LEARNING OUTCOMES
1. Critically evaluate research to support the development of a solution to a cyber security scenario.
Learning
Analysis
2. Apply recognised best practice methods, methodologies and approaches in cyber security in developing a solution to a problem.
Knowledge & Understanding
Problem Solving Application
3. Critically evaluate the success and impact of cyber security project work using appropriate test and evaluation methods.
Analysis
Reflection
4. Complete and present a project, considering risk management, relevant legal, ethical and social implications and complying with appropriate academic and professional requirements and codes of conduct.
Reflection
Communication
ADDITIONAL ASSESSMENT DETAILS
Project proposal 20%
During the inception phase of the project, you will work with your employer and academic supervisor to identify and develop an idea into a suitable proposal. Once completed and approved by the Course team you will develop your ideas through research toward an analysis of the problem domain and a formal project plan. (Learning Outcomes 1).
Project Proposal Presentation 10%
You will present your literature review findings and project plan for discussion and review (Learning Outcome 1).
Dissertation 50%
The analysis, design, implementation and testing phases of the project will be documented into a single report, supported appropriately by academic references and practices. The report will conclude with your evaluation and reflection on the work undertaken and resulting artefact. (Learning Outcomes 2 - 4).
Presentation with Q&A 20%
The culmination of the dissertation module will be your presentation (30 minutes) and defence of your work through questions and answers (30 minutes) to your assessment team (Learning Outcomes 2 - 4).
Assessing aspects of the following KSBs from the CSTP Apprenticeship Standard:
K12: Threats, vulnerabilities, impacts and mitigations in ICT systems and the enterprise environment
S12: Discover, identify and analyse threats, attack techniques, vulnerabilities and mitigations
K13: Human dimensions of cyber security
S13: Assess culture & individual responsibilities
K15: Management of cyber security risk, tools and techniques
S15: Undertake risk modelling, analysis and trades
K16: Quantitative & qualitative risk management theory & practice, role of risk stakeholders
S16: Undertake risk assessment to an external standard
K17: Concepts & benefits of security management systems, governance & international standards
S17: Apply a management system and develop an information security management plan
K18: Security components: how they are used for security / business benefit. Crypto & key management
S18: Configure and use security technology components and key management
K19: How to compose a justified security case
S19: Design & evaluate a system to a security case
K20: Understand security assurance, how to achieve it and how to apply security principles
S20: Architect, analyse & justify a secure system
K21: Assurance concepts & approaches
S21: Develop an assurance strategy
K22: How to diagnose cause from observables. Application of SIEM (Security Information and Event Management) tools & techniques
S22: Security monitoring, analysis and intrusion detection. Recognise anomalies & behaviours
K23: Cyber incident response, management, escalation, investigation & 3rd party involvement
S23: Manage intrusion response, including with 3rd parties
K24: Legal, regulatory, compliance & standards environment
K25: Applicability of laws regulations & ethical standards
S25: Organise testing & investigation work in accordance with legal & ethical requirements
K26: Legal responsibilities of system owners, users, employers, employees
S26: Develop & apply information security policy to implement legal or regulatory requirements
B1: Fluent in written communications and able to articulate complex issues.
B2: Makes concise, engaging and well-structured verbal presentations, arguments and explanations.
B3: Able to deal with different, competing interests within and outside the organisation with excellent negotiation skills.
B4: Able to identify the preferences, motivations, strengths and limitations of other people and apply these insights to work more effectively with and to motivate others.
B5: Able to work effectively with others to achieve a common goal.
B6: Competent in active listening and in leading, influencing and persuading others.
B7: Able to give and receive feedback constructively and incorporate it into his/her own development and life-long learning.
B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations
B9: Able to put forward, demonstrate value and gain commitment to a moderately complex technology-oriented solution, demonstrating understanding of business need, using open questions and summarising skills and basic negotiating skills
B10: Can conduct effective research, using literature and other media
B11: Logical thinking and creative approach to problem solving
B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make)
B13: Demonstrates business disciplines, ethics and courtesies, demonstrating timeliness and focus when faced with distractions and the ability to complete tasks to a deadline with high quality
B14: Flexible attitude and ability to perform under pressure
B15: A thorough approach to work in the cyber security role
INDICATIVE CONTENT
Project proposal specification planning.
Methods and skills of critical literature review.
Selecting and using appropriate technologies available (e.g. library, digital library, Internet facilities and other sources).
Gathering data from a range of primary sources, including experimentation
Techniques for testing project artefacts.
Techniques to analyse data and to present the results in a suitable format.
Critical evaluation of project outcomes.
Critical reflection on one’s performance in the project.
Course-specific guidelines for the individual project.
Project planning and management.
Health and safety.
Legal, ethical, professional and social issues.
Organisation of study materials.
Techniques of research report writing.
The roles of the supervisor and the student.
Issues associated to solution testing and robustness (including British Standards Institution PAS 754).
Consideration of computing in relation to public well-being.
Industry roles and industry relations.
Environment and sustainability issues.
Business, economics, environmental and sustainability issues.
Commercial issues and principles, and Intellectual Property.
Globalisation issues.
Disability and accessibility.
Health and Safety, and associated risk issues.
The specific focus of your individual project this module will determine the extend to the coverage of the development and assessment of the Knowledge and Skills from the CSTP Apprenticeship Standard, but it will demonstrate the following behaviours
B1: Fluent in written communications and able to articulate complex issues.
B2: Makes concise, engaging and well-structured verbal presentations, arguments and explanations.
B3: Able to deal with different, competing interests within and outside the organisation with excellent negotiation skills.
B4: Able to identify the preferences, motivations, strengths and limitations of other people and apply these insights to work more effectively with and to motivate others.
B5: Able to work effectively with others to achieve a common goal.
B6: Competent in active listening and in leading, influencing and persuading others.
B7: Able to give and receive feedback constructively and incorporate it into his/her own development and life-long learning.
B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations.
B9: Able to put forward, demonstrate value and gain commitment to a moderately complex technology-oriented solution, demonstrating understanding of business need, using open questions and summarising skills and basic negotiating skills.
B10: Can conduct effective research, using literature and other media.
B11: Logical thinking and creative approach to problem solving.
B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make).
B13: Demonstrates business disciplines, ethics and courtesies, demonstrating timeliness and focus when faced with distractions and the ability to complete tasks to a deadline with high quality.
B14: Flexible attitude and ability to perform under pressure.
B15: A thorough approach to work in the cyber security role.
In reflection of development of the above behaviours:
Learning within this module maps to the following Fundamental British Values:¿¿
Democracy
Individual liberty
Tolerance
Mutual respect
Learning within this module maps to the following principles of Equality, Diversity & Inclusion:¿
Challenging discrimination
Inclusive practices
WEB DESCRIPTOR
This is the capstone project to your Cyber Security Apprenticeship where you will undertake in-depth, critical research to inform the development of effective solutions to a cyber security scenario drawn from your workplace. You will apply established best practices, methodologies, and industry-recognised approaches to address complex security challenges. Emphasis is placed on the ability to critically evaluate the success and impact of your project work using suitable testing, validation, and evaluation techniques. You will also be expected to plan, execute, and present a well-structured and professionally managed project. This includes identifying and mitigating risks, while addressing the legal, ethical, and social considerations relevant to cyber security practice. Throughout the module, you will be required to adhere to appropriate academic standards and professional codes of conduct, demonstrating both technical competence and responsible practice. By the end, you will have developed a comprehensive understanding of cyber security project work from inception to evaluation, preparing you for professional practice in a complex and evolving threat landscape.
LEARNING STRATEGIES
Module Launch 6 hours
There are a series of induction lectures (typically 1.5 hours per week for four weeks) which cover the process and best practices you will need to be successful in your project. These will support the module as well as appropriate preparation for the EPA
Project Supervision 8 hours apprentice
Each apprentice will receive 24 x 20-minute supervision sessions throughout the duration of the Project supervision with the mode agreed with their supervisor.
Assessments (1.5 hours)
Preparation for Assessments (60)
This time is taken up in preparing the 4 assessed elements including a substantial academic project report.
This module includes 58 off-the-job (OTJ) training hours as standard, covering new learning funded by the apprenticeship levy. A total 400 nominal learning hours has been attributed to this module, incorporating OTJ training alongside broader academic development beyond levy-funded new learning.
TEXTS
O'Leary, Z. (2024) The Essential Guide to Doing Your Research Project. 5th edn. London: SAGE Publications.
Bryman, A. (2024) Social Research Methods. 6th edn. Oxford: Oxford University Press.
Saunders, M., Lewis, P. & Thornhill, A. (2023) Research Methods for Business Students. 9th edn. Harlow: Pearson Education.
Meredith, J. R. & Mantel Jr., S. J. (2023) Project Management: A Managerial Approach. 11th edn. Hoboken, NJ: Wiley.
Watt, A. (2023) Project Management. 2nd edn. BCcampus OpenEd.
Williams, K. (2018), Planning Your Dissertation (Pocket Study Skills), Red Globe Press; 2nd edition.
Burton, H, M. (2021), Your First Research Paper: Learn how to start, structure, write and publish a perfect research paper to get the top mark, independently published.
Dawson, C. (2015) Projects in Computing and Information Systems: A Student's Guide. 3rd edition. Pearson Education. ISBN: 9781292073460
Schwalbe, K. (2018) Information Technology Project Management. 9th edition. Course Technology Inc. ISBN: 978-1337101356
Robson, C. (2016) How to do a Research Project: A Guide for Undergraduate Students. 2nd Edition. Wiley. ISBN: 978-1118691328
RESOURCES
As determined by the agreed project proposal.