institution’s letter of support · web viewissue 1.121 july 2020 issue 1.121 july 2020 page 2 of...

39
Issue 1.1 21 July 2020 Guidance and Application Template for: Application for Certification of a Postgraduate Master’s Degree Providing a General, Broad Foundation in Cyber Security This document provides an application template for an HEI to have its Master’s degree in Cyber Security considered for certification. It provides general guidance only and it is an HEI’s sole responsibility to ensure that its application is compliant and provides the information required in the corresponding call document. It is not a requirement that applicants use the template. Applicants should refer to the call document for detailed guidance on completing all sections of the application as well as details of the assessment criteria that apply. Applicants should note that to help assessors with their assessment of applications, all applications should have a table of contents and make use of headers, footers and hyperlinks. Some points to note: The minimum font size for applications is 10pt. However, it is recognised that to help fit some tables into the space available the text in some tables can be made smaller than 10pt. Text in blue is to help guide applicants on what may be an appropriate response to some sections of the application and is provided by way of example only. Please feel free to delete this page from your completed application Document History Issue Date Comment Issue 1.0 25 June 2020 First issue of application template for general Master’s degrees Issue 1.1 21 July 2020 Additional clarification of Indicative Material in Section 3.3b. Minor updates to example tables 3.2b, 3.2c, 3.3 and 4.1. Minor updates to appendices B and C. Minor typos fixed. Page 1 of 39

Upload: others

Post on 31-Dec-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Guidance and Application Template for:

Application for Certification of a Postgraduate Master’s Degree Providing

a General, Broad Foundation in Cyber Security

This document provides an application template for an HEI to have its Master’s degree in Cyber Security considered for certification. It provides general guidance only and it is an HEI’s sole responsibility to ensure that its application is compliant and provides the information required in the corresponding call document. It is not a requirement that applicants use the template.

Applicants should refer to the call document for detailed guidance on completing all sections of the application as well as details of the assessment criteria that apply.

Applicants should note that to help assessors with their assessment of applications, all applications should have a table of contents and make use of headers, footers and hyperlinks.

Some points to note:

· The minimum font size for applications is 10pt. However, it is recognised that to help fit some tables into the space available the text in some tables can be made smaller than 10pt.

· Text in blue is to help guide applicants on what may be an appropriate response to some sections of the application and is provided by way of example only.

Please feel free to delete this page from your completed application

Document History

Issue

Date

Comment

Issue 1.0

25 June 2020

First issue of application template for general Master’s degrees

Issue 1.1

21 July 2020

Additional clarification of Indicative Material in Section 3.3b. Minor updates to example tables 3.2b, 3.2c, 3.3 and 4.1. Minor updates to appendices B and C. Minor typos fixed.

© Crown Copyright 2020, The National Cyber Security Centre

University of X

Application for Provisional/Full[footnoteRef:2] Certification of a Master’s Degree Providing [2: Please delete either ‘full’ or ‘provisional’]

a General, Broad Foundation in Cyber Security

Issue 1.121 July 2020

Page 2 of 2

Table of contents1.Institution’s Letter of Support71.1Signed letter of support for both full and provisional applications71.2For provisional applications72.Description of the Applicant82.1Team82.2Recent investments92.3External linkages92.4Review and update process92.5Facilities92.6Staff CVs103.Description of the Master’s degree in Cyber Security113.1Description of the degree113.2Number of taught credits that can be mapped to CyBOK Knowledge Areas (KAs)133.3Detailed coverage of KA Topics 143.4Justification of KA coverage for a Master’s degree providing a general, broad foundation in cyber security183.5Module descriptions183.6Research dissertations accounting for more than 80 credits183.7Professional Knowledge and Skills184.Assessment materials194.1Approach to assessment for both full and provisional applications194.1.1Approach to assessment194.1.2Marking194.1.3Justification of 40% pass mark194.1.4Rigour of assessment194.2Examination papers204.2.1Provisional application204.2.2Full application204.3External examiner’s report – full application only205.Original research dissertations215.1Applications for both full and provisional certification215.1.1Guidance to students215.1.2Allocation of dissertation topics215.1.3Scope of dissertation topics215.1.4Monitoring of students’ progress215.1.5Assessment of dissertations215.1.6Research dissertations contributing fewer than 40 credits225.2Dissertations – for full certification only225.2.1List of dissertation topics225.2.2Example dissertations235.2.3Marks for example dissertations236.Student numbers and grades achieved – applications for full certification only246.1Student entry data246.2Student exit data266.3Student satisfaction267.Appendix A: Staff CVs (Appendix to section 2 of application)277.1CV for Dr E. F.277.1.1Personal statement of experience and expertise in cyber security277.1.2Academic background277.1.3Professional employment277.1.4Contribution to cyber security at the University of X277.1.5Esteem indicators277.1.6Cyber security knowledge and expertise indicators277.1.7Any other information277.2CV for Dr G. H.287.2.1Personal statement of experience and expertise in cyber security287.2.2Academic background287.2.3Professional employment287.2.4Contribution to cyber security at the University of X287.2.5Esteem indicators287.2.6Cyber security knowledge and expertise indicators287.2.7Any other information287.3CV for I. J.297.3.1Personal statement of experience and expertise in cyber security297.3.2Academic background297.3.3Professional employment297.3.4Contribution to cyber security at the University of X297.3.5Esteem indicators297.3.6Cyber security knowledge and expertise indicators297.3.7Any other information297.4CV for K. L.307.4.1Personal statement of experience and expertise in cyber security307.4.2Academic background307.4.3Professional employment307.4.4Contribution to cyber security at the University of X307.4.5Esteem indicators307.4.6Cyber security knowledge and expertise indicators307.4.7Any other information308.Appendix B: Module descriptions (Appendix to section 3 of application)318.1Risk Management module318.2Adversarial Behaviour module318.3Cryptography module318.4Network Security module318.5Malware module318.6Human Factors module318.7Research Methods module318.8Cloud Computing module318.9Forensics module318.10Machine Learning module318.11Project Management module319.Appendix C: Assessment materials (Appendix to section 4 of application)329.1Risk Management assessments329.1.1Risk Management Coursework 1329.1.2Risk Management Coursework 2329.2Adversarial Behaviour assessments329.3Cryptography assessments329.4Network Security assessments329.5Malware assessments329.6Human Factors assessments329.7Research Methods assessments329.8Cloud Computing assessments329.9Forensics assessments329.10Machine Learning assessments329.11Project Management assessments329.12External examiner’s report329.13HEI’s response to external examiner’s report3210.Appendix D: Original Research Dissertations (Appendix to section 5 of application)3310.1Dissertation awarded a distinction3310.1.1Distinction dissertation3310.1.2Distinction dissertation information3310.2Dissertation awarded a merit3310.2.1Merit dissertation3310.2.2Merit dissertation information3310.3Dissertation awarded a pass3310.3.1Pass dissertation3310.3.2Pass dissertation information33

Institution’s Letter of Support

Up to two sides of A4

Signed letter of support for both full and provisional applications

The Letter of Support is not scored but must be present. Its purpose is to show that the senior management of the HEI is fully supportive of the application. The Letter should make it clear which degree is being submitted for certification and against which certification standard.

The Letter must be from the Vice Chancellor or equivalent. The Letter must be signed and dated. Please note that a Letter from the Head of Department submitting the application is not acceptable.

The Letter should be viewed as an opportunity for the HEI’s senior management to:

· demonstrate commitment to the Master’s programme specifically and cyber security more generally

· highlight recent HEI investment in the area and any future planned investment

· describe the importance of the area in the HEI’s future strategy, etc.

· outline how Covid-19 is impacting the HEI generally and the Master’s degree specifically along with the steps being taken by the HEI to deal with the issues being raised

For provisional applications

If the Master’s has not yet started, it is important that the HEI confirms that it will start by October 2022.

If the Master’s meets the requirements for full certification, it is important that the HEI confirms that provisional certification is being applied for and why.

Page 2 of 2

INSTITUTION’S LETTER OF SUPPORT

Description of the Applicant

Up to 5 sides of A4, excluding CVs

Team

Provide the names and structure of the department(s)/group(s)/school(s) responsible for the Master’s degree together with the names, seniority and roles of the members of staff responsible for delivering the degree content, setting and marking examinations, supervising dissertations, etc.

Provide a diagram that clearly shows the roles and responsibilities of team members. Where there is a core team delivering the Master’s, it may be helpful to clearly separate the core team from ‘associate’ members of the team. Describe briefly how the team functions as a cohesive unit

By way of example only:

Figure 2.1: Example of HEI organisational structure relevant to the application

By way of example only:

Name of Staff Member

Position

Responsibilities

Relevant Expertise

Dr E. F.

Senior Lecturer and Master’s Course Director

· Ensures overall coherence and quality of Master’s

· delivers module on Risk and Governance

· delivers module on Research Methods

· oversees research projects

· broad knowledge of cyber security

· successfully managed and delivered academic programmes over past 10 years

Dr G. H.

Reader

· delivers Network Security module

· supervises research projects

· key-note presenter at recent network security conferences

I. J.

Lecturer

· delivers Software Security module

· supervises research projects

· extensive experience of building mission-critical systems in industry

Other staff members

….

….

….

K. L.

External Consultant with 3-year contract October 2020 – September 2023

· delivers Forensics module

· runs successful forensics company

· provides forensics advice to government and industry

Table 2.1: Example of a synopsis of the team delivering the Master’s

It is highly recommended to provide hyperlinks to the staff CVs shown in Appendix A so that assessors can quickly cross check the information in Table 2.1 with the information provided in the CVs.

Recent investments

Describe any recent investments from the HEI, government, industry etc. in the groups running the Master’s degree programme. If appropriate, it is advisable to highlight the benefits to the team delivering the degree as well as students undertaking the degree.

By way of example only:

· 50K in financial year 2018-19 from the HEI to the Cyber Security Group for the refurbishment and upgrade of its Forensics Laboratory for equipment and software (provide examples) that Master’s students use

· 100K across financial years 2017-18 and 2018-19 for networking equipment from Manufacturer X to the Department of Computing for the Networking Laboratory that Master’s students will be able to use

· 150K in financial year 2017-18 from the HEI to the Department of Computing for new PCs, laptops and peripherals that will be of benefit to Master’s students also

· 20K in financial year 2016-17 from the HEI to the Cyber Security Group to enable members of staff to gain professional cyber security qualifications (e.g., pen tester, risk analyst, etc.)

External linkages

Describe any external linkages that add value to the Master’s degree, and the impact these bring to the degree programme: e.g., visiting lecturers with specialist knowledge from other academic departments, government or industry; projects suggested, and monitored, by industry; etc.

By way of example only:

· External Advisory Board – e.g., meets twice yearly, membership from industry, government and academia. Membership has strong cyber security representation. If applicable, provide some examples of advice from Advisory Board that has been acted on.

· Company X provides series of invited lectures on Forensics and suggests topics for research dissertations.

· Company Y has donated equipment for joint projects that Master’s students can use.

· Membership of the CISSE UK[footnoteRef:3] network that provides external speakers, course materials and cyber security challenges for students. [3: https://cisseuk.org/]

Review and update process

Describe the process used to review and renew the course content to keep it up to date, for example: how often is the course content reviewed, by whom, and what external advice is taken (e.g., industrial advisory boards).

Facilities

Describe the facilities available to Master’s students in general and those dedicated to students undertaking the Master’s degree specifically, for example: computer laboratories, dedicated equipment, library (access to textbooks), on-line journal subscription (for research dissertations), etc.

Staff CVs

Please see Appendix A: Staff CVs (Appendix to section 2 of application)

Page 2 of 2

DESCRIPTION OF THE APPLICANT

Description of the Master’s degree in Cyber Security

Up to 12 sides of A4, excluding module descriptions

Description of the degree

a. High level description of the Master’s

By way of example only:

· name of degree: Master’s in Cyber Security

· degree awarded: MSc

· total number of credits required for Master’s: 180

· number of taught credits: 120

· number of credits for research dissertation: 60

· date degree started: October 2016

· number of academic years Master’s has been running: 4 years

· running in 2020-21: yes

b. Delivery of degree

By way of example only:

· delivered at UK campus at X

· describe the use of online learning, particularly in relation to Covid-19

· if applicable, state whether the degree is offered on a part-time basis and a provide a description of how the degree is structured to accommodate part-time students

c. Provide a description of the overall aims of the degree, in particular how the degree provides students with a general, broad foundation in cyber security.

d. Describe how the Master’s is of value to students, employers and the academic community.

e. Provide tables (Table 3.1a and Table 3.1b) showing the overall structure of the taught component of the degree[footnoteRef:4]. [4: Please do not include projects or dissertations in this table]

By way of example only:

Name of compulsory module[footnoteRef:5] [5: To help assessors please use short meaningful names (e.g., NetSec) rather than course codes (e.g. YY6203A) for module names.]

Member(s) of staff delivering module

Number of credits

RiskMgt

M. N.

15

AdvBehav

P. Q.

15

Crypt

R. S.

15

NetSec

T. U.

15

Malware

V. W.

15

HumFact

X. Y.

15

ResMethods

E. F.

15

Total number of compulsory credits

105

Table 3.1a: Compulsory taught modules

Name of optional module

Member(s) of staff delivering module

Number of credits

Cloud

A. B.

15

Forensics

C. D.

15

MachLearn

E. F.

15

ProjMgt

G. H.

15

Total number of optional credits required to be taken

15

Table 3.1b: Optional taught modules

0. Number of taught credits that can be mapped to CyBOK Knowledge Areas (KAs)

a. Compulsory modules. Provide a table (Table 3.2a) that shows for each compulsory taught module:

· to which CyBOK KA(s) the module can be mapped – if it does not map to a KA please state NONE

· the number of credits in the module

· the number of credits in the module that can be considered to be addressing the KA(s)

By way of example only:

Name of compulsory module

CyBOK KA(s) addressed

Number of credits in module

Estimated number of credits in module addressing KA(s)

RiskMgt

Risk Mgt and Governance

15

15

AdvBehav

Adversarial Behaviours and Legal

15

12

Crypt

Cryptography

15

15

NetSec

Network Security

15

15

Malware

Malware

15

15

HumFact

Human Factors

15

13

ResMethods

NONE

15

0

Total number of compulsory module credits addressing KAs

85

Table 3.2a: Compulsory taught modules addressing the KAs

b. Optional modules. If applicable, please provide a table (Table 3.2b) that shows the same information for each optional taught module.

By way of example only:

Name of optional module

CyBOK KA(s) addressed

Number of credits in module

Estimated number of credits in module addressing KA(s)

Cloud

Distributed Systems

15

5

Forensics

Forensics

15

15

MachLearn

CyBOK Introduction

15

5

ProjMgt

NONE

15

0

Table 3.2b: Optional taught modules addressing the KAs

c. Pathways. If applicable, please provide a table (Table 3.2c) that identifies the pathways that students could take through the degree. For each pathway, please provide an estimate of the total number of credits addressing the KAs.

By way of example only:

Pathway

Optional modules included in pathway

Estimated total number of credits in pathway addressing KAs (including compulsory and optional module credits)

Pathway 1

Cloud

90

Pathway 2

Forensics

100

Pathway 3

MachLearn

90

Pathway 4

ProjMgt

85

Table 3.2c: Possible pathways that students could take through the taught component of the Master’s

d. If the Master’s has a large number of flexible pathways, provide a description of which pathways through the Master’s meet the requirement for at least 84 taught credits addressing the KAs.

Detailed coverage of KA Topics[footnoteRef:6] [footnoteRef:7] [6: Please use KA 0 to record those modules that are of an underpinning or foundational nature and provide a short narrative noting that this has been done. ] [7: It is recognised that the number of credits assigned to a KA Topic is an estimate only. Overall, however, the credit allocation across the KAs should be a fair, reasonable and justifiable representation.]

a. For each pathway through the taught component of the degree, please complete Table 3.3 following the example rows provided[footnoteRef:8]. [8: Where there are a large number of (flexible) pathways please complete Table 3.3 for a few representative pathways only along with an explanatory narrative.]

b. The purpose of Table 3.3 is for applicants to demonstrate how the KA Topics are covered and assessed. To adequately cover a KA Topic, it needs to be clear that a good breadth and depth of the Indicative Material is covered though it should be noted that not all the Indicative Material would be required to be explicitly covered. Moreover, additional Indicative Material rows can be added to Table 3.3 when it is felt that the Indicative Material listed in Appendix B does not adequately represent coverage of the KA Topic in the Master’s degree. Applications must clearly signpost when this has been done and provide a brief justification. The assessments should show good broad coverage of the Indicative Material, but it is to be expected that some of the taught Indicative Material may not be assessed.

c. For each pathway, please provide a visual representation of the credit allocation across the KAs for the taught component of the degree – please see Figure 3.1 as an example[footnoteRef:9]. [9: Where there are a large number of (flexible) pathways please provide Figure 3.1 for a few representative pathways only along with an explanatory narrative.]

Page 2 of 2

DESCRIPTION OF THE MASTER’S DEGREE

Example Only

Broad Category

Knowledge Area

Topics

Indicative Material

Modules providing significant coverage

Modules providing partial coverage

Assessment

Approximate number of credits

A. Human, Organisational and Regulatory Aspects

1. Risk Management and Governance

Risk Definitions

risk assessment

RiskMgt

RiskMgt-CWK1

2

risk management

RiskMgt

RiskMgt-CWK1

levels of perceived risk

RiskMgt

RiskMgt-CWK1

Risk Governance

governance models

RiskMgt

RiskMgt-CWK1

4

risk perception factors

RiskMgt

RiskMgt-CWK1

human factors and risk communication

RiskMgt, HumFact

security culture

HumFact

enacting security policy

RiskMgt

Table 3.3: An example for illustrative purposes only of how the first two topics in Risk Management and Governance are covered by modules in the Master’s degree.

Example Only

Broad Category

Knowledge Area

Topics

Indicative Material

Modules providing significant coverage

Modules providing partial coverage

Assessment

Approximate number of credits

A. Human, Organisational and Regulatory Aspects

1. Risk Management and Governance

Risk Assessment and Management Principles

component versus systems perspectives

RiskMgt

4

elements of risk

RiskMgt

RiskMgt-CWK2

risk assessment and management methods

RiskMgt

RiskMgt-CWK2

security metrics

Business Continuity: Incident Response and Recovery Planning

ISO/IEC 27034

RiskMgt

2

NCSC guidance

t

RiskMgt

other guidance

RiskMgt

Table 3.3 (continued): An example for illustrative purposes only of how the third and fourth topics in Risk Management and Governance are covered by modules in the Master’s degree.Please note that in this example an additional row of Indicative Material has been added to reflect other guidance for Business Continuity and Planning that is partially covered in the RiskMgt module.

Figure 3.1: An example for illustrative purposes only of credit allocation across the KAs

Justification of KA coverage for a Master’s degree providing a general, broad foundation in cyber security

Cover the following points.

a. Describe how the overall distribution of credits is consistent with the aims of the degree described in section 3.1c.

b. Describe and justify how the distribution of credits:

· provides a coherent body of work for students

· ensures that students are gaining knowledge about key areas of cyber security

Module descriptions

In an appendix to this section, please include a module description for each module that addresses a KA Topic in Table 3.3.

At the beginning of each module description, please provide a table that lists the KA Topics that the module covers along with brief justifications for why this is the case.

The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 3.3.

By way of example only, please see: Appendix B: Module descriptions (Appendix to section 3 of application)

Research dissertations accounting for more than 80 credits

For Master’s degrees in which the original research dissertation accounts for more than 80 credits, clarify how the remainder of the degree adequately covers the KA Topics for a Master’s degree providing a general, broad foundation in cyber security.

Professional Knowledge and Skills

Describe how the areas in Professional Knowledge and Skills (Appendix B, section 3 of call document) are addressed in the Master’s degree. By way of example, describe how team-working, communication skills, professional ethics, etc. are covered within the degree programme as a whole. It is not a requirement to have a separate dedicated module covering Professional Knowledge and Skills.

Assessment materials

Up to 5 sides of A4, excluding copies of assessment materials

Approach to assessment for both full and provisional applicationsApproach to assessment

Describe the overall approach to assessment of the taught modules on the Master’s degree. This should include:

· assessment methodology

· marking scheme

· the pass mark for individual modules and the taught part of the degree overall

Marking

Describe how the overall mark for the degree as a whole is worked out from the taught component and research dissertation component. Please describe the mark required to achieve pass, merit and distinction (or equivalent) of the overall degree.

Justification of 40% pass mark

Where the pass mark for taught modules, dissertation and/or the degree overall is set at, or close to, 40% provide a justification that students achieving this pass mark have achieved and demonstrated sufficient knowledge and understanding at Master’s level. By way of example, it may be appropriate here to refer to the marking scheme that shows what a student has to be able to demonstrate in order to achieve a pass mark of 40%.

Rigour of assessment

Provide a table that shows for each assessed module an estimate of the ratio of bookwork to critical analysis/application in the assessments. Please also provide a brief justification for each ratio. If the ratio is greater than 60:40, provide a clear justification for this value.

By way of example only:

Module

Estimate for % of bookwork in assessments

Estimate for % of critical analysis/application in assessments

Comments (where applicable)

A few examples

RiskMgt (C)

50

50

Body of knowledge to be assimilated and assessed through practical exercises

AdvBehav (C)

60

40

Crypt (C)

40

60

Focus in assessments on practical application and solving problems

NetSec (C)

40

60

Practical exercises requiring understanding, analysis and problem solving

Malware (C)

50

50

HumFact (C)

60

40

ResMethods (C)

45

55

Students required to produce research paper as preparation for their dissertation

Cloud (O)

45

55

Forensics (O)

40

60

Focus in assessments on practical application and solving problems

MachLearn (O)

40

60

ProjMgt (O)

65

35

Table 4.1: An example for illustrative purposes only of the ratio of bookwork to critical analysis/application for compulsory and optional modules.

Examination papersProvisional application

For each of the modules identified in section 3 that addresses a Knowledge Area Topic, describe the process (to be) used for assessment (e.g., examination, coursework, practical exercises, etc.). Provide a copy of examination paper(s) that students have sat or specimen paper(s) of the examinations they will sit. For assessed coursework, please provide copies of all assignments (to be) provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in an Appendix to section 4 of application.

Full application

For academic year 2019-2020, for each of the modules identified in section 3 that addresses a Knowledge Area Topic, describe the process used for assessment (e.g., examination, coursework, practical exercises, etc.). Provide a copy of the examination paper(s) that students sat. For assessed coursework, provide copies of all assignments provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in an Appendix to section 4 of application.

External examiner’s report – full application only

For academic year 2019-2020, provide a copy of the external examiner’s report[footnoteRef:10]. Describe the process for engagement with the external examiner. Describe the technical background and experience of the external examiner. [10: Where the external examiner’s report for 2019-20 is not available by the submission deadline, please provide the most recent report and the HEI’s response. Please state when the 2019-20 report and response will be available and submit them as soon as they are available.]

For academic year 2019-2020, Provide a copy of the HEI’s response to external examiner’s report and any follow-up actions that have been undertaken in response to the report.

Page 2 of 2

ASSESSMENT MATERIALS

Original research dissertations

Up to 5 sides of A4, excluding list of dissertation topics and copies of dissertations

Applications for both full and provisional certificationGuidance to students

Describe the guidance the HEI provides, or will provide, to Master’s students before they embark on their dissertations, for example: research methods, undertaking literature reviews, etc.

Allocation of dissertation topics

Describe the process for allocation of dissertation topics to students, for example:

· is it up to students to come up with topic ideas?

· do members of staff identify possible topics?

· does the HEI have links with industry partners who suggest topics?

Scope of dissertation topics

Describe the process for ensuring:

· dissertation topics are within scope of the CyBOK Knowledge Areas

· that students are supervised by appropriately knowledgeable personnel

Monitoring of students’ progress

Describe the process for monitoring the progress of students on their dissertations.

Assessment of dissertations

Describe the process for assessing dissertations. Provide a specific, tailored marking scheme for dissertations clearly showing how grades are determined and what would be necessary for each of a distinction, merit or pass[footnoteRef:11]. Please indicate whether this or other similar guidance is provided to students. [11: Where the classifications of distinction / merit / pass are not used, please refer to the grades that are used by the HEI.]

By way of example only:

How well was the dissertation work planned10 marks

Significance of problem addressed and relevance to cyber security15 marks

Appropriateness of the technical approach15 marks

Quality of literature review15 marks

Quality and significance of results obtained20 marks

Insight provided by conclusions and recommendations15 marks

Performance in Viva10 marks

Distinction

Thorough and careful planning throughout. Time used effectively.

Important problem, highly relevant to cyber security.

Etc.

Merit

Pass

Fail

Table 5.1: An example for illustrative purposes only of a marking scheme and assessment criteria for dissertations.

Research dissertations contributing fewer than 40 credits

For Master’s degrees in which the original research dissertation accounts for fewer than 40 credits, describe how students are able to gain sufficient understanding and experience of undertaking original research.

Dissertations – for full certification onlyList of dissertation topics

For each of academic years 2019-2020 and 2018-2019 (if any), provide a list of Master’s dissertations undertaken by students. This should include the dissertation title, a short (one paragraph) abstract, an identification of which KA(s) the dissertation applies to, and – if appropriate – whether there was any external involvement in the dissertation (e.g., from industry).

Where there were more than 20 students undertaking dissertations in an academic year, provide information for a representative sample of 20 dissertations only.

By way of example only:

Dissertation title

Synopsis of dissertation

CyBOK KA(s) addressed

External involvement

Diss-1

Diss-2

Diss-n

Table 5.2: An example for illustrative purposes only of a table to describe dissertations undertaken in academic year 2019-2020.

By way of example only:

Dissertation title

Synopsis of dissertation

CyBOK KA(s) addressed

External involvement

Diss-1

Diss-2

Diss-m

Table 5.3: An example for illustrative purposes only of a table to describe dissertations undertaken in academic year 2018-2019.

Example dissertations

For academic year 2019-2020, provide one anonymised and representative copy of a dissertation for each of[footnoteRef:12]: [12: Where the classifications of distinction / merit / pass are not used, please provide representative dissertations for each of the classifications that are used by the HEI.]

a. a dissertation that achieved a distinction Please see: Distinction dissertation

b. a dissertation that achieved a merit Please see: Merit dissertation

c. a dissertation that achieved a pass Please see: Pass dissertation

If none in 2019-2020, try 2018-2019; if none, please contact the NCSC ahead of the deadline for applications. Dissertations should be placed in an appendix at the end of the application and must be included in the email submission.

Marks for example dissertations

For each of the dissertations in the previous section, provide:

a. the overall mark awarded

b. the components of the overall mark, for example marks awarded to:

· viva (including any demonstration)

· dissertation plan

· dissertation

c. key comments from the internal examiners

d. any additional information that you feel would help the assessment panel as part of its job to determine whether the grade awarded to each dissertation is appropriate.

By way of example only:

· Please see: Distinction dissertation information

· Please see: Merit dissertation information

· Please see: Pass dissertation information

Page 2 of 2

ORIGINAL RESEARCH DISSERTATIONS

Student numbers and grades achieved – applications for full certification only

Up to five sides of A4

Student entry data

Where the data are available, for each of academic years 2019-2020 and 2018-2019, please provide the information requested in Table 6.1. Please provide a separate table for each academic year.

By way of example only:

Entry Requirements

Number of full-time students

Number of part-time students

Number with 2/1 (or equivalent) or above in STEM subject

Number with 2/2 (or equivalent) or above in STEM subject

Number without 2/2 or above in STEM subject but who have relevant experience

Number without 2/2 or above in STEM subject or relevant experience

Students with UK nationality

In general, 2/1 in STEM or relevant experience – though some discretion allowed

10

2

6

7

5

0

Students with EU nationality

As above

2

0

1

1

1

0

Students without UK or EU nationality

As above

2

0

0

0

2

0

Table 6.1a: For illustrative purposes only student entry data for 2019-2020.

Entry Requirements

Number of full-time students

Number of part-time students

Number with 2/1 (or equivalent) or above in STEM subject

Number with 2/2 (or equivalent) or above in STEM subject

Number without 2/2 or above in STEM subject but who have relevant experience

Number without 2/2 or above in STEM subject or relevant experience

Students with UK nationality

In general, 2/1 in STEM or relevant experience – though some discretion allowed

8

0

4

4

4

0

Students with EU nationality

As above

2

0

1

1

1

0

Students without UK or EU nationality

As above

0

0

0

0

0

0

Table 6.1b: For illustrative purposes only student entry data for 2018-2019.

If tables 6.1a, b require any explanatory text, please add it here being careful not to exceed page limit for this section.

0. Student exit data

For academic years 2019-2020 and 2018-2019, provide the information requested in Table 6.2.

By way of example only:

Academic year

Number of students scheduled to complete Master’s

Number achieving distinction overall

Number achieving merit overall

Number achieving pass overall

Number failing Master’s

Number deferring for additional year(s)

Number opting to graduate with postgraduate certificate (or equivalent)

Number with other outcomes (if applicable)

2018 - 2019

10

2

5

2

0

0

1

0

2019 - 2020

14

3

7

3

1

0

0

0

Table 6.2: For illustrative purposes only student exit data for 2018-2019 and 2019-2020

If table 6.2 requires any explanatory text, please add it here being careful not to exceed page limit for this section.

Student satisfaction

Provide the results of any student satisfaction surveys and any actions that have been taken by the HEI as a result.

Page 2 of 2

STUDENT NUMBERS AND GRADES ACHIEVED

Appendix A: Staff CVs (Appendix to section 2 of application)

Up to two sides of A4 per CV

It is recommended to follow the structure below for each CV. For each CV, it is important to get across the person’s knowledge, experience and skills in cyber security.

By way of example only:

CV for Dr E. F. Personal statement of experience and expertise in cyber security

Provide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs[footnoteRef:13] as a framework. [13: https://www/cybok.org. ]

Academic background

Include here items such as qualifications obtained, subjects, year, institution, a few key publications.

Professional employment

Describe professional positions of employment, highlighting those relevant to cyber security.

Contribution to cyber security at the University of X

Describe what the person does at the HEI that is relevant to cyber security.

Esteem indicators

For example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.

Cyber security knowledge and expertise indicators

For example, recent publications, work with industry/government, research activities.

Any other information

Include any other information that might be relevant in demonstrating the person’s cyber security expertise.

CV for Dr G. H. Personal statement of experience and expertise in cyber security

Provide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.

Academic background

Include here items such as qualifications obtained, subjects, year, institution, a few key publications.

Professional employment

Describe professional positions of employment, highlighting those relevant to cyber security.

Contribution to cyber security at the University of X

Describe what the person does at the HEI that is relevant to cyber security.

Esteem indicators

For example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.

Cyber security knowledge and expertise indicators

For example, recent publications, work with industry/government, research activities.

Any other information

Include any other information that might be relevant in demonstrating the person’s cyber security expertise.

CV for I. J. Personal statement of experience and expertise in cyber security

Provide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.

Academic background

Include here items such as qualifications obtained, subjects, year, institution, a few key publications.

Professional employment

Describe professional positions of employment, highlighting those relevant to cyber security.

Contribution to cyber security at the University of X

Describe what the person does at the HEI that is relevant to cyber security.

Esteem indicators

For example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.

Cyber security knowledge and expertise indicators

For example, recent publications, work with industry/government, research activities.

Any other information

Include any other information that might be relevant in demonstrating the person’s cyber security expertise.

CV for K. L. Personal statement of experience and expertise in cyber security

Provide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.

Academic background

Include here items such as qualifications obtained, subjects, year, institution, a few key publications.

Professional employment

Describe professional positions of employment, highlighting those relevant to cyber security.

Contribution to cyber security at the University of X

Describe what the person does at the HEI that is relevant to cyber security.

Esteem indicators

For example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.

Cyber security knowledge and expertise indicators

For example, recent publications, work with industry/government, research activities.

Any other information

Include any other information that might be relevant in demonstrating the person’s cyber security expertise.

Page 2 of 2

APPENDIX A: STAFF CVs

Appendix B: Module descriptions (Appendix to section 3 of application)

Include a table at the beginning of each module description that shows which KA Topics the module covers along with brief justifications for why this is the case.

The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 3.3.

By way of example only:

Risk Management module

Adversarial Behaviour module

Cryptography module

Network Security module

Malware module

Human Factors module

Research Methods module

Cloud Computing module

Forensics module

Machine Learning module

Project Management module

Page 2 of 2

APPENDIX B: MODULE DESCRIPTIONS

Appendix C: Assessment materials (Appendix to section 4 of application)

By way of example only:

Risk Management assessments Risk Management Coursework 1Risk Management Coursework 2

Adversarial Behaviour assessments

Cryptography assessments

Network Security assessments

Malware assessments

Human Factors assessments

Research Methods assessments

Cloud Computing assessments

Forensics assessments

Machine Learning assessments

Project Management assessments

External examiner’s report

HEI’s response to external examiner’s report

Page 2 of 2

APPENDIX C: ASSESSMENT MATERIALS

Appendix D: Original Research Dissertations (Appendix to section 5 of application)Dissertation awarded a distinctionDistinction dissertationDistinction dissertation information

Dissertation awarded a meritMerit dissertationMerit dissertation information

Dissertation awarded a pass Pass dissertationPass dissertation information

Page 2 of 2

APPENDIX D: ORIGINAL RESEARCH DISSERTATIONS