institution’s letter of support · web viewissue 1.121 july 2020 issue 1.121 july 2020 page 2 of...
TRANSCRIPT
Guidance and Application Template for:
Application for Certification of a Postgraduate Master’s Degree Providing
a General, Broad Foundation in Cyber Security
This document provides an application template for an HEI to have its Master’s degree in Cyber Security considered for certification. It provides general guidance only and it is an HEI’s sole responsibility to ensure that its application is compliant and provides the information required in the corresponding call document. It is not a requirement that applicants use the template.
Applicants should refer to the call document for detailed guidance on completing all sections of the application as well as details of the assessment criteria that apply.
Applicants should note that to help assessors with their assessment of applications, all applications should have a table of contents and make use of headers, footers and hyperlinks.
Some points to note:
· The minimum font size for applications is 10pt. However, it is recognised that to help fit some tables into the space available the text in some tables can be made smaller than 10pt.
· Text in blue is to help guide applicants on what may be an appropriate response to some sections of the application and is provided by way of example only.
Please feel free to delete this page from your completed application
Document History
Issue
Date
Comment
Issue 1.0
25 June 2020
First issue of application template for general Master’s degrees
Issue 1.1
21 July 2020
Additional clarification of Indicative Material in Section 3.3b. Minor updates to example tables 3.2b, 3.2c, 3.3 and 4.1. Minor updates to appendices B and C. Minor typos fixed.
© Crown Copyright 2020, The National Cyber Security Centre
University of X
Application for Provisional/Full[footnoteRef:2] Certification of a Master’s Degree Providing [2: Please delete either ‘full’ or ‘provisional’]
a General, Broad Foundation in Cyber Security
Issue 1.121 July 2020
Page 2 of 2
Table of contents1.Institution’s Letter of Support71.1Signed letter of support for both full and provisional applications71.2For provisional applications72.Description of the Applicant82.1Team82.2Recent investments92.3External linkages92.4Review and update process92.5Facilities92.6Staff CVs103.Description of the Master’s degree in Cyber Security113.1Description of the degree113.2Number of taught credits that can be mapped to CyBOK Knowledge Areas (KAs)133.3Detailed coverage of KA Topics 143.4Justification of KA coverage for a Master’s degree providing a general, broad foundation in cyber security183.5Module descriptions183.6Research dissertations accounting for more than 80 credits183.7Professional Knowledge and Skills184.Assessment materials194.1Approach to assessment for both full and provisional applications194.1.1Approach to assessment194.1.2Marking194.1.3Justification of 40% pass mark194.1.4Rigour of assessment194.2Examination papers204.2.1Provisional application204.2.2Full application204.3External examiner’s report – full application only205.Original research dissertations215.1Applications for both full and provisional certification215.1.1Guidance to students215.1.2Allocation of dissertation topics215.1.3Scope of dissertation topics215.1.4Monitoring of students’ progress215.1.5Assessment of dissertations215.1.6Research dissertations contributing fewer than 40 credits225.2Dissertations – for full certification only225.2.1List of dissertation topics225.2.2Example dissertations235.2.3Marks for example dissertations236.Student numbers and grades achieved – applications for full certification only246.1Student entry data246.2Student exit data266.3Student satisfaction267.Appendix A: Staff CVs (Appendix to section 2 of application)277.1CV for Dr E. F.277.1.1Personal statement of experience and expertise in cyber security277.1.2Academic background277.1.3Professional employment277.1.4Contribution to cyber security at the University of X277.1.5Esteem indicators277.1.6Cyber security knowledge and expertise indicators277.1.7Any other information277.2CV for Dr G. H.287.2.1Personal statement of experience and expertise in cyber security287.2.2Academic background287.2.3Professional employment287.2.4Contribution to cyber security at the University of X287.2.5Esteem indicators287.2.6Cyber security knowledge and expertise indicators287.2.7Any other information287.3CV for I. J.297.3.1Personal statement of experience and expertise in cyber security297.3.2Academic background297.3.3Professional employment297.3.4Contribution to cyber security at the University of X297.3.5Esteem indicators297.3.6Cyber security knowledge and expertise indicators297.3.7Any other information297.4CV for K. L.307.4.1Personal statement of experience and expertise in cyber security307.4.2Academic background307.4.3Professional employment307.4.4Contribution to cyber security at the University of X307.4.5Esteem indicators307.4.6Cyber security knowledge and expertise indicators307.4.7Any other information308.Appendix B: Module descriptions (Appendix to section 3 of application)318.1Risk Management module318.2Adversarial Behaviour module318.3Cryptography module318.4Network Security module318.5Malware module318.6Human Factors module318.7Research Methods module318.8Cloud Computing module318.9Forensics module318.10Machine Learning module318.11Project Management module319.Appendix C: Assessment materials (Appendix to section 4 of application)329.1Risk Management assessments329.1.1Risk Management Coursework 1329.1.2Risk Management Coursework 2329.2Adversarial Behaviour assessments329.3Cryptography assessments329.4Network Security assessments329.5Malware assessments329.6Human Factors assessments329.7Research Methods assessments329.8Cloud Computing assessments329.9Forensics assessments329.10Machine Learning assessments329.11Project Management assessments329.12External examiner’s report329.13HEI’s response to external examiner’s report3210.Appendix D: Original Research Dissertations (Appendix to section 5 of application)3310.1Dissertation awarded a distinction3310.1.1Distinction dissertation3310.1.2Distinction dissertation information3310.2Dissertation awarded a merit3310.2.1Merit dissertation3310.2.2Merit dissertation information3310.3Dissertation awarded a pass3310.3.1Pass dissertation3310.3.2Pass dissertation information33
Institution’s Letter of Support
Up to two sides of A4
Signed letter of support for both full and provisional applications
The Letter of Support is not scored but must be present. Its purpose is to show that the senior management of the HEI is fully supportive of the application. The Letter should make it clear which degree is being submitted for certification and against which certification standard.
The Letter must be from the Vice Chancellor or equivalent. The Letter must be signed and dated. Please note that a Letter from the Head of Department submitting the application is not acceptable.
The Letter should be viewed as an opportunity for the HEI’s senior management to:
· demonstrate commitment to the Master’s programme specifically and cyber security more generally
· highlight recent HEI investment in the area and any future planned investment
· describe the importance of the area in the HEI’s future strategy, etc.
· outline how Covid-19 is impacting the HEI generally and the Master’s degree specifically along with the steps being taken by the HEI to deal with the issues being raised
For provisional applications
If the Master’s has not yet started, it is important that the HEI confirms that it will start by October 2022.
If the Master’s meets the requirements for full certification, it is important that the HEI confirms that provisional certification is being applied for and why.
Page 2 of 2
INSTITUTION’S LETTER OF SUPPORT
Description of the Applicant
Up to 5 sides of A4, excluding CVs
Team
Provide the names and structure of the department(s)/group(s)/school(s) responsible for the Master’s degree together with the names, seniority and roles of the members of staff responsible for delivering the degree content, setting and marking examinations, supervising dissertations, etc.
Provide a diagram that clearly shows the roles and responsibilities of team members. Where there is a core team delivering the Master’s, it may be helpful to clearly separate the core team from ‘associate’ members of the team. Describe briefly how the team functions as a cohesive unit
By way of example only:
Figure 2.1: Example of HEI organisational structure relevant to the application
By way of example only:
Name of Staff Member
Position
Responsibilities
Relevant Expertise
Dr E. F.
Senior Lecturer and Master’s Course Director
· Ensures overall coherence and quality of Master’s
· delivers module on Risk and Governance
· delivers module on Research Methods
· oversees research projects
· broad knowledge of cyber security
· successfully managed and delivered academic programmes over past 10 years
Dr G. H.
Reader
· delivers Network Security module
· supervises research projects
· key-note presenter at recent network security conferences
I. J.
Lecturer
· delivers Software Security module
· supervises research projects
· extensive experience of building mission-critical systems in industry
Other staff members
….
….
….
K. L.
External Consultant with 3-year contract October 2020 – September 2023
· delivers Forensics module
· runs successful forensics company
· provides forensics advice to government and industry
Table 2.1: Example of a synopsis of the team delivering the Master’s
It is highly recommended to provide hyperlinks to the staff CVs shown in Appendix A so that assessors can quickly cross check the information in Table 2.1 with the information provided in the CVs.
Recent investments
Describe any recent investments from the HEI, government, industry etc. in the groups running the Master’s degree programme. If appropriate, it is advisable to highlight the benefits to the team delivering the degree as well as students undertaking the degree.
By way of example only:
· 50K in financial year 2018-19 from the HEI to the Cyber Security Group for the refurbishment and upgrade of its Forensics Laboratory for equipment and software (provide examples) that Master’s students use
· 100K across financial years 2017-18 and 2018-19 for networking equipment from Manufacturer X to the Department of Computing for the Networking Laboratory that Master’s students will be able to use
· 150K in financial year 2017-18 from the HEI to the Department of Computing for new PCs, laptops and peripherals that will be of benefit to Master’s students also
· 20K in financial year 2016-17 from the HEI to the Cyber Security Group to enable members of staff to gain professional cyber security qualifications (e.g., pen tester, risk analyst, etc.)
External linkages
Describe any external linkages that add value to the Master’s degree, and the impact these bring to the degree programme: e.g., visiting lecturers with specialist knowledge from other academic departments, government or industry; projects suggested, and monitored, by industry; etc.
By way of example only:
· External Advisory Board – e.g., meets twice yearly, membership from industry, government and academia. Membership has strong cyber security representation. If applicable, provide some examples of advice from Advisory Board that has been acted on.
· Company X provides series of invited lectures on Forensics and suggests topics for research dissertations.
· Company Y has donated equipment for joint projects that Master’s students can use.
· Membership of the CISSE UK[footnoteRef:3] network that provides external speakers, course materials and cyber security challenges for students. [3: https://cisseuk.org/]
Review and update process
Describe the process used to review and renew the course content to keep it up to date, for example: how often is the course content reviewed, by whom, and what external advice is taken (e.g., industrial advisory boards).
Facilities
Describe the facilities available to Master’s students in general and those dedicated to students undertaking the Master’s degree specifically, for example: computer laboratories, dedicated equipment, library (access to textbooks), on-line journal subscription (for research dissertations), etc.
Staff CVs
Please see Appendix A: Staff CVs (Appendix to section 2 of application)
Page 2 of 2
DESCRIPTION OF THE APPLICANT
Description of the Master’s degree in Cyber Security
Up to 12 sides of A4, excluding module descriptions
Description of the degree
a. High level description of the Master’s
By way of example only:
· name of degree: Master’s in Cyber Security
· degree awarded: MSc
· total number of credits required for Master’s: 180
· number of taught credits: 120
· number of credits for research dissertation: 60
· date degree started: October 2016
· number of academic years Master’s has been running: 4 years
· running in 2020-21: yes
b. Delivery of degree
By way of example only:
· delivered at UK campus at X
· describe the use of online learning, particularly in relation to Covid-19
· if applicable, state whether the degree is offered on a part-time basis and a provide a description of how the degree is structured to accommodate part-time students
c. Provide a description of the overall aims of the degree, in particular how the degree provides students with a general, broad foundation in cyber security.
d. Describe how the Master’s is of value to students, employers and the academic community.
e. Provide tables (Table 3.1a and Table 3.1b) showing the overall structure of the taught component of the degree[footnoteRef:4]. [4: Please do not include projects or dissertations in this table]
By way of example only:
Name of compulsory module[footnoteRef:5] [5: To help assessors please use short meaningful names (e.g., NetSec) rather than course codes (e.g. YY6203A) for module names.]
Member(s) of staff delivering module
Number of credits
RiskMgt
M. N.
15
AdvBehav
P. Q.
15
Crypt
R. S.
15
NetSec
T. U.
15
Malware
V. W.
15
HumFact
X. Y.
15
ResMethods
E. F.
15
Total number of compulsory credits
105
Table 3.1a: Compulsory taught modules
Name of optional module
Member(s) of staff delivering module
Number of credits
Cloud
A. B.
15
Forensics
C. D.
15
MachLearn
E. F.
15
ProjMgt
G. H.
15
Total number of optional credits required to be taken
15
Table 3.1b: Optional taught modules
0. Number of taught credits that can be mapped to CyBOK Knowledge Areas (KAs)
a. Compulsory modules. Provide a table (Table 3.2a) that shows for each compulsory taught module:
· to which CyBOK KA(s) the module can be mapped – if it does not map to a KA please state NONE
· the number of credits in the module
· the number of credits in the module that can be considered to be addressing the KA(s)
By way of example only:
Name of compulsory module
CyBOK KA(s) addressed
Number of credits in module
Estimated number of credits in module addressing KA(s)
RiskMgt
Risk Mgt and Governance
15
15
AdvBehav
Adversarial Behaviours and Legal
15
12
Crypt
Cryptography
15
15
NetSec
Network Security
15
15
Malware
Malware
15
15
HumFact
Human Factors
15
13
ResMethods
NONE
15
0
Total number of compulsory module credits addressing KAs
85
Table 3.2a: Compulsory taught modules addressing the KAs
b. Optional modules. If applicable, please provide a table (Table 3.2b) that shows the same information for each optional taught module.
By way of example only:
Name of optional module
CyBOK KA(s) addressed
Number of credits in module
Estimated number of credits in module addressing KA(s)
Cloud
Distributed Systems
15
5
Forensics
Forensics
15
15
MachLearn
CyBOK Introduction
15
5
ProjMgt
NONE
15
0
Table 3.2b: Optional taught modules addressing the KAs
c. Pathways. If applicable, please provide a table (Table 3.2c) that identifies the pathways that students could take through the degree. For each pathway, please provide an estimate of the total number of credits addressing the KAs.
By way of example only:
Pathway
Optional modules included in pathway
Estimated total number of credits in pathway addressing KAs (including compulsory and optional module credits)
Pathway 1
Cloud
90
Pathway 2
Forensics
100
Pathway 3
MachLearn
90
Pathway 4
ProjMgt
85
Table 3.2c: Possible pathways that students could take through the taught component of the Master’s
d. If the Master’s has a large number of flexible pathways, provide a description of which pathways through the Master’s meet the requirement for at least 84 taught credits addressing the KAs.
Detailed coverage of KA Topics[footnoteRef:6] [footnoteRef:7] [6: Please use KA 0 to record those modules that are of an underpinning or foundational nature and provide a short narrative noting that this has been done. ] [7: It is recognised that the number of credits assigned to a KA Topic is an estimate only. Overall, however, the credit allocation across the KAs should be a fair, reasonable and justifiable representation.]
a. For each pathway through the taught component of the degree, please complete Table 3.3 following the example rows provided[footnoteRef:8]. [8: Where there are a large number of (flexible) pathways please complete Table 3.3 for a few representative pathways only along with an explanatory narrative.]
b. The purpose of Table 3.3 is for applicants to demonstrate how the KA Topics are covered and assessed. To adequately cover a KA Topic, it needs to be clear that a good breadth and depth of the Indicative Material is covered though it should be noted that not all the Indicative Material would be required to be explicitly covered. Moreover, additional Indicative Material rows can be added to Table 3.3 when it is felt that the Indicative Material listed in Appendix B does not adequately represent coverage of the KA Topic in the Master’s degree. Applications must clearly signpost when this has been done and provide a brief justification. The assessments should show good broad coverage of the Indicative Material, but it is to be expected that some of the taught Indicative Material may not be assessed.
c. For each pathway, please provide a visual representation of the credit allocation across the KAs for the taught component of the degree – please see Figure 3.1 as an example[footnoteRef:9]. [9: Where there are a large number of (flexible) pathways please provide Figure 3.1 for a few representative pathways only along with an explanatory narrative.]
Page 2 of 2
DESCRIPTION OF THE MASTER’S DEGREE
Example Only
Broad Category
Knowledge Area
Topics
Indicative Material
Modules providing significant coverage
Modules providing partial coverage
Assessment
Approximate number of credits
A. Human, Organisational and Regulatory Aspects
1. Risk Management and Governance
Risk Definitions
risk assessment
RiskMgt
RiskMgt-CWK1
2
risk management
RiskMgt
RiskMgt-CWK1
levels of perceived risk
RiskMgt
RiskMgt-CWK1
Risk Governance
governance models
RiskMgt
RiskMgt-CWK1
4
risk perception factors
RiskMgt
RiskMgt-CWK1
human factors and risk communication
RiskMgt, HumFact
security culture
HumFact
enacting security policy
RiskMgt
Table 3.3: An example for illustrative purposes only of how the first two topics in Risk Management and Governance are covered by modules in the Master’s degree.
Example Only
Broad Category
Knowledge Area
Topics
Indicative Material
Modules providing significant coverage
Modules providing partial coverage
Assessment
Approximate number of credits
A. Human, Organisational and Regulatory Aspects
1. Risk Management and Governance
Risk Assessment and Management Principles
component versus systems perspectives
RiskMgt
4
elements of risk
RiskMgt
RiskMgt-CWK2
risk assessment and management methods
RiskMgt
RiskMgt-CWK2
security metrics
Business Continuity: Incident Response and Recovery Planning
ISO/IEC 27034
RiskMgt
2
NCSC guidance
t
RiskMgt
other guidance
RiskMgt
Table 3.3 (continued): An example for illustrative purposes only of how the third and fourth topics in Risk Management and Governance are covered by modules in the Master’s degree.Please note that in this example an additional row of Indicative Material has been added to reflect other guidance for Business Continuity and Planning that is partially covered in the RiskMgt module.
Figure 3.1: An example for illustrative purposes only of credit allocation across the KAs
Justification of KA coverage for a Master’s degree providing a general, broad foundation in cyber security
Cover the following points.
a. Describe how the overall distribution of credits is consistent with the aims of the degree described in section 3.1c.
b. Describe and justify how the distribution of credits:
· provides a coherent body of work for students
· ensures that students are gaining knowledge about key areas of cyber security
Module descriptions
In an appendix to this section, please include a module description for each module that addresses a KA Topic in Table 3.3.
At the beginning of each module description, please provide a table that lists the KA Topics that the module covers along with brief justifications for why this is the case.
The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 3.3.
By way of example only, please see: Appendix B: Module descriptions (Appendix to section 3 of application)
Research dissertations accounting for more than 80 credits
For Master’s degrees in which the original research dissertation accounts for more than 80 credits, clarify how the remainder of the degree adequately covers the KA Topics for a Master’s degree providing a general, broad foundation in cyber security.
Professional Knowledge and Skills
Describe how the areas in Professional Knowledge and Skills (Appendix B, section 3 of call document) are addressed in the Master’s degree. By way of example, describe how team-working, communication skills, professional ethics, etc. are covered within the degree programme as a whole. It is not a requirement to have a separate dedicated module covering Professional Knowledge and Skills.
Assessment materials
Up to 5 sides of A4, excluding copies of assessment materials
Approach to assessment for both full and provisional applicationsApproach to assessment
Describe the overall approach to assessment of the taught modules on the Master’s degree. This should include:
· assessment methodology
· marking scheme
· the pass mark for individual modules and the taught part of the degree overall
Marking
Describe how the overall mark for the degree as a whole is worked out from the taught component and research dissertation component. Please describe the mark required to achieve pass, merit and distinction (or equivalent) of the overall degree.
Justification of 40% pass mark
Where the pass mark for taught modules, dissertation and/or the degree overall is set at, or close to, 40% provide a justification that students achieving this pass mark have achieved and demonstrated sufficient knowledge and understanding at Master’s level. By way of example, it may be appropriate here to refer to the marking scheme that shows what a student has to be able to demonstrate in order to achieve a pass mark of 40%.
Rigour of assessment
Provide a table that shows for each assessed module an estimate of the ratio of bookwork to critical analysis/application in the assessments. Please also provide a brief justification for each ratio. If the ratio is greater than 60:40, provide a clear justification for this value.
By way of example only:
Module
Estimate for % of bookwork in assessments
Estimate for % of critical analysis/application in assessments
Comments (where applicable)
A few examples
RiskMgt (C)
50
50
Body of knowledge to be assimilated and assessed through practical exercises
AdvBehav (C)
60
40
Crypt (C)
40
60
Focus in assessments on practical application and solving problems
NetSec (C)
40
60
Practical exercises requiring understanding, analysis and problem solving
Malware (C)
50
50
HumFact (C)
60
40
ResMethods (C)
45
55
Students required to produce research paper as preparation for their dissertation
Cloud (O)
45
55
Forensics (O)
40
60
Focus in assessments on practical application and solving problems
MachLearn (O)
40
60
ProjMgt (O)
65
35
Table 4.1: An example for illustrative purposes only of the ratio of bookwork to critical analysis/application for compulsory and optional modules.
Examination papersProvisional application
For each of the modules identified in section 3 that addresses a Knowledge Area Topic, describe the process (to be) used for assessment (e.g., examination, coursework, practical exercises, etc.). Provide a copy of examination paper(s) that students have sat or specimen paper(s) of the examinations they will sit. For assessed coursework, please provide copies of all assignments (to be) provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in an Appendix to section 4 of application.
Full application
For academic year 2019-2020, for each of the modules identified in section 3 that addresses a Knowledge Area Topic, describe the process used for assessment (e.g., examination, coursework, practical exercises, etc.). Provide a copy of the examination paper(s) that students sat. For assessed coursework, provide copies of all assignments provided to students. For each assessed coursework also provide a specific, tailored, marking scheme, or a narrative explaining what the marker would expect a student to provide in a good response. This information should be placed in an Appendix to section 4 of application.
External examiner’s report – full application only
For academic year 2019-2020, provide a copy of the external examiner’s report[footnoteRef:10]. Describe the process for engagement with the external examiner. Describe the technical background and experience of the external examiner. [10: Where the external examiner’s report for 2019-20 is not available by the submission deadline, please provide the most recent report and the HEI’s response. Please state when the 2019-20 report and response will be available and submit them as soon as they are available.]
For academic year 2019-2020, Provide a copy of the HEI’s response to external examiner’s report and any follow-up actions that have been undertaken in response to the report.
Page 2 of 2
ASSESSMENT MATERIALS
Original research dissertations
Up to 5 sides of A4, excluding list of dissertation topics and copies of dissertations
Applications for both full and provisional certificationGuidance to students
Describe the guidance the HEI provides, or will provide, to Master’s students before they embark on their dissertations, for example: research methods, undertaking literature reviews, etc.
Allocation of dissertation topics
Describe the process for allocation of dissertation topics to students, for example:
· is it up to students to come up with topic ideas?
· do members of staff identify possible topics?
· does the HEI have links with industry partners who suggest topics?
Scope of dissertation topics
Describe the process for ensuring:
· dissertation topics are within scope of the CyBOK Knowledge Areas
· that students are supervised by appropriately knowledgeable personnel
Monitoring of students’ progress
Describe the process for monitoring the progress of students on their dissertations.
Assessment of dissertations
Describe the process for assessing dissertations. Provide a specific, tailored marking scheme for dissertations clearly showing how grades are determined and what would be necessary for each of a distinction, merit or pass[footnoteRef:11]. Please indicate whether this or other similar guidance is provided to students. [11: Where the classifications of distinction / merit / pass are not used, please refer to the grades that are used by the HEI.]
By way of example only:
How well was the dissertation work planned10 marks
Significance of problem addressed and relevance to cyber security15 marks
Appropriateness of the technical approach15 marks
Quality of literature review15 marks
Quality and significance of results obtained20 marks
Insight provided by conclusions and recommendations15 marks
Performance in Viva10 marks
Distinction
Thorough and careful planning throughout. Time used effectively.
Important problem, highly relevant to cyber security.
Etc.
Merit
Pass
Fail
Table 5.1: An example for illustrative purposes only of a marking scheme and assessment criteria for dissertations.
Research dissertations contributing fewer than 40 credits
For Master’s degrees in which the original research dissertation accounts for fewer than 40 credits, describe how students are able to gain sufficient understanding and experience of undertaking original research.
Dissertations – for full certification onlyList of dissertation topics
For each of academic years 2019-2020 and 2018-2019 (if any), provide a list of Master’s dissertations undertaken by students. This should include the dissertation title, a short (one paragraph) abstract, an identification of which KA(s) the dissertation applies to, and – if appropriate – whether there was any external involvement in the dissertation (e.g., from industry).
Where there were more than 20 students undertaking dissertations in an academic year, provide information for a representative sample of 20 dissertations only.
By way of example only:
Dissertation title
Synopsis of dissertation
CyBOK KA(s) addressed
External involvement
Diss-1
Diss-2
…
Diss-n
Table 5.2: An example for illustrative purposes only of a table to describe dissertations undertaken in academic year 2019-2020.
By way of example only:
Dissertation title
Synopsis of dissertation
CyBOK KA(s) addressed
External involvement
Diss-1
Diss-2
…
Diss-m
Table 5.3: An example for illustrative purposes only of a table to describe dissertations undertaken in academic year 2018-2019.
Example dissertations
For academic year 2019-2020, provide one anonymised and representative copy of a dissertation for each of[footnoteRef:12]: [12: Where the classifications of distinction / merit / pass are not used, please provide representative dissertations for each of the classifications that are used by the HEI.]
a. a dissertation that achieved a distinction Please see: Distinction dissertation
b. a dissertation that achieved a merit Please see: Merit dissertation
c. a dissertation that achieved a pass Please see: Pass dissertation
If none in 2019-2020, try 2018-2019; if none, please contact the NCSC ahead of the deadline for applications. Dissertations should be placed in an appendix at the end of the application and must be included in the email submission.
Marks for example dissertations
For each of the dissertations in the previous section, provide:
a. the overall mark awarded
b. the components of the overall mark, for example marks awarded to:
· viva (including any demonstration)
· dissertation plan
· dissertation
c. key comments from the internal examiners
d. any additional information that you feel would help the assessment panel as part of its job to determine whether the grade awarded to each dissertation is appropriate.
By way of example only:
· Please see: Distinction dissertation information
· Please see: Merit dissertation information
· Please see: Pass dissertation information
Page 2 of 2
ORIGINAL RESEARCH DISSERTATIONS
Student numbers and grades achieved – applications for full certification only
Up to five sides of A4
Student entry data
Where the data are available, for each of academic years 2019-2020 and 2018-2019, please provide the information requested in Table 6.1. Please provide a separate table for each academic year.
By way of example only:
Entry Requirements
Number of full-time students
Number of part-time students
Number with 2/1 (or equivalent) or above in STEM subject
Number with 2/2 (or equivalent) or above in STEM subject
Number without 2/2 or above in STEM subject but who have relevant experience
Number without 2/2 or above in STEM subject or relevant experience
Students with UK nationality
In general, 2/1 in STEM or relevant experience – though some discretion allowed
10
2
6
7
5
0
Students with EU nationality
As above
2
0
1
1
1
0
Students without UK or EU nationality
As above
2
0
0
0
2
0
Table 6.1a: For illustrative purposes only student entry data for 2019-2020.
Entry Requirements
Number of full-time students
Number of part-time students
Number with 2/1 (or equivalent) or above in STEM subject
Number with 2/2 (or equivalent) or above in STEM subject
Number without 2/2 or above in STEM subject but who have relevant experience
Number without 2/2 or above in STEM subject or relevant experience
Students with UK nationality
In general, 2/1 in STEM or relevant experience – though some discretion allowed
8
0
4
4
4
0
Students with EU nationality
As above
2
0
1
1
1
0
Students without UK or EU nationality
As above
0
0
0
0
0
0
Table 6.1b: For illustrative purposes only student entry data for 2018-2019.
If tables 6.1a, b require any explanatory text, please add it here being careful not to exceed page limit for this section.
0. Student exit data
For academic years 2019-2020 and 2018-2019, provide the information requested in Table 6.2.
By way of example only:
Academic year
Number of students scheduled to complete Master’s
Number achieving distinction overall
Number achieving merit overall
Number achieving pass overall
Number failing Master’s
Number deferring for additional year(s)
Number opting to graduate with postgraduate certificate (or equivalent)
Number with other outcomes (if applicable)
2018 - 2019
10
2
5
2
0
0
1
0
2019 - 2020
14
3
7
3
1
0
0
0
Table 6.2: For illustrative purposes only student exit data for 2018-2019 and 2019-2020
If table 6.2 requires any explanatory text, please add it here being careful not to exceed page limit for this section.
Student satisfaction
Provide the results of any student satisfaction surveys and any actions that have been taken by the HEI as a result.
Page 2 of 2
STUDENT NUMBERS AND GRADES ACHIEVED
Appendix A: Staff CVs (Appendix to section 2 of application)
Up to two sides of A4 per CV
It is recommended to follow the structure below for each CV. For each CV, it is important to get across the person’s knowledge, experience and skills in cyber security.
By way of example only:
CV for Dr E. F. Personal statement of experience and expertise in cyber security
Provide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs[footnoteRef:13] as a framework. [13: https://www/cybok.org. ]
Academic background
Include here items such as qualifications obtained, subjects, year, institution, a few key publications.
Professional employment
Describe professional positions of employment, highlighting those relevant to cyber security.
Contribution to cyber security at the University of X
Describe what the person does at the HEI that is relevant to cyber security.
Esteem indicators
For example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.
Cyber security knowledge and expertise indicators
For example, recent publications, work with industry/government, research activities.
Any other information
Include any other information that might be relevant in demonstrating the person’s cyber security expertise.
CV for Dr G. H. Personal statement of experience and expertise in cyber security
Provide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.
Academic background
Include here items such as qualifications obtained, subjects, year, institution, a few key publications.
Professional employment
Describe professional positions of employment, highlighting those relevant to cyber security.
Contribution to cyber security at the University of X
Describe what the person does at the HEI that is relevant to cyber security.
Esteem indicators
For example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.
Cyber security knowledge and expertise indicators
For example, recent publications, work with industry/government, research activities.
Any other information
Include any other information that might be relevant in demonstrating the person’s cyber security expertise.
CV for I. J. Personal statement of experience and expertise in cyber security
Provide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.
Academic background
Include here items such as qualifications obtained, subjects, year, institution, a few key publications.
Professional employment
Describe professional positions of employment, highlighting those relevant to cyber security.
Contribution to cyber security at the University of X
Describe what the person does at the HEI that is relevant to cyber security.
Esteem indicators
For example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.
Cyber security knowledge and expertise indicators
For example, recent publications, work with industry/government, research activities.
Any other information
Include any other information that might be relevant in demonstrating the person’s cyber security expertise.
CV for K. L. Personal statement of experience and expertise in cyber security
Provide a succinct summary of the person’s experience and expertise in cyber security using the CyBOK KAs as a framework.
Academic background
Include here items such as qualifications obtained, subjects, year, institution, a few key publications.
Professional employment
Describe professional positions of employment, highlighting those relevant to cyber security.
Contribution to cyber security at the University of X
Describe what the person does at the HEI that is relevant to cyber security.
Esteem indicators
For example, editorships, invited talks, membership of national and international advisory groups. Highlight those relevant to cyber security.
Cyber security knowledge and expertise indicators
For example, recent publications, work with industry/government, research activities.
Any other information
Include any other information that might be relevant in demonstrating the person’s cyber security expertise.
Page 2 of 2
APPENDIX A: STAFF CVs
Appendix B: Module descriptions (Appendix to section 3 of application)
Include a table at the beginning of each module description that shows which KA Topics the module covers along with brief justifications for why this is the case.
The module descriptions should provide good evidence of the KA Topics and Indicative Material coverage claimed in Table 3.3.
By way of example only:
Risk Management module
Adversarial Behaviour module
Cryptography module
Network Security module
Malware module
Human Factors module
Research Methods module
Cloud Computing module
Forensics module
Machine Learning module
Project Management module
Page 2 of 2
APPENDIX B: MODULE DESCRIPTIONS
Appendix C: Assessment materials (Appendix to section 4 of application)
By way of example only:
Risk Management assessments Risk Management Coursework 1Risk Management Coursework 2
Adversarial Behaviour assessments
Cryptography assessments
Network Security assessments
Malware assessments
Human Factors assessments
Research Methods assessments
Cloud Computing assessments
Forensics assessments
Machine Learning assessments
Project Management assessments
External examiner’s report
HEI’s response to external examiner’s report
Page 2 of 2
APPENDIX C: ASSESSMENT MATERIALS
Appendix D: Original Research Dissertations (Appendix to section 5 of application)Dissertation awarded a distinctionDistinction dissertationDistinction dissertation information
Dissertation awarded a meritMerit dissertationMerit dissertation information
Dissertation awarded a pass Pass dissertationPass dissertation information
Page 2 of 2
APPENDIX D: ORIGINAL RESEARCH DISSERTATIONS