Digital Technologies (Cybersecurity) at York College University Centre - UCAS

Course summary

Cybersecurity, in a nutshell, encompasses the technologies, processes and controls designed to protect systems, networks and data from cyberattacks and unauthorised exploitation. Good cybersecurity involves not only managing the technologies, but the people and the business processes involved with today’s increasingly online world of business and commerce. The course will provide an overview of computing and information security principles to support business needs using current, industry-standard technologies and approaches, with a strong focus on problem solving and the application of digital technologies supported by the underpinning theory to address the needs of the business enterprise in the 21st century. It will develop higher-level technical and analytical skills in the vocational area of digital technologies, which can be applied to a wide range of career routes including information security management, systems and network administration, database administration, web development and programming; along with a range of transferable skills including personal development, research methods and highly regarded ‘soft skills’ such as team working and interpersonal skills.

Modules

Level 4 Introduction to Programming (Visual Studio with C#) Computer Hardware Fundamentals (including Arduino development) Information Security Concepts (CIA model, threat landscape, risk management, countermeasures) Database Design Principles (Using MySQL and relational database theory) Discrete Maths and Cryptography (Includes some Java programming and problem solving) Professionalism in the Digital Sector (Enrolment to the BCS, building a professional development portfolio) Level 5 Information Security in Practice (Security architectures, industry standards, best practice) Individual Research Proposal (Research methods, writing a proposal document) Building a Secure Database (Security features of MySQL, secure development lifecycle) Psychology of Cybersecurity (What motivates threat actors and techniques used in social engineering) Secure Networking Practices (MS Active directory, Security Onion, Kali Linux pen test tools) Website Security Technologies (PHP coding to OWASP standards)

Assessment method

The course has been designed with an emphasis on an adult learning environment, enabling you to make the most of resources available and to take responsibility for your own learning. The inclusion of a professionalism module supports this approach and this emphasis on a more professionally focussed style of learning based on the Framework for Higher Education Quality benchmarks for Level 4 and Level 5. This approach is very much aimed at helping you to make informed decisions about how you learn best and to reflect on your own learning. Another aspect is to make learning active and participative, which is reflected in the highly practical nature of the module delivery and the high proportion of coursework. You will demonstrate knowledge and understanding through a combination of coursework, practical activity and two formal examinations. A wide range of assessment styles are employed, such as walkthroughs, practical work, portfolios of evidence, formal reports, seminars and presentations. The research project in year 2 brings together a full range of skills and knowledge. There are a number of “written work” assessments which have been carefully designed to reflect real-world tasks. Most assignments will be based on a single case study, for which you will produce professionally styled reports, proposal documents, policy documents, technical briefs and specifications. As work-based learning is a key feature of vocational degrees, the case study scenarios have been carefully developed in conjunction with professionals from the cybersecurity industry. This will equip you with skills you will need both in higher levels of academia and in the workplace. Graded exercises, weekly tasks, problem solving activities, flipped classroom actives and online revision tests/quizzes will be used as formative assessment tools to monitor your learning. Feedback on assessment will be given on a regular basis throughout the course and detailed summative feedback will be provided after each piece of coursework is marked. It will highlight the strengths so that you can develop these further as well as offering suggestions for improvement in future work. You will be expected to use feedback as part of your reflective practice to develop knowledge and skills. The use of regular progress checks with a Personal Tutor are important to ensure difficulties are identified early and that you stay on track to achieve your target grade.


How to apply

Application codes

Course code:
D5T7
Institution code:
Y70
Campus name:
Main Site
Campus code:
-

Points of entry

The following entry points are available for this course:

  • Year 1

Entry requirements

Qualification requirements

Applicants who have relevant skills and experience but who do not hold the standard minimum entry requirements will be considered. Applicants will be required to demonstrate the necessary skills and experience to enter the course through their personal statement.

Please click the following link to find out more about qualification requirements for this course

https://www.yorkcollege.ac.uk/study/foundation-degree-fd-digital-technology-with-cyber-security-2


Fees and funding

Tuition fees

England £7200 Year 1
Northern Ireland £7200 Year 1
Scotland £7200 Year 1
Wales £7200 Year 1

Tuition fee status depends on a number of criteria and varies according to where in the UK you will study. For further guidance on the criteria for home or overseas tuition fees, please refer to the UKCISA website .

Additional fee information

No additional fees or cost information has been supplied for this course, please contact the provider directly.
Digital Technologies (Cybersecurity) at York College University Centre - UCAS