Introduction to C# (20 Credits)
This module will introduce you to the C# programming language and the Visual Studio Integrated Development Environment (IDE). This initial module in computer programming assumes no prior knowledge of programming. This module provides support for the Design and Implement elements of the CDIO module.
Fundamentals of Computer Systems (20 Credits)
This module will introduce you to the base concepts of the binary computer through interaction with small devices such as the Raspberry Pi and programming these to work with external hardware devices. You will examine its components, its operation and basic elements of data storage.
Introduction to Forensic Investigation (20 Credits)
This module aims to provide you with the key concepts and theories underpinning forensic investigation in preparation for later modules. The module initially critically examines Locard’s theory on transfer and Kirk’s assertions regarding uniqueness and, hence, individualisation. It then explores the application of these concepts to the chief forms of evidence sought by forensic investigators, such as fingerprints, DNA, marks and digital evidence. Given that the employment of evidence can lead to a number of conclusions which may support those engaged – ultimately – in court proceedings, you will also study the nature of science, the analysis of arguments and inductive and deductive reasoning. These themes are further developed during the remainder of the programme.
Computer Forensics and Cybersecurity (20 Credits)
In this module you will develop your knowledge and understanding of key principles and concepts underpinning computer forensics and cybersecurity. You will study both the theoretical and practical skills underpinning computer forensic and cybersecurity activities, and develop problem-solving skills based on first principles to enable you to commence your career as an effective forensic practitioner. You will also gain an understanding of the frameworks that govern how practitioners engage with a crime scene, in particular the initial assessment of the scene through to the allocation of physical, financial and human resources to ensure that the scene can be harvested for all available computer (including microprocessor) evidence and intelligence. These principles apply equally to both criminal investigations and corporate investigations, such as network breaches/hacking, that may end up in a court. Hence, the module also aims to prepare you to operate within the civil litigation arena with an awareness of legislation and best practice across multiple jurisdictions.
Forensic Practice and Law (20 credits)
This module develops the concepts studied in Introduction to Forensic Investigation by more deeply examining the multi-agency approach to criminal investigations and the unbroken chain followed by evidence from crime scene to court. In this respect the roles of key personnel, and how they understand the context of evidence and, therefore, add value to it to ensure its suitability for presentation to the courts will be studied. The key concept of cooperation through multi-agency approaches to investigation will be considered as a central theme
Ethics, Professionalism and Employability in Computing (20 Credits)
This module provides you with a good understanding of ethical, professional and employability issues that you will encounter when embarking on a career in Computing. The module will focus on the kind of roles available to computer professionals and discuss the choices required, both in general and with regard to the degree modules that might best guide you into a particular career. You will have the opportunity to research and explore the knowledge required for your chosen career and be encouraged to discuss the ethical and professional issues relating to these areas.
Digital Forensics and Ethical Hacking (20 Credits)
This module provides you with the opportunity to develop knowledge and skills in digital forensics and in ethical hacking. From a digital forensics perspective, it provides you with the knowledge to professionally, systematically and impartially approach the identification, preservation, recovery and analysis of all relevant evidence from digital devices using appropriate tools and techniques. From a computer security perspective, you will have the opportunity to develop theory and practice in ethical hacking through the examination of the principles, theories and technical skills required in ethical hacking and the design of countermeasures.
Data Recovery and Analysis (20 Credits)
The module provides you with a deeper understanding of computer architecture, operating systems and networking from a data storage perspective, and how this information relates to the recovery and analysis of such data. In addition, you will explore the underlying techniques used by data recovery tools to enable them to test and evaluate such tools in line with the requirements with industry practice linked to quality standards, such as the Forensic Regulator’s Codes of Practice and Conduct (Forensic Science Regulator, 2017). The module will equip you with the necessary skills to identify, examine and present digital evidence obtained from a computer system, using commercial, open source and free tools to carry out a digital investigation.
Mobile Database Investigation (20 Credits)
Many handheld devices store digital data in databases located within the device. In this module, you will develop your knowledge and understanding of the key principles and concepts needed to perform mobile device databases analysis and investigation. You will explore the fundamental issues involved in database application system implementation using an industry-standard database management system along with an overview of the underling theory. You will develop skills to exploit your knowledge of metadata and file systems to analyse and recover database data from popular Database Management Systems (DBMS), such as SQLite.
Research Methods (20 Credits)
On this module you will gain an understanding of the methodologies which are essential to conduct research in the area of computing. This will form an important theoretical underpinnings for the ‘Individual Study’ module in Level 6, which is itself research based. You will get to understand the elements of research process including formulating questions, understanding the theory and ethics, building evidences, assessing validity and presenting results. You will also learn analysis using a range of qualitative and quantitative data and encourage students to critically evaluate methods, strategies and data those are used in research.
Networking and Operating Systems (20 Credits)
The aim of this module is to first introduce you to basic principles of operating systems and undertake practical exercises on basic administrative tasks. You will also be introduced to the fundamental aspects of Computer Networks. Key aspects such as the design, construction and operation of Local and Wide Area Networks, and the layered protocol architecture are covered. The module aims to reinforce the taught material using physical equipment and software tools in a laboratory environment.
Computer Security (20 Credits)
This module introduces you to the concepts, practices and issues of ensuring computer systems are kept secure. You will gain a basic understanding of the security threats and mechanisms and be able to assess their impact, as well as combat and mitigate against them. You will also be taught how to use applications and tools for detection, prevention and auditing of security threats including malware, human factors and physical security.
Optional Year in Industry
The year in industry allows you to develop your knowledge and skills in a business or industrial setting. This allows you to build up the practical skills desired by employers and to demonstrate your capabilities on your CV.
Individual Study - Part A (20 Credits)
The Individual Study is your opportunity to demonstrate your capabilities and what you have learned over your time at University and is worth a third of your final year credits. You will perform a research task that will usually involve literature and practical work. You will write a dissertation to describe your work and create a poster to present the work to a broad range of people.
Advanced Networking (20 Credits)
Building on the level 5 module Networking and Operating Systems, this module aims to prepare you to meet the challenges in a constantly advancing industry and equip you with advanced knowledge and understanding of recent advancements in communications and networking technologies. The module further aims to develop your ability to analyse and evaluate network related problems and draw on the theoretical and practical knowledge to tackle operational, management and regulatory issues.
Cybersecurity (20 Credits)
In this module you will learn to how to perform a risk assessment of a variety of assets linked to an organisation, such as information, computers, networks, delivery and supply chains, people and buildings. You will then develop skills to protect information systems (hardware, software and associated infrastructure), the data on them, and the services they provide, from unauthorised access, harm or misuse.
Individual Study - Part B (20 Credits)
You will continue your work on your Individual Study that you started in the first Semester.
Current Issues in Computing (20 credits)
This module examines a range of current issues within the field of computing and places them with a broader academic context providing a multi-disciplinary perspective to an otherwise specialised field of study. No prior knowledge of disciplines outside the field of computing is required, but a good understanding of computer related subjects is assumed.
Expert and Professional Witnesses (20 Credits)
This module will familiarise you with the legal system for England and Wales in order to develop your knowledge of the law, structure and processes related to operating as an expert witness. You will then go on to explore the roles, responsibilities and scope of lay witnesses, professional witnesses and expert witnesses in forensic investigations and the methods and models that the expert uses to interpret the value of forensic evidence. Towards the end of the module you will have an opportunity to participate in a moot court exercise to build your confidence and practical experience. To support this activity, you will given extensive training in communication and transaction theories. Case examples are used to demonstrate key theories where appropriate.