cyber_security_technical_professional_integrated_degree

Cyber Security Technical Professional (integrated degree) from September 2020

The degree meets the digital apprenticeship standard set by the Institute for Apprenticeships and Technical Education

It has 2 major components:

  • A full BSc Honours degree - awarded by our partner, the University of the West of England (UWE)
  • A Programme of work based training to develop professional skills and behaviours

Both parts must be achieved to be awarded the qualification

The standard

The Learner Journey covers the sequencing of the modules you will study in your degree, along with the work you should plan to do between in-college block weeks to help you achieve your degree apprenticeship.

The Golden Valley Development (Cyber Park) is attracting many businesses to the area around Gloucestershire College. We have developed the content of the degree program with this in mind, structuring the curriculum to build skills and experience in layers to produce apprentices who can make a real difference to local as well as global business. The Cyber Park is intended as the first facility of its kind in the UK to support the growth and development of new cyber security businesses, technology, research and skills. It will be the focal point for cyber security globally as the UK builds one of the world’s leading digital economies.

The curriculum is designed and sequenced around the 21 knowledge areas contained within the Cyber Security Body of Knowledge CyBOK, which is funded by the NCSC.

Year 1 Modules

Year 1 has been designed to cover the foundations of computing.

Apprentices will cover computing fundamentals such as number systems and representation within the system, machine code, operating system design, virtualisation, different programming languages for different purposes, full stack development, threats to the systems we build and manage, and how to design and implement networked systems.

YearModuleOverviewBuilds towards
1Operating systems and architectureThis module introduces apprentices to the foundations ot beof computer systems architecture together with the integrated hardware and software components and subsystems that enable and allow data to be input, processed and output. Low level programming is used to illustrate the operation of the components. The module then explores the concepts of operating systems, virtualisation, hardware management and file systems. Apprentices will learn the basic concepts of how data is represented in digital systems, logic and storage components, machine organisation and assembler programming. They will then build on this knowledge to see how levels of abstraction are introduced via operating systems and virtualisation to produce usable systems.Programming, Operating Systems & Defensive Programming, Embedded Systems Security, Final Project and Dissertation, and End Point Assessment
ProgrammingThis module introduces students to the core concepts of programming with an introduction to algorithms and the characteristics of programming paradigms. Appropriate programming languages will be chosen to illustrate the concepts. It is not the intent of this module to teach apprentices to become proficient programmers. If this is a requirement of their employment, then it will be the employer’s responsibility. Among the topics included in this module are: introduction to algorithms, procedural, object-orientated & event-driven programming, the integrated development environment and the debugging process. Development lifecycles and processes are covered along with code repositories and version managementInformation Management and Security, Operating Systems & Defensive Programming, Final Project and Dissertation, and End Point Assessment
Cyber threatsSecurity is one of the most important challenges modern organisations face. Security is about protecting organisational assets, including personnel, data, equipment and networks from attack through the use of prevention techniques in the form of vulnerability testing/security policies and detection techniques, exposing breaches in security and implementing effective responses. In order to provide protection, it is fundamental to understand the types of threats, their methods and means of attack. In this module you will explore the different types of threat and how they penetrate personal, physical, logical and procedural in securities.Cryptography, Mathematics and Algorithms, Operating Systems & Defensive Programming, all Year 3 modules and End Point Assessment
NetworkingThe aim of this unit is to provide apprentices with knowledge of computer networking essentials, how they operate, protocols, standards, security considerations and a range of networking technologies. It gives the apprentices the knowledge and skills that they need for the planning, designing, implementation and management of computer networks and understanding of the network infrastructure capabilities and limitations.Information Management and Security, Operating Systems & Defensive Programming, Final Project and Dissertation, and End Point Assessment

Year 2 Modules

Year 2 has been designed to help apprentices mitigate against the threats to the systems we learned to build in year 1.

Modules cover how cryptography can be used to secure data and systems in real-world applications, how organisational Information Management Systems contribute towards securing the enterprise, how we can apple good practise security principles to computer systems, design software with security built-in and how we can secure the burgeoning IoT device landscape.

YearModuleOverviewBuilds towards
2Cryptography, mathematics and algorithmsThis module introduces apprentices to the theoretical principles of cryptography and looks at some practical applications, many of which are used on a daily basis. Apprentices are expected to investigate the inner workings of cryptographic systems and how to correctly use them in real-world applications. Apprentices are expected to explore the mathematical algorithms in relation to cryptography and their applications. Apprentices are also expected to analyse the symmetric encryption methods and ciphers, public key cryptography and the security issues related to their implementation. In addition, apprentices are expected to investigate advanced encryption protocols and their applications. The module covers some of the mathematical principles and theory that underpin computing.The learning in this module underpins all remaining modules, Final Project and Dissertation and the End Point Assessment.
Information management and securityInformation security is concerned with protecting an organisations’ electronic or physical data. It should protect the confidentiality, availability and integrity of data. This module is concerned with the way in which electronic data is handled within the organisation. How it is made available, manipulated and analysed. It then examines how management systems are employed to minimise risk without impacting business productivity. The initial part of the module teaches apprentices the basic concepts of information management and how to use database management systems. The latter part covers the standards, policies and procedures for information security. These will cover human behaviour as well as physical and electronic assets.Operating System Security and Defensive Programming, all Year 3 modules, Final Project and Dissertation, and End Point Assessment
Operating system security and defensive programmingThis module introduces apprentices to the tasks of operating systems such as controlling and allocating memory, prioritising system requests, controlling input and output devices, facilitating data networking and managing files, including security and protection. Apprentices will learn the concepts of security protection in operating systems, such as hierarchical protection domains, and how they are employed to resist malware threats. A design pattern is a description of how to solve a problem that can be used in many different situations and can help deepen the understanding of object-orientated programming and help improve software design and reusability. They can also be used for secure programming and apprentices will learn how to apply them along with other methods and tools.Embedded Systems, All Year 3 Modules, Final Project and Dissertation, and End Point Assessment
Embedded systems securityThis module aims to provide apprentices with an in-depth appreciation of embedded devices and their security. An embedded system is a combination of processor, memory, I/O and the OS that forms a device. Embedded systems get infrequent or never get software updates. They are very many identical devices installed, often in critical facilities and systems. Because of this the devices must be made secure Delivery will cover modern system architecture, key technologies, and the security implications of implementing these technologies. In addition, essential low-level malware techniques will be examined.Final Project and Dissertation, End Point Assessment

Year 3 Modules

In year 3, we build upon the modules covered in Years 1 and 2 to learn how to manage Cyber Security for the enterprise as Cyber Security Professionals. Apprentices will learn how we design security systems incorporating software and hardware consideration, investigate further how we identify and manage risk, what measures and steps we can put in place to re-secure systems after a cyber breach before moving on to their individual project and dissertation.

YearModuleOverviewBuilds towards
3Security assurance and security case developmentThere are recognised IT security design principles which can be applied to IT systems and software. These include security architectures that incorporate hardware and software components. A security case should take these principles and architectures into account.Final Project and Dissertation and the End Point Assessment
Risk and information management Risk assessments are used to identify, estimate, and prioritize risk to organisational operations (i.e., mission, functions, image, finance and reputation), organisational assets, individuals and other organisations, resulting from the operation and use of information systems. In order to assess risk, the systems need to be explored for weaknesses, either technical or social. Reconnaissance methods emulate those of attackers.Final Project and Dissertation and the End Point Assessment
Cybersecurity incident management and professionalismManaging security incidents requires a rigorous approach and may have to be performed in real time. There are defined processes with key stages. Apprentices will be instructed and practice incident management. As part of this modules they will also research and investigate the legal, ethical and regulatory requirements.Final Project and Dissertation and the End Point Assessment
Project and dissertationThere is no specific syllabus for this module as the project is an individual piece of work, exploring an idea from conception through to realisation. Nonetheless, elements of the project process are covered in a short lecture series at the start of the academic year. Overall grade

Year 4 EPA

YearModuleOverviewBuilds towards
4End point assessment (EPA)This is an integrated degree apprenticeship. The degree cannot be awarded unless the apprenticeship is passed and vice versa. The EPA contributes 10 credits towards the degree and must be completed within three months of the Gateway. The EPA starts after the Gateway has been passed. The Gateway requirements are that the employer confirms that the apprentice is ready for the EPA and has met the knowledge, skills and behaviour (KSBs) requirements set out in the occupational standard; and the apprentice has completed and passed all the modules in years 1-3 (350 credits) and the apprentice has passed Level 2 English and maths (if not already achieved); and the apprentice has produced a portfolio in relation to the KSBs for the Technical DiscussionOverall grade

We may review the delivery order of modules based on feedback from employers and apprentices.

The full Learner Journey for Cohort 1 can be found here: Cohort 1

The full Learner Journey for Cohort 2 can be found here:Cohort 2

The full Learner Journey for Cohort 3a and 3b can be found here:Cohort 3

(3 year knowledge program and 6 months for final work based projects and end point assessment entry)

YearModuleRoomBlock release dates
1Operating systems and architectureGlos7/9/2020, 21/9/2020, 12/10/2020
NetworkingGlos9/11/2020, 14/12/2020, 11/01/2021
Cyber threatsGlos08/02/2021, 08/03/2021, 12/04/2021
ProgrammingGlos10/05/2021, 14/06/2021, 28/06/2021
2Cryptography, mathematics and algorithmsChelt G128 & G12606/09/2021, 20/09/2021, 11/10/2021
Operating system security and defensive programmingChelt G12308/11/2021, 06/12/2021, 10/01/2022
Information management and securityChelt G12807/02/2022, 07/03/2022, 11/04/2022
Embedded systems securityChelt G12809/05/2022, 13/06/2022, 27/06/2022
3Security assurance and security case developmentChelt G12805/09/2022, 03/10/2022, 31/10/2022
Risk and information managementChelt G12828/11/2022, 16/01/2023, 13/02/2023
Cybersecurity incident management and professionalismChelt G12813/03/2023, 10/04/2023, 08/05/2023
Project and dissertationChelt G12805/06/2023
4End point assessment (EPA)Chelt G127Dates to be confirmed
YearModuleRoomBlock release dates
1Operating systems and architectureChelt G12713/09/2021, 27/9/2021, 18/10/2021
NetworkingChelt G12715/11/2021, 13/12/2021, 17/01/2022
Cyber threatsChelt G128 & G12614/02/2022, 14/03/2022, 19/04/2022
ProgrammingGlos D10116/05/2022, 20/06/2022, 04/07/2022
2Cryptography, mathematics and algorithmsChelt G12705/09/2022, 26/09/2022, 17/10/2022
Information management and security Chelt G12721/11/2022, 12/12/2022, 23/01/2023
Operating system security and defensive programmingChelt G12720/02/2023, 13/03/2023, 03/04/2023
Embedded systems securityChelt G12701/05/2023, 22/05/2023, 12/06/2023
3Security assurance and security case developmentChelt G12804/09/2023, 02/10/2023, 30/10/2023
Risk and information management Chelt G12827/11/2023, 15/01/2024, 12/02/2024
Cybersecurity incident management and professionalism Chelt G12818/03/2024, 08/04/2024, 29/04/2024
Project and dissertation Chelt G128
4End point assessment (EPA) Chelt G128
YearModuleRoomBlock release dates
1Operating systems and architectureChelt G126 05/09/2022, 03/10/2022, 17/10/2022
ProgrammingGlos D10114/11/2022, 05/12/2022, 23/01/2023
Cyber threatsChelt G12620/02/2023, 06/03/2023, 03/04/2023
NetworkingChelt G12601/05/2023, 22/05/2023, 12/06/2023
2Embedded systems security TBC G12704/09/2023, 25/09/2023, 16/10/2023
Cryptography, mathematics and algorithms TBC G12613/11/2023, 04/12/2023, 08/01/2024
Information management and security TBC G127 & G12805/02/2024, 04/03/2024, 08/04/2024
Operating system security and defensive programming TBC G12729/04/2024, 20/05/2024, 17/06/2024
3Security assurance and security case development
Risk and information management
Cybersecurity incident management and professionalism
Project and dissertation
4End point assessment (EPA)
YearModuleRoomBlock release dates
1Operating systems and architectureChelt G126 12/09/2022, 10/10/2022, 31/10/2022
ProgrammingGlos D101 28/11/2022, 12/12/2022, 30/01/2023
Cyber threatsChelt G126 27/02/2023, 20/03/2023, 10/04/2023
NetworkingChelt G126 08/05/2023, 29/05/2023, 19/06/2023
2Embedded systems security TBC G12718/09/2023, 09/10/2023, 30/10/2023
Cryptography, mathematics and algorithms TBC G12620/11/2023, 11/12/2023, 15/01/2024
Information management and security TBC G12719/02/2024, 18/03/2024, 15/04/2024
Operating system security and defensive programming TBC G12713/05/2024, 03/06/2024, 24/06/2024
3Security assurance and security case development
Risk and information management
Cybersecurity incident management and professionalism
Project and dissertation
4End point assessment (EPA)

For the duration of the apprenticeship, technical competencies will be assessed in the workplace. These will include: building networks and digital systems, writing programs, analysing malware, identifying threats, undertaking risk assessments, designing secure systems and managing intrusion responses.

A professional development plan will be established with the apprentice, the employer and the assessor to ensure all the required components are completed and demonstrated in a final portfolio of work based projects.

Apprentices will be visited by an assessor once a month throughout the degree in order to review progress and assess competencies.

A training coordinator will visit every quarter to formally review progress with the line manager and the apprentice.

The employer and the assessor will judge when the apprentice is ready for the end point assessment.

Competency checklist

Off the job training should be recorded in Smart Assessor. Should there be any issues in accessing Smart Assessor, please use this spreadsheet tracker and we will update Smart Assessor as soon as we can. Tracker and work log

Types of training that count towards the off the job training. OTJ

The apprentice handbook, available in the Wellbeing tab on Smart Assessor, contains the following useful information:

  • Safeguarding, Prevent and British Values
  • What we expect of you as an apprentice
  • What you should expect of us as a training provider
  • College Values
  • Procedures for college life
  • Resources you can access
  • Off The Job training and tracking
  • Assessment processes including the appeals procedure
  • NUS Apprenticeship Membership

Safeguarding

We are also here to support you - you can contact the college’s safeguarding team by emailing safeguarding@gloscol.ac.uk – monitored Monday to Friday from 08:30-17:00

Prevent

PREVENT is part of the Government’s strategy for preventing people becoming RADICALISED which may lead to EXTREMISM and acts of TERRORISM.

RADICALISATION: The process by which an individual or group comes to adopt extreme political, social, or religious views.

EXTREMISM: The condition or act of taking an extreme view; belief in, and support for, ideas that most people think are unreasonable and unacceptable.

TERRORISM: The unlawful use of violence and intimidation for a political, religious or ideological cause

If you are concerned about someone or need help tell the police via, Gloucestershire Police by calling 101, in an emergency by calling 999 or contact the Confidential Anti-Terrorist Hotline on 0800 789 321.

  • cyber_security_technical_professional_integrated_degree.txt
  • Last modified: 2023/09/28 08:50
  • by emma