1 - Northumbria University

advertisement
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Please note that from January 2005
 Where a programme is delivered in more than one mode:
o a full Programme Specification is completed for what is deemed to be the main mode
o details of other modes (part-time, franchise deliveries etc.) are entered onto a Delivery Supplement which is attached to the main document
o one or more delivery supplements may be included at the time of validation, or added when an additional mode of delivery is subsequently
approved.
 Any changes made to an approved Programme Specification are indicated on a Log of Changes sheet, and appended.
Sections 1-10 below indicate all modes of delivery and attendance, with the main mode highlighted by the use of bold type; sections 11-20 refer to the main
mode of delivery.
1.
Programme Title and Award
BSc (Honours) Ethical Hacking for Computer Security
G550/BSC/EHCS
2.
UCAS or other Admissions Code
3.
Northumbria Programme Code(s) please
indicate the programme code(s) for the
main delivery in bold
4.
Mode(s) of Delivery please indicate the main
mode of delivery in bold
Classroombased
YES
Distance Learning
5.
Mode(s) of Attendance please indicate the main
delivery in bold
Full-time
YES
Sandwich
21SCOE-N
ETH1
Blended
YES
Part-time
Other please specify
6.
Location(s) of Delivery if other than Northumbria
7.
Collaborative Provision if applicable
Franchised
Validated
Joint
Dual
Partner Institution(s)
8.
Date(s) of Approval/Review
Approved June 2008. Reviewed February 2009, May 2011, November 2012, July 2014
9.
QAA Subject Benchmark Group
Computing, Engineering
10.
PSRB accreditation if applicable
BCS, The Chartered Institute for IT
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 1 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Sections 11 – 20 relate to the main delivery as indicated in bold above.
11.
Educational Aims of the Programme Specified in terms of the general intentions of the programme and its distinctive characteristics; these should be
consistent with any relevant benchmark and with the Mission of the University.
The primary aim of this programme is to provide a broad, general education in the theory and practice of engineering and computing technologies with
special emphasis in the area of ethical hacking for computer security and network systems. This programme will produce highly skilled and professional
graduates with abilities in resolving computer security problems and cases, especially:





Designing systems for the resolution and management of computer security problems;
Managing computer and information security activities;
Designing countermeasures to enhance systems security;
Analysing current and emergent computer security technologies;
Understanding the legal, social, ethical and professional responsibilities when undertaking ethical hacking operations.
The award of BSc (Honours) Ethical Hacking for Computer Security addresses the need of organisations (both public and private) to address their
system’s security – locating and analysing security weaknesses in computer information systems and then designing countermeasure solutions to
strengthen those systems and make them more reliable and robust. The programme will also address the fundamental principles of computer and
network technologies, analysing computing and networking tools and techniques, providing a wide variety of computing and technology graduate
employment opportunities.
The BSc (Honours) Ethical Hacking for Computer Security programme is directed towards the specific requirements of the computer security discipline.
However, the programme adopts the philosophy of providing an educational programme which addresses the fundamental and underpinning principles
of engineering and computing as designated in the Engineering and Computing Benchmark (see Benchmark mapping in section 18), whilst focussing
on the theoretical, professional, technical, legal and social aspects and concepts of computer security.
The professional requirements of the computer security practitioner will be incorporated throughout the module syllabus on this programme, and it is
anticipated (that as part of the summative assessment process), this course will contribute to the CEH (Certified Ethical Hacking) certification.
Students will have the opportunity to undertake a placement in a Computing environment. Where possible this will be in a systems security
environment, however, it will be made clear to students that direct ethical hacking placements will not always be possible, but the value and benefit of
any and all placement experience will be emphasised.
It is anticipated that graduates from the programme will have the opportunity to work in organisations developing solutions to systems security
problems, particularly in relation to the technical use of ethical hacking tools and the development and design of countermeasures and secure systems.
However, it should be emphasised that there is not an infinite pool of computer security employment opportunities. Graduates will also be suited to
employment in general computing employment and in related specialist areas such as computer networks, system & network security and
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 2 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
management.
This programme is designed to meet the demands of developing technologies in society, business and industry, specifically in the specialist area of
computer security design and investigation. The programme has been developed to address contemporary issues in the developing field of Ethical
Hacking for Computer Security – forming part of the Faculty s successful portfolio of Computer Engineering programmes (BSc (Hons) Computer and
Network Technology).
Additionally, the programme aims to develop the student’s:






Analytical understanding of complex and specialised knowledge, and skills in the field of computer security technologies,
Problem-solving abilities through practical application and theoretical appreciation of the principles associated with computer security
technologies,
Appreciation of innovations and advances in digital security technologies, and the implication for continuing professional development,
Appreciation of major issues at the frontiers of digital security technologies, through debate, discussion and critical analysis,
Application of professional and ethical principles, standards and practices in the field of computer security technologies,
Transferable and life-long learning skills to support continuing educational and professional development.
The content of this programme through its skills and techniques developed are potentially damaging if used maliciously and the capabilities developed
in this programme have potential for harm – to mitigate against this potential, tutors will emphasise the professional expectations of students working in
this domain, and a module on professionalism will be part of the programme. As part of their first year studies, students will develop an understanding
of the legal frameworks surrounding the subject as well as stressing the students’ ethical and moral responsibilities to themselves and others, including
the Faculty and the University and the wider community.
The programme has been designed to meet the requirements of professional registration. It is intended that graduates of the programme meet the BCS
requirements for registration for Chartered Information Technology Professional (CITP) and partial meets those for Chartered Engineer (CEng).
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 3 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
12.
How Students are Supported in their Learning/Employability/Career Development eg curriculum design, personal development plans,
placements, fieldwork, practical projects.
The programme aims to promote a high-quality student experience, through a comprehensive network of student support and guidance services for
example support for students in their learning is provided by:












The Induction Programme
o Year 1 : given details of programme structure, assessment, University support (Student Services), information services (library,
Internet, e-mail, Faculty Intranet); advice re study and time management, familiarisation with laboratory hardware and software.
o Year 2: details of programme/assessment and support in seeking and preparing for placement.
o Final Year: details of programme/assessment, advice on projects and careers guidance.
The Student Handbook detailing programme structure, assessment schedule, regulations, available support.
The University and Faculty web resources, including eLP (Blackboard), detailing staff, programme and module information, and providing
learning materials,
The Programme Team – the individual Module Tutors and the Projects Tutor, the Programme Leader.
The Faculty ’s Retention Advisor whose role is to enhance student progression and programme completion,
Access to all staff via email,
Personal Development Plans, which require students to reflect on and collect evidence of their ongoing development of knowledge and skills,
Direct academic support in seminars/computer lab sessions,
Student Representatives who represent students’ views and concerns at Staff-Student Liaison Committee and Programme Committee
meetings,
The Library, which provides 24 hour access on and off campus to subject gateways, periodicals, electronic databases and library, catalogues,
including the City and Newcastle University Libraries,
Student Placements
o Students have the opportunity to undertake a placement in a computing environment; they are offered support (via seminars and
workshops) in developing their placement plan, i.e., constructing CV(s), writing applications, etc by a Placement Officer.
o During the placement year, each student on placement has an academic tutor (Placement Tutor), who visits two to three times during
the placement and a work based supervisor,
Year Tutor, responsible for managing and looking after the well-being of the year group.
In addition, there will also be a programme of guest speakers from industry.
Student employability is further enhanced by there being an opportunity to take a professional placement in year three. Through careful support of the
student and employer, and subsequent supervision of the placement activities, this period becomes highly valued preparation for level 6 study and
ultimately graduate employment. Students on placement obtain invaluable work experience in computing related employment, gaining self-confidence
and maturity, and greatly enhancing their academic and employment prospects.
The programme has been carefully designed to support employability, lifelong learning and continuing professional development of its students – the
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 4 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
programme provides knowledge and skills, and uses tools, techniques and methods which are immediately useful to employers, both at the placement
and at the graduate stage. Industry practice has strongly influenced the design of the programme, and its content will evolve in line with developments
in the industry and in the subject as an academic discipline. The relevance and richness of the programme has been ensured by identifying employer
needs and opinions – in particular, existing collaborations with North East Fraud Forum (NEFF) and Northumbria Police helped in shaping the design of
the programme and enabled the content to be aligned more closely with employers’ needs and future graduates’ career opportunities. In this way the
programme promotes a strengthening of the economic, environmental and cultural life of the region through opportunities in higher education, creating
partnerships, integrating with communities, and generating and disseminating valuable knowledge.
Students completing this programme will have the opportunity to work in the digital security environment, particularly in relation to the technical
development and implementation of digital forensics and network security strategies. Computer security organisations such as 7Safe (www.7safe.com),
Sapphire Technologies (www.sapphire.net), dns (www.dns.co.uk), and SecureTest (www.securetest.com) are just some examples of companies that
provide employment opportunities for ethical hacking professionals. There are also employment opportunities with management consultancy
organisations such as PWC and KPMG as well as opportunities in computer networking; computer systems risk analysis and indeed as ethical hacking
specialists in business and industry. Systems security sections in large organisations also require skills in this area. Other employment opportunities are
available with government, military and police forces.
However, it should be emphasised that there is not an infinite pool of computer security opportunities and students completing this programme will have
their employability opportunities enhanced in related specialist areas such as computer networks, computer security, and information system security,
development and management. In addition all students will have enhanced research skills, enabling them to undertake an academic or research
oriented career. Careers advice and information concerning further research will be available to all students.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 5 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
13.
Learning Outcomes of Programme Specified in terms of performance capabilities to be shown on completion of the programme/pathway. Please
identify numerically to correspond to the map of learning outcomes in section 18.
a) Knowledge and Understanding
Students will be able to demonstrate specialist in-depth knowledge and critical understanding of (and hence be able to evaluate) the:
A1: essential facts, concepts, principles, theories, challenges and techniques underpinning digital security investigations
A2: application of computer security tools and techniques in order to produce appropriate strategies and instigate change in organisations
A3: fundamental issues at the frontiers of research and development in computer security
A4: techniques, tools and issues involved in computer security investigations (including any associated limitations and constraints)
A5: professional, social, ethical and legal issues associated with computer security investigations
b) Intellectual Skills
Students will apply knowledge and understanding to:
B1: systematically identify and analyse complex problems and offer appropriate strategic solutions using a range of effective methods and tools
B2: critically examine, evaluate, apply and discuss the philosophies, techniques, tools, and methods relevant to the use of computer security
technologies in a range of applications and domains
B3: interpret, evaluate, and synthesise information and data from a variety of sources, using evidence based criteria to discriminate between what is
essential, and what is unnecessary
B4: reflect on the professional, ethical and legal issues surrounding the development and use of computer security technologies
B5: critically examine and evaluate ways of defining, promoting, controlling and validating the attainment of quality in the field of computer security
technologies
B6: appreciate and reflect on how research is advanced through scholarship
B7: identify, plan and execute a significant individual project, conducting independent research, applying originality of thought, via established skills
and techniques in project management and research methodologies.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 6 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
c) Practical Skills
Students will be able to:
C1: apply a range of techniques, tools and knowledge to complex computer security investigations in a variety of situations
C2: use appropriate techniques, tools and knowledge to support effective management of computer security investigations
C3: apply theories and principles of computer security investigations in a business or industrial environment
C4: use a rigorous, scientific approach to the search, selection, evaluation and application of information to support research
d) Transferable/Key Skills
Students will be able to:
D1: learn independently, enhance existing skills, develop new skills, sustain their own professional development
D2: exhibit a systematic approach to problem solving and decision making in complex and unpredictable situations
D3: effectively communicate information, ideas, arguments, problems and solutions to specialists and non-specialists
D4: demonstrate a flexible outlook, using listening and negotiating skills, knowledge and understanding to enthuse their peers
D5: display initiative, responsibility, enterprise, acting autonomously in planning and implementing tasks at a professional level
D6: manage their time, learning and resources in an efficient and professional manner
D7: engage in critical self-appraisal of their own learning experience, personal strengths, limitations and performance
D8: demonstrate research skills at an appropriately advanced and scholarly level
14.
Learning, Teaching and Assessment Strategy Specified to enable learners to achieve and demonstrate the above learning outcomes.
The programme aims to provide students with a wide range of learning opportunities in an exciting, challenging, stimulating and dynamic quality
learning environment. The programme learning outcomes are aligned with module learning outcomes (see section 18) and the learning methods
applied to address the module learning outcomes are specified in module descriptors. Students have a variety of learning opportunities including
lectures, seminars, tutorials, practical’s, research, case studies, online using eLP (Blackboard), guest / expert input and task based learning in guided
and independent study modes. The variety includes methods for individual as well as group learning. Students will be encouraged to develop
independent learning skills and techniques in Level 4 and these will be used increasingly in levels 5 and 6. At levels 5 and 6 students are increasingly
expected to incorporate critical analysis and critical evaluation into their learning. Students will be supported in developing these skills throughout the
programme. The development of transferable skills permeates the whole of the programme, particularly with regard to documentation, communication
and presentation of the results of ethical hacking investigations.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 7 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
The third year of course is encouraged to be a placement year where the students will go into industry and apply many of the skills they have learned in
the first two years of the course, as part of this process the students are supported by a dedicated placement team who manage the external
companies and the interview/application process. The course also supports this by incorporating a Project Management and Professionalism module
which prepares the students for a corporate environment and how they as individuals will be expected to act as a professional. Teamwork is
incorporated into the course in several modules through group work and discussions, this linking of the placements process, the professionalism
teaching and the group work should enable the students to be productive members of staff in their placement and allow them to apply themselves so as
to enjoy the experience.
Computer Security is continuously developing, evolving and changing, consequently students will be expected to keep up to date with developments
through research undertaken as part of their assessments. The input from guest speakers (practitioners and industry experts will contribute to the
currency of the subject material).
The assessment methods used in the programme aim to reflect the wide range of teaching and learning practices, and diversity of subject matter
across the disciplines of computing and engineering and the subject domain of ethical hacking. Assessments are designed to align with the module
learning outcomes and assess the learning outcomes of each module in the most appropriate way whilst ensuring a full-range of assessment methods
across the programme, combining these techniques will:






Emphasise authenticity and complexity in the content and methods of assessment rather than reproduction of knowledge and reductive
measurement.
Uses high-stakes summative assessment rigorously but sparingly rather than as the main driver for learning.
Offer students extensive opportunities to engage in the kinds of tasks that develop and demonstrate their learning, thus building their
confidence and capabilities before they are summatively assessed.
Provide an environment that is rich in feedback derived from formal mechanisms e.g. tutor comments on assignments, student self-review logs.
Provide an environment that is rich in informal feedback, e.g. peer review of draft writing, collaborative project work, which provides students
with a continuous flow of feedback on ‘how they are doing’.
Develop students’ abilities to direct their own learning, evaluate their own progress and attainments and support the learning of others.
Whilst learning and the measurement of learning will be linked closely to assessment, it is hoped that the learning environment and learning
opportunities presented to students will encourage students to be motivated to learn for educational reasons, and not simply to pass summative
assessments. The aim is to avoid surface learning and focus on the need for learning opportunities that elicit a deeper more reflective learning
response from students.
Formative assessment and feedback is incorporated into modules wherever appropriate and students are encouraged to participate in formative
activities through linking those activities to PDPs and using the formative activities to develop the skills, techniques and expectations of summative
assessment. Summative assessment methods include exams, technical reports, case study analyses, presentations, portfolio and project work.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 8 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
15.
Programme Structure This section should be completed with reference to the Modularised Framework for Northumbria Awards.2. Diagrams can also
be used to demonstrate the structure.
Programme Structure Refer if necessary to appended diagrams
2
Level 4
EN0403: Introduction to Ethical Hacking (YL 20 credits)
EN0406: Operating System Fundamentals (YL 20 credits)
EN0402: Programming Fundamentals with Robots (YL 20 credits)
CM0429: Relational Databases (YL 20 credits)
EN0156: Network Technology 1 (YL 20 credits)
EN0407: Web Technologies (YL 20 credits)
Level 5
EN0561: Principles of Ethical Hacking: Operating Systems (YL 20 credits)
EN0578 :Advanced Operating Systems I (YL 20 credits)
EN0273: Programming in C (YL 20 credits)
CM0547: Project Management and Professional Issues (YL 20 credits)
EN0256: Network Technology 2 (YL 20 credits)
CM0513: Dynamic Internet Technologies (YL 20 credits)
Level 6
EN0365: Ethical Hacking for Network Security (YL 20 credits)
CM0645: Individual Project (YL 40 credits) / CM0647: Individual Project (YL 40 credits)
EN0615: Advanced Digital Security (YL 20 credits)
EN0308: Network Technology 3 (YL 20 credits)
EN0616: Security for Web Applications (YL 20 credits)
The Modularised Framework for Northumbria Awards available from
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
http://Northumbria.ac.uk/sd/central/ar/lts/approval/framework/
Page 9 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
PROPOSED DELIVERY (13/14)
Level 4
Sem 1
EN0407
Web Technologies
(YL) (20)
EN0402
Programming
Fundamentals with
Robots (YL) (20)
EN0156
Network
Technology 1 (YL)
(20)
EN0403
Introduction to
Ethical Hacking
(YL) (20)
CM0513
Dynamic Internet
Technologies
(YL) (20)
EN0273
Programming in C
(YL) (20)
EN0256
Network
Technology 2 (YL)
(20)
EN0578
Advanced
Operating Systems
I (YL) (20)
Sem 2
EN0406
Operating System
Fundamentals (YL)
(20)
CM0429
Relational
Databases (YL)
(20)
Level 5
Sem 1
Sem 2
CM0547
Project Management and Professional
Issues (20)
EN0561
Principles of Ethical Hacking (20)
Placement
CM0567
CEIS Professional Placement
Sem 1
Sem 2
Level 6
Sem 1
Sem 2
EN0616
Security for Web
Applications
(YL) (20)
EN0365
Ethical Hacking for
Network Security
(YL)
(20)
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
EN0308
Network Technology 3
(YL) (20)
EN0615
Advanced Digital Security (YL)
(20)
CM0645 / CM0674
Project (YL)
(40)
Page 10 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
16.
Lower Level Awards Credit Structure and Programme Learning Outcomes for Lower Level Awards.
Please delete or add rows as appropriate, with reference to the Assessment Regulations for Northumbria Awards 3 Learning outcomes should be
specified for each lower level award in accordance with the QAA Framework for Higher Education Qualifications 4 which also provides generic
qualification descriptors for each level. The standard credit structure for each award is given below. The Modularised Framework for Northumbria
Awards2 indicates permitted variations and allows programmes to be validated with some lower or higher level credit (e.g. the Certificate of Higher
Education (120 credits at Level 4) can be validated with up to 30 Level 3 credits).
Award
Programme Learning Outcomes may be completed with reference to section 13.
Certificate of Higher Education
A1, A2, A5, B2, B4, C1, C2, D1, D2, D6, D7
120 credits at Level 4
Higher National Certificate
(Higher National Diploma
programmes only)
Not applicable
150 credits:
120 credits at Level 4;
30 credits at Level 5.
Pass Degree
(by transfer of registration from
Honours at the end of
Level 4 or Level 5)
3
A1, A2, A4, A5, B1, B2, B3, B4, B5, B6, C1, C2, C3, D1, D2, D3, D4, D5, D6, D7
The Modularised Framework for Northumbria Awards available from http://Northumbria.ac.uk/sd/central/ar/lts/approval/framework/
The Assessment Regulations for Northumbria Awards available from http://Northumbria.ac.uk/sd/central/ar/lts/approval/assess/
There is a link to the QAA Framework for Higher Education Qualifications at http://Northumbria.ac.uk/sd/central/ar/lts/approval/
2
3
4
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 11 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
300 credits:
120 credits at Level 4;
120 credits at Level 5;
60 credits at Level 6.
17.
Variation from Assessment Regulations or the Modularised Framework Provide details of any approved variations from the Assessment
Regulations for Northumbria Awards (ARNA)3 or the Modularised Framework for Northumbria Awards2.
None
18.
Mapping of Learning Outcomes
This section shows how the individual modules (with module learning outcomes as written in the module descriptor) together contribute to programme
learning outcomes. It should be presented as a matrix of programme learning outcomes (as identified numerically in section 13), against modules.
Where a module contributes to a programme learning outcome it should be flagged. Standard practice will be for a single symbol to indicate a learning
outcome addressed in the module. See guidance notes for discussion of alternative practices.
The following matrix is for a programme structure with 6 learning outcomes in each of the categories of section 13, with rows for 6 modules in each of
levels 4 and 5, and 9 modules including some options in level 6. See guidance notes for a discussion of the treatment of option modules. The matrix
should be extended as required. The matrix will show how some learning outcomes are developed at particular stages in the programme, while others
may be developed through the three levels.
3
2
The Modularised Framework for Northumbria Awards available from http://Northumbria.ac.uk/sd/central/ar/lts/approval/framework/
The Assessment Regulations for Northumbria Awards available from http://Northumbria.ac.uk/sd/central/ar/lts/approval/assess/
3
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 12 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Code
Core /
a) Knowledge & Understanding
b) Intellectual Skills
1
2
1
C
C
C
C
C
C
X
X
X
X
X
X
X
C
C
C
C
C
C
X
X
X
X
X
c) Practical Skills
d) Transferable Key Skills
option
3
4
5
2
3
4
5
6
7
1
2
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
3
4
1
2
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
3
4
5
6
7
8
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Level 4
EN0403
CM0429
EN0402
EN0156
EN0407
EN0406
X
X
X
X
X
X
X
X
X
X
X
Level 5
EN0561
EN0578
EN0273
CM0547
EN0256
CM0513
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Level 6
EN0365
CM0645/
CM0674
EN0615
EN0308
EN0616
C
C
C
C
C
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Page 13 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Benchmark Mapping
Engineering Benchmark
Engineering Related Cognitive Abilities
Demonstrate essential facts, concepts, theories and principles
Level 4
Level 5
EN0403, CM0429,
EN0156, EN0407,
EN0406, EN0402
EN0156, EN0403
EN0561, EN0256,
CM0513, EN0578,
EN0273, CM0547
EN0561, EN0256,
EN0578, EN0273
Appreciate social, environmental, ethical, economic, professional
and commercial considerations
EN0403
EN0561, CM0547
Application of appropriate quantitative science and engineering
tools to the analysis of problems
EN0403, CM0429,
EN0156, EN0407,
EN0406, EN0402
EN0156, EN0406,
EN0402
EN0561, EN0256,
CM0513, EN0578,
EN0273, CM0547
EN0561, EN0273,
EN0578, EN0256
EN0402, EN0403
CM0513, CM0547
EN0403, CM0429,
EN0156, EN0407,
EN0406, EN0402
EN0403, EN0156
EN0561, EN0256,
CM0513, EN0578
Ability to use and apply information from scientific/technical
literature
EN0406, EN0407
CM0513, EN0578,
CM0547
Ability to use appropriate codes of practice and industry standards
EN0406, CM0429,
EN0156, EN0407
EN0256, CM0513
Ability to work as a team member
EN0406
EN0578, CM0547
Demonstrate underpinning science and mathematics
Demonstrate creative and innovative ability in the synthesis and in
formulating designs
Comprehend the broad picture and thus be able to reflect on, and
communicate that broad picture to non-specialists
Engineering Related Practical Abilities
Understanding of and ability to use relevant materials, equipment,
tools, processes or products
Knowledge and understanding of workshop and laboratory practice
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
EN0561, EN0256,
EN0578
Placement
Level 6
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365,
CM0645/CM0674,
EN0615, EN0616
EN0365,
CM0645/CM0674,
EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
CM0645/CM0674,
EN0365
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365
Page 14 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Awareness of quality issues and their application to continuous
improvement
General transferable skills
Problem solving, communication and working with others
Effective use of IT facilities and information retrieval skills
Managing own learning & development/Continuing professional
development
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
EN0403, EN0406,
EN0402, CM0429,
EN0156, EN0407
EN0403, EN0406,
EN0402, CM0429,
EN0156, EN0407
EN0403, EN0406,
EN0402, CM0429,
EN0156, EN0407
CM0547
CM0645/CM0674
EN0561, EN0273,
CM0547, EN0256,
CM0513
EN0561, EN0252,
EN0273, CM0547,
EN0256, CM0513
EN0561, EN0273,
CM0547, EN0256,
CM0513
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
Page 15 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Computing Benchmark
Computer Related Cognitive Abilities
Demonstrate essential facts, concepts, principles and theories
Level 4
Level 5
EN0403, EN0406,
EN0402, CM0429,
EN0407
EN0406, EN0402,
CM0429
EN0561, EN0273,
CM0513
EN0403, EN0406,
CM0429, EN0156,
EN0407
EN0406, CM0429,
EN0156, EN0407
EN0561, EN0256,
CM0513
EN0403
EN0561
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0406, CM0429,
EN0156, EN0407
EN0252, EN0256,
CM0513
Understand the associated risks and safety aspects of computer
based systems
EN0406, EN0156
EN0252, EN0256
Ability to effectively deploy computers based systems
EN0156, EN0407
EN0256, CM0513,
EN0578
Ability to work as a team member
EN0403
CM0547, EN0578
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
CM0645/CM0674,
EN0615, EN0308,
EN0616
CM0645/CM0674,
EN0615, EN0308,
EN0616
EN0365
Demonstrate ability to model and design computer based systems
Demonstrate understanding of the requirements and practical
constraints of computer based systems
Demonstrate understanding of the methods and tools used for the
specification, design, implementation, evaluation and testing of
computer based systems
Demonstrate understanding of the professional considerations
Computer Related Practical Abilities
Ability to specify, design and construct a computer based system
Awareness of quality issues and their application to continuous
improvement
Ability to operate computer equipment effectively, taking into
account its logical and physical properties
EN0403, EN0406,
EN0156, EN0407
EN0252, EN0273,
EN0256, CM0513
Placement
Level 6
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
CM0645/CM0674,
EN0615, EN0616,
EN0365
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
CM0547, EN0578
CM0645/CM0674,
EN0615, EN0616
EN0561, EN0256,
CM0513, EN0578,
EN0273
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
General Transferable skills
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 16 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Problem solving, communication and working with others
Effective use of IT facilities and information retrieval skills
Managing own learning & development/Continuing professional
development
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
EN0403, EN0406,
EN0402, CM0429,
EN0156, EN0407
EN0403, EN0406,
EN0402, CM0429,
EN0156, CM0420,
EN0407
EN0403, EN0406,
EN0402, CM0429,
EN0156
EN0561, EN0273,
CM0547, EN0256,
CM0513
EN0561, EN0273,
CM0547, EN0578,
EN0256, CM0513
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
EN0561, EN0273,
CM0547, EN0256
EN0365, EN0308,
CM0645/CM0674,
EN0615, EN0616
Page 17 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Core requirements for accreditation
2.1.1 Knowledge and understanding of facts, concepts, principles &
theories
X
2.1.2 Use of such knowledge in modelling and design
2.1.3 Problem solving strategies
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
2.1.6 Recognise legal, social, ethical & professional issues
X
X
X
X
X
2.1.7 Knowledge and understanding of commercial and economic issues
X
X
X
X
X
2.2.1 Specify, design or construct computer-based systems
X
X
X
X
X
X
X
X
2.3.1 Work as a member of a development team
2.3.2 Development of general transferable skills
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
X
X
X
X
EN0308 Network Technology 3
EN0615 Advanced Digital Security
EN0616 Security for Web
Applications
EN0365 Ethical Hacking for
Network Security
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
2.2.3 Recognise risk/safety for safe operation of computing equipment
2.2.4 Deploy tools effectively
X
X
2.2.2 Evaluate systems in terms of quality and trade-offs
X
X
X
X
X
X
X
2.1.8 Knowledge of management techniques to achieve objectives
2.1.9 Knowledge of information security issues
X
X
X
X
X
CM0645/674 Project
EN0273 Programming in C
EN0561 Principles of Ethical
Hacking
EN0578 Advanced Operating
Systems
CM0547 Professionalism and
Project Management
Level 6
EN0156 Network Technology 1
EN0402 Programming
Fundamentals with Robots
EN0403 Introduction to Ethical
Hacking
EN0406 Operating System
Fundamentals
Level 5
CM0513 Dynamic Internet
Technologies
EN0256 Network Technology 2
X
X
X
2.1.4 Analyse if/how a system meets current and future requirements
2.1.5 Deploy theory in design, implementation and evaluation of systems
CM0429 Relational Databases
Level 4
BCS Mapping – BSc (Hons) Ethical Hacking for Computer Security
Core Modules/ Accreditation Criteria
(full wording for each criterion is available in Appendix IV of the
Accreditation Guidelines)
EN0407 Web Technologies
BCS Mapping
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Page 18 of 29
X
X
X
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Additional requirements for CITP
X
3.1.1 Deploy systems to meet business goals
3.1.2 Methods, techniques and tools for information modelling,
management and security
X
3.1.3 Knowledge of systems architecture
X
X
X
X
X
X
3.2.1 Specify, deploy, verify and maintain information systems
3.2.2 Defining problems, managing design process and evaluating
outcomes
X
X
3.2.3 System Design
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Additional requirements for CEng/CSci
4.1.1 Knowledge and understanding of scientific and engineering principles
X
4.1.2 Knowledge and understanding of mathematical principles
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
X
X
4.1.3 Knowledge and understanding of computational modelling
4.2.1 Specify, deploy, verify and maintain computer-based systems
4.2.2 Defining problems, managing design process and evaluating
outcomes
4.2.3 Principles of appropriate supporting engineering and scientific
disciplines
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
x
X
x
Page 19 of 29
X
X
X
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
19.
Admission Requirements including approved arrangements for admission with advanced standing, where appropriate.
The ability to benefit from Northumbria University programmes is assessed on a combination of academic and personal qualities which can be
demonstrated in a number of ways. Successful completion of a GCE or VCE Advanced level course of study (or some other equivalent qualification) is
just one way. Students who can in other ways demonstrate their ability to benefit from a Northumbria University programme, in particular mature
students without formal qualifications will always be considered and are invited to contact the Programme Leader to discuss their application.
Applicants should use the personal statement on their application to illustrate their abilities, aptitudes, skills, qualifications and experiences which might
be taken into account as well as or instead of any of the formal qualifications listed below. It is University policy to recognise a wide variety of evidence,
and potential applicants may wish to discuss this aspect of their application with the Programme Leader.
The following standard entry requirements are shown for guidance. A student’s particular combination of qualifications (including key skills) will
always be taken into account in making an offer.
GCSE grade C or above in Mathematics and English Language, plus one of the following:
GCE and VCE Advanced Level
300 UCAS tariff points.
A BTEC national Certificate or Diploma at good standard with evidence of ability in Mathematics
Advanced GNVQ
Merit
Other
EB 64%; IB 24 points.
International students are required to satisfy a minimum requirement regarding their proficiency in both spoken and written English. The requirement is
currently an IELTS score of at least 6.0, or a TOEFL score of at least 550 or an equivalent achievement.
Interviews
Interviews will be held where



the suitability of a candidate is in doubt and further evidence is sought
candidates present an unusual set of qualifications taken or pending, and an appropriate conditional offer needs to be determined
candidates may need advice on the appropriateness of a programme, or on the appropriateness of a proposed preparatory course of study
Applicants invited for an interview will always be told its purpose.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 20 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
20.
Application Procedure
Applications for the full time and sandwich versions of the programme are processed by the Universities and Colleges Admissions Service (UCAS).
Standard applicants who meet, or are expected to meet, the minimum A-level entry requirements, are made offers by the appropriate University
Administrator on the basis of their UCAS application.
The Programme Leader considers other non-standard, applicants on an individual basis.
Students will be expected to sign a code of conduct document before beginning the programme
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 21 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
LETTER OF RECOMMENDATION
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 22 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 23 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
LOG OF CHANGES
Any changes made to an approved Programme Specification (other than typographical corrections) should be logged below and the sheet appended to the
Programme Specification. Subsequent changes can then be added. Where it is not practicable to change an existing Programme Specification, a new version
is required.
Replace CM0501 and CM0504 with IS0503
To replace CM0431 'Introduction to Computer
Crime Investigations' with EN0407 'Web
Technologies'
BSc (Hons) Ethical Hacking
BSc (Hons) Ethical Hacking
3.
To replace :
ISO513 "BIT Consultancy Project" with
CM0547:Project Management and Professionalism
EN0572 "Operating Systems & Concurrency" with
EN0578 "Advanced Operating Systems I"
BSc (Hons) Ethical Hacking
18.2.09
May
2011
No
Level 5
Level 4
2009/10
2011-12
Level 5
2013/14
4.
5.
1
Administrative changes are defined in section of Approval Processes for Taught Programmes and Modules
http://northumbria.ac.uk/sd/central/ar/lts/approval/
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 24 of 29
eg S2;05/06
1.
2.
Change takes
effect
Stage/yea
r of
program
me
eg Year 3
Semester/
academic
year
Programme title(s)
Admin
change1
Y/N
Programme
code(s)
affected by
change
Date of
approval /
amendment
Brief summary of change to Programme
Specification
(including section number)
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
HEAR SUPPLEMENT
The HEAR Supplement should be completed for all new and existing undergraduate honours degrees. Information in sections 7, 8 and 9 should apply to
students gaining awards in the current academic year for all deliveries within the same route (and the possibility that this could differ from related information in
the main programme specification). Once approved, it will be entered by Faculty support staff onto SITS and will be reviewed annually.
1.
Academic Year
2013/4
2.
Northumbria Programme Title and Route Code
BSc (Honours) Ethical Hacking for Computer Security ETH1
3.
Mode/s of Attendance
Full Time
YES
Sandwich
YES
Part Time
Other please specify
4.
Partner Institution/s
5.
Date of Approval
6.
Programme Entry Requirements (150 words maximum) The following generic statement can be edited as appropriate to reflect any subject specific
requirements1
Approved June 2008, reviewed Feb 2009, May 2011
As well as GCE and VCE ‘A levels’, the University accepts a wide range of entry qualifications including BTEC National Awards, Scottish Highers and
Advanced Highers, Irish Leaving Certificate, Access courses and the International Baccalaureate. Entry requirements are usually expressed as UCAS
tariff points and can be found in programme specifications and the on-line prospectus. In addition to achieving the UCAS tariff points for entry to the
programme, students must also be able to demonstrate that they have studied an appropriate minimum number of units at Level 3, which is usually not
less than two full GCE or VCE A levels or equivalent (though for programmes at sub degree level this requirement is usually not less than one full GCE
or VCE A level or equivalent). Applicants may be required to have studied a particular subject or subjects to a certain level. Where the first language is
not English, an IELTS score of 6.0 (with a minimum score of 5.5 in each component) will normally be required for entry.
Students may be admitted to the programme with advanced standing based on accredited prior learning or accredited prior experiential learning.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 25 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
7.
Programme Statement (250 words maximum) This should be written primarily for an external audience (eg employers) clarifying the aims of the
programme, pathways, professional body implications (including where an alternative award title indicates that professional requirements have not
been met) and opportunities for work experience/placements or study abroad. Please note that further information on professional status is required in
section 10 below.
As an ‘Ethical Hacker’ graduates have learned skills that will enable them to locate and strengthen security weaknesses in computer systems.
This programme was developed to meet the rapidly emerging need for organisations to address their systems’ security, and also cover the fundamental
principles of computer and network technologies, analysing computing and networking tools and techniques.
The course addresses the requirements of BCS accreditation and the expectations of other organisations such as Skills for Justice and the Forensic
Science Society are also embedded in the programme.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 26 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
8.
Learning Outcomes applicable to students gaining awards in the current academic year. If these are the same as the main programme specification,
please indicate ‘see section 13 of the main specification’ below, noting that information will need to be extracted from the main programme specification
for entry onto SITS.
The learning outcomes for an Honours degree are as follows:
Knowledge and understanding
Students will be able to demonstrate specialist in-depth knowledge and critical understanding of (and hence be able to evaluate) the:
1.
2.
3.
4.
5.
Essential facts, concepts, principles, theories, challenges and techniques underpinning digital security investigations
Application of computer security tools and techniques in order to produce appropriate strategies and instigate change in organisations
Fundamental issues at the frontiers of research and development in computer security
Techniques, tools and issues involved in computer security investigations (including any associated limitations and constraints)
Professional, social, ethical and legal issues associated with computer security investigations
Intellectual Skills
Students will apply knowledge and understanding to:
1. Systematically identify and analyse complex problems and offer appropriate strategic solutions using a range of effective methods and tools
2. Critically examine, evaluate, apply and discuss the philosophies, techniques, tools, and methods relevant to the use of computer security
technologies in a range of applications and domains
3. Interpret, evaluate, and synthesise information and data from a variety of sources, using evidence based criteria to discriminate between what
is essential, and what is unnecessary
4. Reflect on the professional, ethical and legal issues surrounding the development and use of computer security technologies
5. Critically examine and evaluate ways of defining, promoting, controlling and validating the attainment of quality in the field of computer security
technologies
6. Appreciate and reflect on how research is advanced through scholarship
7. Identify, plan and execute a significant individual project, conducting independent research, applying originality of thought, via established skills
and techniques in project management and research methodologies
Practical Skills
Students will be able to:
1. Apply a range of techniques, tools and knowledge to complex computer security investigations in a variety of situations
2. Use appropriate techniques, tools and knowledge to support effective management of computer security investigations
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 27 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
3. Apply theories and principles of computer security investigations in a business or industrial environment
4. Use a rigorous, scientific approach to the search, selection, evaluation and application of information to support research
Transferable/Key Skills
Students will be able to:
1.
2.
3.
4.
5.
6.
7.
8.
Learn independently, enhance existing skills, develop new skills, sustain their own professional development
Exhibit a systematic approach to problem solving and decision making in complex and unpredictable situations
Effectively communicate information, ideas, arguments, problems and solutions to specialists and non-specialists
Demonstrate a flexible outlook, using listening and negotiating skills, knowledge and understanding to enthuse their peers
Display initiative, responsibility, enterprise, acting autonomously in planning and implementing tasks at a professional level
Manage their time, learning and resources in an efficient and professional manner
Engage in critical self-appraisal of their own learning experience, personal strengths, limitations and performance
Demonstrate research skills at an appropriately advanced and scholarly level
An unclassified degree or lower level qualification may also be awarded where a students has not met all learning outcomes.
9.
Professional status (100 words maximum) Please provide a statement on the professional status of the programme for students graduating in the
current academic year, noting the following extract from guidance from the Higher Education Better Regulation Group (HEBRG)2 for the collection of
data for the KIS:
The outcome of a successful programme accreditation by a PSRB may include one or more of the following:
1.
2.
3.
4.
5.
Graduates are able to practise as a professional in a specific field, and in some cases receive a licence to practise that is required by law;
Graduates are granted chartered status;
Graduates are granted exemption from all or part of professional exams;
Graduates are eligible for entry to membership of a professional association or learned society;
The programme is confirmed as meeting externally designated standards and quality.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 28 of 29
NORTHUMBRIA UNIVERSITY
UNDERGRADUATE PROGRAMME SPECIFICATION
If not applicable, this section should be left blank and a default statement will appear on the HEAR.
The professional requirements of the computer security practitioner will be incorporated throughout the module syllabus on this programme, and it is
anticipated (that as part of the summative assessment process), this course will contribute to the CEH (Certified Ethical Hacking) certification, it may
also contribute to the prestigious CISSP (Certified Information System Security Professional) certification.
Programme Specification, BSc (Hons) Ethical Hacking for Computer Security
Page 29 of 29
Download