cyber_security_technical_professional_integrated_degree

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cyber_security_technical_professional_integrated_degree [2022/11/09 17:14] markcyber_security_technical_professional_integrated_degree [2023/09/28 08:50] (current) – [Modules (Cohort 1 2020 start)] emma
Line 1: Line 1:
--====== Cyber Security Technical Professional (integrated degree) from September 2020 ======+====== Cyber Security Technical Professional (integrated degree) from September 2020 ======
  
 ===== NCSC Provisionally Certified Degree Apprenticeship ===== ===== NCSC Provisionally Certified Degree Apprenticeship =====
Line 56: Line 56:
 | |[[Risk and information management]]| Risk assessments are used to identify, estimate, and prioritize risk to organisational operations (i.e., mission, functions, image, finance and reputation), organisational assets, individuals and other organisations, resulting from the operation and use of information systems. In order to assess risk, the systems need to be explored for weaknesses, either technical or social. Reconnaissance methods emulate those of attackers.|Final Project and Dissertation and the End Point Assessment| | |[[Risk and information management]]| Risk assessments are used to identify, estimate, and prioritize risk to organisational operations (i.e., mission, functions, image, finance and reputation), organisational assets, individuals and other organisations, resulting from the operation and use of information systems. In order to assess risk, the systems need to be explored for weaknesses, either technical or social. Reconnaissance methods emulate those of attackers.|Final Project and Dissertation and the End Point Assessment|
 | |[[Cybersecurity incident management and professionalism]]|Managing security incidents requires a rigorous approach and may have to be performed in real time. There are defined processes with key stages. Apprentices will be instructed and practice incident management. As part of this modules they will also research and investigate the legal, ethical and regulatory requirements.|Final Project and Dissertation and the End Point Assessment| | |[[Cybersecurity incident management and professionalism]]|Managing security incidents requires a rigorous approach and may have to be performed in real time. There are defined processes with key stages. Apprentices will be instructed and practice incident management. As part of this modules they will also research and investigate the legal, ethical and regulatory requirements.|Final Project and Dissertation and the End Point Assessment|
-| |[[Project and dissertation]]|There is no specific syllabus for this module as the project is an individual piece of work, exploring an idea from conception through to realisation. Nonetheless, elements of the project process are covered in a short lecture series at the start of the academic year. |+| |[[Project and dissertation]]|There is no specific syllabus for this module as the project is an individual piece of work, exploring an idea from conception through to realisation. Nonetheless, elements of the project process are covered in a short lecture series at the start of the academic year. |Overall grade|
  
 === Year 4 EPA === === Year 4 EPA ===
 ^Year^Module^Overview^Builds towards^ ^Year^Module^Overview^Builds towards^
-|4|[[End point assessment (EPA]])|This is an integrated degree apprenticeship. The degree cannot be awarded unless the apprenticeship is passed and vice versa. The EPA contributes 10 credits towards the degree and must be completed within three months of the Gateway. The EPA starts after the Gateway has been passed. The Gateway requirements are that the employer confirms that the apprentice is ready for the EPA and has met the knowledge, skills and behaviour (KSBs) requirements set out in the occupational standard; and the apprentice has completed and passed all the modules in years 1-3 (350 credits) and the apprentice has passed Level 2 English and maths (if not already achieved); and the apprentice has produced a portfolio in relation to the KSBs for the Technical Discussion|+|4|[[End point assessment (EPA]])|This is an integrated degree apprenticeship. The degree cannot be awarded unless the apprenticeship is passed and vice versa. The EPA contributes 10 credits towards the degree and must be completed within three months of the Gateway. The EPA starts after the Gateway has been passed. The Gateway requirements are that the employer confirms that the apprentice is ready for the EPA and has met the knowledge, skills and behaviour (KSBs) requirements set out in the occupational standard; and the apprentice has completed and passed all the modules in years 1-3 (350 credits) and the apprentice has passed Level 2 English and maths (if not already achieved); and the apprentice has produced a portfolio in relation to the KSBs for the Technical Discussion|Overall grade|
  
 We may review the delivery order of modules based on feedback from employers and apprentices.  We may review the delivery order of modules based on feedback from employers and apprentices. 
Line 68: Line 68:
 The full Learner Journey for Cohort 2 can be found here:{{ :cyberdegree:cohort2lj.pdf |Cohort 2}} The full Learner Journey for Cohort 2 can be found here:{{ :cyberdegree:cohort2lj.pdf |Cohort 2}}
  
-The full Learner Journey for Cohort 3a and 3b can be found here:{{ :cyberdegree:cohort3lj.pdf |Cohort 3}}+The full Learner Journey for Cohort 3a and 3b can be found here:{{ :cyberdegree:cohort3lj2.pdf |Cohort 3}}
  
 ==== This apprenticeship has a duration of up to 48 months==== ==== This apprenticeship has a duration of up to 48 months====
Line 98: Line 98:
 | |[[Cybersecurity incident management and professionalism]]|Chelt G128|13/03/2023, 10/04/2023, 08/05/2023| | |[[Cybersecurity incident management and professionalism]]|Chelt G128|13/03/2023, 10/04/2023, 08/05/2023|
 | |[[Project and dissertation]]|Chelt G128|05/06/2023| | |[[Project and dissertation]]|Chelt G128|05/06/2023|
-|4|[[End point assessment (EPA]])|+|4|[[End point assessment (EPA]])|Chelt G127|Dates to be confirmed|
  
 ==== Modules (Cohort 2 2021 start) ==== ==== Modules (Cohort 2 2021 start) ====
Line 111: Line 111:
 | |[[Operating system security and defensive programming]]|Chelt G127|20/02/2023, 13/03/2023, 03/04/2023| | |[[Operating system security and defensive programming]]|Chelt G127|20/02/2023, 13/03/2023, 03/04/2023|
 | |[[Embedded systems security]]|Chelt G127|01/05/2023, 22/05/2023, 12/06/2023| | |[[Embedded systems security]]|Chelt G127|01/05/2023, 22/05/2023, 12/06/2023|
-|3|[[Security assurance and security case development]]| +|3|[[Security assurance and security case development]]|Chelt G128|04/09/2023, 02/10/2023, 30/10/2023
-| |[[Risk and information management]]| +| |[[Risk and information management]]| Chelt G128|27/11/2023, 15/01/2024, 12/02/2024
-| |[[Cybersecurity incident management and professionalism]]| +| |[[Cybersecurity incident management and professionalism]]| Chelt G128|18/03/2024, 08/04/2024, 29/04/2024
-| |[[Project and dissertation]]| +| |[[Project and dissertation]]| Chelt G128
-|4|[[End point assessment (EPA]])|+|4|[[End point assessment (EPA]])| Chelt G128|
  
 ==== Modules (Cohort 3A 2022 start) ==== ==== Modules (Cohort 3A 2022 start) ====
Line 122: Line 122:
 |1|[[Operating systems and architecture]]|Chelt G126| 05/09/2022, 03/10/2022, 17/10/2022 | |1|[[Operating systems and architecture]]|Chelt G126| 05/09/2022, 03/10/2022, 17/10/2022 |
 | |[[Programming]]|Glos D101|14/11/2022, 05/12/2022, 23/01/2023| | |[[Programming]]|Glos D101|14/11/2022, 05/12/2022, 23/01/2023|
-| |[[Cyber threats]]|Chelt G126|20/02/2023, 13/03/2023, 03/04/2023|+| |[[Cyber threats]]|Chelt G126|20/02/2023, 06/03/2023, 03/04/2023|
 | |[[Networking]]|Chelt G126|01/05/2023, 22/05/2023, 12/06/2023| | |[[Networking]]|Chelt G126|01/05/2023, 22/05/2023, 12/06/2023|
-|2|[[Cryptography, mathematics and algorithms]]| | +|2|[[Embedded systems security]]| TBC G127|04/09/2023, 25/09/2023, 16/10/2023
-| |[[Operating system security and defensive programming]]| +| |[[Cryptography, mathematics and algorithms]]| TBC G126|13/11/2023, 04/12/2023, 08/01/2024
-| |[[Embedded systems security]]| +| |[[Information management and security]]| TBC G127 & G128|05/02/2024, 04/03/2024, 08/04/2024
-| |[[Information management and security]]|+| |[[Operating system security and defensive programming]]| TBC G127|29/04/2024, 20/05/2024, 17/06/2024|
 |3|[[Security assurance and security case development]]| |3|[[Security assurance and security case development]]|
 | |[[Risk and information management]]| | |[[Risk and information management]]|
Line 141: Line 141:
 | |[[Cyber threats]]|Chelt G126| 27/02/2023, 20/03/2023, 10/04/2023| | |[[Cyber threats]]|Chelt G126| 27/02/2023, 20/03/2023, 10/04/2023|
 | |[[Networking]]|Chelt G126| 08/05/2023, 29/05/2023, 19/06/2023 | | |[[Networking]]|Chelt G126| 08/05/2023, 29/05/2023, 19/06/2023 |
-|2|[[Cryptography, mathematics and algorithms]]| | +|2|[[Embedded systems security]]| TBC G127|18/09/2023, 09/10/2023, 30/10/2023 | 
-| |[[Operating system security and defensive programming]]| +|[[Cryptography, mathematics and algorithms]]| TBC G126|20/11/2023, 11/12/2023, 15/01/2024 | 
-| |[[Embedded systems security]]|+| |[[Information management and security]]| TBC G127|19/02/2024, 18/03/2024, 15/04/2024 | 
 +| |[[Operating system security and defensive programming]]| TBC G127|13/05/2024, 03/06/2024, 24/06/2024 | 
 +|3|[[Security assurance and security case development]]| 
 +| |[[Risk and information management]]| 
 +| |[[Cybersecurity incident management and professionalism]]| 
 +| |[[Project and dissertation]]| 
 +|4|[[End point assessment (EPA]])| 
 + 
 + 
 +==== Modules (Cohort 4 September 2023 start) ==== 
 + 
 +^Year^Module^Room^Block release dates^ 
 +|1|[[Operating systems and architecture]]|Chelt G123| 25/09/2023, 16/10/2023, 06/11/2023 | 
 +| |[[Programming]]|Glos D101| 04/12/2023, 08/01/2024, 29/01/2024 | 
 +| |[[Cyber threats]]|Chelt G123| 19/02/2024, 18/03/2024, 29/04/2024| 
 +| |[[Networking]]|Chelt G123| 20/05/2024, 10/06/2024, 01/07/2024 | 
 +|2|[[Cryptography, mathematics and algorithms]]
 +| |[[Operating system security and defensive programming]]|  
 +| |[[Embedded systems security]]| 
 | |[[Information management and security]]| | |[[Information management and security]]|
 |3|[[Security assurance and security case development]]| |3|[[Security assurance and security case development]]|
Line 150: Line 168:
 | |[[Project and dissertation]]| | |[[Project and dissertation]]|
 |4|[[End point assessment (EPA]])| |4|[[End point assessment (EPA]])|
 +
 +
 +
 ==== Competency component ==== ==== Competency component ====
  
Line 200: Line 221:
  
  
-If you are concerned about someone or need help tell the police via [[www.gloucestershire.police.uk]]by calling 101, in an emergency by calling 999 or contact the Confidential Anti-Terrorist Hotline on 0800 789 321.+If you are concerned about someone or need help tell the police via[[www.gloucestershire.police.uk|Gloucestershire Police]] by calling 101, in an emergency by calling 999 or contact the Confidential Anti-Terrorist Hotline on 0800 789 321.
  
  
  • cyber_security_technical_professional_integrated_degree.1668014091.txt.gz
  • Last modified: 2022/11/09 17:14
  • by mark