88
Issue 2.1 22 July 2021 Certification of Postgraduate Master’s Degrees in Cyber Security Application Template Certification of Master’s Degrees in Computer Science for Cyber Security This document provides an application template for an HEI to have its Master’s degree in Computer Science for Cyber Security considered for certification. It is an HEI’s sole responsibility to ensure that its application is compliant and provides the information required. Every application must be submitted on a separate template. Multiple applications on the same template will not be accepted. Applications that do not use the template will not be considered for assessment . Please feel free to delete this page from your completed application. © Crown Copyright 2021, The National Cyber Security Centre Page 1 of 88

Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Certification of Postgraduate Master’s Degrees in Cyber Security

Application Template

Certification of Master’s Degrees in Computer Science for Cyber Security

This document provides an application template for an HEI to have its Master’s degree in Computer Science for Cyber Security considered for certification. It is an HEI’s sole responsibility to ensure that its application is compliant and provides

the information required.

Every application must be submitted on a separate template. Multiple applications on the same template will not be accepted.

Applications that do not use the template will not be considered for assessment.

Please feel free to delete this page from your completed application.

© Crown Copyright 2021, The National Cyber Security Centre

Page 1 of 72

Page 2: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Instructions on how to use the template1. Text in purple describes what is required in each section of the application.

The places in the template where applicants have to insert text, tables and figures are denoted by ‘<<< … >>>’

Please do not delete the text in purple. It does not contribute to an application’s page count.

2. Text, table entries and figures in brown are provided to help guide applicants on what may be an appropriate response to some sections of the application and are provided by way of example only. They should be deleted from the completed application.

3. Text in red describes the criteria for a section as well as providing a grading framework for assessors.

Please do not delete the text in red. It does not contribute to an application’s page count.

4. A black font colour should be used for applications with a minimum font size of 10pt. However, it is recognised that to help fit some tables into the space available the text in some tables can be made smaller than 10pt, but no smaller than 8pt.

5. To help assessors with their assessment of applications, all applications should have a table of contents and make use of headers, footers and hyperlinks.

6. CVs, Table 4.3, module descriptions, assessment materials, external examiners’ reports (full certifications only), response to external examiners (full certifications only), and information on dissertations (full certifications only) should be included in the word template as Appendices A to F.

7. Anonymised copies of dissertations (full certification only) should be submitted as three separate PDF files.

Document HistoryIssue Date Comment

Issue 1.0 25 June 2020 First issue of application template for general Master’s degreesIssue 1.1 21 July 2020 Additional clarification of Indicative Material in Section 3.3b. Minor

updates to example tables 3.2b, 3.2c, 3.3 and 4.1. Minor updates to appendices B and C. Minor typos fixed.

Issue 2.0 23 June 2021 Second issue.Issue 2.1 22 July 2021 Minor updates to second issue. Table 3.1, update to text regarding

single credit and hours of notional learning. Section 3.3, additional text added to include Master’s delivered by distance learning. Section 4.1.1, additional criterion (ii) introduced.

Please feel free to delete this page from your completed application.

Page 2 of 72

Page 3: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Key Changes from Issue 1.0 of Template dated 22 July 2020Section Change

Overall applications must now be submitted using the template

Throughout document text in purple describes what is required in each section of the application the places in the template where applicants have to provide text are denoted by ‘<<<

APPLICANTS … >>>’

Throughout document text in brown is to help guide applicants on what may be an appropriate response to some sections of the application and is provided by way of example only

Throughout document text in red describes the criteria and provides a grading framework for assessors assessors make comments directly into the template

Section 2.3.1 new section requiring applicants to map the team’s knowledge and expertise to CyBOK

Section 2.4 new section requiring applicants to describe the team’s operating model

Section 2.7 section on review and update process has been updated

Section 2.8 section on facilities has been updated

Sections 3 and 4 the original Section 3 has been split into two: new Section 3 covering high level description of the Master’s; new Section 4 covering the taught component of the Master’s degree

Section 3 is now more table based with applicants required to complete entries in tables

Section 4.3.1 Table 4.3 (previously 3.3) showing detailed coverage of Subject Areas to be placed in Appendix B

Section 4.3.2 new section requiring applicants to provide a summary table of the credit allocation across the Subject Areas

Section 5.1 requires description of assessment types being used on taught modules

Section 5.4 new table (Table 5.1) to be completed covering rigour of assessments

Section 5.6 new section covering the process for setting assessments

Section 5.7 new section covering the process for marking assessments

Section 5.8 new section covering plagiarism

Please feel free to delete this page from your completed application.

Page 3 of 72

Page 4: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Key Changes from Issue 1.0 of Template dated 22 July 2020 (continued)Section Change

Section 5.10 section dealing with external examiners’ reports has been updated

Section 6 renamed ‘Research Dissertations’ rather than ‘Original Research Dissertations’

Section 6.1 new section covering the timeline for research dissertations

Section 6.2 new section covering the governance of the research dissertation process

Section 6.4 new section covering allocation of students to supervisors

Section 6.5 new section covering legal and ethical issues in dissertations

Section 6.7 new section covering plagiarism

Section 6.10 dissertations must now be supplied as three separate PDF files

Section 7.1 entry data required for UK and non-UK students only entry data required for students with 2/2 or above in STEM, relevant experience or

demonstration of aptitude criteria updated

Section 7.2 criteria updated

Appendix A staff CVs (as previous issue)

Appendix B Table 4.3, credit allocation across the Subject Areas

Appendix C module descriptions

Appendix D assessment materials

Appendix E external examiners’ reports

Appendix F information on dissertations

Please feel free to delete this page from your completed application.

Page 4 of 72

Page 5: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

University of X

Application for Provisional/Full1 Certification of a Master’s Degree in Computer Science for Cyber Security

1 Please delete as appropriate.Page 5 of 72

Page 6: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Table of contents1. Institution’s Letter of Support............................................................................................................................................11

1.1 Signed letter of support for both full and provisional applications...........................................................................11

1.2 For provisional applications......................................................................................................................................11

1.3 Assessment criteria...................................................................................................................................................11

2. Description of the Applicant..............................................................................................................................................12

2.1 Organisational structure............................................................................................................................................12

2.1.1 Assessment criteria...............................................................................................................................................12

2.2 Team structure..........................................................................................................................................................12

2.2.1 Assessment criteria...............................................................................................................................................14

2.3 Team knowledge and expertise in cyber security......................................................................................................15

2.3.1 Mapping of team to CyBOK...................................................................................................................................15

2.3.2 Staff CVs................................................................................................................................................................17

2.3.3 Assessment criteria...............................................................................................................................................17

2.4 Team operation.........................................................................................................................................................17

2.4.1 Assessment criteria...............................................................................................................................................18

2.5 Recent investments...................................................................................................................................................18

2.5.1 Assessment criteria...............................................................................................................................................18

2.6 External linkages.......................................................................................................................................................19

2.6.1 Assessment criteria...............................................................................................................................................19

2.7 Review and update process.......................................................................................................................................19

2.7.1 Assessment criteria...............................................................................................................................................20

2.8 Facilities.................................................................................................................................................................... 20

2.8.1 Assessment criterion.............................................................................................................................................20

2.9 Overall assessment of section 2................................................................................................................................20

3. High Level Description of the Master’s Degree in Computer Science for Cyber Security...................................................21

3.1 Key characteristics of the Master’s...........................................................................................................................21

3.1.1 Assessment criteria...............................................................................................................................................21

3.2 Full and provisional certification applications...........................................................................................................22

3.2.1 Full applications....................................................................................................................................................22

3.2.2 Provisional applications........................................................................................................................................22

3.2.3 Assessment criterion.............................................................................................................................................22

3.3 Delivery of the degree...............................................................................................................................................22

3.3.1 Assessment criteria...............................................................................................................................................23

3.4 Aims of the Master’s degree.....................................................................................................................................23

3.4.1 Assessment criteria...............................................................................................................................................23

Page of

TABLE OF CONTENTS

Page 7: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

3.5 Overall assessment of section 3................................................................................................................................23

4. The Taught Component of the Master’s Degree in Computer Science for Cyber Security.................................................24

4.1 Compulsory and optional taught modules................................................................................................................24

4.1.1 Assessment criteria...............................................................................................................................................24

4.2 Number of taught credits that can be mapped to the Subject Areas........................................................................25

4.2.1 Compulsory modules............................................................................................................................................25

4.2.2 Optional modules..................................................................................................................................................25

4.2.3 Pathways...............................................................................................................................................................26

4.2.4 Assessment criteria...............................................................................................................................................26

4.3 Detailed coverage of Subject Areas...........................................................................................................................27

4.3.1 Completion of Table 4.3 in Appendix B.................................................................................................................27

4.3.2 Summary table of credit allocation across the Subject Areas...............................................................................28

4.3.3 Visual representation of credit allocation across the Subject Areas.....................................................................28

4.3.4 Assessment criteria...............................................................................................................................................30

4.4 Justification of Subject Area coverage.......................................................................................................................30

4.4.1 Assessment criteria...............................................................................................................................................30

4.5 Module descriptions..................................................................................................................................................30

4.5.1 Assessment criterion.............................................................................................................................................31

4.6 Professional knowledge and skills.............................................................................................................................31

4.6.1 Assessment criterion.............................................................................................................................................31

4.7 Overall assessment of section 4................................................................................................................................31

5. Assessment Materials........................................................................................................................................................32

5.1 Overall approach to assessment...............................................................................................................................32

5.1.1 Assessment criteria...............................................................................................................................................32

5.2 Marking scheme........................................................................................................................................................32

5.2.1 Assessment criterion.............................................................................................................................................32

5.3 Overall grade for the Master’s..................................................................................................................................32

5.3.1 Assessment criterion.............................................................................................................................................33

5.4 Rigour of assessment................................................................................................................................................33

5.4.1 Assessment criteria...............................................................................................................................................36

5.5 Justification of 40% pass mark..................................................................................................................................36

5.5.1 Assessment criterion.............................................................................................................................................36

5.6 Setting assessments..................................................................................................................................................36

5.6.1 Assessment criteria...............................................................................................................................................36

5.7 Marking assessments................................................................................................................................................37

5.7.1 Assessment criteria...............................................................................................................................................37

Page of

TABLE OF CONTENTS

Page 8: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

5.8 Detecting and dealing with plagiarism......................................................................................................................37

5.8.1 Assessment criterion.............................................................................................................................................37

5.9 Examination papers...................................................................................................................................................37

5.9.1 Provisional application..........................................................................................................................................37

5.9.2 Full application......................................................................................................................................................38

5.10 External examiners’ reports – full application only...................................................................................................38

5.10.1 Assessment criteria...........................................................................................................................................39

5.11 Overall assessment of section 5................................................................................................................................39

6. Research Dissertations.......................................................................................................................................................40

6.1 Timeline.................................................................................................................................................................... 40

6.1.1 Assessment criterion.............................................................................................................................................40

6.2 Governance of the research dissertation process.....................................................................................................40

6.2.1 Assessment criterion.............................................................................................................................................41

6.3 Guidance to students................................................................................................................................................41

6.3.1 Assessment criterion.............................................................................................................................................41

6.4 Identification of dissertation topics...........................................................................................................................41

6.4.1 Assessment criteria...............................................................................................................................................42

6.5 Allocation of students to supervisors........................................................................................................................42

6.5.1 Assessment criterion.............................................................................................................................................42

6.6 Legal and ethical issues.............................................................................................................................................42

6.6.1 Assessment criterion.............................................................................................................................................42

6.7 Monitoring of students’ progress..............................................................................................................................42

6.7.1 Assessment criterion.............................................................................................................................................42

6.8 Detecting and dealing with plagiarism......................................................................................................................43

6.8.1 Assessment criterion.............................................................................................................................................43

6.9 Research dissertations contributing fewer than 40 credits.......................................................................................43

6.9.1 Assessment criterion.............................................................................................................................................43

6.10 Assessment of dissertations......................................................................................................................................43

6.10.1 Assessment criterion........................................................................................................................................44

6.11 For full certification only...........................................................................................................................................44

6.11.1 List of dissertation topics..................................................................................................................................44

6.11.2 Example dissertations.......................................................................................................................................45

6.12 Overall assessment of section 6................................................................................................................................46

7. Student Numbers and Grades Achieved – Applications for Full Certification Only............................................................47

7.1 Student entry data....................................................................................................................................................47

7.1.1 Assessment criteria...............................................................................................................................................48

Page of

TABLE OF CONTENTS

Page 9: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

7.2 Student exit data.......................................................................................................................................................50

7.2.1 Assessment criteria...............................................................................................................................................50

7.3 Student satisfaction...................................................................................................................................................51

7.3.1 Assessment criteria...............................................................................................................................................51

7.4 Overall assessment of section 7................................................................................................................................52

8. Appendix A: Staff CVs (Appendix to Section 2 of Application)...........................................................................................53

8.1 CV for Dr E. F.............................................................................................................................................................53

8.1.1 Personal statement of experience and expertise in computer science and/or cyber security..............................53

8.1.2 Academic background...........................................................................................................................................53

8.1.3 Professional employment.....................................................................................................................................53

8.1.4 Contribution to computer science and/or cyber security at the University of X...................................................53

8.1.5 Esteem indicators.................................................................................................................................................53

8.1.6 Computer science and/or cyber security knowledge and expertise indicators.....................................................53

8.1.7 Any other information..........................................................................................................................................53

8.2 CV for Dr G. H............................................................................................................................................................54

8.2.1 Personal statement of experience and expertise in computer science and/or cyber security..............................54

8.2.2 Academic background...........................................................................................................................................54

8.2.3 Professional employment.....................................................................................................................................54

8.2.4 Contribution to computer science and/or cyber security at the University of X...................................................54

8.2.5 Esteem indicators.................................................................................................................................................54

8.2.6 Computer science and/or cyber security knowledge and expertise indicators.....................................................54

8.2.7 Any other information..........................................................................................................................................54

8.3 CV for I. J...................................................................................................................................................................55

8.3.1 Personal statement of experience and expertise in computer science and/or cyber security..............................55

8.3.2 Academic background...........................................................................................................................................55

8.3.3 Professional employment.....................................................................................................................................55

8.3.4 Contribution to computer science and/or cyber security at the University of X...................................................55

8.3.5 Esteem indicators.................................................................................................................................................55

8.3.6 Computer science and/or cyber security knowledge and expertise indicators.....................................................55

8.3.7 Any other information..........................................................................................................................................55

8.4 CV for K. L..................................................................................................................................................................56

8.4.1 Personal statement of experience and expertise in computer science and/or cyber security..............................56

8.4.2 Academic background...........................................................................................................................................56

8.4.3 Professional employment.....................................................................................................................................56

8.4.4 Contribution to computer science and/or cyber security at the University of X...................................................56

8.4.5 Esteem indicators.................................................................................................................................................56

Page of

TABLE OF CONTENTS

Page 10: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

8.4.6 Computer science and/or cyber security knowledge and expertise indicators.....................................................56

8.4.7 Any other information..........................................................................................................................................56

9. Appendix B: Table 4.3 – Credit Allocation Across the Subject Areas (Appendix to Section 4 of Application).....................57

10. Appendix C: Module Descriptions (Appendix to Section 4 of Application).........................................................................66

10.1 Security Fundamentals module.................................................................................................................................66

10.2 Secure Programming module....................................................................................................................................66

10.3 Low Level Programming module...............................................................................................................................66

10.4 Operating Systems module.......................................................................................................................................66

10.5 Network Security module..........................................................................................................................................66

10.6 Systems Programming module..................................................................................................................................66

10.7 Research Methods module.......................................................................................................................................66

10.8 Data Science module.................................................................................................................................................66

10.9 Hardware module.....................................................................................................................................................66

10.10 Machine Learning module.........................................................................................................................................67

10.11 Project Management module...................................................................................................................................67

11. Appendix D: Assessment materials (Appendix to section 5 of application).......................................................................68

11.1 Security Fundamentals assessments.........................................................................................................................68

11.2 Secure Programming assessments............................................................................................................................68

11.3 Low Level Programming assessments.......................................................................................................................68

11.4 Operating Systems assessments...............................................................................................................................68

11.5 Network Security assessments..................................................................................................................................68

11.6 Systems Programming assessments..........................................................................................................................68

11.7 Research Methods assessments................................................................................................................................68

11.8 Data Science assessments.........................................................................................................................................68

11.9 Hardware assessments..............................................................................................................................................68

11.10 Machine Learning assessments.................................................................................................................................68

11.11 Project Management assessments............................................................................................................................69

12. Appendix E: External Examiners’ Reports (Appendix to Section 5 of Application).............................................................70

12.1 External examiners’ reports......................................................................................................................................70

12.2 HEI’s response to external examiners’ reports..........................................................................................................70

13. Appendix F: Research Dissertations Information (Appendix to Section 6 of Application)..................................................71

13.1 Distinction dissertation information..........................................................................................................................71

13.2 Merit dissertation information..................................................................................................................................71

13.3 Pass dissertation information....................................................................................................................................71

Page of

TABLE OF CONTENTS

Page 11: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

1. Institution’s Letter of SupportUp to two sides of A4, excluding explanatory text and assessment criteria.

1.1 Signed letter of support for both full and provisional applicationsPlease provide a signed and dated letter from the Vice Chancellor (or equivalent) showing support for the HEI’s application to have a Master’s degree in Computer Science for Cyber Security considered for certification by the NCSC.

The letter of support is not graded but must be present. Its purpose is to show that the senior management of the HEI is fully supportive of the application.

Please note that a letter from the Head of Department submitting the application is not acceptable.

The letter should be viewed as an opportunity for the HEI’s senior management to:

demonstrate commitment to the Master’s programme specifically and cyber security more generally highlight recent HEI investment in the area and any future planned investment describe the importance of the area in the HEI’s future strategy, etc. outline how Covid-19 is impacting the HEI generally and the Master’s degree specifically along with the steps being

taken by the HEI to deal with the issues being raised

1.2 For provisional applicationsFor those Master’s degrees that have not yet started, it is important that the HEI confirms the start date for the Master’s degree and that the degree will start by (up to and including) October 2023.

For those Master’s degrees that meet the requirements for full certification to be applied for, but the HEI has only chosen to submit a provisional application, it is important that the HEI confirms both that choice and its reasons for doing so.

<<< APPLICANTS INSERT VC’s LETTER DIRECTLY BELOW >>>

1.3 Assessment criteriai. A letter of support from the Vice Chancellor or equivalent must be provided.

ii. If applicable, the Master’s will start by (up to and including) October 2023.iii. If applicable, a provisional application has been justified where a full application could have been made.

For Assessors onlyCriteria Achieved Not Achieved Unclear Not Applicable

i. ☐ ☐ ☐ii. ☐ ☐ ☐ ☐iii. ☐ ☐ ☐ ☐Comments (if applicable). <insert text here>

Page 11 of 72

INSTITUTION’S LETTER OF SUPPORT

Page 12: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

2. Description of the ApplicantUp to seven sides of A4, excluding explanatory text, assessment criteria, mapping of team to CyBOK and CVs.

2.1 Organisational structurePlease state the name of the lead group(s) / department(s) responsible for delivering the Master’s degree. Provide an organisational diagram (Figure 2.1) that shows where the lead(s) are situated within the overall structure of the HEI.

<<< APPLICANTS INSERT TEXT AND DIAGRAM DIRECTLY BELOW >>>

The text and figure in brown below are by way of example only.

The Department of Computing, drawing on the expertise of the Cyber Security Group, is responsible for delivering the Master’s. The Department of Computing is part of the Faculty of Science, Engineering and Mathematics.

Figure 2.1: HEI organisational structure.

2.1.1 Assessment criteriai. The lead group(s) / department(s) responsible for the Master’s appear(s) to be appropriate.

ii. The organisational structure must make it clear where the lead for the Master’s resides within the HEI.

For assessors onlyCriteria Achieved Not Achieved Unclear

i. ☐ ☐ ☐ii. ☐ ☐ ☐Comments (if applicable). <insert text here>

2.2 Team structurePlease complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for delivering the degree content, setting and marking examinations, supervising dissertations, etc. The relevant expertise column should highlight how staff members have the knowledge and experience to successfully carry out their responsibilities. It is highly recommended to provide hyperlinks to the staff CVs shown in Appendix A so that assessors can quickly cross check the information in Table 2.1 with the information provided in the CVs.

When there is a core team delivering the Master’s, it may be helpful to separate the core team from ‘associate’ members of the team.

Page 12 of 72

DESCRIPTION OF THE APPLICANT

Page 13: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

When a significant activity (e.g., delivery of a module) is undertaken by a third party, which is not directly employed by the HEI, the contractual relationship with the party should be made clear.

<<< APPLICANTS COMPLETE TABLE 2.1 BELOW AND SUPPLY ADDITIONAL TEXT IF APPLICABLE >>>

The text in brown is by way of example only.Name of Staff

MemberRole Responsibilities Relevant Expertise

CV for Dr E. F. Reader and Master’s Course Director

ensures overall coherence and quality of Master’s

delivers module on Cyber Security Fundamentals

delivers module on Research Methods oversees Master’s research projects

broad knowledge of cyber security as evidenced by publication record

successfully managed and delivered academic programmes over past 10 years

CV for Dr G. H.Error: Reference source not found

Senior Lecturer delivers Network Security module supervises research projects

keynote presenter at recent network security conferences

has successfully supervised 10 PhD students through to completion

CV for I. J. Lecturer delivers Secure Programming module supervises research projects

extensive experience of building mission-critical systems in industry

has successfully supervised 10 cyber security Master’s projects over the past 5 years

Other staff members

…. …. ….

CV for K. L. Error: Reference source not found

External consultant with 3-year contract October 2020 – September 2023

delivers Low-level Tools and Techniques module

supervises research projects in malware

works part time for anti-virus company

provides malware advice to government and industry

to date, has successfully supervised 6 Master’s projects on malware drawing on real-world problems

Table 2.1: The team responsible for delivering the Master’s.

All team members listed in Table 2.1 are part of the ‘core team’ for delivery of the Master’s. As noted in Table 2.1, K. L. is employed under a (second) three-year contract with the HEI to deliver the Low-level Tools and Techniques module, to set and mark assessments, and supervise students undertaking research projects in malware.

Page 13 of 72

DESCRIPTION OF THE APPLICANT

Page 14: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

2.2.1 Assessment criteriaiii. Team roles and responsibilities must be appropriate and clear.iv. If applicable, the separation between the core team and associate team must be clear.v. If applicable, the contractual relationship with third parties must be clear and appropriate.

For assessors onlyCriteria Achieved Not Achieved Unclear Not Applicable

iii. ☐ ☐ ☐iv. ☐ ☐ ☐ ☐v. ☐ ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

Page 14 of 72

DESCRIPTION OF THE APPLICANT

Page 15: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

2.3 Team knowledge and expertise in cyber security

2.3.1 Mapping of team to CyBOKPlease complete Table 2.2 that shows the expertise of the team as a whole mapped to CyBOK. Use colour coding to indicate an individual’s level of knowledge and expertise 2. Use ‘T’ to indicate that an individual teaches a module that includes a significant amount of a particular Knowledge Area. Use ‘S’ to indicate that an individual is able to supervise projects in this Knowledge Area. Please ensure that the name of every member of staff is hyperlinked to their CV.

Please note that for those team members whose areas of expertise are in computer science, their entries in Table 2.2 would be expected to primarily record ‘no knowledge’ or ‘basic awareness’.

<<< APPLICANTS COMPLETE TABLE 2.2 BELOW >>>

2 The colours used in Table 2.2 are based on palette 2 from https://medium.com/cafe-pixo/inclusive-color-palettes-for-the-web-bbfe8cf2410e. However, applicants can use any suitable colour-blind friendly palette they think appropriate.

Page 15 of 72

DESCRIPTION OF THE APPLICANT

Page 16: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

The entries in the table are by way of example only.

StaffKnowledge Areas

INT RMG HF POR LR MAL ADV FOR SOIM CRY OS DSS FMS AAA SS WM SSL NS HWS ACRY CPS PL

Error: Reference source not found

T

CV for Dr G. H.Error: Reference source not found

S S S T S S

CV for I. J. Error: Reference source not found

S S T S T S

Error: Reference source not found…

CV for K. L. T S

Key Description

Page 16 of 72

DESCRIPTION OF THE APPLICANT

Page 17: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

#BDD9BF No Knowledge

#929084 Basic Awareness

#FFCF57 Good Knowledge. For example, able to teach material from this KA and supervise Master’s students.

#A997DF Expert. For example, publishes research in the field and/or advises government, industry, academia on the KA.

Table 2.2: Expertise of team mapped to CyBOK.

Page 17 of 72

DESCRIPTION OF THE APPLICANT

Page 18: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

2.3.2 Staff CVsFor every member of staff named in Table 2.1, please provide a tailored CV (up to 2 sides of A4 in length). This should contain:

a personal statement of experience and expertise in computer science and/or cyber security using the CyBOK KAs3 as a framework for the cyber security element

details of academic background details of computer science and/or cyber-security related employment contribution to computer science and/or cyber security at the HEI computer science and/or cyber-security related and other esteem indicators – e.g., editorships, invited talks,

membership of national and international advisory groups computer science and/or cyber-security knowledge and expertise indicators, such as recent publications, work with

industry/government, research activities any other information that might be relevant in demonstrating computer science and/or cyber security expertise

CVs should be placed in Appendix A.

<<< APPLICANTS INSERT TEXT AND LINK TO CVs DIRECTLY BELOW >>>

By way of example only. Please see Appendix A: Staff CVs (Appendix to Section 2 of Application)

2.3.3 Assessment criteriavi. The CVs must show that staff members have the relevant expertise to carry out their roles and responsibilities

shown in Table 2.1.vii. The levels of knowledge and expertise shown in Table 2.2 must be consistent with the CVs.

For assessors onlyCriteria Achieved Not Achieved Unclear

vi. ☐ ☐ ☐vii. ☐ ☐ ☐Comments (if applicable). <insert text here>

2.4 Team operationPlease describe the operating model adopted by the team for the successful delivery of the Master’s. As a minimum, this should include:

team meetings: for example, the chair, regularity, standing agenda items, tracking actions, etc. team communication allocation of workload across staff members progress monitoring of teaching and research dissertations planning assessments and liaising with external examiners planning marking of dissertations and liaising with external examiners dealing with issues raised by students dealing with urgent and important events that affect the delivery of the Master’s such as Covid-19, staff sickness or

staff departures

<<< APPLICANTS INSERT TEXT DIRECTLY BELOW >>>

3 https://www.cybok.org

Page 18 of 72

DESCRIPTION OF THE APPLICANT

Page 19: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

2.4.1 Assessment criteriaviii. It must be clear that the team operates effectively as a cohesive unit.

ix. It must be clear that the team has a process in place to deal with urgent and important events.

For assessors onlyCriteria Achieved Not Achieved Unclear

viii. ☐ ☐ ☐ix. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

2.5 Recent investmentsPlease complete Table 2.3 that shows recent investments from the HEI, government, industry etc. in the groups running the Master’s degree programme. Please highlight the benefits to the academic team delivering the Master’s as well as students undertaking the Master’s.

<<< APPLICANTS COMPLETE TABLE 2.3 BELOW >>>

The text in brown is by way of example only.Value of

InvestmentSource of

InvestmentFinancial Year Nature of Investment Benefit to Academic

TeamBenefit to Master’s

Programme

£50K HEI 2019 - 2020 Refurbishment of Cyber Security Group’s forensics laboratory including equipment and software.

Improved facilities for research and teaching.

Master’s students use the upgraded forensics laboratory.

£100K Manufacturer X 2018 – 20192019 - 2020

Networking equipment to Department of Computing for Department’s networking laboratory.

Improved facilities for research and teaching.

Master’s students use upgraded networking laboratory.

£200K HEI 2018 – 2019 New PCs, laptops and peripherals to Department of Computing.

Master’s students have access to more modern devices.

£20K HEI 2017 - 2018 Members of staff in Cyber Security Group able to gain professional cyber security qualifications (e.g., pen tester, risk analyst, etc.).

Improved knowledge and expertise of staff members.

Master’s students benefit from being taught by staff with recognised industry qualifications.

Table 2.3: Recent investments.

2.5.1 Assessment criteriax. It must be clear that the academic team responsible for the Master’s has benefitted from recent investments.

xi. It must be clear that the Master’s programme has also benefitted from investments.

For assessors onlyCriteria Achieved Not Achieved Unclear

x. ☐ ☐ ☐xi. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

Page 19 of 72

DESCRIPTION OF THE APPLICANT

Page 20: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

2.6 External linkagesPlease complete Table 2.4 that shows external linkages benefitting the academic team and the Master’s programme. For example, visiting lecturers with specialist knowledge from other academic departments, government or industry; projects suggested, and monitored, by industry; etc.

<<< APPLICANTS COMPLETE TABLE 2.4 BELOW >>>

The text in brown is by way of example only.Nature of External Linkage Benefit to Academic Team Benefit to Master’s Programme

External Advisory Board. Meets twice yearly, membership from industry, government and academia. Membership has strong cyber security representation.

Provides advice on cyber security issues affecting external organisations, employment opportunities for graduates, and curriculum development.

Helps ensure Master’s is kept up to date and relevant.

Company X provides series of invited lectures on malware and suggests topics for research dissertations

Opportunity to network with external companies and gain insight into issues of concern to industry.

Master’s students provided with a set of interesting and relevant topics for their dissertations.

Company Y has donated equipment for joint projects

Opportunity to carry out collaborative research with industry.

Master’s students can make use of equipment in their research.

Membership of the CISSE UK network4. CISSE UK provides external speakers, course materials and cyber security challenges for students

Opportunity for academic staff to meet with colleagues in other universities and to develop ‘best practice’ educational materials.

Master’s students engage in cyber security challenges with students from other universities.

Table 2.4: External linkages.

2.6.1 Assessment criteriaxii. It must be clear that the team has a range of external linkages that adds value to the academic team.

xiii. It must be clear that the team has a range of external linkages that adds value to the Master’s.

For assessors onlyCriteria Achieved Not Achieved Unclear

xii. ☐ ☐ ☐xiii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

2.7 Review and update processPlease describe the process used to review and renew the course content to keep it up to date. As a minimum, this should include:

how often are changes to the Master’s considered who is involved in the decision-making process what inputs are considered: e.g., input from academic staff, student feedback, industrial advisory group input,

industrial trends, government strategy, etc what criteria are used to evaluate potential changes who is responsible for signing off changes

<<< APPLICANTS INSERT TEXT BELOW >>>

4 https://cisseuk.org/

Page 20 of 72

DESCRIPTION OF THE APPLICANT

Page 21: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

2.7.1 Assessment criteriaxiv. There must be a clear and appropriate process for reviewing and updating the Master’s programme.xv. The frequency of reviewing and updating must be appropriate to ensure that the Master’s is kept up to date and

relevant.

For assessors onlyCriteria Achieved Not Achieved Unclear

xiv. ☐ ☐ ☐xv. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

2.8 FacilitiesPlease describe the facilities available to students undertaking the Master’s degree. For each facility, please include a brief justification that it is of sufficient quality and quantity to meet the needs of Master’s students. As a minimum please include:

computer laboratories dedicated equipment and software library on-line journal subscriptions for research dissertations

<<< APPLICANTS INSERT TEXT BELOW >>>

2.8.1 Assessment criterionxvi. Students undertaking the Master’s should have access to a sufficient number of well-equipped modern computer

laboratories with easy access to information on the latest developments in computer science and cyber security.

For assessors onlyCriterion Achieved Not Achieved Unclear

xvi. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

2.9 Overall assessment of section 2For assessors only

Overall Grade Overall Comments

<assessors insert grade here> <if applicable, assessors insert text here>

Page 21 of 72

DESCRIPTION OF THE APPLICANT

Page 22: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

3. High Level Description of the Master’s Degree in Computer Science for Cyber SecurityUp to ten sides of A4, excluding explanatory text and assessment criteria.

3.1 Key characteristics of the Master’sPlease complete Table 3.1.

<<< APPLICANTS COMPLETE TABLE 3.1 BELOW >>>

The text in brown is by way of example only.Confirm that degree meets the characteristics of a Category 2, Specialised or Advanced Study Master’s5

Yes ☒ No ☐

Confirm that the degree is not categorised as a Master’s by Research or Integrated Master’s6

Yes ☒ No ☐

Confirm that one credit is equal to 10 hours of notional learning7 by a student

Yes ☒ No ☐

Name of degree Master’s in Computer Science for Cyber Security

Degree awarded MSc

Total number of credits required for Master’s. If different from 180, please provide brief justification.

180

Number of taught credits. If different from 120, please provide brief justification.

120

Number of credits for research dissertation. If more than 80, please justify that there are a sufficient number of credits to cover the taught content.

60

Provisional or Full certification being applied for.

Provisional ☒ Full ☐

Table 3.1: High level characteristics of the Master’s.

3.1.1 Assessment criteriai. Confirmation that the Master’s is classified as a Category 2 Master’s.

ii. Confirmation that the Master’s is not an Integrated Master’s or Master’s by Research.iii. One credit must equate to a nominal 10 hours of work by a student.iv. Where the total number of credits is different from 180 this must be justified.v. Where the number of taught credits is different from 120 this must be justified.

vi. If the number of credits associated with the research dissertation is more than 80 then the applicant will need to justify that there are still a sufficient number of credits in the taught modules of the degree to cover the CyBOK Knowledge Areas in sufficient breadth and depth.

vii. It must be clear whether full or provisional certification is being applied for.

5 https://www.qaa.ac.uk/docs/qaa/quality-code/master's-degree-characteristics-statement8019abbe03dc611ba4caff140043ed24.pdf?sfvrsn=86c5ca81_12, page 56 Master’s by Research (MRes) and Integrated Master’s are both out of scope for this certification.7 https://www.qaa.ac.uk/docs/qaa/quality-code/higher-education-credit-framework-for-england.pdf

Page 22 of 72

HIGH LEVEL DESCRIPTION OF THE MASTER’S DEGREE

Page 23: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

For assessors onlyCriteria Achieved Not Achieved Unclear Not Applicable

i. ☐ ☐ ☐ii. ☐ ☐ ☐iii. ☐ ☐ ☐iv. ☐ ☐ ☐ ☐v. ☐ ☐ ☐ ☐vi. ☐ ☐ ☐ ☐vii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

3.2 Full and provisional certification applicationsPlease complete either section 3.2.1 or section 3.2.2.

3.2.1 Full applications<<< APPLICANTS COMPLETE TABLE 3.2a BELOW >>>

Confirm that the degree had a cohort of students successfully complete the degree in academic year 2020 – 2021.

Yes ☐ No ☐

Confirm that the Master’s is running in academic year 2021 – 2022. Yes ☐ No ☐

Table 3.2a: Full certification application.

3.2.1.1 Assessment criterionviii. The degree must have had a cohort of students successfully complete the degree in academic year 2020 – 2021 and

it must be currently running in academic year 2021 – 2022.

For assessors onlyCriterion Achieved Not Achieved Unclear

viii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

3.2.2 Provisional applications<<< APPLICANTS COMPLETE TABLE 3.2b BELOW >>>

If applicable, confirm that if the Master’s degree has not yet started it will start by (up to and including) October 2023.

Yes ☐ No: ☐ Not applicable ☐

Table 3.2b: Provisional certification application.

3.2.3 Assessment criterionix. Master’s degrees that have not yet started must start by (up to and including) October 2023.

For assessors onlyCriterion Achieved Not Achieved Unclear Not Applicable

ix. ☐ ☐ ☐ ☐

3.3 Delivery of the degreePlease state the UK campus(es) responsible for delivering the Master’s, including those Master’s degrees delivered by distance learning.

Please describe the use of online learning, particularly in relation to Covid-19.

Page 23 of 72

HIGH LEVEL DESCRIPTION OF THE MASTER’S DEGREE

Page 24: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

If applicable, please state whether the degree is offered on a part-time basis and provide a description of how the degree is structured to accommodate part-time students.

<<< APPLICANTS INSERT TEXT BELOW >>>

3.3.1 Assessment criteriax. It must be clear which UK campus(es) is/are responsible for delivering the Master’s.

xi. It should be clear that on-line learning is being used effectively, in particular for dealing with Covid-19.xii. If offered as a part-time Master’s, part-time students should cover the same breadth and depth of content as one-

year, full time students.

For assessors onlyCriteria Achieved Not Achieved Unclear Not Applicable

x. ☐ ☐ ☐xi. ☐ ☐ ☐xii. ☐ ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

3.4 Aims of the Master’s degreePlease provide a description of the overall aims of the degree, in particular how the degree provides students with a foundation in the computer science underpinning cyber security.

Please describe how the Master’s is of value to students, employers and the academic community.

<<< APPLICANTS INSERT TEXT BELOW >>>

3.4.1 Assessment criteriaxiii. The overall aims of the degree must be clearly articulated, coherent and appropriate for a Master’s in computer

science for cyber security.xiv. The Master’s must be of value to students, employers, and the academic community.

For assessors onlyCriteria Achieved Not Achieved Unclear

xiii ☐ ☐ ☐xiv ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

3.5 Overall assessment of section 3For assessors only

Overall Grade Overall Comments

<assessors insert grade here> <if applicable, assessors insert text here>

Page 24 of 72

HIGH LEVEL DESCRIPTION OF THE MASTER’S DEGREE

Page 25: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

4. The Taught Component of the Master’s Degree in Computer Science for Cyber SecurityUp to fifteen sides of A4, excluding explanatory text, assessment criteria, Table 4.3 and module descriptions.

4.1 Compulsory and optional taught modulesPlease complete Table 4.1a and Table 4.1b showing the number of credits associated with compulsory and optional taught modules (if applicable).

Please do not include credits belonging to the research project and dissertation in the tables.

To help assessors, please use short meaningful names (e.g., NetSec) rather than course codes (e.g., XYZ123) for module names.

<<< APPLICANTS COMPLETE TABLES 4.1a and 4.1b BELOW >>>

The text in brown is by way of example only.Name of compulsory module Member(s) of staff delivering module Number of credits

SecFund J. K. 15

SecProg L. M. 15

LowLevelProg N. O. 15

OpSys P. Q. 15

NetSec R. S. 15

SysProg T. U. 15

ResMethods V. W. 15

Total number of compulsory credits

105

Table 4.1a: Compulsory taught modules.

The text in brown is by way of example only.Name of optional module Member(s) of staff delivering module Number of credits

DataSci A. B. 15

Hardware C. D. 15

MachLearn E. F. 15

ProjMgt G. H. 15

Total number of optional credits required to be taken

15

Table 4.1b: Optional taught modules.

4.1.1 Assessment criteriai. The overall structure of the taught component of the degree must be clear: namely, the set of taught modules,

which modules are compulsory and which are optional, and the number of credits awarded for each module.ii. The members of staff delivering the taught modules must be clearly identified and listed in section 2.

For assessors onlyCriteria Achieved Not Achieved Unclear

i. ☐ ☐ ☐ii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

Page 25 of 72

TAUGHT COMPONENT OF THE MASTER’S DEGREE

Page 26: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

4.2 Number of taught credits that can be mapped to the Subject AreasNote:

In the fictitious entries in Table 4.2a, it is worth noting that 5 credits have been mapped to the Subject Areas for the Research Methods module. In this fictitious example, every student has to produce a research paper that forms the basis of their dissertation. Although it is not known in advance onto which Subject Area(s) a paper might map, it will map onto one or more Subject Areas. This is deemed to be an acceptable approach for Research Methods style modules when counting the number of taught credits that can be mapped to the Subject Areas.

4.2.1 Compulsory modules. Please complete Table 4.2a that shows for each compulsory taught module:

to which Subject Area(s) the module can be mapped – if it does not map to a Subject Area please state NONE the number of credits in the module the number of credits in the module that can be considered to be addressing the Subject Area(s)

Please ensure that hyperlinks to the module descriptions are provided.

<<< APPLICANTS COMPLETE TABLE 4.2a BELOW >>>

The text in brown is by way of example only.Name of compulsory

moduleSubject Area(s) addressed Number of credits

in moduleEstimated number

of credits in module addressing

Subject Area(s)

below Security Fundamentals 15 15

below Secure Programming 15 10

below Low Level Techniques and Tools 15 15

below Network Security 15 15

below Malware 15 15

below Systems Programming 15 10

below Potentially any Subject Area 15 5

Total number of compulsory module credits addressing Subject Areas

85

Table 4.2a: Compulsory taught modules addressing the Subject Areas.

4.2.2 Optional modulesIf applicable, please complete Table 4.2b that shows the same information as Table 4.2a for each optional taught module.

Please ensure that hyperlinks to the module descriptions are provided.

<<< APPLICANTS COMPLETE TABLE 4.2b BELOW IF APPLICABLE >>>

Page 26 of 72

TAUGHT COMPONENT OF THE MASTER’S DEGREE

Page 27: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

The text in brown is by way of example only.Name of optional module Subject Area(s) addressed Number of credits in

moduleEstimated number of

credits in module addressing Subject

Area(s)

below Security Fundamentals 15 5

below Embedded Systems 15 5

below Security Fundamentals 15 5

below NONE 15 0

Table 4.2b: Optional taught modules addressing the Subject Areas.

4.2.3 PathwaysIf applicable, please complete Table 4.2c that identifies the pathways that students could take through the degree. For each pathway, please provide an estimate of the total number of credits addressing the Subject Areas.

<<< APPLICANTS COMPLETE TABLE 4.2c BELOW IF APPLICABLE >>>

The text in brown is by way of example only.Pathway Optional modules included in

pathwayEstimated total number of credits in pathway

addressing Subject Areas (including compulsory and optional module credits)

Pathway 1 DataSci 90

Pathway 2 Hardware 90

Pathway 3 MachLearn 90

Pathway 4 ProjMgt 85

Table 4.2c: Pathways that students could take through the taught component of the Master’s that meet the requirement for a minimum of 84 taught credits that can be mapped to Subject Areas 1 to 7.

If the Master’s has a large number of flexible pathways, provide a description of which pathways through the Master’s meet the requirement for at least 84 taught credits that can be mapped to the Subject Areas.

<<< APPLICANTS INSERT TEXT HERE IF APPLICABLE >>>

4.2.4 Assessment criteriaiii. The credit allocation to the Subject Areas shown in Tables 4.2a, b must be appropriate and consistent with the

module descriptions.iv. The completed Tables 4.2a, b, c must show that there is at least one set of modules that students can choose in

which a minimum of 84 taught credits can be mapped to Subject Areas 1 to 7.v. If applicable, if a Master’s has several possible pathways that students could choose that meet the 84-credit

requirement then these pathways must be clearly identified.vi. If applicable, if a Master’s has a large number of possible pathways from which students can choose then the

pathways that meet the 84-credit requirement must be clearly identified.

For assessors onlyCriteria Achieved Not Achieved Unclear Not Applicable

iii. ☐ ☐ ☐Page 27 of 72

TAUGHT COMPONENT OF THE MASTER’S DEGREE

Page 28: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

iv. ☐ ☐ ☐v. ☐ ☐ ☐ ☐vi. ☐ ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

4.3 Detailed coverage of Subject Areas

4.3.1 Completion of Table 4.3 in Appendix BFor each pathway through the taught component of the degree, please complete below following the example rows provided.

<<< APPLICANTS COMPLETE TABLE 4.3 IN APPENDIX B >>>

Notes:

1. It is recognised that the number of credits assigned to a Subject Area is an estimate only. Overall, however, the credit allocation across the Subject Areas should be a fair, reasonable and justifiable representation.

2. The purpose of Table 4.3 is for applicants to demonstrate how the Subject Area Indicative Topics are covered and assessed. To adequately cover a Subject Area, it needs to be clear that a good breadth and depth of the Indicative Topics is covered though it should be noted that not all the Indicative Topics would be required to be explicitly covered. Moreover, additional rows of Indicative Topics can be added to Table 4.3 when it is felt that the Indicative Topics do not adequately represent coverage of the Subject Area in the Master’s degree. Applications must clearly signpost when this has been done and provide a brief justification.

3. Where there are a large number of (flexible) pathways please complete Table 4.3 for a few representative pathways only along with an explanatory narrative.

4. Where a Subject Area and its Indicative Material are covered in good breadth and depth it would be expected that there should be an associated assessment.

Page 28 of 72

TAUGHT COMPONENT OF THE MASTER’S DEGREE

Page 29: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

4.3.2 Summary table of credit allocation across the Subject AreasPlease complete Table 4.4 for each pathway.

<<< APPLICANTS PLEASE COMPLETE TABLE 4.4 BELOW >>>

Pathways

Number of Credits Across Subject AreasTotal Number of

Credits in Pathway

Security Fundamentals

Secure Programming

Low Level Techniques and

Tools

Operating Systems

NetworkingSystems

ProgrammingEmbedded

Systems

#1

#2

#n

Table 4.4: Summary of credit allocation across the Subject Areas

4.3.3 Visual representation of credit allocation across the Subject AreasFor each pathway, please provide a visual representation (Figure 4.1) of the credit allocation across the Subject Areas for the taught component of the degree – please see Figures 4.1 as an example. Where there are a large number of (flexible) pathways please provide Figure 4.1 for a few representative pathways only along with an explanatory narrative.

<<< APPLICANTS INSERT FIGURE 4.1 BELOW >>>

Page 29 of 72

TAUGHT COMPONENT OF THE MASTER’S DEGREE

Page 30: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Figure 4.1: An example for illustrative purposes only of credit allocation across the Subject Areas for a Master’s in computer science for cyber security. Please delete this figure from your application.

Page 30 of 72

TAUGHT COMPONENT OF THE MASTER’S DEGREE

Page 31: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

4.3.4 Assessment criteriavii. Table 4.3 must show which Subject Areas and Indicative Topics are covered in the Master’s.viii. In Table 4.3 where a Subject Area and its Indicative Material are covered in good breadth and depth it would be

expected that there should be an associated assessment. The assessments identified should be consistent with the information on assessments shown in section 5 of the application.

ix. Each Pathway identified in Table 4.4 must have a minimum of 84 taught credits that can be mapped to the Subject Areas.

x. A visual representation must be provided that clearly shows the distribution of credits across the Subject Areas for the Master’s degree.

xi. Tables 4.3 and 4.4 along with Figure 4.1 must show that the taught modules on each pathway provide sufficient weight of coverage of the Indicative Topics, supplemented where appropriate by coverage of other Indicative Topics, for Subject Areas 1, 2, 3 and at least three of Subject Areas 4 to 7 to be satisfactorily addressed.

For assessors onlyCriteria Achieved Not Achieved Unclear

vii. ☐ ☐ ☐viii. ☐ ☐ ☐ix. ☐ ☐ ☐x. ☐ ☐ ☐xi. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

4.4 Justification of Subject Area coveragePlease describe how the overall distribution of credits is consistent with the aims of the degree described in section 3.4.

Please describe and justify how the distribution of credits: provides a coherent body of work for students ensures that students are gaining knowledge about key areas of computer science that underpin cyber security

<<< APPLICANTS INSERT TEXT BELOW >>>

4.4.1 Assessment criteriaxii. The distribution of credits in the taught component of the Master’s must be consistent with the overall aims of a

Master’s degree in computer science for cyber security.xiii. The overall distribution of credits across the Subject Areas must be appropriate and coherent, ensuring that

students are gaining knowledge about key areas of computer science that underpin cyber security.

For assessors onlyCriteria Achieved Not Achieved Unclear

xii. ☐ ☐ ☐xiii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

4.5 Module descriptionsIn an appendix to this section (Appendix C), please include a module description for each module that addresses a Subject Area in Table 4.3.

At the beginning of each module description, please provide a table that lists the Subject Area(s) and Indicative Topics that the module covers along with brief justifications for why this is the case.

Page 31 of 72

TAUGHT COMPONENT OF THE MASTER’S DEGREE

Page 32: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

The module descriptions should provide good evidence of the Subject Areas and Indicative Topics coverage claimed in Table 4.3.

<<< APPLICANTS INSERT TEXT AND LINK TO APPENDIX C BELOW >>>

By way of example only, please see: Appendix C: Module Descriptions (Appendix to Section 4 of Application)

4.5.1 Assessment criterionxiv. The module descriptions must be consistent with the Subject Area and Indicative Topic coverage shown in Tables 4.3

and 4.4.

For assessors onlyCriterion Achieved Not Achieved Unclear

xiv. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

4.6 Professional knowledge and skillsPlease describe how areas in professional knowledge and skills shown below are addressed in the Master’s degree. It is not a requirement to have a separate dedicated module covering professional knowledge and skills.

Professional Knowledge and Skills

Written and oral communication

Working in teams

Legal and ethical issues for the cyber security professional

Understanding intellectual property

<<< APPLICANTS INSERT TEXT BELOW >>>

4.6.1 Assessment criterionxv. Professional knowledge and skills should be addressed in the Master’s degree.

For assessors onlyCriterion Achieved Not Achieved Unclear

xv. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

4.7 Overall assessment of section 4For assessors only

Overall Grade Overall Comments

<assessors insert grade here> <if applicable, assessors insert text here>

Page 32 of 72

TAUGHT COMPONENT OF THE MASTER’S DEGREE

Page 33: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

5. Assessment MaterialsUp to seven sides of A4, excluding explanatory text, assessment criteria and copies of assessments.

5.1 Overall approach to assessmentPlease describe the overall approach to assessment of the taught modules on the Master’s degree. This should include:

the range of assessment types used – e.g., traditional examinations, online examinations, coursework, practicals, literature reviews, multiple choice questions, group work, presentations, etc.

a justification of why these assessment types are appropriate a description of the process involved in deciding the assessment types to use for individual taught modules

<<< APPLICANTS INSERT TEXT BELOW >>>

5.1.1 Assessment criteriai. The range of assessment types used is clear and appropriate – it would be desirable to see a mix of assessment

types being used across the taught modules.ii. There is a clear and appropriate process for deciding which assessment types to use for individual taught modules.

For assessors onlyCriteria Achieved Not Achieved Unclear

i. ☐ ☐ ☒ii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.2 Marking schemeIf available, please provide an overall marking scheme that shows what a student must demonstrate to be awarded a particular mark on a taught module.

<<< APPLICANTS INSERT MARKING SCHEME BELOW >>>

5.2.1 Assessment criterioniii. If available, the marking scheme must clear, appropriate and consistent.

For assessors onlyCriterion Achieved Not Achieved Unclear Not Applicable

iii. ☐ ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.3 Overall grade for the Master’sPlease describe how the overall mark for the Master’s is determined from the marks for the taught modules and the mark for the research dissertation.

Please describe the how the overall grade (e.g., pass, merit, distinction) for the Master’s is determined.

Please describe the process for compensation, if applicable.

<<< APPLICANTS INSERT TEXT BELOW >>>

Page 33 of 72

ASSESSMENT MATERIALS

Page 34: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

5.3.1 Assessment criterioniv. The process to determine the overall grade awarded for the Master’s from the individual modules and research

dissertation must be clear and appropriate.

For assessors onlyCriterion Achieved Not Achieved Unclear

iv. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.4 Rigour of assessmentPlease complete Table 5.1 for each assessed taught module.

Please include hyperlinks to the assessments in Appendix D.

If the average ratio of bookwork to critical analysis / application across all the taught modules is greater than 60:40, please provide a clear justification for this value.

<<< APPLICANTS COMPLETE TABLE 5.1 BELOW >>>

Page 34 of 72

ASSESSMENT MATERIALS

Page 35: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

The text in brown is by way of example only.Module Pass mark Assessment types and relative

weightingsEstimate for % of bookwork

in assessmentsEstimate for % of critical analysis / application

in assessmentsJustification for assessment types and ratio of bookwork to critical analysis

below (C) 50% CWK-1 (50%), CWK-2 (50%) 40 60 Both courseworks present students with novel real-world scenarios in which they have to apply knowledge, understanding and critical analysis.

below (C)

below (C)

below (C)

below (C) 50% CWK (30%), Practical (30%), Exam (40%)

30 70 The coursework presents students with a real-world scenario for which they have to develop a secure network solution. The practical tests a student’s ability to construct and test networks. The exam tests both knowledge and application.

below (C) 50% CWK (60%), Exam (40%) 40 60 The coursework presents students with a real-world programming scenario. The exam tests both knowledge and application.

below (C)

below (O)

below (O)

below (O)

below (O)

Page 35 of 72

ASSESSMENT MATERIALS

Page 36: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Average ratio of bookwork to critical analysis / application across all the taught modules: <<< APPLICANTS INSERT VALUE BELOW >>>

Table 5.1: The assessments used for compulsory and optional taught modules.

Page 36 of 72

ASSESSMENT MATERIALS

Page 37: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

5.4.1 Assessment criteriav. For each taught module, the assessment types and their relative weightings must be clear and appropriate.

vi. For each taught module, the ratio of bookwork to critical analysis / application must be clear and justified.vii. Where the overall, average ratio of bookwork to critical analysis / application is greater than 60:40 this must be

clearly justified.

For assessors onlyCriteria Achieved Not Achieved Unclear Not Applicable

v. ☐ ☐ ☐vi. ☐ ☐ ☐vii. ☐ ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.5 Justification of 40% pass markWhere the pass mark for taught modules, dissertation and/or the degree overall is set at, or close to, 40% please provide a justification that students achieving this pass mark have achieved and demonstrated sufficient knowledge and understanding at Master’s level.

<<< APPLICANTS INSERT TEXT BELOW IF APPLICABLE >>>

By way of example, it may be appropriate here to refer to the marking scheme that shows what a student has to be able to demonstrate in order to achieve a pass mark of 40%.

5.5.1 Assessment criterionviii. Where the pass mark for taught modules, dissertation and/or the degree overall is set at, or close to, 40% it should

be clear that students attaining this pass mark will have sufficiently demonstrated their knowledge, understanding and application at Master’s level.

For assessors onlyCriterion Achieved Not Achieved Unclear Not Applicable

viii. ☐ ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.6 Setting assessmentsPlease describe the process for setting assessments. As a minimum, this should include:

who is responsible for setting the assessments and marking criteria for a taught module who is responsible for verifying the suitability of the assessments and marking criteria for a taught module who oversees assessment setting across all taught modules to ensure consistency how and when are the external examiners engaged to ensure appropriate standards are maintained for Master’s

assessments

<<< APPLICANTS INSERT TEXT BELOW >>>

5.6.1 Assessment criteriaix. The process for setting, verifying and overseeing assessments must be clear and appropriate.x. The process for engaging with the external examiners regarding assessment setting must be clear and appropriate.

For assessors onlyCriteria Achieved Not Achieved Unclear

ix. ☐ ☐ ☐Page 37 of 72

ASSESSMENT MATERIALS

Page 38: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

x. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.7 Marking assessmentsPlease describe the process for marking assessments. As a minimum, this should include:

who is responsible for marking the assessments for a taught module which assessments have both first and second markers who oversees marking across all assessments and modules to ensure consistency how and when are the external examiners engaged to ensure appropriate standards are maintained for the marking

of Master’s assessments

<<< APPLICANTS INSERT TEXT BELOW >>>

5.7.1 Assessment criteriaxi. The process for marking assessments must be clear and appropriate.

xii. The process for engaging with the external examiners regarding assessment marking must be clear and appropriate.

For assessors onlyCriteria Achieved Not Achieved Unclear

xi. ☐ ☐ ☐xii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.8 Detecting and dealing with plagiarism8

Please describe the processes and procedures that are in place to detect and deal with plagiarism on the taught component of the Master’s, particularly for coursework and on-line examinations.

<<< APPLICANTS INSERT TEXT BELOW >>>

5.8.1 Assessment criterionxiii. There must be a robust and effective system in place to detect and deal with plagiarism by students on the taught

component of the Master’s degree.

For assessors onlyCriterion Achieved Not Achieved Unclear

xiii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.9 Examination papersPlease complete either section 5.9.1 or section 5.9.2.

5.9.1 Provisional applicationFor each of the modules listed in Table 5.1 please provide a copy of examination paper(s) that students have sat or specimen paper(s) of the examinations they will sit. For assessed coursework, please provide copies of all assignments (to be) provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in Appendix D.

<<< APPLICANTS INSERT TEXT AND LINK TO APPENDIX D BELOW >>>

8 A useful discussion of plagiarism and the forms of plagiarism can be found at: https://www.ox.ac.uk/students/academic/guidance/skills/plagiarism#:~:text=Plagiarism%20is%20presenting%20someone%20else's,is%20covered%20under%20this%20definition

Page 38 of 72

ASSESSMENT MATERIALS

Page 39: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

By way of example only, please see Appendix D: Assessment materials (Appendix to section 5 of application)

5.9.1.1 Assessment criterionxiv. The assessments must rigorously test students’ understanding and critical analysis of the Subject Areas being

studied.

For assessors onlyCriterion Achieved Not Achieved Unclear

xiv. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.9.2 Full applicationFor academic year 2021 – 2022, for each of the modules listed in Table 5.1, please provide a copy of the examination paper(s) that students sat. For assessed coursework, provide copies of all assignments provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in Appendix D.

<<< APPLICANTS INSERT TEXT AND LINK TO APPENDIX D BELOW >>>

By way of example only, please see: Appendix D: Assessment materials (Appendix to section 5 of application)

5.9.2.1 Assessment criterionxv. The assessments must rigorously test students’ understanding and critical analysis of the Subject Areas being

studied.

For assessors onlyCriterion Achieved Not Achieved Unclear

xv. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.10 External examiners’ reports – full application onlyPlease describe the process for engagement with the external examiners. As a minimum, this should include:

the points during the academic year at which engagement with the external examiners happens reviewing of assessment materials by the external examiners reviewing of assessment marks by the external examiners and moderation of results reviewing of research dissertations by the external examiners and moderation of results

Please describe the technical background and experience of the external examiners.

For academic year 2020 – 2021, please provide a copy of the external examiners’ reports9 - these should be placed in Appendix E.

For academic year 2020 – 2021, please provide a copy of the HEI’s response to the external examiners’ reports and any follow-up actions that have been undertaken in response to the reports. These should be placed in Appendix E.

<<< APPLICANTS INSERT TEXT AND LINK TO APPENDIX E BELOW >>>

9 Where the external examiners’ reports for 2020-21 are not available by the submission deadline, please provide the most recent reports and the HEI’s response. Please state when the 2020 21 reports and response will be available and submit them as soon as they are available.

Page 39 of 72

ASSESSMENT MATERIALS

Page 40: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

By way of example only, please see: Appendix E: External Examiners’ Reports (Appendix to Section 5 of Application)

5.10.1 Assessment criteriaxvi. The process for engaging with the external examiners should be clear and appropriate.

xvii. The external examiners should have the appropriate technical background.xviii. The external examiners’ reports must provide a positive picture of the Master’s degree under assessment.

xix. The progress to any follow-on actions suggested by the external examiners should be made clear.

For assessors onlyCriteria Achieved Not Achieved Unclear

xvi. ☐ ☐ ☐xvii. ☐ ☐ ☐xviii. ☐ ☐ ☐xix. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

5.11 Overall assessment of section 5For assessors only

Overall Grade Overall Comments

<assessors insert grade here> <if applicable, assessors insert text here>

Page 40 of 72

ASSESSMENT MATERIALS

Page 41: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

6. Research DissertationsUp to seven sides of A4, excluding explanatory text, assessment criteria and list of dissertation topics.

Applications for full certification should provide anonymised copies of dissertations in three separate PDF files.

6.1 TimelinePlease complete Table 6.1 that shows the key events and decision points during the academic year leading to the submission and marking of research dissertations. Please adapt Table 6.1 as appropriate if your HEI does not use a semester model.

<<< APPLICANTS COMPLETE TABLE 6.1 BELOW >>>

Text in brown is by way of example only.Semester Activities

01 October to 31 January November – Research Methods module starts December – staff present / make available their ideas for research projects January – external companies present their ideas for research projects January – students encouraged to have informal discussions with staff regarding

research projects

01 February to 31 May February – students submit an outline of their proposed research as part of a paper for the Research Methods module

March – staff assess Research Methods papers and supervisors are allocated to students April – students submit a project plan for their research dissertations to their supervisors April / May – students receive feedback on project plans from supervisors

01 June to 30 September June – students start work on their projects June to September – students meet regularly with supervisors to report progress End-September – students submit their dissertations

October onwards vivas held marking of dissertations by supervisors and second markers moderation of dissertation marks across all dissertations

Table 6.1: Research dissertation timeline.

6.1.1 Assessment criterioni. The activities involved in the identification of potential research topics as well as the initiation, production and

marking of research dissertations must be clearly laid out, appropriate and timely.

For assessors onlyCriterion Achieved Not Achieved Unclear

i. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.2 Governance of the research dissertation processPlease describe the governance of the research dissertation process. As a minimum, this should include:

who has overall responsibility for ensuring the process is properly coordinated and carried out which members of staff are involved in the research dissertation process what happens in the case that a student proposes a research topic for which there is no suitable supervisor what happens in the case that two or more students apply to carry out the same research topic with the same

supervisor what happens in the case that a student is unable to find a suitable area of research for their dissertation what happens in the case that a student is failing to make satisfactory progress in their research

Page 41 of 72

RESEARCH DISSERTATIONS

Page 42: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

how is the situation resolved when first and second markers differ significantly in their marks awarded

<<< APPLICANTS INSERT TEXT BELOW >>>

6.2.1 Assessment criterionii. There must be a robust governance process in place for research dissertations.

For assessors onlyCriterion Achieved Not Achieved Unclear

ii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.3 Guidance to studentsPlease describe the guidance the HEI provides, or will provide, to Master’s students before they embark on their dissertations, for example:

research methods what makes a good dissertation topic how to formulate a research question the structure of dissertations best practice for undertaking a research dissertation carrying out literature reviews presentations from members of staff / external companies on possible research topics, etc.

Although including extracts from a student handbook (within the overall page limits) is acceptable, please do not include a student handbook with the application.

<<< APPLICANTS INSERT TEXT BELOW >>>

6.3.1 Assessment criterioniii. Students receive suitable background guidance on undertaking research dissertations.

For assessors onlyCriterion Achieved Not Achieved Unclear

iii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.4 Identification of dissertation topicsPlease describe the process whereby students choose their dissertation topics, for example:

is it up to students to come up with topic ideas do members of staff identify possible topics does the HEI have links with industry partners who might suggest topics once a student has a potential topic, what do they have to do to get it formally approved how it is ensured that dissertations will be within the scope of Subject Areas 1 to 7 and relevant to cyber security

<<< APPLICANTS INSERT TEXT BELOW >>>

Page 42 of 72

RESEARCH DISSERTATIONS

Page 43: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

6.4.1 Assessment criteriaiv. There must be a clear and appropriate process that supports students to identify research topics for their

dissertations.v. There must be a clear and appropriate process to ensure that dissertations will be within the scope of the Subject

Areas and relevant to cyber security.

For assessors onlyCriteria Achieved Not Achieved Unclear

iv. ☐ ☐ ☐v. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.5 Allocation of students to supervisorsPlease describe the process whereby students are allocated to suitably knowledgeable supervisors.

<<< APPLICANTS INSERT TEXT BELOW >>>

6.5.1 Assessment criterionvi. There must be a clear and appropriate process for allocation of students to suitably knowledgeable supervisors.

For assessors onlyCriterion Achieved Not Achieved Unclear

vi. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.6 Legal and ethical issuesPlease describe how it is ensured that before a student embarks on their dissertation any legal and ethical issues have been considered and addressed and the student has been given approval to proceed.

<<< APPLICANTS INSERT TEXT BELOW >>>

6.6.1 Assessment criterionvii. There must be a clear and appropriate process in place to ensure that students have properly considered and

addressed any legal and ethical issues that may arise in their dissertations and have been given approval to proceed.

For assessors onlyCriterion Achieved Not Achieved Unclear

vii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.7 Monitoring of students’ progressPlease describe the process for monitoring the progress of students on their dissertations. Please describe what action is taken when a student is not making satisfactory progress.

<<< APPLICANTS INSERT TEXT BELOW >>>

6.7.1 Assessment criterionviii. There needs to be a well-defined and suitable process for monitoring the progress of students to ensure that

students are making appropriate progress and where this is not happening suitable corrective action is taken.

Page 43 of 72

RESEARCH DISSERTATIONS

Page 44: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

For assessors onlyCriterion Achieved Not Achieved Unclear

viii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.8 Detecting and dealing with plagiarism10

Please describe the processes and procedures that are in place to detect and deal with plagiarism for the research dissertation. In the case where there is no viva as part of the assessment process, please describe how it is guaranteed that a dissertation is a student’s own work.

<<< APPLICANTS INSERT TEXT BELOW >>>

6.8.1 Assessment criterionix. There must be a robust and effective system in place to detect and deal with plagiarism by students undertaking

their research dissertations.

For assessors onlyCriterion Achieved Not Achieved Unclear

ix. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.9 Research dissertations contributing fewer than 40 creditsFor Master’s degrees in which the research dissertation accounts for fewer than 40 credits, please describe how students are able to gain sufficient understanding and experience of undertaking a research project.

<<< APPLICANTS INSERT TEXT BELOW IF APPLICABLE>>>

6.9.1 Assessment criterionx. For Master’s degrees in which the research dissertation accounts for fewer than 40 credits, it should be clear that

students are still able to gain sufficient understanding and experience of undertaking a research project.

For Assessors onlyCriterion Achieved Not Achieved Unclear Not Applicable

x. ☐ ☐ ☐ ☐Comments (if applicable). <insert text here>

6.10 Assessment of dissertationsPlease describe the process for assessing dissertations. As a minimum, this should include:

the role of first and second markers the process when the first and second markers differ significantly on the marks they award the marks awarded to the dissertation, the viva and any other component of the dissertation process

In addition, please provide a specific, tailored marking scheme for dissertations clearly showing how grades are determined and what would be necessary for each of a distinction, merit or pass11. Please indicate whether this or other similar guidance is provided to students.

<<< APPLICANTS INSERT TEXT AND MARKING SCHEME BELOW >>>10 A useful discussion of plagiarism and the forms of plagiarism can be found at: https://www.ox.ac.uk/students/academic/guidance/skills/plagiarism#:~:text=Plagiarism%20is%20presenting%20someone%20else's,is%20covered%20under%20this%20definition11 Where the classifications of distinction / merit / pass are not used, please refer to the grades that are used by the HEI.

Page 44 of 72

RESEARCH DISSERTATIONS

Page 45: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

6.10.1 Assessment criterionxi. There needs to be a well-defined and rigorous process for the assessment of dissertations.

For assessors onlyCriterion Achieved Not Achieved Unclear

xi. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.11 For full certification only

6.11.1 List of dissertation topicsFor each of academic years 2020 – 2021 and 2019 – 2020 (if any), provide a list of Master’s dissertations undertaken by students – please complete Tables 6.2a, b.

Where there were more than 20 students undertaking dissertations in an academic year, provide information for a representative sample of 20 dissertations only.

<<< APPLICANTS COMPLETE TABLES 6.2a AND 6.2b BELOW >>>

Dissertation title Synopsis of dissertation Subject Areas addressed and relevance to cyber

security

External involvement (if applicable)

Table 6.2a: List of dissertations for 2020 – 2021.

Dissertation title Synopsis of dissertation Subject Areas addressed and relevance to cyber

security

External involvement (if applicable)

Table 6.2b: List of dissertations for 2019 – 2020 (if any).

6.11.1.1 Assessment criterionxii. The list of dissertation topics must show that dissertations are within the scope of the Subject Areas and relevant to

cyber security.

Page 45 of 72

RESEARCH DISSERTATIONS

Page 46: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

For assessors onlyCriterion Achieved Not Achieved Unclear

xii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.11.2 Example dissertationsPlease include with your application three separate PDF files as follows12:

1. an anonymised and representative dissertation that achieved a distinction in 2020 – 20212. an anonymised and representative dissertation that achieved a merit in 2020 – 20213. an anonymised and representative dissertation that achieved a pass in 2020 – 2021

If there was not a dissertation in 2020 – 2021 for any of the categories, please use a dissertation from 2019 – 2020. If there was not a dissertation in 2019 – 2020, please contact the NCSC ahead of the deadline for applications.

In Appendix F, for each of the three dissertations please provide:

a. the overall mark awarded

b. the components of the overall mark, for example marks awarded to: viva (including any demonstration) dissertation plan dissertation

c. key comments from the internal examiners

d. any additional information that you feel would help the assessment panel as part of its job to determine whether the grade awarded to each dissertation is appropriate.

<<< APPLICANTS PROVIDE LINKS TO APPENDIX F BELOW >>>

By way of example only:

Please see: Distinction dissertation information

Please see: Merit dissertation information

Please see: Return to Research Dissertations.

6.11.2.1 Assessment criterionxiii. The award of distinction, merit or pass for the representative dissertations must be appropriate and show no

evidence of regular over-grading.

For assessors onlyCriterion Achieved Not Achieved Unclear

xiii. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

6.12 Overall assessment of section 6For assessors only

Overall Grade Overall Comments

12 Where the classifications of distinction / merit / pass are not used, please provide representative dissertations for each of the classifications that are used by the HEI.

Page 46 of 72

RESEARCH DISSERTATIONS

Page 47: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

<assessors insert grade here> <if applicable, assessors insert text here>

Page 47 of 72

RESEARCH DISSERTATIONS

Page 48: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

7. Student Numbers and Grades Achieved – Applications for Full Certification OnlyUp to seven sides of A4, excluding explanatory text and assessment criteria.

7.1 Student entry dataWhere the data are available, for each of academic years 2020 – 2021 and 2019 – -2020 please complete Tables 7.1a, b.

<<< APPLICANTS COMPLETE TABLES 7.1a, b >>>

The text in brown is by way of example only.Entry Requirements Number of full-time

studentsNumber of part-time

studentsNumber with 2/2 (or

equivalent) or above in STEM subject

Number without 2/2 or above in STEM subject but

who have relevant experience or

demonstrated aptitude

Number without 2/2 or above in STEM subject, relevant experience or

demonstration of aptitude

Students with UK nationality

In general, 2/2 in STEM subject, relevant experience or demonstration of aptitude – though some discretion allowed

10 2 7 5 0

Students without UK nationality

As above 4 0 1 3 0

Table 7.1a: Student entry data for 2020 – 2021.

Please add explanatory text when, for example, there is a lower than expected proportion of students who have 2/2or above in STEM subject, relevant experience or demonstration of aptitude.

<<< APPLICANTS INSERT EXPLANATORY TEXT BELOW IF REQUIRED >>>

Page 48 of 72

STUDENT NUMBERS AND GRADES ACHIEVED

Page 49: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Entry Requirements Number of full-time students

Number of part-time students

Number with 2/2 (or equivalent) or above in

STEM subject

Number without 2/2 or above in STEM subject but

who have relevant experience or

demonstrated aptitude

Number without 2/2 or above in STEM subject, relevant experience or

demonstration of aptitude

Students with UK nationality

In general, 2/2 in STEM subject, relevant experience or demonstration of aptitude – though some discretion allowed

8 0 4 4 0

Students without UK nationality

As above 2 0 1 1 0

Table 7.1b: Student entry data for 2019 – 2020.

Please add explanatory text when, for example, there is a lower than expected proportion of students who have the equivalent of a 2/2 or above in STEM subject, relevant experience or demonstration of aptitude.

<<< APPLICANTS INSERT EXPLANATORY TEXT BELOW IF REQUIRED >>>

7.1.1 Assessment criteriai. It would be expected that the majority of UK students should have one of more of the following:

a 2/2 degree or above in a STEM subject equivalent experience a clear demonstration of aptitude for cyber security

When this is not the case a clear justification should be provided.

ii. It would be expected that the majority of non-UK students should have one of more of the following: the equivalent of a 2/2 degree or above in a STEM subject equivalent experience a clear demonstration of aptitude for cyber security

Page 49 of 72

STUDENT NUMBERS AND GRADES ACHIEVED

Page 50: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

When this is not the case a clear justification should be provided.

For assessors onlyNot applicable applies if there were not any UK students or non-UK students.

Criteria Achieved Not Achieved Unclear Not Applicablei. ☐ ☐ ☐ ☐ii. ☐ ☐ ☐ ☐Comments (if applicable). <insert text here>

7.2

Page 50 of 72

STUDENT NUMBERS AND GRADES ACHIEVED

Page 51: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

7.2 Student exit dataPlease complete Table 7.2 for academic years 2020 – 2021 and 2019 – 2020.

<<< APPLICANTS COMPLETE TABLE 7.2 BELOW >>>

The text in brown is by way of example only.Academic

yearNumber of students

scheduled to complete Master’s

Number achieving distinction overall

Number achieving merit overall

Number achieving pass overall

Number failing Master’s

Number deferring for additional

year(s)

Number opting to graduate with postgraduate certificate (or equivalent)

Number with other outcomes

(if applicable)

2020 – 2021 14 3 7 3 1 0 0 0

2019 – 2020 10 2 5 2 0 0 1 0

Table 7.2: Student exit data for 2020 – 2021 and 2019 – 2020

Please add explanatory text below when:

there appears to be a higher than expected proportion of students achieving the higher grades there appears to be a higher than expected proportion of students achieving the lower grades there appears to be a higher than expected proportion of students, failing, deferring, accepting lower qualifications or with other outcomes

<<< APPLICANTS INSERT EXPLANATORY TEXT BELOW IF REQUIRED >>>

7.2.1 Assessment criteriaiii. It would be expected that the distribution of pass, merit and distinction grades should be broadly consistent with the experience and entry qualifications of the student intake.iv. When there appears to be a higher than expected proportion of students achieving the higher grades this should be justified and the external examiners should not have raised

any concerns. v. When there appears to be a higher than expected proportion of students achieving the lower grades this should be justified and the external examiners should not have raised

any concerns.

Page 51 of 72

STUDENT NUMBERS AND GRADES ACHIEVED

Page 52: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

vi. It would be expected that the proportion of students failing, deferring or accepting a lesser qualification should be low. When the proportion is higher than would be expected, a clear justification should be provided and the external examiners should not have raised any concerns.

For Assessors only

Criteria Achieved Not Achieved Unclear Not Applicableiii. ☐ ☐ ☐iv. ☐ ☐ ☐ ☐v. ☐ ☐ ☐ ☐vi. ☐ ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

7.3 Student satisfactionPlease describe how the HEI encourages Master’s students to participate in the feedback process.

Please provide the results of student satisfaction from activities such as:

PTES13

collated feedback from students on the Master’s modules collated feedback from staff-student liaison committees results

Please describe any actions taken by the HEI as a result of student feedback.

<<< APPLICANTS INSERT TEXT BELOW >>>

7.3.1 Assessment criteriavii. The HEI should encourage students to provide feedback on the Master’s.viii. The results of student satisfaction surveys should paint a largely positive picture of students’ learning experience on the Master’s.

ix. The HEI should be able to demonstrate progress on any key issues raised by such surveys.

For Assessors onlyCriteria Achieved Not Achieved Unclear

vii. ☐ ☐ ☐

13 https://www.advance-he.ac.uk/reports-publications-and-resources/postgraduate-taught-experience-survey-ptes

Page 52 of 72

STUDENT NUMBERS AND GRADES ACHIEVED

Page 53: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

viii ☐ ☐ ☐ix. ☐ ☐ ☐Comments (if applicable). <assessors insert text here>

7.4 Overall assessment of section 7For assessors only

Overall Grade Overall Comments

<assessors insert grade here> <if applicable, assessors insert text here>

Page 53 of 72

STUDENT NUMBERS AND GRADES ACHIEVED

Page 54: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

8. Appendix A: Staff CVs (Appendix to Section 2 of Application)Up to two sides of A4 per CV

Please follow the structure below for each CV. For each CV, it is important to get across the person’s knowledge, experience and skills in cyber security.

Return to above

By way of example only:

8.1 CV for Dr E. F.

8.1.1 Personal statement of experience and expertise in computer science and/or cyber securityProvide a succinct summary of the person’s experience and expertise in computer science and/or cyber security – for cyber security use the CyBOK KAs14 as a framework.

8.1.2 Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.

8.1.3 Professional employmentDescribe professional positions of employment, highlighting those relevant to computer science and/or cyber security.

8.1.4 Contribution to computer science and/or cyber security at the University of XDescribe what the person does at the HEI that is relevant to computer science and/or cyber security.

8.1.5 Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to computer science and/or cyber security.

8.1.6 Computer science and/or cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.

8.1.7 Any other informationInclude any other information that might be relevant in demonstrating the person’s computer science and/or cyber security expertise.

Return to above

14 https://www/cybok.org.

Page 54 of 72

APPENDIX A: STAFF CVs

Page 55: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

8.2 CV for Dr G. H.

8.2.1 Personal statement of experience and expertise in computer science and/or cyber securityProvide a succinct summary of the person’s experience and expertise in computer science and/or cyber security – for cyber security use the CyBOK KAs as a framework.

8.2.2 Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.

8.2.3 Professional employmentDescribe professional positions of employment, highlighting those relevant to computer science and/or cyber security.

8.2.4 Contribution to computer science and/or cyber security at the University of XDescribe what the person does at the HEI that is relevant to computer science and/or cyber security.

8.2.5 Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to computer science and/or cyber security.

8.2.6 Computer science and/or cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.

8.2.7 Any other informationInclude any other information that might be relevant in demonstrating the person’s computer science and/or cyber security expertise.

Return to above

Page 55 of 72

APPENDIX A: STAFF CVs

Page 56: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

8.3 CV for I. J.

8.3.1 Personal statement of experience and expertise in computer science and/or cyber securityProvide a succinct summary of the person’s experience and expertise in computer science and/or cyber security – for cyber security use the CyBOK KAs as a framework.

8.3.2 Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.

8.3.3 Professional employmentDescribe professional positions of employment, highlighting those relevant to computer science and/or cyber security.

8.3.4 Contribution to computer science and/or cyber security at the University of XDescribe what the person does at the HEI that is relevant to computer science and/or cyber security.

8.3.5 Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to computer science and/or cyber security.

8.3.6 Computer science and/or cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.

8.3.7 Any other informationInclude any other information that might be relevant in demonstrating the person’s computer science and/or cyber security expertise.

Return to above

Page 56 of 72

APPENDIX A: STAFF CVs

Page 57: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

8.4 CV for K. L.

8.4.1 Personal statement of experience and expertise in computer science and/or cyber securityProvide a succinct summary of the person’s experience and expertise in computer science and/or cyber security – for cyber security use the CyBOK KAs as a framework.

8.4.2 Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.

8.4.3 Professional employmentDescribe professional positions of employment, highlighting those relevant to computer science and/or cyber security.

8.4.4 Contribution to computer science and/or cyber security at the University of XDescribe what the person does at the HEI that is relevant to computer science and/or cyber security.

8.4.5 Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to computer science and/or cyber security.

8.4.6 Computer science and/or cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.

8.4.7 Any other informationInclude any other information that might be relevant in demonstrating the person’s computer science and/or cyber security expertise.

Return to above

Page 57 of 72

APPENDIX A: STAFF CVs

Page 58: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

9. Appendix B: Table 4.3 – Credit Allocation Across the Subject Areas (Appendix to Section 4 of Application)Please complete Table 4.3 below.

Please note that the column ‘Relevant CyBOK KAs’ is provided for information only.

The example for Security Fundamentals is provided here for guidance only.

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

Subject Area Relevant CyBOK KAs Indicative (or Other Relevant) Topics

Modules Providing Significant Coverage

Modules Providing Partial Coverage

Assessments Approximate Number of Credits

1. Security Fundamentals

Introduction

Risk Management and Governance

Adversarial Behaviours

Cryptography

Law and Regulation

foundational concepts SecFund

SecFund-CWKSecFund-Exam

15

risk SecFund

threats and attacks SecFund

principles of secure design SecFund

cryptography SecFund

security architecture SecFund

security economics SecFund

legal SecFund

An example for illustrative purposes only of how the Indicative Topics in Security Fundamentals are covered by modules in the Master’s degree.

Page 58 of 72

APPENDIX B: TABLE 4.3

Page 59: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

<<<. APPLICANTS COMPLETE TABLE 4.3 BELOW WHICH CONTINUES OVER A NUMBER OF PAGES >>>

Table 4.3 Subject Area Relevant CyBOK KAs Indicative (or Other

Relevant) TopicsModules Providing

Significant CoverageModules Providing

Partial CoverageAssessments Approximate Number

of Credits

1. Security Fundamentals

Introduction

Risk Management and Governance

Adversarial Behaviours

Cryptography

Law and Regulation

foundational concepts

risk

threats and attacks

principles of secure design

cryptography

security architecture

security economics

legal

Page 59 of 72

APPENDIX B: TABLE 4.3

Page 60: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Subject Area Relevant CyBOK KAs Indicative (or Other Relevant) Topics

Modules Providing Significant Coverage

Modules Providing Partial Coverage

Assessments Approximate Number of Credits

2. Secure Programming

Software Security

Secure Software Lifecycle

Operating Systems and Virtualisation

defensive programming

memory corruption

injection techniques

privilege escalation

user and kernel space vulnerabilities

web applications

static analysis

application/system logic flaws

compiler defences

managed vs un-managed code

Page 60 of 72

APPENDIX B: TABLE 4.3

Page 61: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Subject Area Relevant CyBOK KAs Indicative (or Other Relevant) Topics

Modules Providing Significant Coverage

Modules Providing Partial Coverage

Assessments Approximate Number of Credits

3. Low Level Techniques and Tools

Malware and Attack Technologies

assembly language programming

machine-level instruction set and organisation

compilers

reverse engineering techniques

reverse engineering for malware analysis

reverse engineering communications

de-obfuscation of obfuscated code

common tools for reverse engineering

anti-debugging mechanisms

fuzzing

Page 61 of 72

APPENDIX B: TABLE 4.3

Page 62: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Subject Area Relevant CyBOK KAs Indicative (or Other Relevant) Topics

Modules Providing Significant Coverage

Modules Providing Partial Coverage

Assessments Approximate Number of Credits

4. Operating Systems Operating Systems and Virtualisation

concurrency and synchronisation

processes and threads, process/thread management, synchronisation, inter-process communication

scheduling and dispatch

memory management

security and protection

file systems

I/O system

kernel security and reliability

network file system

network layer and transport layer protocols

Windows kernel

Linux kernel

Page 62 of 72

APPENDIX B: TABLE 4.3

Page 63: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Subject Area Relevant CyBOK KAs Indicative (or Other Relevant) Topics

Modules Providing Significant Coverage

Modules Providing Partial Coverage

Assessments Approximate Number of Credits

5. Networking Network Security

routing, network and application protocols

network architectures

network devices

network security

wireless network security

network traffic analysis

protocol analysis

network mapping techniques

Page 63 of 72

APPENDIX B: TABLE 4.3

Page 64: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Subject Area Relevant CyBOK KAs Indicative (or Other Relevant) Topics

Modules Providing Significant Coverage

Modules Providing Partial Coverage

Assessments Approximate Number of Credits

6. Systems Programming

advanced C programming

kernel internals

device drivers

multi-threading

file I/O

process management

file and directory management

memory management

signals

Page 64 of 72

APPENDIX B: TABLE 4.3

Page 65: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Subject Area Relevant CyBOK KAs Indicative (or Other Relevant) Topics

Modules Providing Significant Coverage

Modules Providing Partial Coverage

Assessments Approximate Number of Credits

7. Embedded Systems

Hardware Security

Cyber Physical Systems

hardware, design and fabrication

software architectures

programming and systems development

security and reliability

applications of embedded devices and systems

hardware debugging (JTAG, UART, etc)

side-channel attacks and differential power analysis

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security

Page 65 of 72

APPENDIX B: TABLE 4.3

Page 66: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Page 66 of 72

APPENDIX B: TABLE 4.3

Page 67: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

10. Appendix C: Module Descriptions (Appendix to Section 4 of Application)Please include a table at the beginning of each module description that shows which KA Topics the module covers along with brief justifications for why this is the case.

The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 4.3.

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security

By way of example only:

10.1 Security Fundamentals module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.2 Secure Programming module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.3 Low Level Programming module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.4 Operating Systems module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.5 Network Security module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.6 Systems Programming module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.7 Research Methods module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.8 Data Science module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.9 Hardware module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

Page 67 of 72

APPENDIX C: MODULE DESCRIPTIONS

Page 68: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

10.10 Machine Learning module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

10.11 Project Management module

Return to The Taught Component of the Master’s Degree in Computer Science for Cyber Security .

Page 68 of 72

APPENDIX C: MODULE DESCRIPTIONS

Page 69: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

11. Appendix D: Assessment materials (Appendix to section 5 of application)Please include assessment materials for the taught modules on the Master’s structured as in the examples below. This will help assessors navigate the materials supplied.

Return to Assessment Materials .

By way of example only:

11.1 Security Fundamentals assessments

Return to Assessment Materials .

11.2 Secure Programming assessments

Return to Assessment Materials .

11.3 Low Level Programming assessments

Return to Assessment Materials .

11.4 Operating Systems assessments

Return to Assessment Materials .

11.5 Network Security assessments

Return to Assessment Materials .

11.6 Systems Programming assessments

Return to Assessment Materials .

11.7 Research Methods assessments

Return to Assessment Materials .

11.8 Data Science assessments

Return to Assessment Materials .

11.9 Hardware assessments

Return to Assessment Materials .

11.10 Machine Learning assessments

Page 69 of 72

APPENDIX D: ASSESSMENT MATERIALS

Page 70: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

Return to Assessment Materials .

11.11 Project Management assessments

Return to Assessment Materials .

Page 70 of 72

APPENDIX D: ASSESSMENT MATERIALS

Page 71: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

12. Appendix E: External Examiners’ Reports (Appendix to Section 5 of Application)Please provide copies of the external examiners’ reports and the HEI’s response in the two sections below.

Return to Assessment Materials .

12.1 External examiners’ reports

Return to Assessment Materials .

12.2 HEI’s response to external examiners’ reports

Return to Assessment Materials .

Page 71 of 72

APPENDIX E: EXTERNAL EXAMINERS’ REPORTS

Page 72: Institution’s Letter of Support  · Web view2021. 7. 26. · Please complete Table 2.1 that gives the names, roles and responsibilities of the members of staff responsible for

Issue 2.122 July 2021

13. Appendix F: Research Dissertations Information (Appendix to Section 6 of Application)For each of the dissertations, please provide:

a. the overall mark awarded

b. the components of the overall mark, for example marks awarded to: viva (including any demonstration) dissertation plan dissertation

c. key comments from the internal examiners

d. any additional information that you feel would help the assessment panel as part of its job to determine whether the grade awarded to each dissertation is appropriate

13.1 Distinction dissertation information<<< APPLICANTS INSERT TEXT BELOW >>>

Return to Research Dissertations .

13.2 Merit dissertation information <<< APPLICANTS INSERT TEXT BELOW >>>

Return to Research Dissertations .

13.3 Pass dissertation information<<< APPLICANTS INSERT TEXT BELOW >>>

Return to Research Dissertations .

Page 72 of 72

APPENDIX F: RESEARCH DISSERTATIONS