Choose three from the following:
- Cyber Security and Ethical Hacking: An Introduction – 20 UK CREDITS (equivalent to 10 ECTS) – 250 Total Learning Hours
Cyber security is of crucial importance to all legitimate users of the Internet – from government and commerce through to private users.
The level, scale and profundity of cyber-attacks and fraudulent activity continue to increase. As a result, there is a vital and continuous need for organisations to adapt and enhance security in order to keep abreast of ever more sophisticated forms of attack. In parallel, it is necessary to verify the effectiveness of security arrangements, to identify weaknesses (which are always present) and to determine the value gained from financial investment in cyber defence. In this module, we focus on issues relating to cybersecurity, methods that can be employed in evaluating system security and basic digital forensics techniques which can be used to accrue information pertaining to an attack. We particularly focus on introducing ethical hacking techniques, also known as penetration testing, by which organisations recruit appropriate professionals who are charged with identifying and reporting on security weaknesses. This module provides an opportunity to develop important and highly transferable practical skills underpinned by a theoretical understanding of key issues and methodologies. This is reflected in the various assessment components, by the use of research-informed content and by the expectation that you will develop the breadth of your knowledge by making regular and considered contributions to the virtual classroom’s discussion forum.
Module learning outcomes
On successful completion of the module, you will be able to:
- Critically discuss the threat spectrum of cyberspace attacks and key defensive techniques
- Apply basic tools and techniques in a structured, ethical and professional manner so as to evaluate and report on system security using ethical hacking methodologies
- Apply appropriate basic digital forensics tools and techniques in a structured manner so as to accrue information relevant to a cyber-attack and/or fraudulent activity
Module content
Indicative topics:
- The use and misuse of digital systems
- The myth of total security
- An introduction to digital forensics
- An introduction to ethical hacking and penetration testing
- Ethical and professional responsibilities
- Ethical hacking and the law
- Security fundamentals – technical vulnerabilities
- Security fundamentals – organisational vulnerabilities
- Human factors & social engineering
- Cyber-attacks and illegal activity: techniques and motivations
- Digital forensics – tools and techniques
- Digital forensics – case studies
- Ethical hacking and penetration testing – tools and techniques
- Ethical hacking case studies
- Cyber security and mobile technologies
- Cyber warfare
- Cyber terrorism
- Database Fundamentals – 20 UK CREDITS (equivalent to 10 ECTS) – 250 Total Learning Hours
Starting from scratch and assuming no prior knowledge, this module provides a broad grounding in the fundamental features, analysis, design and implementation of modern relational database systems in multi-user and web-based environments.
It also explores alternative technologies that are available in the database arena along with associated web programming technologies and scripting languages. The key issues of database security, database performance, the incorporation of non-traditional data, the role of database administration and the legal and ethical issues surrounding the storage and security of information are also introduced. A research-infused curriculum is adopted in this module and is reinforced by an expectation that you will regularly contribute to the virtual classroom’s discussion forum. This will provide opportunities to consider diverse cutting-edge issues – thereby supporting the acquisition of a broad range of highly transferable skills.
Module learning outcomes
On successful completion of the module, you will be able to:
- Model, design and implement a relational database with a web-based interface for a given scenario
- Review and critically evaluate database technologies
Module content
Indicative topics:
- Database and database management system fundamentals
- Conceptual data models
- Relational theory and relational algebra
- Database design and normalization
- Database query languages
- Databases and non-traditional data
- Database optimization and query tuning
- Database security techniques
- Web-enabled database techniques (scripting and interfaces)
- Data management principles (ethical and legal issues)
- Data management – future trends and technologies
- Distributed Applications and Web Services – 20 UK CREDITS (equivalent to 10 ECTS) – 250 Total Learning Hours
This module provides a wide-ranging introduction to the various techniques that can be used in the development of distributed applications.
These operate seamlessly across architectures that consist of two or more, and often many, computing machines that are connected via some form of network, eg physical or wireless. A research-infused curriculum is adopted in this module and is re-enforced by an expectation that you will regularly contribute to the virtual classroom’s discussion forum. This will provide opportunities to consider diverse cutting-edge issues – thereby supporting the acquisition of a broad range of highly transferable skills.
Module learning outcomes
On successful completion of the module, you will be able to:
- Critically evaluate the suitability of different platforms and techniques that can be applied when developing distributed applications
- Research appropriate applications so as to demonstrate web services techniques and critically evaluate their effectiveness
- Participate effectively in group work and proactively contribute to the overall organisation of the group
Module content
Indicative topics:
- History of distributed systems and web services
- Distributed computing architectures
- Web service protocols
- Peer-to-peer computing
- Web service orchestration
- Distributed media
- Cloud computing
- Web 2.0, Web 3.0 and beyond
- Internet of Things: An Introduction – 20 UK CREDITS (equivalent to 10 ECTS) – 250 Total Learning Hours
The concept of an ‘Internet of things’ (which is often discussed within the framework of pervasive and ubiquitous forms of computing) relates to the development, deployment and operation of a broad spectrum of Internet-connected devices which are able to communicate with applications, with each other, and with the environment.
The pervasive use of interconnected and intercommunicating sensory technologies offers great opportunities for business, for governmental agencies and for the individual. However, there are a number of ongoing challenges which include reliability, data handling, security and impact on personal privacy. This module provides a practical, interdisciplinary introduction to the Internet of things and to the broader area of pervasive computing. A research-infused curriculum is adopted in this module and is reinforced by an expectation that you will regularly contribute to the virtual classroom’s discussion forum. This will provide opportunities to consider diverse cutting-edge issues – thereby supporting you in the acquisition of a broad range of highly transferable skills. As a part of the assessment for this module, you will have the opportunity to carry out a design and construction exercise in which you will develop and programme one or more Internet-connected devices (usually based on the Arduino or Raspberry Pi technologies). Alternatively, you will undertake a research-informed case study involving research into specific topics.
Module learning outcomes
On successful completion of the module, you will be able to:
- Demonstrate competence in understanding the principles, techniques, protocols and technologies which underpin the Internet of things
- Critically appraise the strengths and weaknesses of the concepts and potential social and ethical ramifications of the Internet of things and of pervasive computing in general
- Critically evaluate the benefits which the Internet of things and pervasive computing offer in advancing indicative areas of application
Module content
Indicative topics:
- Pervasive computing and the Internet of things
- Hardware and software considerations
- Sensor and actuator technologies
- Exemplar devices
- Communication techniques and protocols
- RFID devices
- Power sources and reliability
- Data bandwidth issues
- Wireless sensor networks
- Security issues
- Exemplar case studies – Internet of things in commerce, employment, environment, and m-Health
- Ethical issues
- Current and future research, developments and trends
- Network Management and Security – 20 UK CREDITS (equivalent to 10 ECTS) – 250 Total Learning Hours
This module is intended to provide you with an in-depth understanding of the issues involved in the management of large scale computer networks.
The importance of information security and risk management are highlighted, as are the implications of security compromise and infringement. In particular, the need for network management is discussed, and relevant models to facilitate this are presented. Network infrastructure and capacity planning, together with associated metrics, are investigated, with this being framed in terms of quality of service and the use of service level agreements. Network security concepts and techniques, for example cryptography and encryption, are also introduced in this module. Such topics are particularly relevant to modern computing paradigms, such as cloud computing. A research-infused curriculum is adopted and is reinforced by an expectation that you will regularly contribute to the virtual classroom’s discussion forum. This will provide opportunities to consider diverse cutting-edge issues – thereby supporting you in the acquisition of a broad range of highly transferable skills.
Module learning outcomes
On successful completion of the module, you will be able to:
- Justify the need for network management; consider the main network management functions and discuss both benefits and limitations
- Critically interpret recent research and development in the field of network management security
- Critically review the requirements for the design of a network system so as to meet a given application scenario and evaluate key aspects of its security
Module content
Indicative topics:
- Configuration management
- Event management
- Performance management
- Accounting management
- Network management standards
- Capacity planning
- Aspects of network security, eg authentication, firewalls, physical security, different types of network attacks and risk analysis
- Disaster recovery
- Information security management systems (ISMS)
- Current areas of research and interest in network management, including aspects of cloud computing
- General issues relating to the management of information technology, such as ethical, legal and security of information, as it relates to network management
- Selected case studies
- Software Engineering: Creating Quality Products – 20 UK CREDITS (equivalent to 10 ECTS) – 250 Total Learning Hours
This module provides a wide-ranging and highly practical introduction to the software life cycle – from software specification and design through to programming, testing and documentation.
Basic programming techniques are introduced at an early stage and so previous programming experience is not assumed. However, those who have programming skills will gain the opportunity to extend their understanding of software development as an engineering process and to apply this knowledge in the implementation of a larger software development task. Practical programming is taught within a framework of software engineering techniques thereby allowing you to better appreciate that the ability to cut code represents only one (albeit crucial) part of the software life cycle. Learners are introduced to a range of highly transferable skills which are needed in order to produce fully-documented high-quality software products. As part of the assessment for this module, you will design, develop, test and document several programmes. You may undertake this work individually or form a group (software development team). Groups normally comprise three members. Group work is strongly encouraged – but is not a requirement. You are expected to make regular contributions to the virtual classroom’s discussion forum.
Module learning outcomes
On successful completion of the module, you will be able to:
- Demonstrate competence in basic algorithm design, program coding, documentation development, and debugging
- Apply software engineering techniques across key areas of the software life cycle
- Critically appraise software development processes with particular reference to software specification, documentation and testing
Module content
Indicative topics:
- Origins and evolution of software engineering techniques
- Examples of good and bad practice, software quality
- Software project management
- Human factors
- Introduction to programming
- Algorithm design
- Software life cycle
- Sequential development strategy – strengths and weaknesses
- Agile development
- Software specification
- Programming strategies
- Development environments
- Testing strategies and techniques
- Exhaustive testing
- Documentation techniques
- Web Development: Creating Effective Applications – 20 UK CREDITS (equivalent to 10 ECTS) – 250 Total Learning Hours
This module explores historical, current, and emerging issues, technologies, practices, and infrastructure relating to the creation of large-scale, multi-function websites.
Particular emphasis is given to supporting wide-ranging functionality, eg a combination of e-commerce, communication, social networking, content and management. Particular attention is given to the application of rational methods and critical thinking in the selection of the web technologies which are most suited to a given application scenario. A research-infused curriculum is adopted in this module and is reinforced by an expectation that you will regularly contribute to the virtual classroom’s discussion forum. This will provide opportunities to consider diverse cutting-edge issues – thereby supporting you in the acquisition of a broad range of highly transferable skills. As part of the assessment for this module, you will have the opportunity to carry out a research-informed case study and develop a working web application for a given application.
Module learning outcomes
On successful completion of the module, you will be able to:
- Review and critically evaluate available web-based application implementation options
- Interpret web-based application development issues
- Identify and justify the design decisions involved in implementing fully featured, multi-function websites
Module content
Indicative topics:
- Internet protocols and standards
- A review of current development platforms and technologies in the context of developing complex web applications
- Site implementation strategies
- Services oriented architecture and web services
- Current trends in the application of internet technologies (for both individual and business use)
- Content management systems
- Web connectivity
- Accessibility
- Emerging technologies, ‘hot topics’ and new developments
- General issues relating to the management of information technology, such as ethical considerations and security of information, as they relate to web technologies
- Responsive template
- Evaluation of the suitability of mobile technologies for different situations
- Examination of the ethical implications of the use of mobile technologies