Learning outcomes on successful completion of the programme will depend on the modules taken but will include some or all of the following.
Knowledge and understanding
- Demonstrate deep knowledge of information security principles and challenges in networks and software systems, protection mechanisms, approaches to assess and mitigate risks, security standards, data protection and cybersecurity regulations
-
Demonstrate deep knowledge of network security, secure software systems development, and cryptography
-
Understand strengths and limitations of important public key and symmetric/asymmetric cryptographic protocols
Applying knowledge and understanding
- Perform risk assessment, management and mitigations of secure infrastructures and operations
- Track strategic threats and maintain situation awareness
- Identify cybersecurity laws that apply to complex organisations and apply protection measures to comply with these laws
- Apply network security and secure software development concepts to the design, configuration and implementation of networked, software and distributed systems technologies
- Perform vulnerability assessment and penetration testing
- Develop patches to fix vulnerabilities in software projects
- Apply cryptographic techniques to secure software, systems and computer networks
- Apply incident response principles and methodologies to secure infrastructures and operations
Making judgements
- Evaluate trade-offs involving security, regulations, business, economic and management principles
- Apply appropriate (quantitative/qualitative) risk assessment techniques to measure security risks
- Appraise intrusion detection system and security of modern internet protocols (e.g., IPv6)
- Identify effective penetration testing strategies
- Apply appropriate incident response principles and methodologies to secure infrastructures and operations
- Apply appropriate cryptographic protocols to secure networks, software and systems
Communications and working skills
-
Communicate security risks and mitigation strategies to executives
-
Work and engage in discussions in security teams, share work fairly to meet the obligations set by the group
-
Explain advantages and disadvantages of cryptographic protocols
Learning skills
- Attract and assess security talent
- Lead security teams and influence organisational culture
- Be curious about latest security vulnerabilities and technologies
- Actively promote security practices within the organisation
- Identify novel security research directions