|
Final award |
Professional Doctorate |
|
Intermediate awards available |
PGDipin Information Security |
|
UCAS code |
N/A |
|
Details of professional body accreditation |
N/A |
|
Relevant QAA Benchmark statements |
|
|
Date specification last up-dated |
June 2011 |
The principal aim of the professional doctorate programme is to make a significant contribution to the advanced professional and academic development of information security, digital forensics and compliance.
-
Applicants are normally expected to hold a good Master’s degree from a British university or an equivalent qualification from another recognised institution, and to have at least three years professional experience. Applicants who do not have a Master’s degree but who have a first or upper second class honours degree, or a qualification which is regarded as equivalent, and who have exceptional professional experience may be considered. Applicants whose first language is not English need to supply evidence of proficiency in English equivalent to IELTS 6.5 or TOEFL 250/600.
The Professional Doctorate in Information Security is a flexible Full-time or part-time programme.
Part 1, leading up to the Advanced Award and taken over one year full-time and two years part time study, consists of a number of taught elements.
Part 2, leading to the Professional Doctorate in Information Security consists of supervised work towards a thesis of 40,000 words. The normal period of registration and study for Part 2 is 2 years.
Work discussion, theory, observation, policy and research methods are all taught in small seminar groups
Each module in Stage One is assessed by an assignment and Exam scheduled on the Module Specification.
In order to proceed on to Stage Two of the Programme, candidates are required to pass all modules in stage 1.
Career opportunities for experienced security professionals who have recognition beyond Masters level in the field of information security is expected to continue increasing during the foreseeable future and this programme is designed to meet the demand. The requirements of industry are varied, challenging and continually changing, with information security and corporate governance at the forefront of the knowledge explosion.
Linked to the increase in the number of M level programmes in the UK and demands from professionals for higher forms of learning and qualification, the ISD has become a popular route to a professional doctorate, not only at the national level, but internationally. It is popular in the UK as it allows participants to study while continuing in their professional careers. Internationally, the ISD is popular because of the structured nature of the programme, and the face to face input.
Throughout Part 1 and Part 2 of the programme, students have opportunities to develop and discuss their ideas and experiences in small seminar groups and individual tutorials/supervisions. All the assignments provide opportunities for making creative contributions to understanding practice based on experience. In Part 2, students research an area of professional practice relevant to their own interests leading to the writing of an original thesis
This is an extremely flexible programme that facilitates the professional and academic learning of information security students at different stages of their careers. It offers a range of post-qualifying and academic awards –including the Professional Doctorate in Information Security. This is the only professional doctorates in the UK and unique, in that it provides a practice based programme, emphasising learning from experience, leading to various intermediate qualifications and, ultimately, the professional doctorate.
The programme provides opportunities to develop specialist skills and leadership capacities. It is expected that the programme will considerably enhance the career pathways for students within Information Security.
Support is offered through the individualised learning programme, one to one relationships with tutors and supervisors and learning in a small group setting.
-
Knowledge
Thinking skills
Subject-Based Practical skills
Skills for life and work (general skills)
All programmes are credit-rated to help you to understand the amount and level of study that is needed.
One credit is equal to 10 hours of directed study time (this includes everything you do e.g. lecture, seminar and private study).
Credits are assigned to one of 5 levels:
The overall credit-rating of this programme is 180 for Masters, 60 for PGCert, 120 for PGDip.
The programme involves study in seminars for one year or two years (Part 1) full-time or part-time. In Part 2, research seminars take place once a fortnight. Additionally there are individual meetings with research supervisors and time needed for individual study and research
The teaching year is divided into two semesters of roughly equal length. A typical student registered in a full-time attendance mode will study two 30 credit modules per semester and a typical student registered in a part-time attendance mode will study one or two modules per semester
|
Application Process: Candidate applies and application is considered by two Programme Team. Interview may be required. Offer is made. |
|
|
Entry to Programme: Candidate enters programme and is immediately assigned a Personal Tutor. |
|
|
STAGE ONE |
|
|
Research Methods Modules |
|
|
GSM007 |
Understanding the research process and context |
|
GSM008 |
Research Preparation and Planning |
|
Subject Specific Modules |
|
|
IMM024 |
Information Technology and Internet Law |
|
CNM026 |
Seizure and Examination of Computer Systems |
|
Assessment for Stage One: Modules 1, 2, 3 and 4 are assessed by an assignment scheduled on the Module Specification. Details of the assessment process are provided in module handbook. |
|
|
STAGE TWO |
|
|
A 40,000 word thesis assessed by an internal and external examiner and defended at oral examination. Successful examination leads of the award of Doctor of Information Security. |
|
|
Year |
Module title |
Credit |
status |
|
1 |
Understanding the research process and context |
|
Core |
|
1 |
Research Preparation and Planning |
|
Core |
|
1 |
Information Technology and Internet Law |
|
Core |
|
1 |
Seizure and Examination of Computer Systems |
|
core |
|
|
|
|
|
|
2 and 3 |
A 40,000 word thesis assessed by an internal and external examiner and defended at oral examination. Successful examination leads of the award of Doctor of Information Security |
|
Core |
-
Where a student is eligible for an Masters award then the award classification is determined by calculating the arithmetic mean of all marks and applying the mark obtained as a percentage, with all decimals points rounded up to the nearest whole number, to the following classification
|
70% - 100% |
Distinction |
|
60% - 69% |
Merit |
|
50% - 59% |
Pass |
|
0% - 49% |
Not Passed |
Knowledge is developed through
Thinking skills are developed through
Practical skills are developed through
Skills for life and work (general skills) are developed through
Knowledge is assessed by
Thinking skills are assessed by
Practical skills are assessed by
Skills for life and work (general skills) are assessed by
Before this programme started, the following was checked:
This is done through a process of programme approval which involves consulting academic experts including some subject specialists from other institutions.
The quality of this programme is monitored each year through evaluating:
Drawing on this and other information, programme teams undertake the annual Review and Enhancement Process which is co-ordinated at School level and includes student participation. The process is monitored by the Quality and Standards Committee.
Once every six years an in-depth review of the whole field is undertaken by a panel that includes at least two external subject specialists. The panel considers documents, looks at student work, speaks to current and former students and speaks to staff before drawing its conclusions. The result is a report highlighting good practice and identifying areas where action is needed.
This programme has a programme committee comprising all relevant teaching staff, student representatives and others who make a contribution towards the effective operation of the programme (e.g. library/technician staff). The committee has responsibilities for the quality of the programme. It provides input into the operation of the Review and Enhancement Process and proposes changes to improve quality. The programme committee plays a critical role in the quality assurance procedures.
The standard of this programme is monitored by at least one external examiner. External examiners have two primary responsibilities:
External examiners fulfil these responsibilities in a variety of ways including:
The following methods for gaining student feedback are used on this programme:
Students are notified of the action taken through:
The following methods are used for gaining the views of other interested parties:
This is a unique opportunity as the Docklands campus is in the middle of the London financial community, all of whom have need qualified professionals in information security, digital forensics and compliance.
Further information about this programme is available from:
For a general description of these pages and an explanation of how they should work with screenreading equipment please follow this link: Link to general description
For further information on this web site’s accessibility features please follow this link: Link to accessibility information