Awards
Target Award
Award Description:Bachelor of Science with Honours (SW) (Fnd) - SBSHF
Recruitable Target
Alternative Exit
Alternative Exit
Alternative Exit
Alternative Exit
Alternative Exit
Accreditation
BCS, the Chartered Institute for IT
Programme Offerings
Full-Time
F2F-JMU-SEP
Sandwich Year Out
F2F-JMU-SEP
Educational Aims of the Course
The two principal themes in the programme are the development of computer science skills relating to information security, and the associated software engineering, management and analysis skills required to enact successful information security within networked computing environments. This is underpinned by themes of computing, networking and software engineering. The main aims are: -To provide students with the technical skills required for the development of computer security software solutions. -To enable the student to acquire the skills needed in the investigation of user requirements and the development of a suitable software design using the appropriate specifications and design methodologies. -To prepare students with the management skills required to implement Computer security. -To provide students with the knowledge of the wide range of issues involved in the implementation of Computer security, such as legal, ethical and privacy requirements. - To encourage students to engage with the development of employability skills by completing a self-awareness statement. -To provide students with a comprehensive understanding, critical awareness and ability to conduct evaluation of current computer security research issues. -To further develop students' originality in applying analytical, creative, problem solving and research skills. -To provide advanced, conceptual understanding, underpinning career development, innovation and further study such as PhD in the area of Computer Security. -For students undertaking a placement year the aim is to provide students with an extended period of work experience at an approved partner that will complement their programme of study at LJMU. This will give the students the opportunity to develop professional skills relevant to their programme of study, as well as attitude and behaviours necessary for employment in a diverse and changing environment.
Learning Outcomes
1.
Apply Computer Programming techniques to solve computer security problem.
2.
Critically evaluate and test theories, concepts and systems relating to computer security.
3.
Plan, conduct and report a research project.
4.
Critically analyse evidence data for an security investigation.
5.
Evaluate security investigation and response methodologies.
6.
Work professionally as a member of a team.
7.
Identify and deploy appropriate tools and techniques for ethical hacking and security investigations.
8.
Conduct research into Computer Security.
9.
Apply numerical methods to computing problems involving a quantitative dimension.
10.
Communicate complex information effectively by written or verbal means.
11.
Identify job roles and opportunities that reflect personal interest and expertise.
12.
Manage a software development process, including secure software development.
13.
Plan and manage personal learning and development.
14.
Work on computer security problems in an ethical way.
15.
Design, plan and execute complex network security investigations.
16.
Use a wide range of IT infrastructure such as hardware / network configurations, types of systems, development tools, and emerging technologies to solve computing problems.
17.
Critically reflect on a wide range of security knowledge domains, such as physical and logical security, legal issues, privacy, internet security, and protection including forensics.
18.
Deploy a wide range of appropriate computing tools, facilities and techniques to solve a computer security problem.
19.
Utilise complex methods and skills to solve well-defined computer-based problems.
20.
Reflect on the impact of new technologies / standards / legal requirements on the security domain.
Teaching, Learning and Assessment
Acquisition of the skills is through a combination of lectures, tutorials, practical sessions and laboratory work. These skills are assessed across the 3 upper levels of the programme in a range of different assessments such as coursework, presentations and examinations. Throughout the learner is encouraged to undertake independent reading both to supplement and consolidate what is being taught / learnt and to broaden their individual knowledge and understanding of the subject.
Programme Structure
Programme Structure Description
The placement year, module 5102COMSCI, will follow Level 5 and students will be enrolled on a 480 credit honours sandwich programme. The Level 5 mean for the final award mark will be calculated based upon the 240 credits at Level 5. Students successfully completing the assessment of the placement year … For more content click the Read More button below.
Structure
Level 3
Level 4
Level 5
Level 6
Entry Requirements
A levels
Access awards
BTECs
GCSEs and equivalents
IELTS
International Baccalaureate
Interview required
Irish awards
OCR Cambridge Technical
Reduced offer scheme
T levels
UCAS points
Welsh awards
Extra Entry Requirements
Is a DBS check required?
No