Module Descriptors
CYBER SECURITY TECHNICAL PROFESSIONAL HONOURS PROJECT
COMP63050
Key Facts
Digital, Technology, Innovation and Business
Level 6
40 credits
Contact
Leader: Pantaleon Lutta Odongo
Hours of Study
Scheduled Learning and Teaching Activities:
Independent Study Hours:
Total Learning Hours:
Pattern of Delivery
  • Occurrence A, Stoke Campus, UG Semester 2 to UG Semester 3
  • Occurrence B, Stoke Campus, UG Semester 3 to UG Semester 1
Sites
  • Stoke Campus
Assessment
  • PROJECT PROPOSAL AND LITERATURE REVIEW - 2000 WORDS weighted at 20%
  • PROPOSAL PRESENTATION - 30 MINUTES weighted at 10%
  • DISSERTATION - 8000 WORDS weighted at 50%
  • PRESENTATION WITH Q&A - 1 HOUR weighted at 20%
Module Details
LEARNING OUTCOMES
1. Critically evaluate research to support the development of a solution to a cyber security scenario.

Learning

Analysis

2. Apply recognised best practice methods, methodologies and approaches in cyber security in developing a solution to a problem.

Knowledge & Understanding

Problem Solving Application

3. Critically evaluate the success and impact of cyber security project work using appropriate test and evaluation methods.

Analysis

Reflection

4. Complete and present a project, considering risk management, relevant legal, ethical and social implications and complying with appropriate academic and professional requirements and codes of conduct.

Reflection

Communication

ADDITIONAL ASSESSMENT DETAILS
Project proposal 20%

During the inception phase of the project, you will work with your employer and academic supervisor to identify and develop an idea into a suitable proposal. Once completed and approved by the Course team you will develop your ideas through research toward an analysis of the problem domain and a formal project plan. (Learning Outcomes 1).



Project Proposal Presentation 10%

You will present your literature review findings and project plan for discussion and review (Learning Outcome 1).

Dissertation 50%

The analysis, design, implementation and testing phases of the project will be documented into a single report, supported appropriately by academic references and practices. The report will conclude with your evaluation and reflection on the work undertaken and resulting artefact. (Learning Outcomes 2 - 4).

Presentation with Q&A 20%

The culmination of the dissertation module will be your presentation (30 minutes) and defence of your work through questions and answers (30 minutes) to your assessment team (Learning Outcomes 2 - 4).



Assessing aspects of the following KSBs from the CSTP Apprenticeship Standard:

K12: Threats, vulnerabilities, impacts and mitigations in ICT systems and the enterprise environment

S12: Discover, identify and analyse threats, attack techniques, vulnerabilities and mitigations

K13: Human dimensions of cyber security

S13: Assess culture & individual responsibilities

K15: Management of cyber security risk, tools and techniques

S15: Undertake risk modelling, analysis and trades

K16: Quantitative & qualitative risk management theory & practice, role of risk stakeholders

S16: Undertake risk assessment to an external standard

K17: Concepts & benefits of security management systems, governance & international standards

S17: Apply a management system and develop an information security management plan

K18: Security components: how they are used for security / business benefit. Crypto & key management

S18: Configure and use security technology components and key management

K19: How to compose a justified security case

S19: Design & evaluate a system to a security case

K20: Understand security assurance, how to achieve it and how to apply security principles

S20: Architect, analyse & justify a secure system

K21: Assurance concepts & approaches

S21: Develop an assurance strategy

K22: How to diagnose cause from observables. Application of SIEM (Security Information and Event Management) tools & techniques

S22: Security monitoring, analysis and intrusion detection. Recognise anomalies & behaviours

K23: Cyber incident response, management, escalation, investigation & 3rd party involvement

S23: Manage intrusion response, including with 3rd parties

K24: Legal, regulatory, compliance & standards environment

K25: Applicability of laws regulations & ethical standards

S25: Organise testing & investigation work in accordance with legal & ethical requirements

K26: Legal responsibilities of system owners, users, employers, employees

S26: Develop & apply information security policy to implement legal or regulatory requirements

B1: Fluent in written communications and able to articulate complex issues.

B2: Makes concise, engaging and well-structured verbal presentations, arguments and explanations.

B3: Able to deal with different, competing interests within and outside the organisation with excellent negotiation skills.

B4: Able to identify the preferences, motivations, strengths and limitations of other people and apply these insights to work more effectively with and to motivate others.

B5: Able to work effectively with others to achieve a common goal.

B6: Competent in active listening and in leading, influencing and persuading others.

B7: Able to give and receive feedback constructively and incorporate it into his/her own development and life-long learning.

B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations

B9: Able to put forward, demonstrate value and gain commitment to a moderately complex technology-oriented solution, demonstrating understanding of business need, using open questions and summarising skills and basic negotiating skills

B10: Can conduct effective research, using literature and other media

B11: Logical thinking and creative approach to problem solving

B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make)

B13: Demonstrates business disciplines, ethics and courtesies, demonstrating timeliness and focus when faced with distractions and the ability to complete tasks to a deadline with high quality

B14: Flexible attitude and ability to perform under pressure

B15: A thorough approach to work in the cyber security role
INDICATIVE CONTENT
Project proposal specification planning.
Methods and skills of critical literature review.
Selecting and using appropriate technologies available (e.g. library, digital library, Internet facilities and other sources).
Gathering data from a range of primary sources, including experimentation
Techniques for testing project artefacts.
Techniques to analyse data and to present the results in a suitable format.
Critical evaluation of project outcomes.
Critical reflection on one’s performance in the project.
Course-specific guidelines for the individual project.
Project planning and management.
Health and safety.
Legal, ethical, professional and social issues.
Organisation of study materials.
Techniques of research report writing.
The roles of the supervisor and the student.
Issues associated to solution testing and robustness (including British Standards Institution PAS 754).
Consideration of computing in relation to public well-being.
Industry roles and industry relations.
Environment and sustainability issues.
Business, economics, environmental and sustainability issues.
Commercial issues and principles, and Intellectual Property.
Globalisation issues.
Disability and accessibility.
Health and Safety, and associated risk issues.



The specific focus of your individual project this module will determine the extend to the coverage of the development and assessment of the Knowledge and Skills from the CSTP Apprenticeship Standard, but it will demonstrate the following behaviours



B1: Fluent in written communications and able to articulate complex issues.

B2: Makes concise, engaging and well-structured verbal presentations, arguments and explanations.

B3: Able to deal with different, competing interests within and outside the organisation with excellent negotiation skills.

B4: Able to identify the preferences, motivations, strengths and limitations of other people and apply these insights to work more effectively with and to motivate others.

B5: Able to work effectively with others to achieve a common goal.

B6: Competent in active listening and in leading, influencing and persuading others.

B7: Able to give and receive feedback constructively and incorporate it into his/her own development and life-long learning.

B8: Analytical and critical thinking skills for Technology Solutions development and can systematically analyse and apply structured problem-solving techniques to complex systems and situations.

B9: Able to put forward, demonstrate value and gain commitment to a moderately complex technology-oriented solution, demonstrating understanding of business need, using open questions and summarising skills and basic negotiating skills.

B10: Can conduct effective research, using literature and other media.

B11: Logical thinking and creative approach to problem solving.

B12: Able to demonstrate a ‘security mind-set’ (how to break as well as make).

B13: Demonstrates business disciplines, ethics and courtesies, demonstrating timeliness and focus when faced with distractions and the ability to complete tasks to a deadline with high quality.

B14: Flexible attitude and ability to perform under pressure.

B15: A thorough approach to work in the cyber security role.



In reflection of development of the above behaviours:

Learning within this module maps to the following Fundamental British Values:¿¿

Democracy

Individual liberty

Tolerance

Mutual respect



Learning within this module maps to the following principles of Equality, Diversity & Inclusion:¿

Challenging discrimination

Inclusive practices
WEB DESCRIPTOR
This is the capstone project to your Cyber Security Apprenticeship where you will undertake in-depth, critical research to inform the development of effective solutions to a cyber security scenario drawn from your workplace. You will apply established best practices, methodologies, and industry-recognised approaches to address complex security challenges. Emphasis is placed on the ability to critically evaluate the success and impact of your project work using suitable testing, validation, and evaluation techniques. You will also be expected to plan, execute, and present a well-structured and professionally managed project. This includes identifying and mitigating risks, while addressing the legal, ethical, and social considerations relevant to cyber security practice. Throughout the module, you will be required to adhere to appropriate academic standards and professional codes of conduct, demonstrating both technical competence and responsible practice. By the end, you will have developed a comprehensive understanding of cyber security project work from inception to evaluation, preparing you for professional practice in a complex and evolving threat landscape.
LEARNING STRATEGIES
Module Launch 6 hours

There are a series of induction lectures (typically 1.5 hours per week for four weeks) which cover the process and best practices you will need to be successful in your project. These will support the module as well as appropriate preparation for the EPA

Project Supervision 8 hours apprentice

Each apprentice will receive 24 x 20-minute supervision sessions throughout the duration of the Project supervision with the mode agreed with their supervisor.



Assessments (1.5 hours)

Preparation for Assessments (60)

This time is taken up in preparing the 4 assessed elements including a substantial academic project report.

This module includes 58 off-the-job (OTJ) training hours as standard, covering new learning funded by the apprenticeship levy. A total 400 nominal learning hours has been attributed to this module, incorporating OTJ training alongside broader academic development beyond levy-funded new learning.
TEXTS
O'Leary, Z. (2024) The Essential Guide to Doing Your Research Project. 5th edn. London: SAGE Publications.

Bryman, A. (2024) Social Research Methods. 6th edn. Oxford: Oxford University Press.

Saunders, M., Lewis, P. & Thornhill, A. (2023) Research Methods for Business Students. 9th edn. Harlow: Pearson Education.

Meredith, J. R. & Mantel Jr., S. J. (2023) Project Management: A Managerial Approach. 11th edn. Hoboken, NJ: Wiley.

Watt, A. (2023) Project Management. 2nd edn. BCcampus OpenEd.

Williams, K. (2018), Planning Your Dissertation (Pocket Study Skills), Red Globe Press; 2nd edition.

Burton, H, M. (2021), Your First Research Paper: Learn how to start, structure, write and publish a perfect research paper to get the top mark, independently published.

Dawson, C. (2015) Projects in Computing and Information Systems: A Student's Guide. 3rd edition. Pearson Education. ISBN: 9781292073460

Schwalbe, K. (2018) Information Technology Project Management. 9th edition. Course Technology Inc. ISBN: 978-1337101356

Robson, C. (2016) How to do a Research Project: A Guide for Undergraduate Students. 2nd Edition. Wiley. ISBN: 978-1118691328
RESOURCES
As determined by the agreed project proposal.