· web viewconcepts of digital evidence for computer based, mobile technology, embedded and...

23
DEFINITIVE MODULE RECORDS Programme Title: BSc (Hons) Computing Technologies (Level 6) University of Plymouth Programme Code: Full Time (5376), Part Time (5377) Partner Faculty: Academic Partnerships, University of Plymouth Partner Delivering Institution: Cornwall College, Camborne Start Date: September 2019-20 First Award Date: July – 2020 (Full Time), July – 2021 (Part Time) Date of Approval: May 2015 Date(s) of Revision(s) to this Document: 23/08/18, 26/09/18, 15/05/19

Upload: others

Post on 25-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

DEFINITIVE MODULE RECORDS

Programme Title: BSc (Hons) Computing Technologies (Level 6)

University of Plymouth Programme Code: Full Time (5376), Part Time (5377)

Partner Faculty: Academic Partnerships, University of Plymouth

Partner Delivering Institution: Cornwall College, Camborne

Start Date: September 2019-20

First Award Date: July – 2020 (Full Time), July – 2021 (Part Time)

Date of Approval: May 2015

Date(s) of Revision(s) to this Document: 23/08/18, 26/09/18, 15/05/19

Page 2:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION A: DEFINITIVE MODULE RECORD. Proposed changes must be submitted via Faculty Quality Procedures for approval and issue of new module code.

MODULE CODE: CORC367 MODULE TITLE: Agile Methods

CREDITS: 20 FHEQ Level: 6HECOS CODE: 100365, 100376, 100385

PRE-REQUISITES: None CO-REQUISITES: None COMPENSATABLE: Yes

SHORT MODULE DESCRIPTOR:This module covers topics relating to the agile methodology. It investigates contemporary management styles in the software industry and wider business contexts. It provides the core understanding of working in an Agile manner.

ELEMENTS OF ASSESSMENT:WRITTEN EXAMINATION COURSEWORK PRACTICAL

E1 (Examination) C1 (Coursework)

70% P1 (Practical) 30%

E2 (Clinical Examination)

A1 (Generic Assessment)

T1 (Test)

SUBJECT ASSESSMENT PANEL Group to which module should be linked: Camborne

Professional body minimum pass mark requirement: N/A

MODULE AIMS: To develop an understanding of a spectrum of agile methodologies, their origins and

applicability of different project and workplace challenges. To explain the business culture and the economic case required for Agile. To understand the implication of a collaborative agile environment on individuals, teams, the

business and customers. To recognise the features and components of a collaborative agile environment.

ASSESSED LEARNING OUTCOMES: At the end of the module the learner will be expected to be able to: Critically evaluate various Agile approaches (e.g. XP, Scrum, Lean, DSDM) Critically appraise the business culture and the economic case required for Agile Judiciously apply Agile techniques to a given problem scenario Create an Agile project plan based on increments and iterations

DATE OF APPROVAL: 19/05/15 FACULTY/OFFICE: Academic PartnershipsDATE OF IMPLEMENTATION: 01/09/15 SCHOOL/PARTNER: Cornwall CollegeDATE(S) OF APPROVED CHANGE: N/A TERM/SEMESTER: 15/AY/AU/M

Page 3:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION B: DETAILS OF TEACHING, LEARNING AND ASSESSMENTItems in this section must be considered annually and amended as appropriate, in conjunction with the Module Review Process. Some parts of this page may be used in the KIS return and published on the extranet as a guide for prospective students. Further details for current students should be provided in module guidance notes.ACADEMIC YEAR: 2019-20 NATIONAL COST CENTRE: 121MODULE LEADER: Belinda Waldock OTHER MODULE STAFF: Caroline Cripps, Buzz

Banks, Chris JenkinsSUMMARY of MODULE CONTENT: Origins of Agile practices, the Agile Manifesto and principles, overview of XP, Scrum, Lean and DSDM. Agile in practice, increments and iterations.SUMMARY OF TEACHING AND LEARNING:Scheduled Activities Hours Comments/Additional InformationLectures 28 Presentation of topics relevant to application of

Agile methodologyTutorial 2 Individual tutorial supportPractical Classes and Workshops 15 Programme specific practical workExternal visits 5 Opportunity to see theory put into practiceGuided independent study 150 Autonomous working (with tutor if appropriate)Total 200

Category Element Component Name Component Weighting

Comments include links to learning objectives

Written exam

E1T1

Coursework C1

Creation of a project plan in an Agile development environment

100%

Total = 100%

Learner led group working and individual reflection covers LO1,LO3, LO4

Practical P1 Pitch 100%Total = 100%

LO2

Updated by:HE Operations

Date:15/05/19

Approved by:HE Operations

Date:15/05/19

Recommended Texts and Sources:Beck, K. & Andres, C. (2005) Extreme Programming Explained: Embrace Change. Addison-Wesley.Cockburn, A. (2007) Agile software development: the cooperative game, Harlow: Addison-Wesley.Cohen, M. (2005) Agile Estimating and Planning, Addison-Wesley.Courage, C. & Baxter, K. (2005) Understanding your Users, Morgan Kaufmann, San Francisco.DSDM Consortium, (2010) DSDM Atern handbook, V2, Ashford: DSDM Consortium.Hughes, B. & Cotterell, M (2009) "Software Project Management." McGraw Hill Higher Education.Larman, C. (2004) Agile and iterative development: a manager’s guide, Boston, Mass; London: Addison-Wesley.Measey, P., Gray, A, Berridge, C, Wilmshurts, D, Levy, R, Short, M, Roberts, B, Oliver, L & Wolf, L (2015) Agile Foundations: Principles, practices and frameworks. BCS, London.Qassim, A.A. (2008) Why information systems projects fail : Guidelines for Successful Projects. The INTOSAI IT Journal, pp.12–17. Available at: http://www.intosaiitaudit.org/intoit_articles/26_p12top17.pdfSchwaber, K. (2004) Agile Project Management with Scrum. Microsoft PressStapleton, J, (2003) DSDM: Business focused development. 2nd Edition, Addison Wesley,.Taylor, M.J. et al., (2002) Methodologies and website development: a survey of practice. Information and Software Technology, 44(6), pp.381–391. Available at: http://www.sciencedirect.com/science/article/pii/S0950584902000241

Page 4:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION A: DEFINITIVE MODULE RECORD. Proposed changes must be submitted via Faculty Quality Procedures for approval and issue of new module code.

MODULE CODE: CORC368 MODULE TITLE: Cloud Computing and Security

CREDITS: 20 FHEQ Level: 6 HECOS CODE: 100365, 100376, 100385

PRE-REQUISITES: None CO-REQUISITES: None COMPENSATABLE: Yes

SHORT MODULE DESCRIPTOR: This module introduces the main computing models exploited in Grids and Clouds to evolve from cluster computing towards more virtualized resources and across-institutional user communities. As the Internet of Everything brings new economic and social opportunities worldwide, global demand increases the need for security and risk management skills, knowledge of Open Source software, Cloud Computing and social media.

ELEMENTS OF ASSESSMENT:WRITTEN EXAMINATION COURSEWORK PRACTICAL

E1 (Examination) C1 (Coursework)

60% P1 (Practical)

E2 (Clinical Examination)

A1 (Generic Assessment)

T1 (Test) 40%

SUBJECT ASSESSMENT PANEL Group to which module should be linked: Camborne

Professional body minimum pass mark requirement: N/A

MODULE AIMS: To appraise the business culture and the economic case of Open Source, Cloud Computing and

social media. To examine communications security from a computer network, IT system and organisational

perspective. To develop an understanding of communications security through cryptography, confidentiality

and penetration testing. To investigate network attacks and network anomalies, including Denial/Distributed Denial of

Service.

ASSESSED LEARNING OUTCOMES:At the end of the module the learner will be expected to be able to:1. Critically appraise the business culture and the economic case of Open Source, Cloud Computing

and social media.2. Critically assess the use of communications security through cryptography, confidentiality and

penetration testing.3. Critically appraise communications security from a computer network, IT system and

organisational perspective.4. To research and critically evaluate network attacks and network anomalies, including

Denial/Distributed Denial of Service.

DATE OF APPROVAL: 19/05/15 FACULTY/OFFICE: Academic PartnershipsDATE OF IMPLEMENTATION: 01/09/15 SCHOOL/PARTNER: Cornwall College

Page 5:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

DATE(S) OF APPROVED CHANGE: N/A TERM/SEMESTER: 15/AY/AU/MSECTION B: DETAILS OF TEACHING, LEARNING AND ASSESSMENTItems in this section must be considered annually and amended as appropriate, in conjunction with the Module Review Process. Some parts of this page may be used in the KIS return and published on the extranet as a guide for prospective students. Further details for current students should be provided in module guidance notes.ACADEMIC YEAR: 2019-20 NATIONAL COST CENTRE: 121

MODULE LEADER: Dave Cook OTHER MODULE STAFF:

SUMMARY of MODULE CONTENT: Cryptography- substitution and transposition; confidentiality- disk encryption software File/folder encryption, Database encryption, public-key/Private-Key cryptography: RSA, 3DES, AES algorithms and digital signatures. Network attacks and network anomalies, Denial/Distributed Denial of Service (DoS/DDos), IDS, IPS, Anomaly and signature, penetration testing , PCI Data Security Standard (PCI DSS) Virtualization Guidelines and CSA (Cloud Security Alliance) for cloud environments, configure basic hardware constituent components of a cloud.

SUMMARY OF TEACHING AND LEARNING:Scheduled Activities Hours Comments/Additional InformationLectures 28 Presentation of topics relevant distributed

computing and security perspectivesTutorial 2 Individual tutorial supportPractical Classes and Workshops 30 Programme specific practical workSelf-directed study 140 Autonomous working (with tutor if appropriate)Total 200

Category Element Component Name Component Weighting

Comments include links to learning objectives

Written exam

E1

T1 In Class Test 100%Total = 100%

LO2

Coursework C1

Open Source, Cloud Computing and social media combined with security investigation Report

100%

Total = 100%LO1, LO3, LO4

Practical P1

Updated by:HE Operations

Date:15/05/19

Approved by:HE Operations

Date:15/05/19

Recommended Texts and Sources: Barker,K. & Morris, S. (2012) CCNA Security, USA: Cisco PressHwang, K., Dongarra, J. & Fox, G. (2011) Distributed and Cloud Computing: From Parallel Processing to the Internet of Things, Morgan Kaufmann.Kale, V. (2014) Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications, Chapman and Hall CRCMahajan, S. & Seema, S. (2013) Distributed Computing, India: OUPPfleeger,C.P., & Lawrence,S. (2015) Security in Computing, US: Prentice Hall Pearson Education.Online

Page 6:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

http://www.inf.ed.ac.uk/teaching/courses/ds/SECTION A: DEFINITIVE MODULE RECORD. Proposed changes must be submitted via Faculty Quality Procedures for approval and issue of new module code.

MODULE CODE: CORC369 MODULE TITLE: Digital Forensics

CREDITS: 10 FHEQ Level: 6HECOS CODE: 100365, 100376, 100385

PRE-REQUISITES: None CO-REQUISITES: None COMPENSATABLE: Yes

SHORT MODULE DESCRIPTOR:This module explores the importance of forensic capability in terms of the digital forensic methodologies, principles and disciplines of acquisition, examination, analysis and presentation reporting procedures. Fundamental ethical and professional issues associated with the use of digital forensics are also examined.

ELEMENTS OF ASSESSMENT:WRITTEN EXAMINATION COURSEWORK PRACTICAL

E1 (Examination) C1 (Coursework) 100% P1 (Practical)E2 (Clinical Examination)

A1 (Generic Assessment)

T1 (Test)

SUBJECT ASSESSMENT PANEL Group to which module should be linked: Computing

Professional body minimum pass mark requirement: N/A

MODULE AIMS: To understand the concepts of forensic digital evidence To develop a detailed understanding of data preservation, recovery, integrity, carving and

repeatability To explain the concepts of ethical and professional issues To develop a detailed understanding of forensic techniques, open source and commercial

forensic tools

ASSESSED LEARNING OUTCOMES:At the end of the module the learner will be expected to be able to:1. Understand and critically appraise principles involved in Digital Forensic investigations such as

data preservation, recovery, integrity, carving and repeatability.2. Critically appraise ethical and professional issues related to Digital Forensics.3. Research and critically evaluate forensic techniques and tools used for digital evidence.

DATE OF APPROVAL: 19/05/15 FACULTY/OFFICE: Academic PartnershipsDATE OF IMPLEMENTATION: 01/09/15 SCHOOL/PARTNER: Cornwall CollegeDATE(S) OF APPROVED CHANGE: N/A TERM/SEMESTER: 15/AU/M

Page 7:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION B: DETAILS OF TEACHING, LEARNING AND ASSESSMENTItems in this section must be considered annually and amended as appropriate, in conjunction with the Module Review Process. Some parts of this page may be used in the KIS return and published on the extranet as a guide for prospective students. Further details for current students should be provided in module guidance notes.ACADEMIC YEAR: 2019-20 NATIONAL COST CENTRE: 121

MODULE LEADER: Dave Cook OTHER MODULE STAFF: Chris Jenkins

SUMMARY of MODULE CONTENT:Concepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as data preservation, recovery, integrity, carving and repeatability, ethical and professional issues related to Digital Forensics, the role of related professional and regulatory bodies, such as those recommended by the ACPO (Association of Chief Police Officers) Good Practice Guide for Computer-Based Evidence, forensic techniques used in the examination of end-devices, open source and commercial forensic tools.

SUMMARY OF TEACHING AND LEARNING:Scheduled Activities Hours Comments/Additional InformationLectures 14 Preparatory lectures to assure appropriateness

of proposed study; core and programme specificTutorial 1 Individual tutorial supportPractical classes and workshops 8 Programme specific practical workGuided Independent Study 77 Autonomous working (with tutor if appropriate)Total 100

Category Element

Component Name Component Weighting

Comments include links to learning objectives

Written exam

E1T1

Coursework C1

Forensic Investigation Report based on a case study

100%

Total = 100%

LO1, LO2, LO3

Practical P1

Updated by:HE Operations

Date:15/05/19

Approved by:HE Operations

Date:15/05/19

Recommended Texts and Sources: Kruse I. W. & Heiser, G. (2001) Computer Forensics: Incident Response Essentials, 1st Ed. U.S.A. Indiana: Addison Wesley.Nelson, B., Stuart, C. & Phillips, A. (2015) Guide to Computer Forensics and Investigations: Processing Digital Evidence, 5th Ed. U.S.A. New York: Delmar Cengage Learning.Volonino L., Anzaldua, R. & Godwin, J.(2007) “Computer forensics: principles and practices, USA: Pearson/Prentice Hall.Widup, S., (2014) Computer Forensics and Digital Investigation with EnCase Forensic v7, UK:

Page 8:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

McGraw-Hill Osborne.

SECTION A: DEFINITIVE MODULE RECORD. Proposed changes must be submitted via Faculty Quality Procedures for approval and issue of new module code.

MODULE CODE: CORC370 MODULE TITLE: Entrepreneurship for E-Business

CREDITS: 10 FHEQ Level: 6HECOS CODE: 100365, 100376, 100385

PRE-REQUISITES: None CO-REQUISITES: None COMPENSATABLE: No

SHORT MODULE DESCRIPTOR: This module covers topics relating to examining the various models for e-business, develop skills in writing business plans and forecasts and investigate the role technology can play in starting and operating an e-business.

ELEMENTS OF ASSESSMENT:WRITTEN EXAMINATION COURSEWORK PRACTICAL

E1 (Examination) C1 (Coursework)

80% P1 (Practical) 20%

E2 (Clinical Examination)

A1 (Generic Assessment)

T1 (Test)

SUBJECT ASSESSMENT PANEL Group to which module should be linked: Computing

Professional body minimum pass mark requirement: N/A

MODULE AIMS: The aim of this module is to equip students with the skills and knowledge required to set up and

run a small e-business

ASSESSED LEARNING OUTCOMES:At the end of the module the learner will be expected to be able to:1. Critically analyse the validity of a business idea.2. Create a written business plan.3. Create and effectively pitch the business plan.4. Critically understand the pressures that operate on a small business.

DATE OF APPROVAL: 19/05/15 FACULTY/OFFICE: Academic PartnershipsDATE OF IMPLEMENTATION: 01/09/15 SCHOOL/PARTNER: Cornwall CollegeDATE(S) OF APPROVED CHANGE: N/A TERM/SEMESTER: 15/SP/M

Page 9:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION B: DETAILS OF TEACHING, LEARNING AND ASSESSMENTItems in this section must be considered annually and amended as appropriate, in conjunction with the Module Review Process. Some parts of this page may be used in the KIS return and published on the extranet as a guide for prospective students. Further details for current students should be provided in module guidance notes.ACADEMIC YEAR: 2019-20 NATIONAL COST CENTRE: 133

MODULE LEADER: Dr Bryan Mills OTHER MODULE STAFF:

SUMMARY of MODULE CONTENT: E-business models, creating a business plan, financing an e-business, marketing and e-business, operating an e-business, technologies for e-business: security, internet, web and telephony.

SUMMARY OF TEACHING AND LEARNING:Scheduled Activities Hours Comments/Additional InformationLectures 20 Preparatory lectures to assure appropriateness of

proposed study; core and programme specificTutorial 2 Individual tutorial supportGuided Independent Study 78Total 100

Category Element Component Name Component Weighting

Comments include links to learning objectives

Written exam

E1T1

Coursework C1 Business Plan 100%Total = 100%

LO1, LO2, LO4

Practical P1Presentation of business plan

100%

Total = 100%

LO3

Updated by: HE Operations

Date:15/05/19

Approved by: HE Operations

Date:15/05/19

Recommended Texts and Sources:Allen, P. (2000) Realizing eBusiness with Components, Addison-Wesley Pub.Deitel, M. H. &, Deitel, P. J. (2011) e-Business & e-Commerce for Managers, Prentice Hall.Norris, M & West, S. (2001) eBusiness Essentials, 2nd Edition, John Wiley & Sons.Osterwalder, A. & Pigneur, Y. (2010) Business Model Generation: A Handbook for Visionaries,Game Changers, and Challengers, John Wiley & Sons Ltd.Plant, R. (2000) eCommerce: Formulation of Strategy, Prentice Hall.Reynolds, J. (2004) The Complete E-Commerce Book: Design, Build, and Maintain a Successful Web-Based Business, CMP Books.Waldock,B (2015) Being Agile in Business, Amazon.co.ukWilliams, S. (2010) The Financial Times Guide to Business Start Up 2011, Prentice Hall.

Page 10:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION A: DEFINITIVE MODULE RECORD. Proposed changes must be submitted via Faculty Quality Procedures for approval and issue of new module code.

MODULE CODE: CORC371 MODULE TITLE: Honours Project

CREDITS: 40 FHEQ Level: 6HECOS CODE: 100365, 100376, 100385

PRE-REQUISITES: None CO-REQUISITES: None COMPENSATABLE: No

SHORT MODULE DESCRIPTOR:This module allows students to explore in detail an academic subject of their choice. The module comprises a substantial autonomous research study/investigation and implementation of a computing project. The student’s ability to design a valid investigation and collect, collate, and implement a product based on the research and to communicate the outcome/s is assessed.

ELEMENTS OF ASSESSMENT:WRITTEN EXAMINATION COURSEWORK PRACTICAL

E1 (Examination) C1 (Coursework)

90% P1 (Practical) 10%

E2 (Clinical Examination)

A1 (Generic Assessment)

T1 (Test)

SUBJECT ASSESSMENT PANEL Group to which module should be linked: Computing

Professional body minimum pass mark requirement: N/A

MODULE AIMS: To carry out a self-directed study of current issues and concepts relevant to their degree

programme To provide knowledge and understanding of the research process To develop competence in the design and execution of a computer based project The ability to communicate their findings by appropriate means

ASSESSED LEARNING OUTCOMES: At the end of the module the learner will be expected to be able to:1. Critically evaluate relevant literature/software, identify the need for further research

investigation and propose a suitable a suitable project for research, investigation and implementation.

2. Judiciously design and execute the collection of data via any combination of laboratory work, questionnaire and interview methodologies and analyse and interpret your results.

3. Design and execute a computer based project.4. Critically evaluate and reflect the computer based project.5. Communicate the outcome/s in an appropriate technical context.

DATE OF APPROVAL: 19/05/15 FACULTY/OFFICE: Academic PartnershipsDATE OF IMPLEMENTATION: 01/09/15 SCHOOL/PARTNER: Cornwall College

Page 11:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

DATE(S) OF APPROVED CHANGE: N/A TERM/SEMESTER: 15/AY/AU/MSECTION B: DETAILS OF TEACHING, LEARNING AND ASSESSMENTItems in this section must be considered annually and amended as appropriate, in conjunction with the Module Review Process. Some parts of this page may be used in the KIS return and published on the extranet as a guide for prospective students. Further details for current students should be provided in module guidance notes.ACADEMIC YEAR: 2019-20 NATIONAL COST CENTRE: 121MODULE LEADER: Caroline Cripps OTHER MODULE STAFF: Dave Cook, Dr Bryan Mills,

Naomi JohnsSUMMARY of MODULE CONTENT: Feasibility of a computer based project, collection of data and analysis of data, the design and execution of a computer based project. Critical evaluation and reflection of a computer based project. Presentation and demonstration methods. Through a programme of guest lecturers from local industry, students are encouraged to work with industry in identifying and obtaining suitable projects. Requests from local businesses through an employer forum will also be posted on the virtual learning environment. Students are encouraged to demonstrate their capability to create an artefact.SUMMARY OF TEACHING AND LEARNING:Scheduled Activities Hours Comments/Additional InformationLectures 15 Preparatory lectures to assure appropriateness of

proposed study; core and programme specificTutorial 10 Individual tutorial supportPractical Classes and Workshops 20 Programme SpecificProject supervision 15 Supervisory sessions as appropriateGuided Independent Study 340 Autonomous working (with tutor if appropriate)Total 400

Category Element Component Name

Component Weighting

Comments include links to learning objectives

Written exam

E1T1

Coursework C1

Investigation, Logbook, Final report and evaluation

100%

Total = 100%

LO1, LO2, LO3, LO4

Practical P1 Presentation / Viva voce

100%Total = 100%

LO5

Updated by:HE Operations

Date:15/05/19

Approved by:HE Operations

Date:15/05/19

Recommended Texts and Sources:Cottrell S. (2014) Dissertations and Project Reports: A Step by Step Guide (Palgrave Study Skills). Palgrave MacmillanGreetham B. (2009) How to Write your Undergraduate Dissertation (Palgrave Study Skills), Palgrave MacmillanWalliman N. (2013) Your Undergraduate Dissertation: The Essential Guide for Success (SAGE Study Skills Series), SAGE Publications LtdWeyers J.& McMillan K. (2011) How to Write Dissertations & Project Reports (Smarter Study Skills), Prentice HallProject dependent resources

Page 12:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION A: DEFINITIVE MODULE RECORD. Proposed changes must be submitted via Faculty Quality Procedures for approval and issue of new module code.

MODULE CODE: CORC372 MODULE TITLE: Advanced Networking

CREDITS: 20 FHEQ Level: 6 HECOS CODE: 100365, 100376, 100385

PRE-REQUISITES: CORC2110 CO-REQUISITES: None COMPENSATABLE: Yes

SHORT MODULE DESCRIPTOR: This module covers topics relating to advanced networking. It will equip students with the knowledge and skills needed to plan, implement, verify, secure, maintain and troubleshoot local and wide-area enterprise networks, and how to work collaboratively with specialists on advanced security, voice, wireless and video solutions.

ELEMENTS OF ASSESSMENT: [Use HESA KIS definitions]WRITTEN EXAMINATION COURSEWORK PRACTICAL

E1 (Examination) C1 (Coursework) P1 (Practical) 50%E2 (Clinical Examination)

A1 (Generic Assessment)

T1 (Test) 50%

SUBJECT ASSESSMENT PANEL Group to which module should be linked: Computing

Professional body minimum pass mark requirement: N/A

MODULE AIMS: To explore advanced networking topics. To develop a detailed understanding of the principles needed to plan, implement, verify, secure,

maintain and troubleshoot local and wide-area enterprise networks. To apply the principles of planning, implementing, verifying, securing, maintaining and

troubleshooting local and wide-area enterprise networks. How to work collaboratively with specialists on advanced security, voice, wireless and video

solutions.

ASSESSED LEARNING OUTCOMES: At the end of the module the learner will be expected to be able to:1. Appraise the latest technology and trends in advanced networking topics.2. Critically appraise the principles needed to plan, implement, verify, secure, maintain and

troubleshoot local and wide-area enterprise networks.3. Judiciously apply the principles of planning, implementing, verifying, securing, maintaining and

troubleshooting local and wide-area enterprise networks.4. Critically evaluate how to work collaboratively with specialists on advanced security, voice,

wireless and video solutions.

DATE OF APPROVAL: 19/05/15 FACULTY/OFFICE: Academic PartnershipsDATE OF IMPLEMENTATION: 01/09/15 SCHOOL/PARTNER: Cornwall CollegeDATE(S) OF APPROVED CHANGE: N/A TERM/SEMESTER: 15/AY/AU/M

Page 13:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION B: DETAILS OF TEACHING, LEARNING AND ASSESSMENTItems in this section must be considered annually and amended as appropriate, in conjunction with the Module Review Process. Some parts of this page may be used in the KIS return and published on the extranet as a guide for prospective students. Further details for current students should be provided in module guidance notes.ACADEMIC YEAR: 2019-20 NATIONAL COST CENTRE: 121

MODULE LEADER: Dave Cook OTHER MODULE STAFF:

SUMMARY of MODULE CONTENT:Advanced networking topics, the principles needed to plan, implement, verify, secure, maintain and troubleshoot local and wide-area enterprise networks. The principles of planning, implementing, verifying, securing, maintaining and troubleshooting local and wide-area enterprise networks and collaborative working with specialists on advanced security, voice, wireless and video solutions.

SUMMARY OF TEACHING AND LEARNING:Scheduled Activities Hours Comments/Additional InformationLectures 28 Presentation of topics relevant to advanced

networkingPractical classes and workshops 30 Programme specific practical workTutorial 2 Individual tutorial supportGuided Independent Study 140 Autonomous working (with tutor if appropriate)Total 200

Category Element Component Name Component Weighting

Comments include links to learning objectives

Written exam

E1

T1 In Class Test 100%Total = 100%

LO1, LO2

Coursework C1

Practical P1 Skills Based Assessment

100%Total = 100%

LO3, LO4

Updated by:HE Operations

Date:15/05/19

Approved by:HE Operations

Date:15/05/19

Recommended Texts and Sources:Empson, S., Gargano, P. & Roth, H. (2014) CCNP Routing and Switching Portable Command Guide, USA: Cisco Press.Ranjbar, A. (2014) Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: (CCNP TSHOOT 300-135), USA: Cisco Press.Teare, D, Vachon, B & Graziani, R. (2015) Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide: (CCNP ROUTE 300-101), USA: Cisco Press.Wallace, k., Hucaby, D. & Lacoste, R (2014) CCNP Routing and switching v2.0, USA: Official Cert Guide Library, Cisco Press.

Page 14:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION A: DEFINITIVE MODULE RECORD. Proposed changes must be submitted via Faculty Quality Procedures for approval and issue of new module code.

MODULE CODE: CORC373 MODULE TITLE: Advanced Object Oriented Programming

CREDITS: 20 FHEQ Level: 6 HECOS CODE: 100365, 100376, 100385

PRE-REQUISITES: None CO-REQUISITES: None COMPENSATABLE: Yes

SHORT MODULE DESCRIPTOR:This module will develop in depth the necessary skills and knowledge for the development of software development applications using an Object Oriented programming language, such as C++ and Java. Students will demonstrate the skills required to engineer Object Oriented based software application from initial specifications through to implementation, testing and documentation.

ELEMENTS OF ASSESSMENT: [Use HESA KIS definitions]WRITTEN EXAMINATION COURSEWORK PRACTICAL

E1 (Examination) C1 (Coursework)

60% P1 (Practical)

E2 (Clinical Examination)

A1 (Generic Assessment)

T1 (Test) 40%

SUBJECT ASSESSMENT PANEL Group to which module should be linked: Computing

Professional body minimum pass mark requirement: N/A

MODULE AIMS: To develop a detailed understanding of object oriented principles in the design of software

applications To apply Object oriented principles to produce Unified Modelling specifications To produce, edit and test Object Oriented applications

ASSESSED LEARNING OUTCOMES:At the end of the module the learner will be expected to be able to:1. Critically analyse the use of object oriented principles in the design of software applications.2. Use Object Oriented principles to produce Unified Modelling Language specifications.3. Construct, edit and test Object Oriented applications to a given specification.4. Critically appraise the use of pair / mob programming.

DATE OF APPROVAL: 19/05/15 FACULTY/OFFICE: Academic PartnershipsDATE OF IMPLEMENTATION: 01/09/15 SCHOOL/PARTNER: Cornwall CollegeDATE(S) OF APPROVED CHANGE: N/A TERM/SEMESTER: 15/AY/AU/M

Page 15:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as
Page 16:  · Web viewConcepts of digital evidence for Computer Based, Mobile Technology, Embedded and Network Forensics, the principles involved in Digital Forensic investigations such as

SECTION B: DETAILS OF TEACHING, LEARNING AND ASSESSMENTItems in this section must be considered annually and amended as appropriate, in conjunction with the Module Review Process. Some parts of this page may be used in the KIS return and published on the extranet as a guide for prospective students. Further details for current students should be provided in module guidance notes.ACADEMIC YEAR: 2019-20 NATIONAL COST CENTRE: 121

MODULE LEADER: Caroline Cripps OTHER MODULE STAFF: Byran Wills-Heath, Naomi Johns

SUMMARY of MODULE CONTENT:Object oriented principles in the design of software applications, use Object Oriented principles to produce Unified Modelling specifications, produce, edit and test Object Oriented applications, such as C++ and Java, mob/pair programming, threads and exceptions.

SUMMARY OF TEACHING AND LEARNING:

Scheduled ActivitiesHour

sComments/Additional Information

Lectures 28 Presentation of topics relevant to application of Software Engineering and O-O programming

Tutorial 2 Individual tutorial supportPractical Classes and Workshops

30Programme specific practical work

Self-directed study 140 Autonomous working (with tutor if appropriate)Total 200

Category Element

Component Name

Component Weighting

Comments include links to learning objectives

Written exam

E1

T1In Class Test 100%

Total = 100%LO1

Coursework

C1Software development project

100%

Total = 100%

LO2, LO3, LO4

Practical P1

Updated by:HE Operations

Date:15/05/19

Approved by:HE Operations

Date:15/05/19