CYBER SECURITY OPERATIONS

SHE Level 2
SCQF Credit Points 20.00
ECTS Credit Points 10.00
Module Code M2G425230
Module Leader Kenneth Ovens
School School of Computing, Engineering and Built Environment
Subject Cyber Security and Networks
Trimester
  • B (January start)

Pre-Requisite Knowledge

Introduction to Computer Networking or equivalent. Fundamentals of Computing or equivalent.

Summary of Content

Cybersecurity risks and threats are ever-present. The Internet and network infrastructures are increasingly vulnerable to a wide variety of physical and cyber attacks. These threats and vulnerabilities are fuelling the growing need for skilled cybersecurity professionals who can protect systems from attack, respond to security breaches and solve cyber crimes. This module covers foundational knowledge in aspects of security in the cyber world, including information security, systems security, network security, physical security, ethics and laws. The module also provides students with an understanding of the main principles behind digital forensics, together with the principles, theories and technical skills employed in the digital forensics analysis field. The percentage of Work Based Learning for this module, as represented by the proportion of the Activity Types which take place off campus, is 78%. The percentage of Work Based Assessment for this module is 40%.

Syllabus

Cybersecurity: b7 Confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures. b7 Threats, vulnerabilites, and atacks. b7 Tactcs, techniques and procedures used by cyber criminals. b7 Types of malware, malicious code and social engineering. b7 Technologies, products and procedures used to ensure confdentality, integrity, and availability. Digital Forensics: b7 Fundamental and defning principles of digital forensics. b7 Laws and ethical principles. b7 Types of acquisiton. b7 Preservaton of evidence, handling and integrity. b7 Disk imaging tools and techniques. b7 Preparaton of audit trails to ACPO expectatons. b7 Standards and expectatons of documentaton required for presentaton in court. b7 Incident Response Tactics -360

Learning Outcomes

On successful completion of this module a student should be able to:1 - Describe the technologies, products and procedures used to ensure confidentiality, integrity and availability.2 - Explain the policies, ethics, principles and procedures of forensic investigations and be aware of the legal aspectsincluding documentary and evidentiary standards expected in presenting investigative findings.3 - Apply the core concepts, knowledge and practice of digital forensic methodology to computer crime investigation.

Teaching / Learning Strategy

Work Based Education aims to maximise the direct and digitally mediated contact time with students by practicing teaching and learning strategies that use authentic work based scenarios and encourage action learning, enquiry based learning, problem based learning and peer learning. All these approaches aim to directly involve the students in the process of learning and to encourage sharing of learning between students. The module team will determine the level and accuracy of knowledge acquisition at key points in the delivery, inputting when necessary either directly or with the support of external experts who will add to the authenticity, the credibility and application of the education and learning in the workplace. The Learning and Teaching Strategy is informed by the University's Strategy for Learning. The course material will be introduced through online presentations as well as guided reading material made available on GCULearn. These are supported by practical exercises, and there will be seminars on campus which will allow students to discuss key concepts and issues with peers and tutors. Students will be expected to undertake a significant level of independent study within the workplace, including practical activities, and links will be provided to appropriate external material such as articles, podcasts and videos to supplement the module content. Students will be encouraged to reflect upon the theoretical learning within the workplace and the application of newly learned concepts to the work environment, and this will form part of the module assessment. Students will receive feedback on their performance throughout the module through undertaking the practical assignments and tutorial exercises and participating in the seminars.

Indicative Reading

Sammons, J., (2015) - The Basics of Digital Forensics (Second Editon). Available: <htp://www.sciencedirect.com/science/book/9780128016350> Altheide, C. & Carvey, H., (2011) - Digital Forensics with Open Source Tools. Available: <htp://www.sciencedirect.com/science/book/9781597495868> Hosmer, C., (2014) - Python Forensics Available: htp://www.sciencedirect.com/science/book/9780124186767 Cybersecurity Essentals 1.0 - Cisco Networking Academy

Transferrable Skills

Logical thinking and problem solving. Critical analysis. Communication skills (electronic, written, oral and listening) necessary to make effective presentation of a technical nature (information, ideas, problems and their solutions) to a range of audiences. Creativity, innovation and independent thinking. Ability to prioritise tasks and time management (organising and planning work).

Module Structure

Activity Total Hours
Lectures (FT) 24.00
Practicals (FT) 24.00
Seminars (FT) 24.00
Independent Learning (FT) 108.00
Assessment (FT) 20.00

Assessment Methods

Component Duration Weighting Threshold Description
Coursework 1 n/a 40.00 35% Practical Research / Laboratory Work
Exam (Exams Office) 2.00 60.00 35% unseen written exam