Cyber Security Fundamentals
University of Glasgow
Area of Study
Taught In English
Course Level Recommendations
ISA offers course level recommendations in an effort to facilitate the determination of course levels by credential evaluators.We advice each institution to have their own credentials evaluator make the final decision regrading course levels.
Recommended U.S. Semester Credits2.5 - 3
Recommended U.S. Quarter Units4 - 5
Hours & Credits
OverviewShort DescriptionThis course provides an introduction to the foundational aspects of computer security, such as algorithms and protocols. It also covers ways in which these systems can be attacked and techniques for thwarting these attacks.TimetableThree hours per weekRequirements of EntryNoneExcluded CoursesCyber Security Fundamentals (M)Co-requisitesNoneAssessmentExamination (80%); Set Exercise: (20%)Main Assessment In: April/MayAre reassessment opportunities available for all summative assessments? NoReassessments are normally available for all courses, except those which contribute to the Honours classification. For non Honours courses, students are offered reassessment in all or any of the components of assessment if the satisfactory (threshold) grade for the overall course is not achieved at the first attempt. This is normally grade D3 for undergraduate students and grade C3 for postgraduate students. Exceptionally it may not be possible to offer reassessment of some coursework items, in which case the mark achieved at the first attempt will be counted towards the final course grade. Any such exceptions for this course are described below.RESIT EXAMINATIONS ARE NOT ALLOWED FOR HONOURS STUDENTSRESIT EXAMINATIONS ARE ALLOWED FOR MASTERS STUDENTSThe coursework cannot be redone because the nature of the coursework is such that it takes a significant number of days to produce it and this effort is infeasible for supporting the re-doing of such coursework over the summer.Course AimsThe aim of this course is to provide participants with the opportunity to develop a security mind-set by introducing students to introductory core material in the area of computer security.Intended Learning Outcomes of CourseBy the end of this course students should be able to:1. Explain the algorithms behind a number of different cryptographic and communication solutions;2. Explain a number of different security protocols;3. Evaluate an existing or proposed system in terms of potential vulnerabilities and recommend the most appropriate security solution to apply in a number of different scenarios;4. Summarise the key vulnerabilities, threats, and attacks with regards to network security and explain approaches to mitigate these issues.5. Produce a program which implements an aspect of computer security.Minimum Requirement for Award of CreditsStudents must submit at least 75% by weight of the components (including examinations) of the course's summative assessment.
Courses and course hours of instruction are subject to change.
Credits earned vary according to the policies of the students' home institutions. According to ISA policy and possible visa requirements, students must maintain full-time enrollment status, as determined by their home institutions, for the duration of the program.
ECTS (European Credit Transfer and Accumulation System) credits are converted to semester credits/quarter units differently among U.S. universities. Students should confirm the conversion scale used at their home university when determining credit transfer.
Please note that some courses with locals have recommended prerequisite courses. It is the student's responsibility to consult any recommended prerequisites prior to enrolling in their course.