical devices embedded with sensors, software, and connectivity, enabling them to collect and exchange data. These devices range from everyday items like smart home appliances to complex industrial systems. IoT allows for automation, real-time monitoring, and improved efficiency across sectors such as healthcare, agriculture, manufacturing, and transportation. However, there is huge potential for issues relating to privacy and security. This module will not only develop your skills in designing and deploying and IoT solutions but will do so whilst considering the legal, ethical and importantly security context too.
LEARNING STRATEGIES
This module will be delivered in a Blended Learning Mode consisting of face-to-face, online and guided learning sessions.



Teaching sessions will blend theory and practical learning, and most importantly where possible will seek to be contextualised in your workplace as part of your apprenticeship. You will be introduced to curriculum concepts and ideas and will then be able to apply theory to practical examples. In addition, students will be provided with a range of resources for independent study such as case studies, academic papers and industry case studies. There will be a mixture of practical and theoretical formative (mock or practice) exercises which will help you build knowledge and confidence in preparation for summative (formal) assessment.



The delivery will be delivered as follows:



Module Launch week: 12 hours.
There will be a module launch week with up to 12 hours of face-to-face contact time devoted to developing your understanding of the core purpose and assessment of the module. You will be presented with details of how the learning will be structured and how to access to the learning materials for the remainder of the module.



Structured Learning Sessions: 15 hours
Following the module launch week you will have a further 15 hours of attendance-based contact time as a class with the module team. This will typically be as 10 x 1.5-hour online classes. Classes which will be a combination of activities including lectures, demonstrations, discussions, tutorials and seminars. Some sessions maybe in flipped classroom style, where you will be expected to watch online recordings, read materials or respond to practical activities in preparation for active engagement with problem solving in the online session.



1:1 Progress Checks: 1 hour
As a Blended Learner understanding your progress can be a challenge so you are allocated an hour of 1:1 time with your tutor (typically 3 x 20-minute meetings). Some of these may be in small groups if appropriate. These sessions may be used to discuss key topics, troubleshoot solutions, review working drafts etc.



Assignment Development: Time 30 hours

A typical assignment will take you a minimum 30 hours to complete.



This module includes 58 off-the-job (OTJ) training hours as standard, covering new learning funded by the apprenticeship levy. A total 200 nominal learning hours has been attributed to this module, incorporating OTJ training alongside broader academic development beyond levy-funded new learning.
TEXTS
Weber, R. H. (2025) Internet of Things – New Serials. Cham: Springer.

Bhambri, P., Soni, R. & Tran, T.-A. (eds.) (2024) Smart Healthcare Systems: AI and IoT Perspectives. Boca Raton, FL: CRC Press.

Gubbi, J., Buyya, R., Marusic, S. & Palaniswami, M. (2023) Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Morgan Kaufmann.

Roman, R., Zhou, J. & Lopez, J. (2023) Mobile Sensor Networks. Morgan Kaufmann.

Song, H. (2022), Internet Of Everything: Key Technologies, Practical Applications And Security Of IoT, World Scientific Publishing Co Pte Lt

Lele, C. (2022), Internet of Things (IoT) A Quick Start Guide: A to Z of IoT Essentials (English Edition), BPB Publications

Herreo, C. (2022), Fundamentals of IoT Communication Technologies (Textbooks in Telecommunication Engineering), Springer; 1st ed. 2022 edition

Fattahi, A. (2022), IoT Product Design and Development: Best Practices for Industrial, Consumer, and Business Applications (IoT Skills in Practice), Wiley-Blackwell

Barnet, P. et. Al. (2020), Intelligent Automation: Learn how to harness Artificial Intelligence to boost business & make our world more human

Tounsi, W. ed., (2019), Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT, John Wiley & Sons.

Bhattacharjee, S., (2018), Practical Industrial Internet of Things security: A practitioner's guide to securing connected industries. Packt Publishing Ltd.

Russell, B. and Van Duren, D., (2016), Practical internet of things security. Packt Publishing Ltd.
RESOURCES
Software Development Environments

Azure IoT resources

AWS IoT resources