Last modified: 23 Aug 2024 15:16
A major contributing factor to cyber risk is the lack of well-designed cybersecurity architecture that protects against ever-evolving cyber-attacks. A well-designed architecture provides a streamlined workflow for security and non-security practitioners, along with increasing the robustness of an organisation’s cybersecurity. In this course you will gain the advance knowledge to develop, design and analyse security solution architectures to meet your organisation's cybersecurity objectives.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | First Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
Cybersecurity of an organisation depends upon a set of policies, procedures and tools that interact with each other to protect the organisational assets. To ensure robust security against potential APTs (Advanced Persistent Threat) and/or Zero-Day attacks. The cybersecurity infrastructure requires an optimised design and deployment (aka security architecture).
In this course, you will gain vendor-neutral skills that you can apply to different technologies and methodologies. The focus on the course is on six fundamental aspects of the security architecture that include: i) governance, compliance and risk management, ii) application security, iii) identity and access management, iv) infrastructure security, v) security architecture modelling and vi) security operations architecture.
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Based on lecture 9 and 10. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Analyse | Understand the challenges associated with the security operations, how to systemise them as a well-defined system/architecture. |
Conceptual | Evaluate | Gain the understanding of security architecture modelling and able to evaluate a security architecture overall robustness. |
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Based on lecture 1 and 2. Online feedback. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Understand | Understand the basic concept of security architecture. |
Procedural | Understand | Understand the basic principles and their applications of security governance architecture. |
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Based on lecture 5 and 6. Online feedback provided. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Create | Able to define the application security architecture. |
Procedural | Apply | Gain the knowledge about risk management architecture and how organisations utilised it to make sure they manage/accept their risk profile. |
Assessment Type | Summative | Weighting | 25 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Online feedback provided. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Analyse | Understand the challenges associated with the security operations, how to systemise them as a well-defined system/architecture. |
Conceptual | Analyse | Explore different infrastructure security architectures, their pros and cons and how they can benefit an overall enterprise security posture. |
Conceptual | Create | Able to define the application security architecture. |
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Based on lecture 3 and 4. Online feedback provided. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Apply | Gain the knowledge about risk management architecture and how organisations utilised it to make sure they manage/accept their risk profile. |
Procedural | Understand | Understand the basic principles and their applications of security governance architecture. |
Reflection | Analyse | Appreciate how security compliance architecture can be designed effectively. |
Assessment Type | Summative | Weighting | 15 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Based on lecture 7 and 8. Online feedback provided. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Analyse | Explore different infrastructure security architectures, their pros and cons and how they can benefit an overall enterprise security posture. |
Factual | Analyse | Gain knowledge about identity and access management (IAM) architecture paradigms and how these can be adopted by different organisations. |
There are no assessments for this course.
Assessment Type | Summative | Weighting | 100 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Understand | Understand the basic concept of security architecture. |
Conceptual | Analyse | Understand the challenges associated with the security operations, how to systemise them as a well-defined system/architecture. |
Reflection | Analyse | Appreciate how security compliance architecture can be designed effectively. |
Conceptual | Evaluate | Gain the understanding of security architecture modelling and able to evaluate a security architecture overall robustness. |
Procedural | Apply | Gain the knowledge about risk management architecture and how organisations utilised it to make sure they manage/accept their risk profile. |
Conceptual | Analyse | Explore different infrastructure security architectures, their pros and cons and how they can benefit an overall enterprise security posture. |
Conceptual | Create | Able to define the application security architecture. |
Factual | Analyse | Gain knowledge about identity and access management (IAM) architecture paradigms and how these can be adopted by different organisations. |
Procedural | Understand | Understand the basic principles and their applications of security governance architecture. |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.