Last modified: 31 Jul 2023 11:19
A major contributing factor to cyber risk is the lack of well-designed cybersecurity architecture that protects against ever-evolving cyber-attacks. A well-designed architecture provides a streamlined workflow for security and non-security practitioners, along with increasing the robustness of an organisation’s cybersecurity. In this course you will gain the advance knowledge to develop, design and analyse security solution architectures to meet your organisation's cybersecurity objectives.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | First Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
Cybersecurity of an organisation depends upon a set of policies, procedures and tools that interact with each other to protect the organisational assets. To ensure robust security against potential APTs (Advanced Persistent Threat) and/or Zero-Day attacks. The cybersecurity infrastructure requires an optimised design and deployment (aka security architecture).
In this course, you will gain vendor-neutral skills that you can apply to different technologies and methodologies. The focus on the course is on six fundamental aspects of the security architecture that include: i) governance, compliance and risk management, ii) application security, iii) identity and access management, iv) infrastructure security, v) security architecture modelling and vi) security operations architecture.
Information on contact teaching time is available from the course guide.
5x MCQ Class Tests (15% each) (75% in total)
Essay (25%) 2,000 words
Resit Assessment
Resubmission of failed elements (pass marks carried forward).
There are no assessments for this course.
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Create | Able to define the application security architecture. |
Procedural | Apply | Gain the knowledge about risk management architecture and how organisations utilised it to make sure they manage/accept their risk profile. |
Conceptual | Analyse | Understand the challenges associated with the security operations, how to systemise them as a well-defined system/architecture. |
Conceptual | Analyse | Explore different infrastructure security architectures, their pros and cons and how they can benefit an overall enterprise security posture. |
Conceptual | Evaluate | Gain the understanding of security architecture modelling and able to evaluate a security architecture overall robustness. |
Factual | Analyse | Gain knowledge about identity and access management (IAM) architecture paradigms and how these can be adopted by different organisations. |
Reflection | Analyse | Appreciate how security compliance architecture can be designed effectively. |
Procedural | Understand | Understand the basic principles and their applications of security governance architecture. |
Conceptual | Understand | Understand the basic concept of security architecture. |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.