In your first year you'll study with our partner, ARU College. This module will provide you with the necessary skills to begin studying at level 4 in engineering, computer science and related courses. You will be introduced to the core skills necessary to succeed in higher education, including thinking critically, researching and referencing appropriately, demonstrating appropriate numeracy and ICT skills, and communicating effectively verbally and in writing. In addition to these fundamental skills, you'll cover the subjects underpinning the technological disciplines. Fundamental mathematical skills will be covered, alongside pre-calculus, followed by an introduction to calculus and vector and matrix arithmetic. You will also be introduced to classical mechanics, and its application to real-world scenarios. You will be introduced to the fundamentals of computer science, learning about the principles behind programming and applying them through a series of practical coding exercises. You'll undertake a multi-disciplinary group project as you learn about the collaborative nature of engineering, and design from a broader perspective of business. The module is made up of the following eight constituent elements: Interactive Learning Skills and Communication (ILSC); Information Communication Technology (ICT); Critical Thinking; Maths for Scientists; Maths for Engineers; Physics for Engineers; Fundamentals of Computing; Engineering Design.
The ability to automate network and server administration is a key skill for any networking or cyber security specialist. The development of large scale networks within multinational organisations running on multiple servers means that configuring and analysing network systems or servers individually is insufficient to meet the needs of these organisations. Implementation and maintenance of server environments commonly used for web and database hosting are an associated skill that is frequently required by network and sysadmin employers. You will be introduced to a programming language suitable for both network and server administration. You will be guided through the development of server systems suitable for use in commercial environments. You will also consider the needs of a typical organisation from both the networking and cyber security standpoints to develop solutions suitable for use in a business environment. The foundation knowledge and understanding you develop during this module will form the structure on which you can build the sophisticated synthesis techniques required in the second and third year of your studies.
View the full module definitionIn your studies we will introduce you to the fundamental concepts required to understand, design, implement and test high-level programming languages. You will be introduced to a design methodology to help develop linear and hierarchical trains of thought from idea conception through design and implementation to testing. Using a simple interactive programming environment, you will discover how to create and use a wide variety of different basic and complex data structures. By the end of the module, you will be able to: Analyse a simple set of requirements; design appropriate data structures; select appropriate language syntax to manipulate program data; understand and use syntax for the implementation of conditional logic and repetition; be able to create simple scripts to perform a number of operations in turn to achieve a desired effect; demonstrate familiarity with the taxonomy of programming languages and the software development life-cycle and gain sufficient experience of a range of algorithm design techniques, such that, given a simple problem description, appropriate variables you can identify decisions and repetitive actions and translate them into appropriate code constructs.
View the full module definitionThis module provides an introduction to the main principles of security for IT and networked systems. Key areas of security are introduced, beginning with underlying concepts and threats, and then proceeding to address specific issues and technologies relating to host systems and networked environments. Issues relating to security design are also highlighted. The module aims to familiarise students with the fundamentals of information security technologies and to develop an understanding of the various security threats and vulnerabilities. Consideration is given to core security pertaining to host systems and network environments. The Cyber Crime Fundamentals module is delivered as a mixture of theory, through a series of lectures, and practical implementation, through a series of guided laboratory exercises.
View the full module definitionAs a student embarking on a degree in computer science or a closely related discipline, this module will equip you with the core mathematical skills needed to succeed. This module also contributes to the professional body accreditation of your programme of study, reflecting the criticality of mathematics/statistics skills in professional computing roles and in computer science research. During much of the module, you will be studying topics in discrete mathematics, such as set theory and logic, Boolean algebra, functions, matrices, sequences/series and product/summation notations. Further topics include probability and statistics, which are useful in understanding the behaviour of non-deterministic algorithms, data visualisation, and in the design and implementation of computer science research projects. The topics you will study will be directly related to computing principles. For example the use of set theory for: the representation of computational structures such as lists, trees and graphs; computations on discrete collections of data (such as in databases); the relationship between number classes and data types and in evaluating computability; and parallels between set theoretic operations and programming logic. The relationship between Boolean algebra and logic operators used in computer programming will be discussed, along with topics like the evaluation and simplification of Boolean expressions. Topics such as sequences and series will be related to elementary algorithm complexity (e.g., linear, logarithmic, and exponential functions), and mathematical functions (injective, surjective, bijective) will be related to program functions, with common functions found in nearly all non-trivial computer programs (such as modulus, floor/ceiling, and numerical operations such as gcd and lcm) being introduced and demonstrated in context. Permutations and combinations will be related to computer security, and the notion of intractable computational problems. Matrices will be in discussed in terms of their ability to represent computational structures such as images, graphs, and computer networks. Core descriptive and inferential statistics used for data visualisation and hypothesis testing (including histograms, distribution types, measures of central tendency and dispersion, and basic inferential statistics such as t-tests and linear correlation) will be examined. Mathematics and statistics skills are regarded as a core competency in computing professionals, and graduates with these skills are highly valued by employers in all job roles in computing and more widely.
View the full module definitionThis module sets the computer networks foundations needed for those pursuing a career in cyber security, forensics and computer networks. This module prepares you by introducing you to how networks operate, covering architectures, models, protocols and networking elements needed to support the operations of small, medium and large companies. You will have the opportunity to develop your understanding of the OSI and TCP/IP layered models as well as the details and purpose of each of their layers. Laboratory sessions will give you hands-on experience in constructing and configuring network devices. You will use the Cisco CCNA Introduction to Networks course as well as CompTIA’s Network+. This module will lay the foundation for, and prepare you for, the cyber security, computer networking and forensics sector to name a few.
View the full module definitionComputer networks have become an important element for every organisation and individual, which means that an in-depth understanding on computer networks foundations are important to guarantee their correct functionality. You will be introduced to key concepts and protocols of network routing and switching. We will cover basic routing and switching concepts, including static and default routing, Virtual Local Area Networks (VLANs), and inter- VLAN routing. Dynamic protocols will be discussed and explored and topics such as DHCP and First Hop Routing concepts will also be covered. You will be faced with a mixture of theory, delivered through a series of lectures, and practical implementation, delivered through a series of guided laboratory exercises. In the lab sessions you will gain deep understanding on the routing and switching concepts with an emphasis on hands-on-skills using hardware equipment in the laboratory and advanced network simulation tools that comply with industry standards. The knowledge and understanding obtained here will prepare you to support any company’s network so they can keep the pace with the changing needs of organisations and support them in their daily business. The module is based on the second module of the Cisco Certified Network Associate (CCNA) study material. The CCNA is a worldwide industry-recognised certification that equips you with the information and expertise to master in networking and will allow you to excel in roles such as Network or Network Support Engineer, Network Operations Engineer, Network Administrator and others.
View the full module definitionThe field of digital forensics is a critical component in the majority of modern policing incidents and investigations. In your studies you'll be introduced to the key aspects of digital investigative strategy, including identification, the powers necessary for lawful seizure, safe handling, policy and legislation, and methods of examination of digital evidence. You'll also explore how digital evidence is reported within the criminal justice system. Material will be delivered in a combination of lectures and practical formats to secure the knowledge-base, where you'll be exposed to various scientific methods and standards to support and develop your learning of the specialism. You'll also learn of the types of jobs digital forensics knowledge could lead to in your future career, from public services/corporate to analyst/consultant and eDiscovery manager.
View the full module definitionRuskin Modules are designed to prepare our students for a complex, challenging and changing future. These interdisciplinary modules provide the opportunity to further broaden your perspectives, develop your intellectual flexibility and creativity. You will work with others from different disciplines to enable you to reflect critically on the limitations of a single discipline to solve wider societal concerns. You will be supported to create meaningful connections across disciplines to apply new knowledge to tackle complex problems and key challenges. Ruskin Modules are designed to grow your confidence, seek and maximise opportunities to realise your potential to give you a distinctive edge and enhance your success in the workplace.
You'll be exposed to the inner workings of cloud and IoT technologies. These technologies help you understand how devices interconnect with each other, how their security works and what data is being stored in them. You'll be able to extract data from devices in the cloud (servers, routers, cloud storage) and IoT devices locally (such as sensors, smart speakers etc.) You'll also configure cloud and server technologies to understand their pros/cons and use cases in test and production environments. This could take the form of virtualisation using virtual machines or containers.
View the full module definitionKnowledge of Digital Security is a core skill you require for any cybersecurity role and provides a springboard to intermediatelevel cybersecurity jobs. Your studies will comprise of real-world best practices in cybersecurity to ensure you have practical security problem-solving skills and learn how to address security incidents, not just identify them. You will also gain the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations; in summary all the essential skills you need to get employed in the cyber security domain. Your study will also focus on today’s best practices for risk management and risk mitigation, including more emphasis on the practical and hands-on ability to both identify and address security threats, attacks, and vulnerabilities. The skills you'll gain will give you a baseline for nearly all cyber security jobs.
View the full module definitionThis module builds upon the previous Principles of Digital Forensics module, in which you will learn about filesystems, evidence gathering and processing. This module combines file systems (NTFS, FAT), OS forensics (Windows) and Opensource intelligence (OSINT) to give a complete picture of a suspect's interactions. This information is presented in our Mock courtroom to give you first-hand experience in providing expert witness testimony under cross-examination.
View the full module definitionThis module will prepare you for the role of a digital forensics investigator where you will learn about the core concepts of a forensic investigation such as the professional guidelines, the chain of custody, evidence handling and the production of expert technical reports. In addition, the module covers the foundations of scientific evidence collection and the preservation of historical artefacts found in an operating system (such as those that might be found in Windows 10 and the NTFS file system). These artefacts might include 'shell bags', 'MTF records' or 'prefetch' files. The classes will also consider that these artefacts and techniques may not necessarily point to the accused person. For example, the forensic investigators will need to determine if malware was in play and if so, what it did and how it did it through process tree examination and reverse analysis of the malware. Students will use professional and open source software to complete their work and produce court-ready documents.
View the full module definitionStudying this module will give you a rounded introduction to the principles of ethical hacking from both a theoretical and technical perspective. As part of your studies you will be given a contextual setting for ethical hacking by an examination of the issues associated with systems security, cybercrime and the criminal justice system i.e. Computer Misuse Act. Within a mixture of lectures, demonstrations and practical sessions you will be introduced to the basic principles of ethical hacking and the role ethical hacking plays in providing more secure and robust information to support computer systems and networks (including wireless networks). This module will involve being exposed to, and using, the basic tools and techniques of ethical hacking, particularly in regard to penetration testing and systems security within a safe and sandboxed environment. You will be provided with opportunities to develop academic skills in report writing and evidence-based demonstrations. By research and application you will develop the skills to manage the particular legal, ethical and professional challenges facing the Information Security practitioner, with particular reference to the criminal justice system in England and Wales and the Computer Misuse Act.
View the full module definitionOne of the largest growing, in-demand areas in the security industry is DevSecOps (Developer SecurityOperations). The role features the use of the SDLC (Software Development Life Cycle) and applying security to it, for both new and legacy web applications. While studying this module you will gain the knowledge and transferable skills, to learn hands-on web application security development, secure coding techniques, vulnerability assessment and testing. You will be introduced to concepts such as buffer overflow exploits, cross-site scripting, data leakage and web services vulnerabilities. The need for good security management is also emphasised by the design and implementation of custom security policies.
View the full module definitionYou will engage in a substantial piece of individual research and/or product development work, focused on a topic relevant to your specific discipline. The topic may be drawn from a variety of sources including: Anglia Ruskin research groups, previous/current work experience, the company in which you are currently employed, an Anglia Ruskin lecturer suggested topic or a professional subject of their specific interest (if suitable supervision is available).
View the full module definitionMobile forensics is the scientific process of preserving, extracting and interpreting data from mobile devices (such as phones and tablets). The Mobile Forensics module will dive into the filesystem and metadata from mobile devices, focusing on Android (the world's most popular operating system). This module will go through how to best preserve data from a mobile device and the different types of extraction (physical, logical, filesystem). This extracted data will be analysed to explain what the user of this phone was doing at a given time, where they were and how this could evidentially be relevant in an investigation.
View the full module definitionSecurity Management, Operations and Analytics imparts an understanding of the underlying principles associated with security management. You'll develop an understanding of security threats and vulnerabilities within modern organisational environments, and gain an understanding of the underlying principles of risk analysis and contingency planning as applied to business systems. Consideration is also given to the need for legislative compliance. This module also focuses on the current perspective of cybersecurity analytics contrasted with the emerging trends over threat hunting and threat intelligence. The limitations of an organisations current tools used in cybersecurity will be examined especially the role and the use of SIEM in an organisations operational security management. This contributes to help you understand how organisations can better understand their cyber risks environment. The Security Management and Governance module is delivered as a mixture of theory, through a series of lectures, and practical implementation, through a series of guided laboratory exercises.
View the full module definition