institution’s letter of support · web viewissue 1.021 july 2020 issue 1.021 july 2020 page 2 of...

38
Issue 1.0 21 July 2020 Guidance and Application Template for: Application for Certification of a Postgraduate Master’s Degree Focusing on a Specialised Area of Cyber Security This document provides an application template for an HEI to have its Master’s degree in Cyber Security considered for certification. It provides general guidance only and it is an HEI’s sole responsibility to ensure that its application is compliant and provides the information required in the corresponding call document. It is not a requirement that applicants use the template. Applicants should refer to the call document for detailed guidance on completing all sections of the application as well as details of the assessment criteria that apply. Applicants should note that to help assessors with their assessment of applications, all applications should have a table of contents and make use of headers, footers and hyperlinks. Some points to note: The minimum font size for applications is 10pt. However, it is recognised that to help fit some tables into the space available the text in some tables can be made smaller than 10pt. Text in blue is to help guide applicants on what may be an appropriate response to some sections of the application and is provided by way of example only. Please feel free to delete this page from your completed application Document History Issue Date Comment Issue 1.0 21 July 2020 First issue of application template for specialised Master’s degrees © Crown Copyright 2020, The National Cyber Security Centre Page 1 of 38

Upload: others

Post on 25-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

Guidance and Application Template for:

Application for Certification of a Postgraduate Master’s Degree Focusing on a Specialised Area of Cyber Security

This document provides an application template for an HEI to have its Master’s degree in Cyber Security considered for certification. It provides general guidance only and it is an HEI’s sole responsibility to ensure that its application is compliant

and provides the information required in the corresponding call document. It is not a requirement that applicants use the template.

Applicants should refer to the call document for detailed guidance on completing all sections of the application as well as details of the assessment criteria that apply.

Applicants should note that to help assessors with their assessment of applications, all applications should have a table of contents and make use of headers, footers and hyperlinks.

Some points to note: The minimum font size for applications is 10pt. However, it is recognised that to help fit some tables into the space

available the text in some tables can be made smaller than 10pt. Text in blue is to help guide applicants on what may be an appropriate response to some sections of the application

and is provided by way of example only.

Please feel free to delete this page from your completed application

Document History

Issue Date CommentIssue 1.0 21 July 2020 First issue of application template for specialised Master’s degrees

© Crown Copyright 2020, The National Cyber Security Centre

Page 1 of 33

Page 2: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

University of X

Application for Provisional/Full1 Certification of a Master’s Degree Focusing on a Specialised Area of Cyber Security

1 Please delete either ‘full’ or ‘provisional’

Page 2 of 33

Page 3: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

Table of contents1. Institution’s Letter of Support..............................................................................................................................................6

1.1 Signed letter of support for both full and provisional applications.............................................................................6

1.2 For provisional applications........................................................................................................................................6

2. Description of the Applicant................................................................................................................................................7

2.1 Team...........................................................................................................................................................................7

2.2 Recent investments.....................................................................................................................................................8

2.3 External linkages.........................................................................................................................................................8

2.4 Review and update process.........................................................................................................................................8

2.5 Facilities...................................................................................................................................................................... 8

2.6 Staff CVs......................................................................................................................................................................9

3. Description of the Master’s degree in Cyber Security........................................................................................................10

3.1 Description of the degree..........................................................................................................................................10

3.2 Number of taught credits that can be mapped to CyBOK Knowledge Areas (KAs)....................................................12

3.3 Detailed coverage of KA Topics ................................................................................................................................13

3.4 Justification of KA coverage for a Master’s degree focusing on a specialised area of cyber security........................17

3.5 Module descriptions..................................................................................................................................................17

3.6 Research dissertations accounting for more than 80 credits....................................................................................17

3.7 Professional Knowledge and Skills.............................................................................................................................17

4. Assessment materials........................................................................................................................................................18

4.1 Approach to assessment for both full and provisional applications..........................................................................18

4.1.1 Approach to assessment.......................................................................................................................................18

4.1.2 Marking.................................................................................................................................................................18

4.1.3 Justification of 40% pass mark..............................................................................................................................18

4.1.4 Rigour of assessment............................................................................................................................................18

4.2 Examination papers...................................................................................................................................................19

4.2.1 Provisional application..........................................................................................................................................19

4.2.2 Full application......................................................................................................................................................19

4.3 External examiner’s report – full application only.....................................................................................................19

5. Original research dissertations..........................................................................................................................................20

5.1 Applications for both full and provisional certification..............................................................................................20

5.1.1 Guidance to students............................................................................................................................................20

5.1.2 Allocation of dissertation topics............................................................................................................................20

5.1.3 Scope of dissertation topics..................................................................................................................................20

5.1.4 Monitoring of students’ progress.........................................................................................................................20

5.1.5 Assessment of dissertations..................................................................................................................................20

Page of

TABLE OF CONTENTS

Page 4: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

5.1.6 Research dissertations contributing fewer than 40 credits...................................................................................21

5.2 Dissertations – for full certification only...................................................................................................................21

5.2.1 List of dissertation topics......................................................................................................................................21

5.2.2 Example dissertations...........................................................................................................................................22

5.2.3 Marks for example dissertations...........................................................................................................................22

6. Student numbers and grades achieved – applications for full certification only................................................................23

6.1 Student entry data....................................................................................................................................................23

6.2 Student exit data.......................................................................................................................................................25

6.3 Student satisfaction...................................................................................................................................................25

7. Appendix A: Staff CVs (Appendix to section 2 of application)............................................................................................26

7.1 CV for Dr E. F.............................................................................................................................................................26

7.1.1 Personal statement of experience and expertise in cyber security.......................................................................26

7.1.2 Academic background...........................................................................................................................................26

7.1.3 Professional employment.....................................................................................................................................26

7.1.4 Contribution to cyber security at the University of X............................................................................................26

7.1.5 Esteem indicators.................................................................................................................................................26

7.1.6 Cyber security knowledge and expertise indicators..............................................................................................26

7.1.7 Any other information..........................................................................................................................................26

7.2 CV for Dr G. H............................................................................................................................................................27

7.2.1 Personal statement of experience and expertise in cyber security.......................................................................27

7.2.2 Academic background...........................................................................................................................................27

7.2.3 Professional employment.....................................................................................................................................27

7.2.4 Contribution to cyber security at the University of X............................................................................................27

7.2.5 Esteem indicators.................................................................................................................................................27

7.2.6 Cyber security knowledge and expertise indicators..............................................................................................27

7.2.7 Any other information..........................................................................................................................................27

7.3 CV for I. J...................................................................................................................................................................28

7.3.1 Personal statement of experience and expertise in cyber security.......................................................................28

7.3.2 Academic background...........................................................................................................................................28

7.3.3 Professional employment.....................................................................................................................................28

7.3.4 Contribution to cyber security at the University of X............................................................................................28

7.3.5 Esteem indicators.................................................................................................................................................28

7.3.6 Cyber security knowledge and expertise indicators..............................................................................................28

7.3.7 Any other information..........................................................................................................................................28

7.4 CV for K. L..................................................................................................................................................................29

7.4.1 Personal statement of experience and expertise in cyber security.......................................................................29

Page of

TABLE OF CONTENTS

Page 5: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

7.4.2 Academic background...........................................................................................................................................29

7.4.3 Professional employment.....................................................................................................................................29

7.4.4 Contribution to cyber security at the University of X............................................................................................29

7.4.5 Esteem indicators.................................................................................................................................................29

7.4.6 Cyber security knowledge and expertise indicators..............................................................................................29

7.4.7 Any other information..........................................................................................................................................29

8. Appendix B: Module descriptions (Appendix to section 3 of application)..........................................................................30

8.1 Forensics-1 module...................................................................................................................................................30

8.2 Forensics-2 module...................................................................................................................................................30

8.3 Network Security module..........................................................................................................................................30

8.4 Cyber Security module..............................................................................................................................................30

8.5 Research Methods module.......................................................................................................................................30

8.6 Cloud Computing module..........................................................................................................................................30

8.7 Data Science module.................................................................................................................................................30

8.8 Machine Learning module.........................................................................................................................................30

8.9 Project Management module...................................................................................................................................30

9. Appendix C: Assessment materials (Appendix to section 4 of application)........................................................................31

9.1 Forensics-1 assessments...........................................................................................................................................31

9.2 Forensics-2 assessments...........................................................................................................................................31

9.3 Network Security assessments..................................................................................................................................31

9.4 Cyber Security assessments......................................................................................................................................31

9.5 Research Methods assessments................................................................................................................................31

9.6 Cloud Computing assessments..................................................................................................................................31

9.7 Data Science assessments.........................................................................................................................................31

9.8 Machine Learning assessments.................................................................................................................................31

9.9 Project Management assessments............................................................................................................................31

9.10 External examiner’s report........................................................................................................................................31

9.11 HEI’s response to external examiner’s report...........................................................................................................31

10. Appendix D: Original Research Dissertations (Appendix to section 5 of application).........................................................32

10.1 Dissertation awarded a distinction............................................................................................................................32

10.1.1 Distinction dissertation.....................................................................................................................................32

10.1.2 Distinction dissertation information.................................................................................................................32

10.2 Dissertation awarded a merit....................................................................................................................................32

10.2.1 Merit dissertation.............................................................................................................................................32

10.2.2 Merit dissertation information.........................................................................................................................32

10.3 Dissertation awarded a pass.....................................................................................................................................32

Page of

TABLE OF CONTENTS

Page 6: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

10.3.1 Pass dissertation...............................................................................................................................................32

10.3.2 Pass dissertation information...........................................................................................................................32

Page of

TABLE OF CONTENTS

Page 7: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

1. Institution’s Letter of SupportUp to two sides of A4

1.1 Signed letter of support for both full and provisional applicationsThe Letter of Support is not scored but must be present. Its purpose is to show that the senior management of the HEI is fully supportive of the application. The Letter should make it clear which degree is being submitted for certification and against which certification standard.

The Letter must be from the Vice Chancellor or equivalent. The Letter must be signed and dated. Please note that a Letter from the Head of Department submitting the application is not acceptable.

The Letter should be viewed as an opportunity for the HEI’s senior management to:

demonstrate commitment to the Master’s programme specifically and cyber security more generally

highlight recent HEI investment in the area and any future planned investment

describe the importance of the area in the HEI’s future strategy, etc.

outline how Covid-19 is impacting the HEI generally and the Master’s degree specifically along with the steps being taken by the HEI to deal with the issues being raised

1.2 For provisional applicationsIf the Master’s has not yet started, it is important that the HEI confirms that it will start by October 2022.

If the Master’s meets the requirements for full certification, it is important that the HEI confirms that provisional certification is being applied for and why.

Page 7 of 33

INSTITUTION’S LETTER OF SUPPORT

Page 8: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

2. Description of the ApplicantUp to 5 sides of A4, excluding CVs

2.1 TeamProvide the names and structure of the department(s)/group(s)/school(s) responsible for the Master’s degree together with the names, seniority and roles of the members of staff responsible for delivering the degree content, setting and marking examinations, supervising dissertations, etc.

Provide a diagram that clearly shows the roles and responsibilities of team members. Where there is a core team delivering the Master’s, it may be helpful to clearly separate the core team from ‘associate’ members of the team. Describe briefly how the team functions as a cohesive unit

By way of example only:

Figure 2.1: Example of HEI organisational structure relevant to the application

By way of example only:

Name of Staff Member

Position Responsibilities Relevant Expertise

CV for Dr E. F. Senior Lecturer and Master’s Course Director

Ensures overall coherence and quality of Master’s

delivers module on Cyber Security delivers module on Research Methods oversees research projects

broad knowledge of cyber security successfully managed and

delivered academic programmes over past 10 years

CV for Dr G. H.Error: Reference source not found

Reader delivers Network Security module supervises research projects

key-note presenter at recent network security conferences

CV for I. J. Lecturer delivers Forensics-1 module supervises research projects

extensive experience of applying digital forensics in industry

Page 8 of 33

DESCRIPTION OF THE APPLICANT

Page 9: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

Other staff members

…. …. ….

CV for K. L. Error: Reference source not found

External Consultant with 3-year contract October 2020 – September 2023

delivers a number of lectures in Forensics-2 module

runs successful forensics company provides forensics advice to

government and industry

Table 2.1: Example of a synopsis of the team delivering the Master’s

It is highly recommended to provide hyperlinks to the staff CVs shown in Appendix A so that assessors can quickly cross check the information in Table 2.1 with the information provided in the CVs.

2.2 Recent investmentsDescribe any recent investments from the HEI, government, industry etc. in the groups running the Master’s degree programme. If appropriate, it is advisable to highlight the benefits to the team delivering the degree as well as students undertaking the degree.

By way of example only:

50K in financial year 2018-19 from the HEI to the Cyber Security Group for the refurbishment and upgrade of its Forensics Laboratory for equipment and software (provide examples) that Master’s students use

100K across financial years 2017-18 and 2018-19 for networking equipment from Manufacturer X to the Department of Computing for the Networking Laboratory that Master’s students will be able to use

150K in financial year 2017-18 from the HEI to the Department of Computing for new PCs, laptops and peripherals that will be of benefit to Master’s students also

20K in financial year 2016-17 from the HEI to the Cyber Security Group to enable members of staff to gain professional cyber security qualifications (e.g., forensic analyst, risk analyst, etc.)

2.3 External linkagesDescribe any external linkages that add value to the Master’s degree, and the impact these bring to the degree programme: e.g., visiting lecturers with specialist knowledge from other academic departments, government or industry; projects suggested, and monitored, by industry; etc.

By way of example only:

External Advisory Board – e.g., meets twice yearly, membership from industry, government and academia. Membership has strong cyber security representation. If applicable, provide some examples of advice from Advisory Board that has been acted on.

Company X provides series of invited lectures on Forensics and suggests topics for research dissertations. Company Y has donated equipment for joint projects that Master’s students can use. Membership of the CISSE UK2 network that provides external speakers, course materials and cyber security

challenges for students.

2.4 Review and update processDescribe the process used to review and renew the course content to keep it up to date, for example: how often is the course content reviewed, by whom, and what external advice is taken (e.g., industrial advisory boards).

2.5 FacilitiesDescribe the facilities available to Master’s students in general and those dedicated to students undertaking the Master’s degree specifically, for example: computer laboratories, dedicated equipment, library (access to textbooks), on-line journal subscription (for research dissertations), etc.

2 https://cisseuk.org/

Page 9 of 33

DESCRIPTION OF THE APPLICANT

Page 10: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

2.6 Staff CVsPlease see Appendix A: Staff CVs (Appendix to section 2 of application)

Page 10 of 33

DESCRIPTION OF THE APPLICANT

Page 11: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

3. Description of the Master’s degree in Cyber SecurityUp to 12 sides of A4, excluding module descriptions

3.1 Description of the degreea. High level description of the Master’s

By way of example only: name of degree: Master’s in Digital Forensics degree awarded: MSc total number of credits required for Master’s: 180 number of taught credits: 120 number of credits for research dissertation: 60 date degree started: October 2016 number of academic years Master’s has been running: 4 years running in 2020-21: yes

b. Delivery of degreeBy way of example only: delivered at UK campus at X describe the use of online learning, particularly in relation to Covid-19 if applicable, state whether the degree is offered on a part-time basis and a provide a description of how the

degree is structured to accommodate part-time students

c. Provide a description of the overall aims of the degree, in particular how the degree provides students with a foundation in a specialised area of cyber security.

d. Describe how the Master’s is of value to students, employers and the academic community.

Page 11 of 33

DESCRIPTION OF THE MASTER’S DEGREE

Page 12: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

e. Provide tables (Table 3.1a and Table 3.1b) showing the overall structure of the taught component of the degree3.By way of example only:

Name of compulsory module4 Member(s) of staff delivering module Number of credits

below M. N. 30

below P. Q. 30

NetSec R. S 15

CyberSec T. U 15

ResMethods V. W 15

Total number of compulsory credits

105

Table 3.1a: Compulsory taught modules

Name of optional module Member(s) of staff delivering module Number of credits

Cloud A. B. 15

DataSci C. D. 15

MachLearn E. F. 15

ProjMgt G. H. 15

Total number of optional credits required to be taken

15

Table 3.1b: Optional taught modules

3.2

3 Please do not include projects or dissertations in this table4 To help assessors please use short meaningful names (e.g., NetSec) rather than course codes (e.g. YY6203A) for module names.

Page 12 of 33

DESCRIPTION OF THE MASTER’S DEGREE

Page 13: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

3.2 Number of taught credits that can be mapped to CyBOK Knowledge Areas (KAs)a. Compulsory modules. Provide a table (Table 3.2a) that shows for each compulsory taught module:

to which CyBOK KA(s) the module can be mapped – if it does not map to a KA please state NONE

the number of credits in the module

the number of credits in the module that can be considered to be addressing the KA(s)

By way of example only:

Name of compulsory module

CyBOK KA(s) addressed Number of credits in module

Estimated number of credits in module addressing KA(s)

below Forensics, Operating Systems, Cryptography

30 30

below Forensics, Hardware 30 30

below Network, Web & Mobile 15 15

below Risk, Law and Regulation, Malware

15 15

below NONE 15 0

Total number of compulsory module credits addressing KAs

90

Table 3.2a: Compulsory taught modules addressing the KAs

b. Optional modules. If applicable, please provide a table (Table 3.2b) that shows the same information for each optional taught module.By way of example only:

Name of optional module CyBOK KA(s) addressed Number of credits in module

Estimated number of credits in module addressing KA(s)

below Distributed Systems 15 5

below CyBOK Introduction 15 5

below CyBOK Introduction 15 5

below NONE 15 0

Table 3.2b: Optional taught modules addressing the KAs

c. Pathways. If applicable, please provide a table (Table 3.2c) that identifies the pathways that students could take through the degree. For each pathway, please provide an estimate of the total number of credits addressing the KAs.By way of example only:

Pathway Optional modules included in pathway

Estimated total number of credits in pathway addressing KAs (including compulsory and

optional module credits)

Pathway 1 Cloud 95

Page 13 of 33

DESCRIPTION OF THE MASTER’S DEGREE

Page 14: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

Pathway 2 DataSci 95

Pathway 3 MachLearn 95

Pathway 4 ProjMgt 90

Table 3.2c: Possible pathways that students could take through the taught component of the Master’s

d. If the Master’s has a large number of flexible pathways, provide a description of which pathways through the Master’s meet the requirement for at least 84 taught credits addressing the KAs.

3.3 Detailed coverage of KA Topics5 6

a. For each pathway through the taught component of the degree, please complete Table 3.3 following the example rows provided7.

b. The purpose of Table 3.3 is for applicants to demonstrate how the KA Topics are covered and assessed. To adequately cover a KA Topic, it needs to be clear that a good breadth and depth of the Indicative Material is covered though it should be noted that not all the Indicative Material would be required to be explicitly covered. Moreover, additional Indicative Material rows can be added to Table 3.3 when it is felt that the Indicative Material listed in Appendix B does not adequately represent coverage of the KA Topic in the Master’s degree. Applications must clearly signpost when this has been done and provide a brief justification. The assessments should show good broad coverage of the Indicative Material, but it is to be expected that some of the taught Indicative Material may not be assessed.

c. For each pathway, provide a visual representation of the credit allocation across the KAs for the taught component of the degree –see Figure 3.1 as an example8.

5 Please use KA 0 to record those modules that are of an underpinning or foundational nature and provide a short narrative noting that this has been done. 6 It is recognised that the number of credits assigned to a KA Topic is an estimate only. Overall, however, the credit allocation across the KAs should be a fair, reasonable and justifiable representation.7 Where there are a large number of (flexible) pathways please complete Table 3.3 for a few representative pathways only along with an explanatory narrative.8 Where there are a large number of (flexible) pathways please provide Figure 3.1 for a few representative pathways only along with an explanatory narrative.

Page 14 of 33

DESCRIPTION OF THE MASTER’S DEGREE

Page 15: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

Exam

ple

Onl

y

Broad Category Knowledge Area Topics Indicative Material Modules providing significant coverage

Modules providing partial

coverage

Assessment Approximate number of

credits

A. Human, Organisational and Regulatory Aspects

1. Risk Management and Governance

Risk Definitions

risk assessment CyberSec below

2risk management CyberSec below

levels of perceived risk CyberSec below Error: Reference source notfound

Risk Governance

governance models CyberSec below

2

risk perception factors CyberSec below Error: Reference source notfound

human factors and risk communication

security culture

enacting security policy

Table 3.3: An example for illustrative purposes only of how the first two topics in Risk Management and Governance are covered by modules in the Master’s degree.

Page 15 of 33

DESCRIPTION OF THE MASTER’S DEGREE

Page 16: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

Exam

ple

Onl

yBroad Category Knowledge Area Topics Indicative Material Modules

providing significant coverage

Modules providing partial

coverage

Assessment Approximate number of

credits

A. Human, Organisational and Regulatory Aspects

1. Risk Management and Governance

Risk Assessment and Management Principles

component versus systems perspectives

CyberSec

2

elements of risk CyberSec below Error: Reference source notfound

risk assessment and management methods

CyberSec below Error: Reference source notfound

security metrics

Business Continuity: Incident Response and Recovery Planning

ISO/IEC 27034

1

NCSC guidance t CyberSec

other guidance CyberSec

Table 3.3 (continued): An example for illustrative purposes only of how the third and fourth topics in Risk Management and Governance are covered by modules in the Master’s degree.Please note that in this example an additional row of Indicative Material has been added to reflect other guidance for Business Continuity and Planning that is partially covered in the CyberSec module.

Page 16 of 33

DESCRIPTION OF THE MASTER’S DEGREE

Page 17: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

Figure 3.1: An example for illustrative purposes only of credit allocation across the KAs for a Master’s in digital forensics

Page 17 of 33

DESCRIPTION OF THE MASTER’S DEGREE

Page 18: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

3.4 Justification of KA coverage for a Master’s degree focusing on a specialised area of cyber securityCover the following points.

a. Describe how the overall distribution of credits is consistent with the aims of the degree described in section 3.1c. It would be expected that the specialised area of cyber security should be clearly reflected in the distribution of credits with substantial coverage of the relevant KA(s) along with appropriate coverage of other relevant KAs.

b. Describe and justify how the distribution of credits: provides a coherent body of work for students ensures that students are gaining deep knowledge and understanding about the specialised area of cyber

security

3.5 Module descriptionsIn an appendix to this section, please include a module description for each module that addresses a KA Topic in Table 3.3.

At the beginning of each module description, please provide a table that lists the KA Topics that the module covers along with brief justifications for why this is the case.

The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 3.3.

By way of example only, please see: Appendix B: Module descriptions (Appendix to section 3 of application)

3.6 Research dissertations accounting for more than 80 credits

For Master’s degrees in which the original research dissertation accounts for more than 80 credits, clarify how the remainder of the degree adequately covers the KA Topics for a Master’s degree focusing on a specialised area of cyber security.

3.7 Professional Knowledge and SkillsDescribe how the areas in Professional Knowledge and Skills (Appendix B, section 3 of call document) are addressed in the Master’s degree. By way of example, describe how team-working, communication skills, professional ethics, etc. are covered within the degree programme as a whole. It is not a requirement to have a separate dedicated module covering Professional Knowledge and Skills.

Page 18 of 33

DESCRIPTION OF THE MASTER’S DEGREE

Page 19: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

4. Assessment materialsUp to 5 sides of A4, excluding copies of assessment materials

4.1 Approach to assessment for both full and provisional applications

4.1.1 Approach to assessmentDescribe the overall approach to assessment of the taught modules on the Master’s degree. This should include:

assessment methodology marking scheme the pass mark for individual modules and the taught part of the degree overall

4.1.2 MarkingDescribe how the overall mark for the degree as a whole is worked out from the taught component and research dissertation component. Please describe the mark required to achieve pass, merit and distinction (or equivalent) of the overall degree.

4.1.3 Justification of 40% pass markWhere the pass mark for taught modules, dissertation and/or the degree overall is set at, or close to, 40% provide a justification that students achieving this pass mark have achieved and demonstrated sufficient knowledge and understanding at Master’s level. By way of example, it may be appropriate here to refer to the marking scheme that shows what a student has to be able to demonstrate in order to achieve a pass mark of 40%.

4.1.4 Rigour of assessmentProvide a table that shows for each assessed module an estimate of the ratio of bookwork to critical analysis/application in the assessments. Please also provide a brief justification for each ratio. If the ratio is greater than 60:40, provide a clear justification for this value.

By way of example only:

Module Estimate for % of bookwork in assessments

Estimate for % of critical analysis/application in assessments

Comments (where applicable)

A few examples

Forensics-1 assessments (C)

40 60 Assessments include practical application of knowledge

Forensics-2 assessments(C)

40 60 Assessments include practical application of knowledge

Network Security assessments (C)

40 60 Practical exercises requiring understanding, analysis and problem solving

Cyber Security assessments (C)

60 40

below (C) 45 55 Students required to produce research paper as preparation for their dissertation

below (O) 45 55

below (O) 40 60

below (O) 40 60

Page 19 of 33

ASSESSMENT MATERIALS

Page 20: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

below (O) 65 35

Table 4.1: An example for illustrative purposes only of the ratio of bookwork to critical analysis/application for compulsory and optional modules.

4.2 Examination papers

4.2.1 Provisional applicationFor each of the modules identified in section 3 that addresses a Knowledge Area Topic, describe the process (to be) used for assessment (e.g., examination, coursework, practical exercises, etc.). Provide a copy of examination paper(s) that students have sat or specimen paper(s) of the examinations they will sit. For assessed coursework, please provide copies of all assignments (to be) provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in an Appendix C: Assessment materials (Appendix to section 4 of application).

4.2.2 Full applicationFor academic year 2019-2020, for each of the modules identified in section 3 that addresses a Knowledge Area Topic, describe the process used for assessment (e.g., examination, coursework, practical exercises, etc.). Provide a copy of the examination paper(s) that students sat. For assessed coursework, provide copies of all assignments provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in an Appendix C: Assessment materials (Appendix to section 4 of application).

4.3 External examiner’s report – full application onlyFor academic year 2019-2020, provide a copy of the External examiner’s report9. Describe the process for engagement with the external examiner. Describe the technical background and experience of the external examiner.

For academic year 2019-2020, Provide a copy of the HEI’s response to external examiner’s report and any follow-up actions that have been undertaken in response to the report.

9 Where the external examiner’s report for 2019-20 is not available by the submission deadline, please provide the most recent report and the HEI’s response. Please state when the 2019-20 report and response will be available and submit them as soon as they are available.

Page 20 of 33

ASSESSMENT MATERIALS

Page 21: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

5. Original research dissertationsUp to 5 sides of A4, excluding list of dissertation topics and copies of dissertations

5.1 Applications for both full and provisional certification

5.1.1 Guidance to studentsDescribe the guidance the HEI provides, or will provide, to Master’s students before they embark on their dissertations, for example: research methods, undertaking literature reviews, etc.

5.1.2 Allocation of dissertation topicsDescribe the process for allocation of dissertation topics to students, for example:

is it up to students to come up with topic ideas? do members of staff identify possible topics? does the HEI have links with industry partners who suggest topics?

5.1.3 Scope of dissertation topicsDescribe the process for ensuring:

dissertation topics are within scope of the specialised area of cyber security and the appropriate CyBOK Knowledge Area(s)

that students are supervised by appropriately knowledgeable personnel

5.1.4 Monitoring of students’ progressDescribe the process for monitoring the progress of students on their dissertations.

5.1.5 Assessment of dissertationsDescribe the process for assessing dissertations. Provide a specific, tailored marking scheme for dissertations clearly showing how grades are determined and what would be necessary for each of a distinction, merit or pass10. Please indicate whether this or other similar guidance is provided to students.

10 Where the classifications of distinction / merit / pass are not used, please refer to the grades that are used by the HEI.

Page 21 of 33

ORIGINAL RESEARCH DISSERTATIONS

Page 22: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

By way of example only:

How well was the dissertation work planned10 marks

Significance of problem addressed and relevance to cyber security15 marks

Appropriateness of the technical approach15 marks

Quality of literature review15 marks

Quality and significance of results obtained20 marks

Insight provided by conclusions and recommendations15 marks

Performance in Viva10 marks

Distinction Thorough and careful planning throughout. Time used effectively.

Important problem, highly relevant to cyber security.

Etc.

Merit

Pass

Fail

Table 5.1: An example for illustrative purposes only of a marking scheme and assessment criteria for dissertations.

5.1.6 Research dissertations contributing fewer than 40 creditsFor Master’s degrees in which the original research dissertation accounts for fewer than 40 credits, describe how students are able to gain sufficient understanding and experience of undertaking original research.

5.2 Dissertations – for full certification only

5.2.1 List of dissertation topicsFor each of academic years 2019-2020 and 2018-2019 (if any), provide a list of Master’s dissertations undertaken by students. This should include the dissertation title, a short (one paragraph) abstract, an identification of which KA(s) the dissertation applies to, and – if appropriate – whether there was any external involvement in the dissertation (e.g., from industry).

Where there were more than 20 students undertaking dissertations in an academic year, provide information for a representative sample of 20 dissertations only.

By way of example only:

Dissertation title Synopsis of dissertation CyBOK KA(s) addressed External involvement

Diss-1

Diss-2

Diss-n

Table 5.2: An example for illustrative purposes only of a table to describe dissertations undertaken in academic year 2019-2020.

Page 22 of 33

ORIGINAL RESEARCH DISSERTATIONS

Page 23: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

By way of example only:

Dissertation title Synopsis of dissertation CyBOK KA(s) addressed External involvement

Diss-1

Diss-2

Diss-m

Table 5.3: An example for illustrative purposes only of a table to describe dissertations undertaken in academic year 2018-2019.

5.2.2 Example dissertationsFor academic year 2019-2020, provide one anonymised and representative copy of a dissertation for each of11:

a. a dissertation that achieved a distinction Please see: Distinction dissertation

b. a dissertation that achieved a merit Please see: Merit dissertation below

c. a dissertation that achieved a pass Please see: Pass dissertation below

If none in 2019-2020, try 2018-2019; if none, please contact the NCSC ahead of the deadline for applications. Dissertations should be placed in an appendix at the end of the application and must be included in the email submission.

5.2.3 Marks for example dissertationsFor each of the dissertations in the previous section, provide:

a. the overall mark awarded

b. the components of the overall mark, for example marks awarded to: viva (including any demonstration) dissertation plan dissertation

c. key comments from the internal examiners

d. any additional information that you feel would help the assessment panel as part of its job to determine whether the grade awarded to each dissertation is appropriate.

By way of example only:

Please see: Distinction dissertation information

Please see: Merit dissertation information

Please see: Pass dissertation information

11 Where the classifications of distinction / merit / pass are not used, please provide representative dissertations for each of the classifications that are used by the HEI.

Page 23 of 33

ORIGINAL RESEARCH DISSERTATIONS

Page 24: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

6. Student numbers and grades achieved – applications for full certification onlyUp to five sides of A4

6.1 Student entry dataWhere the data are available, for each of academic years 2019-2020 and 2018-2019, please provide the information requested in Table 6.1. Please provide a separate table for each academic year.

By way of example only:

Entry Requirements

Number of full-time students

Number of part-time students

Number with 2/1 (or equivalent) or above in

STEM subject

Number with 2/2 (or equivalent) or above in

STEM subject

Number without 2/2 or above in STEM

subject but who have relevant experience

Number without 2/2 or above in STEM subject or

relevant experience

Students with UK nationality

In general, 2/1 in STEM or relevant experience – though some discretion allowed

10 2 6 7 5 0

Students with EU nationality

As above 2 0 1 1 1 0

Students without UK or EU nationality

As above 2 0 0 0 2 0

Table 6.1a: For illustrative purposes only student entry data for 2019-2020.

Page 24 of 33

STUDENT NUMBERS AND GRADES ACHIEVED

Page 25: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

Entry Requirements

Number of full-time students

Number of part-time students

Number with 2/1 (or equivalent) or above in

STEM subject

Number with 2/2 (or equivalent) or above in

STEM subject

Number without 2/2 or above in STEM

subject but who have relevant experience

Number without 2/2 or above in STEM subject or

relevant experience

Students with UK nationality

In general, 2/1 in STEM or relevant experience – though some discretion allowed

8 0 4 4 4 0

Students with EU nationality

As above 2 0 1 1 1 0

Students without UK or EU nationality

As above 0 0 0 0 0 0

Table 6.1b: For illustrative purposes only student entry data for 2018-2019.

If tables 6.1a, b require any explanatory text, please add it here being careful not to exceed page limit for this section.

6.2

Page 25 of 33

STUDENT NUMBERS AND GRADES ACHIEVED

Page 26: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

6.2 Student exit dataFor academic years 2019-2020 and 2018-2019, provide the information requested in Table 6.2.

By way of example only:

Academic year

Number of students scheduled to

complete Master’s

Number achieving distinction overall

Number achieving merit overall

Number achieving pass overall

Number failing Master’s

Number deferring for additional

year(s)

Number opting to graduate with postgraduate certificate (or equivalent)

Number with other outcomes

(if applicable)

2018 - 2019 10 2 5 2 0 0 1 0

2019 - 2020 14 3 7 3 1 0 0 0

Table 6.2: For illustrative purposes only student exit data for 2018-2019 and 2019-2020

If table 6.2 requires any explanatory text, please add it here being careful not to exceed page limit for this section.

6.3 Student satisfactionProvide the results of any student satisfaction surveys and any actions that have been taken by the HEI as a result.

Page 26 of 33

STUDENT NUMBERS AND GRADES ACHIEVED

Page 27: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

7. Appendix A: Staff CVs (Appendix to section 2 of application)Up to two sides of A4 per CV

It is recommended to follow the structure below for each CV. For each CV, it is important to get across the person’s knowledge, experience and skills in cyber security.

By way of example only:

7.1 CV for Dr E. F.

7.1.1 Personal statement of experience and expertise in cyber securityProvide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs12 as a framework.

7.1.2 Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.

7.1.3 Professional employmentDescribe professional positions of employment, highlighting those relevant to cyber security.

7.1.4 Contribution to cyber security at the University of XDescribe what the person does at the HEI that is relevant to cyber security.

7.1.5 Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.

7.1.6 Cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.

7.1.7 Any other informationInclude any other information that might be relevant in demonstrating the person’s cyber security expertise.

12 https://www/cybok.org.

Page 27 of 33

APPENDIX A: STAFF CVs

Page 28: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

7.2 CV for Dr G. H.

7.2.1 Personal statement of experience and expertise in cyber securityProvide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.

7.2.2 Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.

7.2.3 Professional employmentDescribe professional positions of employment, highlighting those relevant to cyber security.

7.2.4 Contribution to cyber security at the University of XDescribe what the person does at the HEI that is relevant to cyber security.

7.2.5 Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.

7.2.6 Cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.

7.2.7 Any other informationInclude any other information that might be relevant in demonstrating the person’s cyber security expertise.

Page 28 of 33

APPENDIX A: STAFF CVs

Page 29: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

7.3 CV for I. J.

7.3.1 Personal statement of experience and expertise in cyber securityProvide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.

7.3.2 Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.

7.3.3 Professional employmentDescribe professional positions of employment, highlighting those relevant to cyber security.

7.3.4 Contribution to cyber security at the University of XDescribe what the person does at the HEI that is relevant to cyber security.

7.3.5 Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.

7.3.6 Cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.

7.3.7 Any other informationInclude any other information that might be relevant in demonstrating the person’s cyber security expertise.

Page 29 of 33

APPENDIX A: STAFF CVs

Page 30: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

7.4 CV for K. L.

7.4.1 Personal statement of experience and expertise in cyber securityProvide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.

7.4.2 Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.

7.4.3 Professional employmentDescribe professional positions of employment, highlighting those relevant to cyber security.

7.4.4 Contribution to cyber security at the University of XDescribe what the person does at the HEI that is relevant to cyber security.

7.4.5 Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.

7.4.6 Cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.

7.4.7 Any other informationInclude any other information that might be relevant in demonstrating the person’s cyber security expertise.

Page 30 of 33

APPENDIX A: STAFF CVs

Page 31: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

8. Appendix B: Module descriptions (Appendix to section 3 of application)Include a table at the beginning of each module description that shows which KA Topics the module covers along with brief justifications for why this is the case.

The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 3.3.

By way of example only:

8.1 Forensics-1 module

8.2 Forensics-2 module

8.3 Network Security module

8.4 Cyber Security module

8.5 Research Methods module

8.6 Cloud Computing module

8.7 Data Science module

8.8 Machine Learning module

8.9 Project Management module

Page 31 of 33

APPENDIX B: MODULE DESCRIPTIONS

Page 32: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

9. Appendix C: Assessment materials (Appendix to section 4 of application)By way of example only:

9.1 Forensics-1 assessments

9.2 Forensics-2 assessments

9.3 Network Security assessments

9.4 Cyber Security assessments

9.5 Research Methods assessments

9.6 Cloud Computing assessments

9.7 Data Science assessments

9.8 Machine Learning assessments

9.9 Project Management assessments

9.10 External examiner’s report

9.11 HEI’s response to external examiner’s report

Page 32 of 33

APPENDIX C: ASSESSMENT MATERIALS

Page 33: Institution’s Letter of Support · Web viewIssue 1.021 July 2020 Issue 1.021 July 2020 Page 2 of 2ORIGINAL RESEARCH DISSERTATIONS Page 2 of 2 APPENDIX B: MODULE DESCRIPTIONS Page

Issue 1.021 July 2020

10. Appendix D: Original Research Dissertations (Appendix to section 5 of application)

10.1 Dissertation awarded a distinction

10.1.1 Distinction dissertation

10.1.2 Distinction dissertation information

10.2 Dissertation awarded a merit

10.2.1 Merit dissertation

10.2.2 Merit dissertation information

10.3 Dissertation awarded a pass

10.3.1 Pass dissertation

10.3.2 Pass dissertation information

Page 33 of 33

APPENDIX D: ORIGINAL RESEARCH DISSERTATIONS