Partner Details

YPC International College (Kolej Antarabangsa YPC)

Awards

Target Award

Award Description:Bachelor of Science with Honours - BSH

Alternative Exit

Alternative Exit

Programme Offerings

Full-Time

F2F-YPC-SEP

Educational Aims of the Course

The two principal themes in the programme are the development of computer science skills relating to information security, and the associated software engineering, management and analysis skills required to enact successful information security within networked computing environments. This is underpinned by themes of computing, networking and software engineering. The main aims are: - To provide students with the technical skills required for the development of computer security software solutions. - To enable the student to acquire the skills needed in the investigation of user requirements and the development of a suitable software design using the appropriate specifications and design methodologies. - To prepare students with the management skills required to implement Computer Security. - To provide students with the knowledge of the wide range of issues involved in the implementation of Computer Security, such as legal, ethical and privacy requirements. - To encourage students to engage with the development of employability skills by completing a self-awareness statement. - To provide students with a comprehensive understanding, critical awareness and ability to conduct evaluation of current computer security research issues. - To further develop students' originality in applying analytical, creative, problem solving and research skills. - To provide advanced, conceptual understanding, underpinning career development, innovation and further study such as PhD in the area of Computer Security.

Learning Outcomes

1.
Apply Computer Programming techniques to solve computer security problems.
2.
Critically evaluate and test theories, concepts and systems relating to computer security.
3.
Plan, conduct and report a research project.
4.
Critically analyse evidence data for a security investigation.
5.
Evaluate security investigation and response methodologies.
6.
Work professionally as a member of a team.
7.
Identify and deploy appropriate tools and techniques for ethical hacking and security investigations.
8.
Conduct research into Computer Security.
9.
Apply numerical methods to computing problems involving a quantitative dimension.
10.
Communicate complex information effectively by written or verbal means.
11.
Identify job roles and opportunities that reflect personal interest and expertise.
12.
Manage a software development process, including secure software development.
13.
Plan and manage personal learning and development.
14.
Work on computer security problems in an ethical way.
15.
Design, plan and execute complex network security investigations.
16.
Use a wide range of IT infrastructure such as hardware / network configurations, types of systems, development tools, and emerging technologies to solve computing problems.
17.
Critically reflect on a wide range of security knowledge domains, such as physical and logical security, legal issues, privacy, internet security, and protection including forensics.
18.
Deploy a wide range of appropriate computing tools, facilities and techniques to solve a computer security problem.
19.
Utilise complex methods and skills to solve well-defined computer-based problems.
20.
Reflect on the impact of new technologies / standards / legal requirements on the security domain.

Teaching, Learning and Assessment

Acquisition of the skills is through a combination of lectures, tutorials, practical sessions and laboratory work. These skills are assessed across the 3 levels of the programme in a range of different assessments such as coursework, presentations and examinations. Throughout the learner is encouraged to undertake independent reading both to supplement and consolidate what is being taught / learnt and to broaden their individual knowledge and understanding of the subject.

Opportunities for work related learning

Level 4: 4703YCOM Professional Practice - this module provides students with an opportunity to consider their future role as a computing professional and develop a plan to enable them to progress in their chosen career. Level 5: 5700YCOM Group Project - this module provides further insight into developing the role of the student becoming a computing professional, via teamwork and consideration of professional issues within computer security. Students will be encouraged to become student members of appropriate professional bodies for the computing industry (e.g. ACM, IEEE or BCS) as part of their development.

Programme Structure

Programme Structure Description

Students starting on this programme prior to September 2022 will be required to complete the modules specified in the programme specification in force when they commenced their study. This requirement may be varied should a student take a leave of absence or be required to complete final module attempts.

Entry Requirements

Alternative qualifications considered

HECoS Code(s)

(CAH11-01) computing