MSc Enterprise Security & Digital Forensics

Similar documents
MSc Computer Networking

School of Innovative Technologies and Engineering. Postgraduate Diploma in Information Technology (With Specialisation in Networking)

PROGRAMME SPECIFICATION

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Programme Specification

Bachelor of Information Technology (Network Security)

PROGRAMME SPECIFICATION

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English

CISA Training.

All LJMU programmes are delivered and assessed in English

BS523 (with PDP) Postgraduate Diploma in Management. January 2016 January September 2017

Information Security and Computer Forensics (ISCF)

Certified Cyber Security Analyst VS-1160

Short courses presented by the NWU Programme in Forensic Accountancy

BSc (Hons) Business Information Systems

MSc Management with Project Management. BS524 (with PDP) Postgraduate Diploma in Management. January 2016 January 2021.

MSc Cyber Security. International Students Can Apply

OVERVIEW OF SUBJECT REQUIREMENTS

Short Course in Film Editing

E-guide Getting your CISSP Certification

A Comparative Study of Teaching Forensics at a University Degree Level

COURSE BROCHURE CISA TRAINING

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

Cloud Security. Copyright Ramesh Nagappan. All rights reserved.

BSc (Hons) Web Technologies

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Professional Engineering (Civil Engineering)

BSc (Hons) Information Systems - IC 311

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Course Specifications M. Tech. / PG Diploma Programme

STUDENT AND ACADEMIC SERVICES

Programme title: BSc (Hons) Forensic Archaeology and Anthropology

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering

Business Information Systems

COMPUTER FORENSICS (CFRS)

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

CCISO Blueprint v1. EC-Council

Information Systems and Tech (IST)

Programme Specification Title of Programme: HNC in Computing and Systems Development with Cisco CCENT

This programme is only offered at: Kazan State University for Architecture and Engineering (KSUAE)

Professional Certificate in Conduct Risk, Culture and Operational Risk Management

Cyber Security Technologies

Unit 3 Cyber security

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18

UWE BRISTOL BSc (Hons) Information Technology

N/A. Engineering (MEng) July 2014

MASTER OF SCIENCE IN COMPUTER SCIENCE

Pearson BTEC Level 5 Higher National Diploma in Engineering (Electrical and Electronic Engineering)

CIM Level 3 Foundation Certificate in Marketing

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

UNDERGRADUATE PROGRAMME SPECIFICATION

BSc (Honours) Computer Science Curriculum Outline

University of Plymouth. BA (Hons) Accounting and Finance 0414

Level 4 Diploma in Computing

ASTON UNIVERSITY PROGRAMME SPECIFICATION

Course Outline. CISSP - Certified Information Systems Security Professional

This version of the programme is no longer recruiting. Please see the specification for BSc (Hons) Software Engineering.

How to add value and increase income with Vendors resources

MSc entry onwards UCL UCL. Engineering Sciences

BSc (Hons) Computer Science - E318

Masters in Software Engineering

The Challenge of Cloud Security

BSc (Hons) Software Engineering (FT) - IC320

PROGRAMME SPECIFICATION

BTEC LEVEL 4 Higher National Certificate in Business

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

Programme name Computer Science with Cyber Security

Electronic warfare, information and cyber

AML/CTF Graduate Program

BEng (Hons) Electronic and Communication Engineering - E431 (Under Review)

BEng (Hons) Civil Engineering E410 (Under Review)

BEng (Hons) Mechanical Engineering - E440 (Under Review)

DIPLOMA COURSE IN INTERNAL AUDIT

Programme Specification

ACCA Certificate in Audit (RQF Level 4) Qualification specification

Programme Specification

E431 - BEng (Hons) Electronic and Communication Engineering

AML/CTF Graduate Program

BEng (Hons) Mechanical Engineering (Minor: Energy Systems) E443

Bachelor of Information Technology

College Of. Technological Innovation

2. SCQF level: Choose 3. SCQF credit value ECTS credit value: 10

School of Mathematics, Computer Science and Engineering Department or equivalent Department of Computer Science

Programme Specification

Syllabus for P.G. Diploma in Cyber Law and Information Technology

COURSE SPECIFICATION

PROGRAMME SPECIFICATION Final

Practitioner Certificate in Business Continuity Management (PCBCM) Course Description. 10 th December, 2015 Version 2.0

About the course.

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)

School of Engineering & Built Environment

Advent IM Ltd ISO/IEC 27001:2013 vs

Article II - Standards Section V - Continuing Education Requirements

BSc/MSci Professional Accounting in Business Programme Structure

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

Transcription:

School of Innovative Technologies & Engineering Department of Business Informatics & Software Engineering MSc Enterprise & Digital Forensics PROGRAMME DOCUMENT Version 1.0 MESDF v1.0 April 2012 University of Technology, Mauritius La Tour Koenig, Pointe aux Sables, Mauritius Tel: (230) 207 5250 Fax: (230) 234 1747 Email: site@umail.utm.ac.mu website: www.utm.ac.mu Page 1 of 8

MSc Enterprise & Digital Forensics A. Programme Information MSc in Enterprise and Digital Forensics is the fore runner to the MSc in Computer and Forensics that provides specialised study for those students with an interest in areas such as enterprise security, security management, cryptography, digital forensics, controls, cloud frameworks, law/regulations, security technologies and audit areas. Most postgraduate courses are based upon a broad range of modules. However, we recognise the desire for some students to specialise in specific areas in order to increase employment prospects in their area of interest. The MSc in Enterprise and Digital Forensics is designed for candidates wishing to gain employment in enterprise security and digital forensics related areas such as with public and private security agencies, computer companies, local police forces and other government agencies etc. B. Programme Aims This Programme will provide both theory and practice and will enable students to gain the skills to develop a management security policy for organisations, design a secure wireless or wired computer network, manage a forensic case and understand and perform detailed technical analyses of computer-based evidence as well as many other aspects of computer and data security. It will further provide extensive understanding of securitybased architectures as well as developing skill in the use of tools to test and evaluate such systems. C. Programme Objectives After successful completion of the Programme, the graduates should: display a mastery of the principal skill required for work in security & forensics dept have achieved broad understanding and knowledge, and have an interest in and appreciation of risk assessment, major security issues, policies, securing software, cloud concepts-security etc be logical and analytical, and possess skill in security, biometrics, high level forensics research and investigation become knowledgeable on core security focusing on predictions and or potential threats and analysis and core practice and actions that are required MESDF v1.0/april 2012 Page 2 of 8

PART I Regulations D. General Entry Requirements As per UTM S Admission Regulations, and Admission to Programmes of Study at Master s Degree Level E. Programme Entry Requirements At least an Honours Degree with significant Information security, Networking or IT content. For instance, BSc (Hons) Degree in Science, Engineering, or other qualifications (academic or professional) acceptable to the University of Technology, Mauritius F. Programme Mode and Duration One Semester consists of 15 weeks (excluding examination period) Full Time: Part Time: 1 Year (2 semesters) 1½ Years (3 semesters) G. Teaching and Learning Strategies Lectures, Tutorials and Practicals Class Tests and Assignments Industrial Project Workshops / Seminars / Lab Sessions Structured Discussions & Self Directed Study Case Study material & scenarios centred on real world problems H. Student Support and Guidance Academic Tutoring: 3 hours per week per module I. Attendance Requirements As per UTM s Regulations and Policy J. Credit System 1 module = 3 or 4 credits Industrial Project = 12 credits K. Student Progress and Assessment The programme is delivered mainly through lectures, tutorials, and practical laboratory sessions. Students are expected to be as autonomous and research oriented as possible and activities may include reading research papers, delivering presentations, taking part in quizzes, case-studying amongst others. Each module carries 100 marks and unless otherwise specified, will be assessed as follows: Written examination, inclusive of reading time, of duration of 2-3 hours for 3 credits modules and not less than 3 hours for 4 credits modules and continuous assessment carrying up to 40% of total marks. Continuous assessment can be based on a combination of assignments, field study, workshops and class tests. Project on an Industrial placement The students will undergo a six months project in collaboration with the industry. This project will be jointly supervised by an internal academic staff and an external representative from the industry local or overseas through UTM linkages MESDF v1.0/april 2012 Page 3 of 8

L. Evaluation and Performance The percentage mark contributes a 100 percent weighting towards the degree classification. Maximum marks attainable: 1100 Module grading structure: Grade Marks x (%) A 70 x B 60 x 70 C 50 x 60 D 40 x 50 F x 40 A-D F Pass Fail M. Award Classification Overall weighted mark x (%) Classification 70 x MSc with Distinction 60 x < 70 MSc with Merit 40 x < 60 MSc x < 40 No Award Minimum Credits Required for Award of: Master s Degree: 42 Postgraduate Diploma: 30 Postgraduate Certificate: 18 N. Programme Organisation & Management Programme Coordinators: Dr. Panchoo and Mr. J. Narsoo Contact Details: Telephone Number: (+230) 207 52 50 Email: s.panchoo@umail.utm.ac.mu, jnarsoo@umail.utm.ac.mu MESDF v1.0/april 2012 Page 4 of 8

Part II - Programme Structure O. MSc Enterprise & Digital Forensics Full Time (Version 1.0) Semester 1 Semester 2 Code Modules Hrs/Wk L + P/T SECU5111C Information Warfare & Management ISM5120C SECU5115C SECU5116C Digital Forensics & Investigation Enterprise Cloud Concepts & Frameworks Standards & Technologies Credits Code Modules Hrs/Wk Credits L + P/T SECU5114C Secure Infrastructure Design ISM5122C Information Risks & Controls SECU5117C Mobile & Wireless Network 2 + 1 3 ISM5121C Cybercrime & Law 2 + 1 3 PROJ5202C Industrial Project 12 P. MSc Enterprise & Digital Forensics Part Time (Version 1.0) Semester 1 Semester 2 Code Modules Hrs/Wk L + P / T Credits Code Modules Hrs/Wk L + P / T Credits SECU5111C Information SECU5115C Enterprise Cloud Warfare & Concepts & Frameworks Management ISM5120C Digital Forensics & Investigation SECU5114C Secure Infrastructure Design SECU5116C Standards & Technologies 2 + 1 3 ISM5122C Information Risks & Controls PROJ5202C Industrial Project Semester 3 Code Modules Hrs/Wk Credits L + P SECU5117C Mobile & Wireless Network ISM5121C Cybercrime & Law 2 + 1 3 PROJ5202C Industrial Project 12 MESDF v1.0/april 2012 Page 5 of 8

Q. MODULE OUTLINE ISMS5121C: CYBERCRIME & LAW Introduction to law Basic liability for online activities E-commerce and the law of contracts Dematerialization of documents Legal restrictions on the movement and use of cryptographic technology Digital signature and electronic signature law International e-commerce and the law Discussion: revisiting issues in a multinational context, and electronic money. Types of computer crime, history, surveys, statistics and global connections Legal Measures: Computer Misuse, Criminal Damage, Software Piracy, Forgery, Investigative Powers Network Crimes: Hacking methodologies via the Internet and attacks to other networks Investigations, Incident Handling and Forensic Examination The Future: The expansion of the Internet, pornography and other unsuitable material Identity Theft and Fraud Government control of security technology; regulation of CAs/TTPs; data privacy legislation, and taxation of e-commerce ISM5120C: DIGITAL FORENSICS & INVESTIGATION Database Forensics Network Forensics Mobile Device Forensics Computer Forensics Investigative tools Digital Evidence Forensics Process Development of Forensic tools Forensic Standards Search & Seizure Network, Cloud, e-discovery and Mobile Forensics Creating Forensic Ready Infrastructure Evidence Collection Using Network Intelligence SECU5115C: ENTERPRISE CLOUD SECURITY CONCEPTS & FRAMEWORKS Vulnerabilities & Cloud Risks Enterprise Cloud v/s open cloud Core cloud computing technologies Essential Characteristics Core-Technology Vulnerabilities Essential Cloud Characteristic Vulnerabilities Defects in Known controls vs. cloud implementations Prevalent Vulnerabilities in State of the Art cloud offerings Cloud Software Infrastructure & Environments Cloud Service Models SaaS, PaaS, IaaS Computational resources storage, communication, cloud web applications, Services & APIs Management Access Identity, Authentication, Authorisation NIST & ISO Standards Virtualisation & Cloud Threats to evolving Data Centers Cloud/Grid Computing Principles, distributed architectures Data Grid & Semantics Web MESDF v1.0/april 2012 Page 6 of 8

Cloud Grid applications Auditing Mechanisms ISM5122C: INFORMATION RISKS & CONTROLS Identify, assess and evaluate risk Enterprise risk management strategy Development and implementation of risk responses Risk factors and Events Addressing adapting to cost-effectiveness alignment to business objectives. Monitoring of risk and communicate information Managing stakeholders to ensure continued effectiveness Developing, Measuring and Monitoring of KRIs & KPIs Designing and implementation of information systems controls Governance, risk and compliance (GRC) tools Control practices related to business processes and initiatives Business process review tools and techniques Standards, frameworks Plan, supervise and conduct testing Maturity model to identify the gaps Control objectives, activities and metrics related to architecture (platforms, networks, application, databases and operating systems) SECU5111C: INFORMATION WARFARE & SECURITY MANAGEMENT IW Doctrine and the Single Integrated Picture, Information Assurance Defensive Information Operations, Offensive Information Operations Computer Network Attack, IW Support: Research & Development, Operational Planning Principles of Information and its Management Internal Control, Audit and Information & Governance ISO 27001 Information Management for Business benefits Role of Risk Analysis and Management in Effective InfoSec Building a World-class Information Architecture Management Systems, Models and Frameworks Business Continuity the Wider Context of Information SECU5117C: MOBILE & WIRELESS NETWORK SECURITY Wireless & Mobile IP Architecture, Standards, Interoperability Developments Cryptographic Tools for Wireless Network security Architectures & Protocols in Wireless LANs Architectures & Protocols in 3G Mobile Networks IP Roaming Quality of Service Broadband Wireless Access Secure M-Commerce - WPKI - RPKI SECU5114C: SECURE INFRASTUCTURE DESIGN IPv6 - Transition techniques from IPv4 to IPv6 MESDF v1.0/april 2012 Page 7 of 8

Internet security models: IPv4/IPv6 WLAN Technology and Solutions Network Infrastructure Design Network Infrastructure for Virtualization Change Management Structure for a Network Network & Routing Topology Network Devices Internet Connectivity and Perimeter Networks Routing Communications Network Performance Network Design Plan Defense-in-Depth Model End-end security PKI : WPKI,MPKI - Algorithms: DES, RSA. Encapsulation. Encryption principles SECU5116C: STANDARDS & SECURITY TECHNOLOGIES service &mechanism OSI communications architecture frameworks for key management Access control and authentication Encryption algorithms Computer and Network Architectures Platform and Operating System User Authentication Mechanisms Models and Access Control Mechanisms Malicious Code Introduction to Protocols Network Threats and Countermeasures Web Wireless (WLAN and GSM/UMTS) Authentication and key agreement Modern security evaluation criteria Common Criteria framework for security evaluation PROJ5202: INDUSTRIAL PROJECT Students will undergo a six months project in collaboration with the industry. An internal academic staff and an external representative from the industry local or overseas through UTM linkages will jointly supervise this project. The Project would include a project write up and presentation. MESDF v1.0/april 2012 Page 8 of 8