Level-3 Diploma in Cyber Security Management And Operations -(LSIB-UK)Specifications

Page 19

with various information sources provided by QUALIFI to all centres. This learner-support information will be presented within clearly separated tabs, including: Unit Content: Actual learning content broken down into weekly stages with a reflective learning end-section Video-shelf: Unit content and additional information provided by the course leader via video Podcasts: Podcasts are broadcast by the GlobalCyberAcademy.com and cover the Learning Outcomes of each unit. E-library: Access to electronic books, books produced by the course team, journals, data sources and news articles, as well as a recommended book and journals list Assignment Instructions: Clear and precise instructions and contact details for compiling and submitting assignments. Support materials such as guides to report, portfolio and essay writing, as well as making presentations Discussion Board: Interactive zone for learners to network, share ideas and co-explore information sources. Case studies and reflective case-study learning will underpin all theory. The support will provide blended delivery formats: written, videoconferencing and interactive learner-tutor question and answer sessions that can either be visual (via VOIP) or written (via feedback on the two-way Student Journal). Assessment Guidance Each unit in this qualification is worth 10 credits and the qualification is designed to be flexible for learners who are already working and in demanding jobs. Every unit must be passed in order to achieve the Diploma. Learners will be able to progress sequentially through each unit, accumulating credits as they pass each unit assessment point. During each of the six (10-credit) units, every learner will have the opportunity to ‘practise’ and hone their ability to undertake the final (formal) assessment. Such non-mandatory practice will by way of completing a formative exercise/s throughout the unit. Summative Assessment: The learner should produce a cyber security plan that is based upon a formal risk-assessment. Presentation Format (PowerPoint or similar): Maximum 20 slides. Suggested Resources Computer Ethics Institute, 10 Commandments of Computer http://computerethicsinstitute.org/publications/tencommandments.html

Ethics,

accessed

at:

HR Magazine (2016), HR’s Role in Dealing with Terror Threats, http://hrmagazine.co.uk/article-details/hrs-role-in-dealing-with-terror-threats

accessed

at:

ISO (2013) ISO27001:2013 Information Security Management, International Standards Organisation (ISO) SANS 20 Critical Security Controls, can be accessed resources/posters/20-critical-security-controls/55/download

London School of International Business | www.LSIB.co.uk

at: https://www.sans.org/security-

20


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.