Learning outcome
1.1

Strategy and planning

1.2

Security and privacy

1.3

Governance, risk and compliance

1.4

Advice and guidance

2.5

Change implementation

2.6

Change analysis

2.7

Change planning

3.8

Systems development

3.9

Data and analytics

3.10

User experience

3.11

Content management

3.12

Computational science

4.13

Technology management

4.14

Service management

4.15

Security services

5.16

People management

5.17

Skills management

6.18

Stakeholder management

6.19

Sales and marketing

A1

Demonstrate initiative and judgement to adapt cyber security technologies to unique and diverse contexts.

A2

Relate and interpret emerging developments in cyber security to historical developments.

K1

Analyse and describe the principles of information in the context of cyber security threats and attacks

K2

Investigate Internet tools used by hackers to penetrate systems and launch attacks.

K3

Differentiate and integrate legal, privacy and ethical aspects in the context of cyber security.

K4

Review basic security issues related to wired, wireless and mobile networks covering authentication, message encryption and key management.

K5

Analyse different mitigation mechanisms and prevention to determine and evaluate possible security solutions.

S1

Outline threats and risks from cyberspace.

S2

Appraise the encryption strength by the key size and algorithm applied.

S3

Perform the anti-malware scanning and/or intrusion detection using open source software.

S4

Utilize open-source tools to create a simple yet fully functional firewall.

S5

Compare and contrast presentations of cyber security topics.

Learning outcome
1.1

ICT Fundamentals

1.2

ICT Infrastructure

1.3

Information & Data Science and Engineering

1.4

Computational Science and Engineering

1.5

Application Systems

1.6

Cyber Security

1.7

ICT Projects

1.8

ICT Management and Governance

2.1

Professional ICT Ethics

2.2

Impacts of ICT

2.3

Working Individually and in ICT development teams

2.4

Professional Communication

2.5

The Professional ICT Practitioner

A1

Demonstrate initiative and judgement to adapt cyber security technologies to unique and diverse contexts.

A2

Relate and interpret emerging developments in cyber security to historical developments.

K1

Analyse and describe the principles of information in the context of cyber security threats and attacks

K2

Investigate Internet tools used by hackers to penetrate systems and launch attacks.

K3

Differentiate and integrate legal, privacy and ethical aspects in the context of cyber security.

K4

Review basic security issues related to wired, wireless and mobile networks covering authentication, message encryption and key management.

K5

Analyse different mitigation mechanisms and prevention to determine and evaluate possible security solutions.

S1

Outline threats and risks from cyberspace.

S2

Appraise the encryption strength by the key size and algorithm applied.

S3

Perform the anti-malware scanning and/or intrusion detection using open source software.

S4

Utilize open-source tools to create a simple yet fully functional firewall.

S5

Compare and contrast presentations of cyber security topics.