production
Skip to Content

CS502C: ENTERPRISE SECURITY ARCHITECTURE (2023-2024)

Last modified: 23 Jul 2024 10:43


Course Overview

A major contributing factor to cyber risk is the lack of well-designed cybersecurity architecture that protects against ever-evolving cyber-attacksA well-designed architecture provides a streamlined workflow for security and non-security practitioners, along with increasing the robustness of an organisation’s cybersecurityIn this course you will gain the advance knowledge to develop, design and analyse security solution architectures to meet your organisation's cybersecurity objectives.   

Course Details

Study Type Postgraduate Level 5
Term First Term Credit Points 15 credits (7.5 ECTS credits)
Campus Aberdeen Sustained Study No
Co-ordinators
  • Dr Raja Akram

What courses & programmes must have been taken before this course?

  • Either Master Of Science In Cybersecurity or Master of Engineering in Computing Science
  • Either Any Postgraduate Programme or Programme Level 5

What other courses must be taken with this course?

None.

What courses cannot be taken with this course?

  • CS50CC Enterprise Security Architecture (Studied)
  • CS552C Enterprise Security Architecture (Studied)

Are there a limited number of places available?

No

Course Description

Cybersecurity of an organisation depends upon a set of policies, procedures and tools that interact with each other to protect the organisational assets. To ensure robust security against potential APTs (Advanced Persistent Threat) and/or Zero-Day attacks. The cybersecurity infrastructure requires an optimised design and deployment (aka security architecture).  

In this course, you will gain vendor-neutral skills that you can apply to different technologies and methodologies. The focus on the course is on six fundamental aspects of the security architecture that include: i) governance, compliance and risk management, ii) application security, iii)  identity and access management, iv) infrastructure security, v) security architecture modelling and vi) security operations architecture. 


Contact Teaching Time

Information on contact teaching time is available from the course guide.

Teaching Breakdown

More Information about Week Numbers


Details, including assessments, may be subject to change until 30 August 2024 for 1st term courses and 20 December 2024 for 2nd term courses.

Summative Assessments

Class Test - Multiple Choice Questions

Assessment Type Summative Weighting 15
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Based on lecture 1 and 2. Online feedback.

Learning Outcomes
Knowledge LevelThinking SkillOutcome
ConceptualUnderstandUnderstand the basic concept of security architecture.
ProceduralUnderstandUnderstand the basic principles and their applications of security governance architecture.

Class Test - Multiple Choice Questions

Assessment Type Summative Weighting 15
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Based on lecture 5 and 6. Online feedback provided. 

Learning Outcomes
Knowledge LevelThinking SkillOutcome
ConceptualCreateAble to define the application security architecture.
ProceduralApplyGain the knowledge about risk management architecture and how organisations utilised it to make sure they manage/accept their risk profile.

Class Test - Multiple Choice Questions

Assessment Type Summative Weighting 15
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Based on lecture 3 and 4. Online feedback provided.

Learning Outcomes
Knowledge LevelThinking SkillOutcome
ProceduralApplyGain the knowledge about risk management architecture and how organisations utilised it to make sure they manage/accept their risk profile.
ProceduralUnderstandUnderstand the basic principles and their applications of security governance architecture.
ReflectionAnalyseAppreciate how security compliance architecture can be designed effectively.

Class Test - Multiple Choice Questions

Assessment Type Summative Weighting 15
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Based on lecture 9 and 10.

Learning Outcomes
Knowledge LevelThinking SkillOutcome
ConceptualAnalyseUnderstand the challenges associated with the security operations, how to systemise them as a well-defined system/architecture.
ConceptualEvaluateGain the understanding of security architecture modelling and able to evaluate a security architecture overall robustness.

Class Test - Multiple Choice Questions

Assessment Type Summative Weighting 15
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Based on lecture 7 and 8. Online feedback provided.

Learning Outcomes
Knowledge LevelThinking SkillOutcome
ConceptualAnalyseExplore different infrastructure security architectures, their pros and cons and how they can benefit an overall enterprise security posture.
FactualAnalyseGain knowledge about identity and access management (IAM) architecture paradigms and how these can be adopted by different organisations.

Essay

Assessment Type Summative Weighting 25
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback

Online feedback provided.

Word Count 2000
Learning Outcomes
Knowledge LevelThinking SkillOutcome
ConceptualAnalyseExplore different infrastructure security architectures, their pros and cons and how they can benefit an overall enterprise security posture.
ConceptualAnalyseUnderstand the challenges associated with the security operations, how to systemise them as a well-defined system/architecture.
ConceptualCreateAble to define the application security architecture.

Formative Assessment

There are no assessments for this course.

Resit Assessments

Resubmission of failed elements (pass marks carried forward)

Assessment Type Summative Weighting 100
Assessment Weeks Feedback Weeks

Look up Week Numbers

Feedback
Learning Outcomes
Knowledge LevelThinking SkillOutcome
Sorry, we don't have this information available just now. Please check the course guide on MyAberdeen or with the Course Coordinator

Course Learning Outcomes

Knowledge LevelThinking SkillOutcome
ConceptualCreateAble to define the application security architecture.
ConceptualAnalyseExplore different infrastructure security architectures, their pros and cons and how they can benefit an overall enterprise security posture.
FactualAnalyseGain knowledge about identity and access management (IAM) architecture paradigms and how these can be adopted by different organisations.
ConceptualEvaluateGain the understanding of security architecture modelling and able to evaluate a security architecture overall robustness.
ReflectionAnalyseAppreciate how security compliance architecture can be designed effectively.
ProceduralApplyGain the knowledge about risk management architecture and how organisations utilised it to make sure they manage/accept their risk profile.
ConceptualAnalyseUnderstand the challenges associated with the security operations, how to systemise them as a well-defined system/architecture.
ConceptualUnderstandUnderstand the basic concept of security architecture.
ProceduralUnderstandUnderstand the basic principles and their applications of security governance architecture.

Compatibility Mode

We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.