Cyber Security Fundamentals

University of Glasgow

Course Description

  • Course Name

    Cyber Security Fundamentals

  • Host University

    University of Glasgow

  • Location

    Glasgow, Scotland

  • Area of Study

    Computer Science

  • Language Level

    Taught In English

  • Course Level Recommendations


    ISA offers course level recommendations in an effort to facilitate the determination of course levels by credential evaluators.We advice each institution to have their own credentials evaluator make the final decision regrading course levels.

    Hours & Credits

  • Scotcat Credits

  • Recommended U.S. Semester Credits
    2.5 - 3
  • Recommended U.S. Quarter Units
    4 - 5
  • Overview

    Short Description
    This course provides an introduction to the foundational aspects of computer security, such as algorithms and protocols. It also covers ways in which these systems can be attacked and techniques for thwarting these attacks.
    Three hours per week
    Requirements of Entry
    Excluded Courses
    Cyber Security Fundamentals (M)
    Examination (80%); Set Exercise: (20%)
    Main Assessment In: April/May
    Are reassessment opportunities available for all summative assessments? No
    Reassessments are normally available for all courses, except those which contribute to the Honours classification. For non Honours courses, students are offered reassessment in all or any of the components of assessment if the satisfactory (threshold) grade for the overall course is not achieved at the first attempt. This is normally grade D3 for undergraduate students and grade C3 for postgraduate students. Exceptionally it may not be possible to offer reassessment of some coursework items, in which case the mark achieved at the first attempt will be counted towards the final course grade. Any such exceptions for this course are described below. 
    The coursework cannot be redone because the nature of the coursework is such that it takes a significant number of days to produce it and this effort is infeasible for supporting the re-doing of such coursework over the summer.
    Course Aims
    The aim of this course is to provide participants with the opportunity to develop a security mind-set by introducing students to introductory core material in the area of computer security.
    Intended Learning Outcomes of Course
    By the end of this course students should be able to:
    1. Explain the algorithms behind a number of different cryptographic and communication solutions;
    2. Explain a number of different security protocols;
    3. Evaluate an existing or proposed system in terms of potential vulnerabilities and recommend the most appropriate security solution to apply in a  number of different scenarios;
    4. Summarise the key vulnerabilities, threats, and attacks with regards to network security and explain approaches to mitigate these issues.
    5. Produce a program which implements an aspect of computer security.
    Minimum Requirement for Award of Credits
    Students must submit at least 75% by weight of the components (including examinations) of the course's summative assessment.

Course Disclaimer

Courses and course hours of instruction are subject to change.

Credits earned vary according to the policies of the students' home institutions. According to ISA policy and possible visa requirements, students must maintain full-time enrollment status, as determined by their home institutions, for the duration of the program.

ECTS (European Credit Transfer and Accumulation System) credits are converted to semester credits/quarter units differently among U.S. universities. Students should confirm the conversion scale used at their home university when determining credit transfer.

Please note that some courses with locals have recommended prerequisite courses. It is the student's responsibility to consult any recommended prerequisites prior to enrolling in their course.


This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies.

Read our Privacy Policy to learn more.