Learning Outcomes:
Upon successful completion of this module students should be able to:
- Apply cybersecurity techniques to practical security problems
- Report on the results obtained
- Evaluate the performance of these techniques
Curricular information is subject to change.
Upon successful completion of this module students should be able to:
- Apply cybersecurity techniques to practical security problems
- Report on the results obtained
- Evaluate the performance of these techniques
Student Effort Type | Hours |
---|---|
Project Supervision | 12 |
Autonomous Student Learning | 350 |
Total | 362 |
The student should have successfully completed the following modules:
- Information Security
- Leadership in Security
- Privacy and Compliance
- Risk Assessment and Standards
- Secure Software Engineering
- Applied Cryptography
- Network Security
- Incident Response
Description | Timing | Component Scale | % of Final Grade | ||
---|---|---|---|---|---|
Report(s): A report discussing the problem you addressed, background concepts that are fundamental to carrying out your work, the design and implementation of your solution, an evaluation and the main findings. | Week 15 | Graded | No | 100 |
Yes |
Remediation Type | Remediation Timing |
---|---|
In-Module Resit | Prior to relevant Programme Exam Board |
• Feedback individually to students, on an activity or draft prior to summative assessment
• Feedback individually to students, post-assessment
Students will receive regular verbal feedback during supervisory meetings and can expect feedback from their supervisor on one draft of their project report, provided they supply it in a timely manner.