| Learning outcome |
1.1Strategy and planning |
1.2Security and privacy |
1.3Governance, risk and compliance |
1.4Advice and guidance |
2.5Change implementation |
2.6Change analysis |
2.7Change planning |
3.8Systems development |
3.9Data and analytics |
3.10User experience |
3.11Content management |
3.12Computational science |
4.13Technology management |
4.14Service management |
4.15Security services |
5.16People management |
5.17Skills management |
6.18Stakeholder management |
6.19Sales and marketing |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A1Demonstrate initiative and judgement to adapt cyber security technologies to unique and diverse contexts. |
|||||||||||||||||||
A2Relate and interpret emerging developments in cyber security to historical developments. |
|||||||||||||||||||
K1Analyse and describe the principles of information in the context of cyber security threats and attacks |
|||||||||||||||||||
K2Investigate Internet tools used by hackers to penetrate systems and launch attacks. |
|||||||||||||||||||
K3Differentiate and integrate legal, privacy and ethical aspects in the context of cyber security. |
|||||||||||||||||||
K4Review basic security issues related to wired, wireless and mobile networks covering authentication, message encryption and key management. |
|||||||||||||||||||
K5Analyse different mitigation mechanisms and prevention to determine and evaluate possible security solutions. |
|||||||||||||||||||
S1Outline threats and risks from cyberspace. |
|||||||||||||||||||
S2Appraise the encryption strength by the key size and algorithm applied. |
|||||||||||||||||||
S3Perform the anti-malware scanning and/or intrusion detection using open source software. |
|||||||||||||||||||
S4Utilize open-source tools to create a simple yet fully functional firewall. |
|||||||||||||||||||
S5Compare and contrast presentations of cyber security topics. |
| Learning outcome |
1.1ICT Fundamentals |
1.2ICT Infrastructure |
1.3Information & Data Science and Engineering |
1.4Computational Science and Engineering |
1.5Application Systems |
1.6Cyber Security |
1.7ICT Projects |
1.8ICT Management and Governance |
2.1Professional ICT Ethics |
2.2Impacts of ICT |
2.3Working Individually and in ICT development teams |
2.4Professional Communication |
2.5The Professional ICT Practitioner |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
A1Demonstrate initiative and judgement to adapt cyber security technologies to unique and diverse contexts. |
|||||||||||||
A2Relate and interpret emerging developments in cyber security to historical developments. |
|||||||||||||
K1Analyse and describe the principles of information in the context of cyber security threats and attacks |
|||||||||||||
K2Investigate Internet tools used by hackers to penetrate systems and launch attacks. |
|||||||||||||
K3Differentiate and integrate legal, privacy and ethical aspects in the context of cyber security. |
|||||||||||||
K4Review basic security issues related to wired, wireless and mobile networks covering authentication, message encryption and key management. |
|||||||||||||
K5Analyse different mitigation mechanisms and prevention to determine and evaluate possible security solutions. |
|||||||||||||
S1Outline threats and risks from cyberspace. |
|||||||||||||
S2Appraise the encryption strength by the key size and algorithm applied. |
|||||||||||||
S3Perform the anti-malware scanning and/or intrusion detection using open source software. |
|||||||||||||
S4Utilize open-source tools to create a simple yet fully functional firewall. |
|||||||||||||
S5Compare and contrast presentations of cyber security topics. |