Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
course_handbook-oldcourse/chb.yml
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
196 lines (173 sloc)
9.4 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
school: Computing, Electronics and Mathematics | |
course_title: Ethical Hacking and Cybersecurity | |
award: BSc/MSci | |
years: 2021/2022 | |
authors: | |
- name: Daniel Goldsmith | |
role: Course Director | |
- name: Ian Cornelius | |
role: Assistant Course Director | |
- name: Terry Richards | |
role: First-Year Tutor | |
studying: | | |
With high profile incidents like the WannaCry and Petya ransomware attacks making headlines in 2017, there is an increasing demand for highly trained individuals who can advise businesses and organisations, government and law enforcement agencies alike on the best ways to protect their computer networks and the valuable, commercially sensitive information stored within them. | |
The specialist skills and knowledge to thoroughly test the security of computer systems, make them secure and investigate properly if they are compromised are not typically taught within a standard computer science course. In order to create graduates with the right mix of skills for the cybersecurity industry, this course has been developed to provide a good practical and theoretical understanding of cybersecurity, hacking, digital forensics and the underlying computer science. | |
aims: | | |
Graduates of the Ethical Hacking and Cyber Security course will: | |
- have a clearly targeted and developed set of skills in computer | |
science with special emphasis on security, | |
- an understanding of the threats posed to modern information | |
structures and will be able to apply defences against such threats, | |
- be able to devise methods of testing a systems security and | |
possess the skills needed to break into systems that have | |
vulnerabilities, | |
- be able to advise a company on how to set up secure systems and | |
- have had the opportunity to take part in a placement year in | |
industry or overseas. | |
The skills base of this course generally resides within the body of knowledge defined by the QAA Computing benchmark statement. As well as the technical foci, the courses all contain content that prepares students in social, ethical, legal and professional aspects of a cooperative human environment such as the workplace. | |
The MSci Award extends the course learning of the Bachelors programme into more advanced topics from cyber security while also allowing students to investigate areas at the forefront of computer science research and industry. In particular, the 4th year project module will extend the research skills of the MSci students by asking them to work on research projects associated with researchers in the department. This open-ended and deep learning characterises much of the 4th year of the course. | |
l4modules: | |
- code: 4059CEM | |
title: Legal and Ethical Foundations in Cyber Security | |
credits: 10 | |
- code: 4060CEM | |
title: Digital Forensics Fundamentals | |
credits: 10 | |
- code: 4061CEM | |
title: Programming and Algorithms 1 | |
credits: 30 | |
- code: 4056CEM | |
title: Introduction to Web Development and Database Systems | |
credits: 10 | |
- code: 4062CEM | |
title: Skills Development 1 | |
credits: 0 | |
- code: 4064CEM | |
title: Foundations of Cyber Security | |
credits: 20 | |
- code: 4065CEM | |
title: Computer Systems and Networks | |
credits: 20 | |
- code: 4063CEM | |
title: The Security Professional | |
credits: 10 | |
l5modules: | |
- code: 5062CEM | |
title: Programming and Algorithms 2 | |
credits: 20 | |
- code: 5063CEM | |
title: Practical Pen-Testing | |
credits: 20 | |
- code: 5064CEM | |
title: Networking | |
credits: 20 | |
- code: 5065CEM | |
title: Applied Forensics | |
credits: 10 | |
- code: 5066CEM | |
title: Skills Development 2 | |
credits: 0 | |
- code: 5067CEM | |
title: Web Security | |
credits: 10 | |
- code: 5068CEM | |
title: Platforms and Operating Systems | |
credits: 20 | |
- code: 5069CEM | |
title: Cyber Security Careers | |
credits: 10 | |
l6modules: | |
- code: 6050CEM | |
title: Security Audit and Monitoring | |
credits: 10 | |
- code: 6049CEM | |
title: Managing Red Teams and Pen-Tests | |
credits: 10 | |
- code: 6053CEM | |
title: Skills Development 3 | |
credits: 0 | |
- code: 6051CEM | |
title: Practical Cryptography | |
credits: 10 | |
- code: 6052CEM | |
title: Reverse Engineering | |
credits: 20 | |
- code: 6054CEM | |
title: Security Management | |
credits: 10 | |
- code: 6048CEM | |
title: Exploit Development | |
credits: 20 | |
- code: 6047CEM | |
title: Cyber Security Project | |
credits: 30 | |
l7modules: | |
- code: 7033CEM | |
title: Digital Security Risk and Audit Management | |
credits: 15 | |
- code: 7031CEM | |
title: Cryptography | |
credits: 15 | |
- code: 7026CEM | |
title: Security of Emerging Connected Systems | |
credits: 15 | |
- code: 7010CEM | |
title: Automotive Cyber Security | |
credits: 15 | |
- code: 7098CEM | |
title: Cyber Security Research Project | |
credits: 30 | |
- code: 7014CEM | |
title: Artificial Neural Networks | |
credits: 15 | |
- code: 7032CEM | |
title: Secure Design and Development | |
credits: 15 | |
clos: | |
- Systems - have a broad and deep understanding of the functioning of common software, platforms and systems, with the ability to build and secure such systems as well as analyse and reverse engineer their function and develop exploits for their flaws. | |
- Programming - create working solutions to a variety of computational and real world problems using an appropriate programming language (or languages) for the task. | |
- Computer Architectures - understand the underlying architecture that supports the modern computer, including both traditional operating systems and modern internet based infrastructure. | |
- Secure Systems, Development and Code Review - be able to create software and systems that use appropriate tools, techniques, standards and best practices in order to minimise the chance of exploitable errors, and be able to analyse third-party code to determine level of risk. | |
- Penetration Testing - using a range of tools, from simple and general-purpose tools such as nmap and netcat, to specialist tools such as OpenVas or Metasploit, perform penetration tests on systems and networks with good coverage and professional reporting. | |
- Professional Practice - understand professional practices of the modern cyber security and wider IT industry, including technical (e.g. version control / automated testing) but also social, ethical & legal responsibilities. | |
- Transferable Skills - apply a wide variety of degree level transferable skills including time management, team working, written and verbal presentation to both experts and non-experts, and critical reflection on own and others work. | |
- Advanced Work - apply the above to advanced topics selected according to the interests of individual students or module themes. | |
- Cutting-Edge Topics in Cyber Security - Apply advanced topics from research, such as formal methods and artificial neural networks to topics in cyber security. (Level 7) | |
- Cyber Security in Embedded, Automotive and Industrial Settings - apply general cyber security principals to specific domains and understand the specific needs of those domains as well as the tools and techniques peculiar to them, including protocols, methodologies, legal aspects and so on. (Level 7) | |
- Theoretical Aspects of Cyber Security - assess the inner workings of tools and algorithms, and demonstrating the ability to apply that knowledge in tasks such as cryptanlysis. (Level 7) | |
- Higher-Level Transferable Skills - apply a wide range of postgraduate level transferable skills in project design, data analysis, science communication, critical evaluation (of own and others work) and problem solving. (Level 7) | |
progression: | |
- To progress from Level 4 to Level 5 students must obtain at least 110 of the 120 available credits and successfully pass the module Skills Development 1. | |
- To progress from Level 5 to professional training (5012CEM), students will be required to have gained 110 credits at Level 5 and passed the Skills Development 2 module. | |
- To progress from Level 5 to Level 6 students must obtain at least 110 of the 120 available credits and pass the module Skills Development 2. | |
- To progress from Level 6 onto Level 7 (and thus change degree from BSc to MSci) students must request to transfer to the MSci if they entered on the BSc; obtain an average module grade of 60% or more at Level 6; and obtain a mark of at least 60% on their project (module 6047CEM). | |
- Students who entered on the MSci but do not satisfy the progression criteria are awarded the BSc degree. | |
awards: | |
- level: MSci. | |
reqs: | |
- Achievement of 480 CATS credits at levels 4, 5, 6 and 7. | |
- A pass in all of the mandatory modules in the programme of study for the named award. The level 7 research project must be included in the calculation of the class of award. | |
- level: BSc. Honours | |
reqs: | |
- Achievement of 360 CATS credits at Levels 4, 5 and 6. | |
- A pass in all of the mandatory modules in the recommended programme of study for the named award. The level 6 project module must be included in the calculation of the class of award for all Honours Degree awards | |
lsc: | |
name: Karim Ahmed | |
email: ad2607@coventry.ac.uk | |
lsts: | |
- name: Dorothea Kondrat | |
email: aa0224@coventry.ac.uk | |
- name: Simon Billings | |
email: ab9160@coventry.ac.uk | |
- name: Amanda Brooks | |
email: ab3728@coventry.ac.uk | |
- name: Arfan Ghani | |
email: ac4418@coventry.ac.uk | |
ee: | |
name: Jeanette Chin | |
institution: University of East Anglia | |
registry: | |
email: CEM.FacultyRegistry.ec@coventry.ac.uk | |
# LocalWords: Antal Goldschmidt ee lsts Kondrat uk coventry Arfan | |
# LocalWords: Ghani aa Karim lsc reqs BSc CEM cryptanlysis netcat | |
# LocalWords: clos |