Institution’s Letter of Support



Guidance and Application Template for:Application for Certification of a Postgraduate Master’s Degree Focusing on a Specialised Area of Cyber SecurityThis document provides an application template for an HEI to have its Master’s degree in Cyber Security considered for certification. It provides general guidance only and it is an HEI’s sole responsibility to ensure that its application is compliant and provides the information required in the corresponding call document. It is not a requirement that applicants use the template.Applicants should refer to the call document for detailed guidance on completing all sections of the application as well as details of the assessment criteria that apply.Applicants should note that to help assessors with their assessment of applications, all applications should have a table of contents and make use of headers, footers and hyperlinks.Some points to note:The minimum font size for applications is 10pt. However, it is recognised that to help fit some tables into the space available the text in some tables can be made smaller than 10pt.Text in blue is to help guide applicants on what may be an appropriate response to some sections of the application and is provided by way of example only.Please feel free to delete this page from your completed applicationDocument HistoryIssueDateCommentIssue 1.021 July 2020First issue of application template for specialised Master’s degrees? Crown Copyright 2020, The National Cyber Security CentreUniversity of XApplication for Provisional/Full Certification of a Master’s Degree Focusing on a Specialised Area of Cyber SecurityTable of contents TOC \o "1-3" \h \z \u 1.Institution’s Letter of Support PAGEREF _Toc46238596 \h 61.1Signed letter of support for both full and provisional applications PAGEREF _Toc46238597 \h 61.2For provisional applications PAGEREF _Toc46238598 \h 62.Description of the Applicant PAGEREF _Toc46238599 \h 72.1Team PAGEREF _Toc46238600 \h 72.2Recent investments PAGEREF _Toc46238601 \h 82.3External linkages PAGEREF _Toc46238602 \h 82.4Review and update process PAGEREF _Toc46238603 \h 82.5Facilities PAGEREF _Toc46238604 \h 82.6Staff CVs PAGEREF _Toc46238605 \h 93.Description of the Master’s degree in Cyber Security PAGEREF _Toc46238606 \h 103.1Description of the degree PAGEREF _Toc46238607 \h 103.2Number of taught credits that can be mapped to CyBOK Knowledge Areas (KAs) PAGEREF _Toc46238608 \h 123.3Detailed coverage of KA Topics PAGEREF _Toc46238609 \h 133.4Justification of KA coverage for a Master’s degree focusing on a specialised area of cyber security PAGEREF _Toc46238610 \h 173.5Module descriptions PAGEREF _Toc46238611 \h 173.6Research dissertations accounting for more than 80 credits PAGEREF _Toc46238612 \h 173.7Professional Knowledge and Skills PAGEREF _Toc46238613 \h 174.Assessment materials PAGEREF _Toc46238614 \h 184.1Approach to assessment for both full and provisional applications PAGEREF _Toc46238615 \h 184.1.1Approach to assessment PAGEREF _Toc46238616 \h 184.1.2Marking PAGEREF _Toc46238617 \h 184.1.3Justification of 40% pass mark PAGEREF _Toc46238618 \h 184.1.4Rigour of assessment PAGEREF _Toc46238619 \h 184.2Examination papers PAGEREF _Toc46238620 \h 194.2.1Provisional application PAGEREF _Toc46238621 \h 194.2.2Full application PAGEREF _Toc46238622 \h 194.3External examiner’s report – full application only PAGEREF _Toc46238623 \h 195.Original research dissertations PAGEREF _Toc46238624 \h 205.1Applications for both full and provisional certification PAGEREF _Toc46238625 \h 205.1.1Guidance to students PAGEREF _Toc46238626 \h 205.1.2Allocation of dissertation topics PAGEREF _Toc46238627 \h 205.1.3Scope of dissertation topics PAGEREF _Toc46238628 \h 205.1.4Monitoring of students’ progress PAGEREF _Toc46238629 \h 205.1.5Assessment of dissertations PAGEREF _Toc46238630 \h 205.1.6Research dissertations contributing fewer than 40 credits PAGEREF _Toc46238631 \h 215.2Dissertations – for full certification only PAGEREF _Toc46238632 \h 215.2.1List of dissertation topics PAGEREF _Toc46238633 \h 215.2.2Example dissertations PAGEREF _Toc46238634 \h 225.2.3Marks for example dissertations PAGEREF _Toc46238635 \h 226.Student numbers and grades achieved – applications for full certification only PAGEREF _Toc46238636 \h 236.1Student entry data PAGEREF _Toc46238637 \h 236.2Student exit data PAGEREF _Toc46238638 \h 256.3Student satisfaction PAGEREF _Toc46238639 \h 257.Appendix A: Staff CVs (Appendix to section 2 of application) PAGEREF _Toc46238640 \h 267.1CV for Dr E. F. PAGEREF _Toc46238641 \h 267.1.1Personal statement of experience and expertise in cyber security PAGEREF _Toc46238642 \h 267.1.2Academic background PAGEREF _Toc46238643 \h 267.1.3Professional employment PAGEREF _Toc46238644 \h 267.1.4Contribution to cyber security at the University of X PAGEREF _Toc46238645 \h 267.1.5Esteem indicators PAGEREF _Toc46238646 \h 267.1.6Cyber security knowledge and expertise indicators PAGEREF _Toc46238647 \h 267.1.7Any other information PAGEREF _Toc46238648 \h 267.2CV for Dr G. H. PAGEREF _Toc46238649 \h 277.2.1Personal statement of experience and expertise in cyber security PAGEREF _Toc46238650 \h 277.2.2Academic background PAGEREF _Toc46238651 \h 277.2.3Professional employment PAGEREF _Toc46238652 \h 277.2.4Contribution to cyber security at the University of X PAGEREF _Toc46238653 \h 277.2.5Esteem indicators PAGEREF _Toc46238654 \h 277.2.6Cyber security knowledge and expertise indicators PAGEREF _Toc46238655 \h 277.2.7Any other information PAGEREF _Toc46238656 \h 277.3CV for I. J. PAGEREF _Toc46238657 \h 287.3.1Personal statement of experience and expertise in cyber security PAGEREF _Toc46238658 \h 287.3.2Academic background PAGEREF _Toc46238659 \h 287.3.3Professional employment PAGEREF _Toc46238660 \h 287.3.4Contribution to cyber security at the University of X PAGEREF _Toc46238661 \h 287.3.5Esteem indicators PAGEREF _Toc46238662 \h 287.3.6Cyber security knowledge and expertise indicators PAGEREF _Toc46238663 \h 287.3.7Any other information PAGEREF _Toc46238664 \h 287.4CV for K. L. PAGEREF _Toc46238665 \h 297.4.1Personal statement of experience and expertise in cyber security PAGEREF _Toc46238666 \h 297.4.2Academic background PAGEREF _Toc46238667 \h 297.4.3Professional employment PAGEREF _Toc46238668 \h 297.4.4Contribution to cyber security at the University of X PAGEREF _Toc46238669 \h 297.4.5Esteem indicators PAGEREF _Toc46238670 \h 297.4.6Cyber security knowledge and expertise indicators PAGEREF _Toc46238671 \h 297.4.7Any other information PAGEREF _Toc46238672 \h 298.Appendix B: Module descriptions (Appendix to section 3 of application) PAGEREF _Toc46238673 \h 308.1Forensics-1 module PAGEREF _Toc46238674 \h 308.2Forensics-2 module PAGEREF _Toc46238675 \h 308.3Network Security module PAGEREF _Toc46238676 \h 308.4Cyber Security module PAGEREF _Toc46238677 \h 308.5Research Methods module PAGEREF _Toc46238678 \h 308.6Cloud Computing module PAGEREF _Toc46238679 \h 308.7Data Science module PAGEREF _Toc46238680 \h 308.8Machine Learning module PAGEREF _Toc46238681 \h 308.9Project Management module PAGEREF _Toc46238682 \h 309.Appendix C: Assessment materials (Appendix to section 4 of application) PAGEREF _Toc46238683 \h 319.1Forensics-1 assessments PAGEREF _Toc46238684 \h 319.2Forensics-2 assessments PAGEREF _Toc46238685 \h 319.3Network Security assessments PAGEREF _Toc46238686 \h 319.4Cyber Security assessments PAGEREF _Toc46238687 \h 319.5Research Methods assessments PAGEREF _Toc46238688 \h 319.6Cloud Computing assessments PAGEREF _Toc46238689 \h 319.7Data Science assessments PAGEREF _Toc46238690 \h 319.8Machine Learning assessments PAGEREF _Toc46238691 \h 319.9Project Management assessments PAGEREF _Toc46238692 \h 319.10External examiner’s report PAGEREF _Toc46238693 \h 319.11HEI’s response to external examiner’s report PAGEREF _Toc46238694 \h 3110.Appendix D: Original Research Dissertations (Appendix to section 5 of application) PAGEREF _Toc46238695 \h 3210.1Dissertation awarded a distinction PAGEREF _Toc46238696 \h 3210.1.1Distinction dissertation PAGEREF _Toc46238697 \h 3210.1.2Distinction dissertation information PAGEREF _Toc46238698 \h 3210.2Dissertation awarded a merit PAGEREF _Toc46238699 \h 3210.2.1Merit dissertation PAGEREF _Toc46238700 \h 3210.2.2Merit dissertation information PAGEREF _Toc46238701 \h 3210.3Dissertation awarded a pass PAGEREF _Toc46238702 \h 3210.3.1Pass dissertation PAGEREF _Toc46238703 \h 3210.3.2Pass dissertation information PAGEREF _Toc46238704 \h 32Institution’s Letter of SupportUp to two sides of A4Signed letter of support for both full and provisional applicationsThe Letter of Support is not scored but must be present. Its purpose is to show that the senior management of the HEI is fully supportive of the application. The Letter should make it clear which degree is being submitted for certification and against which certification standard.The Letter must be from the Vice Chancellor or equivalent. The Letter must be signed and dated. Please note that a Letter from the Head of Department submitting the application is not acceptable.The Letter should be viewed as an opportunity for the HEI’s senior management to:demonstrate commitment to the Master’s programme specifically and cyber security more generallyhighlight recent HEI investment in the area and any future planned investmentdescribe the importance of the area in the HEI’s future strategy, etc.outline how Covid-19 is impacting the HEI generally and the Master’s degree specifically along with the steps being taken by the HEI to deal with the issues being raisedFor provisional applicationsIf the Master’s has not yet started, it is important that the HEI confirms that it will start by October 2022.If the Master’s meets the requirements for full certification, it is important that the HEI confirms that provisional certification is being applied for and why.Description of the ApplicantUp to 5 sides of A4, excluding CVsTeamProvide the names and structure of the department(s)/group(s)/school(s) responsible for the Master’s degree together with the names, seniority and roles of the members of staff responsible for delivering the degree content, setting and marking examinations, supervising dissertations, etc. Provide a diagram that clearly shows the roles and responsibilities of team members. Where there is a core team delivering the Master’s, it may be helpful to clearly separate the core team from ‘associate’ members of the team. Describe briefly how the team functions as a cohesive unitBy way of example only:Figure 2.1: Example of HEI organisational structure relevant to the applicationBy way of example only: Name of Staff MemberPositionResponsibilitiesRelevant Expertise REF _Ref42085548 \h \* MERGEFORMAT Dr E. F.Senior Lecturer and Master’s Course DirectorEnsures overall coherence and quality of Master’sdelivers module on Cyber Securitydelivers module on Research Methodsoversees research projects broad knowledge of cyber securitysuccessfully managed and delivered academic programmes over past 10 years REF _Ref42159364 \h \* MERGEFORMAT Dr G. H. REF _Ref42086488 \h \* MERGEFORMAT Readerdelivers Network Security modulesupervises research projectskey-note presenter at recent network security conferences REF _Ref42159502 \h \* MERGEFORMAT I. J.Lecturerdelivers Forensics-1 modulesupervises research projectsextensive experience of applying digital forensics in industryOther staff members….….…. REF _Ref42159577 \h \* MERGEFORMAT K. L. REF _Ref42086571 \h \* MERGEFORMAT External Consultant with 3-year contract October 2020 – September 2023 delivers a number of lectures in Forensics-2 moduleruns successful forensics companyprovides forensics advice to government and industryTable 2.1: Example of a synopsis of the team delivering the Master’sIt is highly recommended to provide hyperlinks to the staff CVs shown in Appendix A so that assessors can quickly cross check the information in Table 2.1 with the information provided in the CVs.Recent investmentsDescribe any recent investments from the HEI, government, industry etc. in the groups running the Master’s degree programme. If appropriate, it is advisable to highlight the benefits to the team delivering the degree as well as students undertaking the degree.By way of example only: 50K in financial year 2018-19 from the HEI to the Cyber Security Group for the refurbishment and upgrade of its Forensics Laboratory for equipment and software (provide examples) that Master’s students use100K across financial years 2017-18 and 2018-19 for networking equipment from Manufacturer X to the Department of Computing for the Networking Laboratory that Master’s students will be able to use150K in financial year 2017-18 from the HEI to the Department of Computing for new PCs, laptops and peripherals that will be of benefit to Master’s students also20K in financial year 2016-17 from the HEI to the Cyber Security Group to enable members of staff to gain professional cyber security qualifications (e.g., forensic analyst, risk analyst, etc.)External linkagesDescribe any external linkages that add value to the Master’s degree, and the impact these bring to the degree programme: e.g., visiting lecturers with specialist knowledge from other academic departments, government or industry; projects suggested, and monitored, by industry; etc.By way of example only:External Advisory Board – e.g., meets twice yearly, membership from industry, government and academia. Membership has strong cyber security representation. If applicable, provide some examples of advice from Advisory Board that has been acted pany X provides series of invited lectures on Forensics and suggests topics for research pany Y has donated equipment for joint projects that Master’s students can use.Membership of the CISSE UK network that provides external speakers, course materials and cyber security challenges for students.Review and update processDescribe the process used to review and renew the course content to keep it up to date, for example: how often is the course content reviewed, by whom, and what external advice is taken (e.g., industrial advisory boards).FacilitiesDescribe the facilities available to Master’s students in general and those dedicated to students undertaking the Master’s degree specifically, for example: computer laboratories, dedicated equipment, library (access to textbooks), on-line journal subscription (for research dissertations), etc.Staff CVsPlease see REF _Ref42155410 \h \* MERGEFORMAT Appendix A: Staff CVs (Appendix to section 2 of application)Description of the Master’s degree in Cyber SecurityUp to 12 sides of A4, excluding module descriptionsDescription of the degreeHigh level description of the Master’sBy way of example only:name of degree: Master’s in Digital Forensicsdegree awarded: MSctotal number of credits required for Master’s: 180number of taught credits: 120number of credits for research dissertation: 60date degree started: October 2016number of academic years Master’s has been running: 4 yearsrunning in 2020-21: yesDelivery of degreeBy way of example only:delivered at UK campus at Xdescribe the use of online learning, particularly in relation to Covid-19if applicable, state whether the degree is offered on a part-time basis and a provide a description of how the degree is structured to accommodate part-time studentsProvide a description of the overall aims of the degree, in particular how the degree provides students with a foundation in a specialised area of cyber security.Describe how the Master’s is of value to students, employers and the academic community.Provide tables (Table 3.1a and Table 3.1b) showing the overall structure of the taught component of the degree.By way of example only:Name of compulsory moduleMember(s) of staff delivering moduleNumber of credits REF _Ref42595636 \p \h Forensics-1M. N. 30 REF _Ref42595492 \p \h Forensics-2P. Q.30NetSecR. S15CyberSecT. U15ResMethodsV. W 15Total number of compulsory credits 105Table 3.1a: Compulsory taught modulesName of optional moduleMember(s) of staff delivering moduleNumber of creditsCloudA. B. 15DataSciC. D. 15MachLearnE. F. 15ProjMgtG. H. 15Total number of optional credits required to be taken15Table 3.1b: Optional taught modulesNumber of taught credits that can be mapped to CyBOK Knowledge Areas (KAs)Compulsory modules. Provide a table (Table 3.2a) that shows for each compulsory taught module:to which CyBOK KA(s) the module can be mapped – if it does not map to a KA please state NONEthe number of credits in the modulethe number of credits in the module that can be considered to be addressing the KA(s)By way of example only:Name of compulsory moduleCyBOK KA(s) addressedNumber of credits in moduleEstimated number of credits in module addressing KA(s) REF _Ref42595636 \p \h Forensics-1Forensics, Operating Systems, Cryptography3030 REF _Ref42595492 \p \h \* MERGEFORMAT Forensics-2Forensics, Hardware3030 REF _Ref42600537 \p \h NetSecNetwork, Web & Mobile1515 REF _Ref42600644 \p \h CyberSecRisk, Law and Regulation, Malware 1515 REF _Ref42600787 \p \h \* MERGEFORMAT ResMethodsNONE150Total number of compulsory module credits addressing KAs90Table 3.2a: Compulsory taught modules addressing the KAsOptional modules. If applicable, please provide a table (Table 3.2b) that shows the same information for each optional taught module.By way of example only:Name of optional moduleCyBOK KA(s) addressedNumber of credits in moduleEstimated number of credits in module addressing KA(s) REF _Ref42600890 \p \h \* MERGEFORMAT CloudDistributed Systems155 REF _Ref42600948 \p \h \* MERGEFORMAT DataSciCyBOK Introduction155 REF _Ref42601006 \p \h \* MERGEFORMAT MachLearnCyBOK Introduction155 REF _Ref42601080 \p \h \* MERGEFORMAT ProjMgtNONE150Table 3.2b: Optional taught modules addressing the KAsPathways. If applicable, please provide a table (Table 3.2c) that identifies the pathways that students could take through the degree. For each pathway, please provide an estimate of the total number of credits addressing the KAs.By way of example only:PathwayOptional modules included in pathwayEstimated total number of credits in pathway addressing KAs (including compulsory and optional module credits)Pathway 1Cloud95Pathway 2 DataSci95Pathway 3MachLearn95Pathway 4ProjMgt90Table 3.2c: Possible pathways that students could take through the taught component of the Master’sIf the Master’s has a large number of flexible pathways, provide a description of which pathways through the Master’s meet the requirement for at least 84 taught credits addressing the KAs.Detailed coverage of KA Topics For each pathway through the taught component of the degree, please complete Table 3.3 following the example rows provided.The purpose of Table 3.3 is for applicants to demonstrate how the KA Topics are covered and assessed. To adequately cover a KA Topic, it needs to be clear that a good breadth and depth of the Indicative Material is covered though it should be noted that not all the Indicative Material would be required to be explicitly covered. Moreover, additional Indicative Material rows can be added to Table 3.3 when it is felt that the Indicative Material listed in Appendix B does not adequately represent coverage of the KA Topic in the Master’s degree. Applications must clearly signpost when this has been done and provide a brief justification. The assessments should show good broad coverage of the Indicative Material, but it is to be expected that some of the taught Indicative Material may not be assessed.For each pathway, provide a visual representation of the credit allocation across the KAs for the taught component of the degree –see Figure 3.1 as an example.Example OnlyBroad CategoryKnowledge AreaTopicsIndicative MaterialModules providing significant coverageModules providing partial coverageAssessmentApproximate number of creditsA. Human, Organisational and Regulatory Aspects1. Risk Management and GovernanceRisk Definitionsrisk assessmentCyberSec REF _Ref42605843 \p \h CyberSec-CWK2risk managementCyberSec REF _Ref42605843 \p \h CyberSec-CWKlevels of perceived riskCyberSec REF _Ref42605843 \p \h CyberSec-CWK REF _Ref43295253 \p \h \* MERGEFORMAT Risk Governancegovernance modelsCyberSec REF _Ref42605843 \p \h CyberSec-CWK2risk perception factorsCyberSec REF _Ref42605843 \p \h CyberSec-CWK REF _Ref43295253 \p \h \* MERGEFORMAT human factors and risk communicationsecurity cultureenacting security policyTable 3.3: An example for illustrative purposes only of how the first two topics in Risk Management and Governance are covered by modules in the Master’s degree.Example OnlyBroad CategoryKnowledge AreaTopicsIndicative MaterialModules providing significant coverageModules providing partial coverageAssessmentApproximate number of creditsA. Human, Organisational and Regulatory Aspects1. Risk Management and GovernanceRisk Assessment and Management Principlescomponent versus systems perspectivesCyberSec2elements of riskCyberSec REF _Ref42605843 \p \h CyberSec-CWK REF _Ref43295253 \p \h \* MERGEFORMAT risk assessment and management methodsCyberSec REF _Ref42605843 \p \h CyberSec-CWK REF _Ref43295253 \p \h \* MERGEFORMAT security metricsBusiness Continuity: Incident Response and Recovery PlanningISO/IEC 270341NCSC guidancetCyberSecother guidanceCyberSecTable 3.3 (continued): An example for illustrative purposes only of how the third and fourth topics in Risk Management and Governance are covered by modules in the Master’s degree.Please note that in this example an additional row of Indicative Material has been added to reflect other guidance for Business Continuity and Planning that is partially covered in the CyberSec module.Figure 3.1: An example for illustrative purposes only of credit allocation across the KAs for a Master’s in digital forensicsJustification of KA coverage for a Master’s degree focusing on a specialised area of cyber securityCover the following points.Describe how the overall distribution of credits is consistent with the aims of the degree described in section 3.1c. It would be expected that the specialised area of cyber security should be clearly reflected in the distribution of credits with substantial coverage of the relevant KA(s) along with appropriate coverage of other relevant KAs. Describe and justify how the distribution of credits: provides a coherent body of work for studentsensures that students are gaining deep knowledge and understanding about the specialised area of cyber securityModule descriptionsIn an appendix to this section, please include a module description for each module that addresses a KA Topic in Table 3.3. At the beginning of each module description, please provide a table that lists the KA Topics that the module covers along with brief justifications for why this is the case.The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 3.3.By way of example only, please see: REF _Ref42594185 \h \* MERGEFORMAT Appendix B: Module descriptions (Appendix to section 3 of application)Research dissertations accounting for more than 80 creditsFor Master’s degrees in which the original research dissertation accounts for more than 80 credits, clarify how the remainder of the degree adequately covers the KA Topics for a Master’s degree focusing on a specialised area of cyber security. Professional Knowledge and SkillsDescribe how the areas in Professional Knowledge and Skills (Appendix B, section 3 of call document) are addressed in the Master’s degree. By way of example, describe how team-working, communication skills, professional ethics, etc. are covered within the degree programme as a whole. It is not a requirement to have a separate dedicated module covering Professional Knowledge and Skills.Assessment materialsUp to 5 sides of A4, excluding copies of assessment materialsApproach to assessment for both full and provisional applicationsApproach to assessmentDescribe the overall approach to assessment of the taught modules on the Master’s degree. This should include:assessment methodologymarking schemethe pass mark for individual modules and the taught part of the degree overallMarkingDescribe how the overall mark for the degree as a whole is worked out from the taught component and research dissertation component. Please describe the mark required to achieve pass, merit and distinction (or equivalent) of the overall degree.Justification of 40% pass markWhere the pass mark for taught modules, dissertation and/or the degree overall is set at, or close to, 40% provide a justification that students achieving this pass mark have achieved and demonstrated sufficient knowledge and understanding at Master’s level. By way of example, it may be appropriate here to refer to the marking scheme that shows what a student has to be able to demonstrate in order to achieve a pass mark of 40%.Rigour of assessmentProvide a table that shows for each assessed module an estimate of the ratio of bookwork to critical analysis/application in the assessments. Please also provide a brief justification for each ratio. If the ratio is greater than 60:40, provide a clear justification for this value.By way of example only:ModuleEstimate for % of bookwork in assessmentsEstimate for % of critical analysis/application in assessmentsComments (where applicable)A few examples REF _Ref42604262 \h \* MERGEFORMAT Forensics-1 (C)4060Assessments include practical application of knowledge REF _Ref42604376 \h \* MERGEFORMAT Forensics-2 (C)4060Assessments include practical application of knowledge REF _Ref45021806 \h \* MERGEFORMAT NetSec (C)4060Practical exercises requiring understanding, analysis and problem solving REF _Ref42605843 \h \* MERGEFORMAT CyberSec (C)6040 REF _Ref42605976 \p \h \* MERGEFORMAT ResMethods (C)4555Students required to produce research paper as preparation for their dissertation REF _Ref42606031 \p \h \* MERGEFORMAT Cloud (O)4555 REF _Ref42606073 \p \h \* MERGEFORMAT DataSci (O)4060 REF _Ref42606124 \p \h \* MERGEFORMAT MachLearn (O)4060 REF _Ref42606240 \p \h \* MERGEFORMAT ProjMgt (O)6535Table 4.1: An example for illustrative purposes only of the ratio of bookwork to critical analysis/application for compulsory and optional modules.Examination papersProvisional applicationFor each of the modules identified in section 3 that addresses a Knowledge Area Topic, describe the process (to be) used for assessment (e.g., examination, coursework, practical exercises, etc.). Provide a copy of examination paper(s) that students have sat or specimen paper(s) of the examinations they will sit. For assessed coursework, please provide copies of all assignments (to be) provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in an REF _Ref42606456 \h \* MERGEFORMAT Appendix to section 4 of application.Full applicationFor academic year 2019-2020, for each of the modules identified in section 3 that addresses a Knowledge Area Topic, describe the process used for assessment (e.g., examination, coursework, practical exercises, etc.). Provide a copy of the examination paper(s) that students sat. For assessed coursework, provide copies of all assignments provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in an REF _Ref42606456 \h \* MERGEFORMAT Appendix to section 4 of application.External examiner’s report – full application onlyFor academic year 2019-2020, provide a copy of the REF _Ref42606839 \h \* MERGEFORMAT external examiner’s report. Describe the process for engagement with the external examiner. Describe the technical background and experience of the external examiner.For academic year 2019-2020, Provide a copy of the REF _Ref42607209 \h \* MERGEFORMAT HEI’s response to external examiner’s report and any follow-up actions that have been undertaken in response to the report.Original research dissertationsUp to 5 sides of A4, excluding list of dissertation topics and copies of dissertationsApplications for both full and provisional certificationGuidance to studentsDescribe the guidance the HEI provides, or will provide, to Master’s students before they embark on their dissertations, for example: research methods, undertaking literature reviews, etc. Allocation of dissertation topicsDescribe the process for allocation of dissertation topics to students, for example:is it up to students to come up with topic ideas?do members of staff identify possible topics?does the HEI have links with industry partners who suggest topics?Scope of dissertation topicsDescribe the process for ensuring:dissertation topics are within scope of the specialised area of cyber security and the appropriate CyBOK Knowledge Area(s)that students are supervised by appropriately knowledgeable personnelMonitoring of students’ progressDescribe the process for monitoring the progress of students on their dissertations. Assessment of dissertationsDescribe the process for assessing dissertations. Provide a specific, tailored marking scheme for dissertations clearly showing how grades are determined and what would be necessary for each of a distinction, merit or pass. Please indicate whether this or other similar guidance is provided to students. By way of example only: How well was the dissertation work planned10 marksSignificance of problem addressed and relevance to cyber security15 marksAppropriateness of the technical approach15 marksQuality of literature review15 marksQuality and significance of results obtained20 marksInsight provided by conclusions and recommendations15 marksPerformance in Viva10 marksDistinctionThorough and careful planning throughout. Time used effectively.Important problem, highly relevant to cyber security.Etc.MeritPassFailTable 5.1: An example for illustrative purposes only of a marking scheme and assessment criteria for dissertations.Research dissertations contributing fewer than 40 creditsFor Master’s degrees in which the original research dissertation accounts for fewer than 40 credits, describe how students are able to gain sufficient understanding and experience of undertaking original research. Dissertations – for full certification onlyList of dissertation topicsFor each of academic years 2019-2020 and 2018-2019 (if any), provide a list of Master’s dissertations undertaken by students. This should include the dissertation title, a short (one paragraph) abstract, an identification of which KA(s) the dissertation applies to, and – if appropriate – whether there was any external involvement in the dissertation (e.g., from industry). Where there were more than 20 students undertaking dissertations in an academic year, provide information for a representative sample of 20 dissertations only.By way of example only:Dissertation titleSynopsis of dissertationCyBOK KA(s) addressedExternal involvementDiss-1Diss-2 …Diss-nTable 5.2: An example for illustrative purposes only of a table to describe dissertations undertaken in academic year 2019-2020.By way of example only:Dissertation titleSynopsis of dissertationCyBOK KA(s) addressedExternal involvementDiss-1Diss-2 …Diss-mTable 5.3: An example for illustrative purposes only of a table to describe dissertations undertaken in academic year 2018-2019.Example dissertationsFor academic year 2019-2020, provide one anonymised and representative copy of a dissertation for each of:a dissertation that achieved a distinction Please see: REF _Ref42675691 \h \* MERGEFORMAT Distinction dissertationa dissertation that achieved a merit Please see: REF _Ref42675734 \h \* MERGEFORMAT Merit dissertation REF _Ref42674442 \p \h \* MERGEFORMAT a dissertation that achieved a pass Please see: REF _Ref42675776 \h \* MERGEFORMAT Pass dissertation REF _Ref42674517 \p \h \* MERGEFORMAT If none in 2019-2020, try 2018-2019; if none, please contact the NCSC ahead of the deadline for applications. Dissertations should be placed in an appendix at the end of the application and must be included in the email submission.Marks for example dissertationsFor each of the dissertations in the previous section, provide:the overall mark awardedthe components of the overall mark, for example marks awarded to:viva (including any demonstration)dissertation plandissertationkey comments from the internal examinersany additional information that you feel would help the assessment panel as part of its job to determine whether the grade awarded to each dissertation is appropriate.By way of example only:Please see: REF _Ref42675331 \h \* MERGEFORMAT Distinction dissertation informationPlease see: REF _Ref42675364 \h \* MERGEFORMAT Merit dissertation informationPlease see: REF _Ref42675387 \h \* MERGEFORMAT Pass dissertation informationStudent numbers and grades achieved – applications for full certification onlyUp to five sides of A4Student entry dataWhere the data are available, for each of academic years 2019-2020 and 2018-2019, please provide the information requested in Table 6.1. Please provide a separate table for each academic year.By way of example only:Entry RequirementsNumber of full-time studentsNumber of part-time studentsNumber with 2/1 (or equivalent) or above in STEM subject Number with 2/2 (or equivalent) or above in STEM subject Number without 2/2 or above in STEM subject but who have relevant experienceNumber without 2/2 or above in STEM subject or relevant experienceStudents with UK nationalityIn general, 2/1 in STEM or relevant experience – though some discretion allowed 1026750Students with EU nationalityAs above201110Students without UK or EU nationalityAs above200020Table 6.1a: For illustrative purposes only student entry data for 2019-2020.Entry RequirementsNumber of full-time studentsNumber of part-time studentsNumber with 2/1 (or equivalent) or above in STEM subject Number with 2/2 (or equivalent) or above in STEM subject Number without 2/2 or above in STEM subject but who have relevant experienceNumber without 2/2 or above in STEM subject or relevant experienceStudents with UK nationalityIn general, 2/1 in STEM or relevant experience – though some discretion allowed 804440Students with EU nationalityAs above201110Students without UK or EU nationalityAs above000000Table 6.1b: For illustrative purposes only student entry data for 2018-2019.If tables 6.1a, b require any explanatory text, please add it here being careful not to exceed page limit for this section.Student exit dataFor academic years 2019-2020 and 2018-2019, provide the information requested in Table 6.2. By way of example only:Academic yearNumber of students scheduled to complete Master’sNumber achieving distinction overallNumber achieving merit overall Number achieving pass overallNumber failing Master’s Number deferring for additional year(s)Number opting to graduate with postgraduate certificate (or equivalent)Number with other outcomes (if applicable)2018 - 20191025200102019 - 2020143731000Table 6.2: For illustrative purposes only student exit data for 2018-2019 and 2019-2020If table 6.2 requires any explanatory text, please add it here being careful not to exceed page limit for this section.Student satisfactionProvide the results of any student satisfaction surveys and any actions that have been taken by the HEI as a result.Appendix A: Staff CVs (Appendix to section 2 of application)Up to two sides of A4 per CVIt is recommended to follow the structure below for each CV. For each CV, it is important to get across the person’s knowledge, experience and skills in cyber security.By way of example only:CV for Dr E. F. Personal statement of experience and expertise in cyber securityProvide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.Professional employmentDescribe professional positions of employment, highlighting those relevant to cyber security.Contribution to cyber security at the University of XDescribe what the person does at the HEI that is relevant to cyber security. Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.Cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.Any other informationInclude any other information that might be relevant in demonstrating the person’s cyber security expertise.CV for Dr G. H. Personal statement of experience and expertise in cyber securityProvide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.Professional employmentDescribe professional positions of employment, highlighting those relevant to cyber security.Contribution to cyber security at the University of XDescribe what the person does at the HEI that is relevant to cyber security. Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.Cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.Any other informationInclude any other information that might be relevant in demonstrating the person’s cyber security expertise.CV for I. J. Personal statement of experience and expertise in cyber securityProvide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.Professional employmentDescribe professional positions of employment, highlighting those relevant to cyber security.Contribution to cyber security at the University of XDescribe what the person does at the HEI that is relevant to cyber security. Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.Cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.Any other informationInclude any other information that might be relevant in demonstrating the person’s cyber security expertise.CV for K. L. Personal statement of experience and expertise in cyber securityProvide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.Academic backgroundInclude here items such as qualifications obtained, subjects, year, institution, a few key publications.Professional employmentDescribe professional positions of employment, highlighting those relevant to cyber security.Contribution to cyber security at the University of XDescribe what the person does at the HEI that is relevant to cyber security. Esteem indicatorsFor example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.Cyber security knowledge and expertise indicatorsFor example, recent publications, work with industry/government, research activities.Any other informationInclude any other information that might be relevant in demonstrating the person’s cyber security expertise.Appendix B: Module descriptions (Appendix to section 3 of application)Include a table at the beginning of each module description that shows which KA Topics the module covers along with brief justifications for why this is the case.The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 3.3.By way of example only:Forensics-1 module Forensics-2 moduleNetwork Security moduleCyber Security module Research Methods module Cloud Computing module Data Science module Machine Learning module Project Management module Appendix C: Assessment materials (Appendix to section 4 of application)By way of example only:Forensics-1 assessments Forensics-2 assessmentsNetwork Security assessmentsCyber Security assessmentsResearch Methods assessmentsCloud Computing assessmentsData Science assessmentsMachine Learning assessmentsProject Management assessmentsExternal examiner’s reportHEI’s response to external examiner’s reportAppendix D: Original Research Dissertations (Appendix to section 5 of application)Dissertation awarded a distinctionDistinction dissertationDistinction dissertation information Dissertation awarded a meritMerit dissertationMerit dissertation information Dissertation awarded a pass Pass dissertationPass dissertation information ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download