Click here to start your application. Apply now

Academic Handbook BSc (Hons) Digital and Technology Solutions

Cyber Security Analyst End-Point Assessment Course Descriptor

Course Code LCSCI62109A Discipline Computing and Information Systems
UK Credit 30 US Credit N/A
FHEQ Level 6 Date Approved October 2023
Core Attributes
Pre-Requisites
Co-Requisites

Course Overview

Digital and Technology Solutions Professionals are found in organisations where digital technologies can be used to solve problems that exist across a range of functions. DWhether looking for ways to reduce waste, increase productivity, ensure resilient and responsive customer service, or create a secure transactional environment, organisations turn to digital and technological solutions to achieve these aims. Wherever these activities take place Digital and Technology Solutions Professionals are influencing outcomes and making things happen.

A cyber security analyst typically leads in the work to define, implement and maintain security products and systems within an organisation’s policies and service level agreements. They will need to analyse and understand the points of vulnerability within information technology systems and a proactive and agile approach to maintain high levels of systems and organisational security. They will monitor security performance using tools, statistical reporting and analysis, using the output of monitoring to problem solve, propose improvements and implement changes to meet service level requirements. A cyber security analyst leads technical implementation of security infrastructures and technical designs, including producing cost and timescale estimates and identifying risks. After implementation they take ownership for obtaining the information required to diagnose and resolve more complex problems and escalations such as security incidents and business recovery. They engage with third parties to jointly resolve in-depth product issues where necessary and complete cyber risk assessments.

This course enables learners to demonstrate the occupational competencies of the role via a work-based project and a portfolio. The implementation of the course assessments will be in line with the Digital and Technology Solutions Professional End-Point Assessment Plan.

Learning Outcomes

On successful completion of the course, students will be able to:

Knowledge and Understanding

K1c Plan and deliver a substantial individual project by applying  a digital technology solutions and demonstrate a competitive advantage by adapting and exploiting it
K1c Assess sustainable development approaches within digital technologies as they relate to their role including diversity and inclusion.
K1c Critically evaluate the ethical principles and codes of good practice of at least one significant cyber security professional body and the ethical responsibilities of a cyber security professional
K1c Critically assess concepts and approaches to cyber security assurance
K2c Deploy the principles of strategic decision making concerning the acquisition or development of digital and technology solutions
K2c Produce a project plan which estimates risks and opportunities  and determines mitigation strategies.
K2c Critically evaluate appropriate techniques and approaches that are used in creating a business case
K2c Apply techniques to estimate cost and time resource constraints
K2c Critically Analyse the business problem behind the project proposal to identify the role of digital and technology solutions
K2c Deploy the principles of quantitative and qualitative risk management theory including the role of risk stakeholders.
K3c Apply the principles of cyber security tools and techniques, security architectures and methodologies to the project.
K3c Apply the key legislative frameworks and the regulatory landscape for cyber security
K3c Evaluate approaches to incident response and management including escalation and investigation of cyber security breaches and their root cause
K3c Demonstrate how to undertake security risk assessments for complex systems without direct supervision and propose a remediation strategy relevant to the context of the organisation
K3c Critically evaluate the nature and scope of common vulnerabilities in digital and technology solutions
K4c Critically reflect on core technical concepts for digital and technology solutions and their applicability to organisation’s standards; data gathering, data management, data analysis and computer networking concepts.
K4c Demonstrate how teams work effectively to produce a digital and technology solution applying relevant organisational theories using up to date awareness of trends and innovations.
K4c Critically evaluate the concepts and principles of leadership and management as they relate to their role and how they apply them
K4c Critically analyse relevant evidence to produce a proposal for a digital and technology based project in line with legal, ethical and regulatory requirements whilst ensuring the protection of personal data, safety and security

Subject Specific Skills

S1c Apply relevant legal, ethical, social and professional standards to digital and technology solutions considering both technical and non-technical audiences and in line with organisational guidelines.
S2c Manage cyber security risk
S3c Recommend improvements to the cyber security approaches of an organisation based on research into future potential cyber threats and considering threat trends in the project.
S3c Analyse cyber security requirements in the project against other design requirements for systems or products and identify conflicting requirements and recommend appropriate solutions with clear explanation of costs/benefits
S3c Lead the design and build of systems in accordance with a security case to address organisational challenges in the project
S3c Discover, identify and analyse security threats, attack techniques and vulnerabilities using cyber security architectures, methodologies, tools and techniques to recommend mitigation and security controls in the project
S3c Select and apply cyber security tools and techniques in relation to the risks identified in the context of the project
S3c Lead cyber security awareness campaigns and evaluate their effectiveness
S3c Demonstrate the use of core technical concepts for digital and technology solutions, including: Initiate, design, code, test and debug a software component for a digital and technology solution; security and resilience techniques and apply the principles of data analysis

 

Transferable and Employability Skills

T1c Present an overview of the project to appropriate stakeholders using appropriate language and style
T1c Display an advanced level of technical proficiency in written English and competence in applying scholarly terminology, so as to be able to apply skills in critical evaluation, analysis and judgement effectively in a diverse range of contexts.
T3c Make meaningful conclusions on the basis of a long period of independent study.
T4c Manage the project delivery to achieve digital and technology solutions
T4c Justify the methods of research and evaluation which determined the selection of digital and technology solutions identified for the project

Teaching and Learning

The contact hours on this course are formed predominantly of supervisory meetings, typically 4 x 1 hour.

Students are also expected to manage their self-directed learning and independent study in support of the course.

The course learning and teaching hours will be structured as follows:

  • Off-the-job learning and teaching (12 days x 7 hours) = 84 hours
  • On-the-job learning (24 days x 7 hours) = 168 hours (e.g. 2 days per week for 12 weeks)
  • Independent study (4 hours per week) = 48 hours

Workplace assignments (see below) will be completed as part of on-the-job learning.

Indicative total learning hours for this course: 300

Assessment

Both formative and summative assessment are used as part of this course, with purely formative opportunities typically embedded within interactive teaching sessions, office hours, and/or the VLE.

Summative Assessments

AE: Assessment Activity Weighting (%) Duration Length
1 Project report with presentation, questions and answers 50%   6000 word (report) & 60 minutes (presentation and Q&A)
2 Professional discussion underpinned by a portfolio 50%   60 minutes

Feedback

Students will receive formative and summative feedback in a variety of ways, written (e.g. marked up on assignments, through email or the VLE) or oral (e.g. as part of interactive teaching sessions or in office hours).

Indicative Reading

Note: Comprehensive and current reading lists are produced annually in the Course Syllabus or other documentation provided to students; the indicative reading list provided below is for a general guide and part of the approval/modification process only.

  • Walliman, N., (2013), Your Undergraduate Dissertation: The Essential Guide for Success, London: Sage.
  • Rugg, G., & Petre, M. (2006). A gentle guide to research methods. McGraw-Hill Education (UK).
  • Berndtsson, M., Hansson, J., Olsson, B., & Lundell, B. (2007). Thesis projects: a guide for students in computer science and information systems. Springer Science & Business Media.
  • Stephan Felix, M., & Smith, I. (2019). A practical guide to dissertation and thesis writing. Cambridge Scholars Publishing.
  • Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review. International journal of information management, 36(2), pp.215-225.
  • Katsikeas, S., Johnson, P., Ekstedt, M. and Lagerström, R., 2021. Research communities in cyber security: A comprehensive literature review. Computer Science Review, 42, p.100431.

Indicative Topics

Note: Comprehensive and current topics for courses are produced annually in the Course Syllabus or other documentation provided to students; the indicative topics provided below is used as a general guide and part of the approval/modification process only.

  • How to solve a technological problem based on an organisation’s problem
  • Managing technology projects to a successful outcome
  • Using real-world data and scenarios

Version History

Title: LCSCI62109A Cyber Security Analyst End-Point Assessment Course Descriptor

Approved by: Academic Board

Location: academic-handbook/digital-and-technology-solutions

Version number Date approved Date published Owner Proposed next review date Modification (As per AQF4) & category number
1.0 October 2023 October 2023 Dr Alexandros Koliousis October 2028
Print/Save PDF