inline-defaultCreated with Sketch.

This website uses cookies to ensure you get the best experience on our website.

Students
Tuition Fee
GBP 750
Per course
Start Date
Medium of studying
Fully Online
Duration
2 months
Program Facts
Program Details
Degree
Courses
Major
Cybersecurity | Software Development | Network Security
Area of study
Information and Communication Technologies
Education type
Fully Online
Timing
Part time
Course Language
English
Tuition Fee
Average International Tuition Fee
GBP 750
Intakes
Program start dateApplication deadline
2023-09-012023-07-09
2024-01-012023-11-26
2024-05-01-
About Program

Program Overview


The Mobile Systems and Cyber Security program from Teesside University is a 12-week online certificate that provides a comprehensive understanding of mobile systems and cyber security concepts. Through hands-on activities and case studies, students develop critical thinking and research skills to analyze security issues and evaluate protective strategies. The program prepares graduates for successful careers in the cyber security domain, with potential roles including IT security analyst, manager, and architect.

Program Outline


Degree Overview:


Mobile Systems and Cyber Security (Online)

is a 12-week, 100% online University Certificate in Postgraduate Professional Development (UCPPD) offered by Teesside University.


Overview:

The program delves into the concepts and technologies underpinning modern mobile devices, including hardware, networking, and security aspects.


Objectives:

  • Equip students with a comprehensive understanding of mobile systems and cyber security.
  • Develop critical thinking and research skills to analyze security issues and evaluate protective strategies.
  • Enhance expertise in maximizing bandwidth efficiency for mobile device communication.
  • Prepare graduates for successful careers in the cyber security domain.

Description:

The program examines various facets of mobile systems and cyber security, including:

  • Networks and protocol stacks: Covers fundamental concepts of network operations and communication protocols.
  • IEEE 802.11 standard overview: Explores the 802.11 family of wireless networking standards, including security aspects.
  • IEEE 802.11e, physical layer security and jamming: Addresses security vulnerabilities and countermeasures at the physical layer of wireless communication.
  • Wireless sensor networks and wireless embedded systems: Examines the principles and applications of wireless sensor networks and embedded systems.
  • Multiple access schemes on wireless networks: Delves into various techniques for sharing wireless channels among multiple devices.
  • IEEE 802.11 passive and active scanning: Explains different scanning methods used in wireless networks.
  • Cellular network and mobile IP: Covers the fundamentals of cellular networks and mobile IP technology for seamless connectivity.
  • Wireless sensor networks architecture: Explores the architectural components and principles of wireless sensor networks.
  • Wireless sensor network routing and MAC protocols: Investigates routing protocols and media access control protocols designed for wireless sensor networks.
  • Security basics: Bash scripting: Introduces basic security concepts and scripting skills using Bash.
  • Wireless network security: Bash and networks: Applies Bash scripting skills to enhance wireless network security.
  • Bluetooth security: own cloud and Wireshark: Examines Bluetooth security vulnerabilities and explores network analysis tools like Wireshark.
  • Zigbee: Nmap and Metasploit: Investigates Zigbee security and utilizes Nmap and Metasploit tools for vulnerability assessment and exploitation.
  • Future developments: Discusses emerging trends and future directions in mobile systems and cyber security.

Outline:


What you study:

  • Networks and protocol stacks
  • IEEE 802.11 standard overview
  • IEEE 802.11e, physical layer security and jamming
  • Wireless sensor networks and wireless embedded systems
  • Multiple access schemes on wireless networks
  • IEEE 802.11 passive and active scanning
  • Cellular network and mobile IP
  • Wireless sensor networks architecture
  • Wireless sensor network routing and MAC protocols
  • Security basics: Bash scripting
  • Wireless network security: Bash and networks
  • Bluetooth security: own cloud and Wireshark
  • Zigbee: Nmap and Metasploit
  • Future developments

How you learn:

  • Purpose-built online learning environment.
  • Access to a wealth of learning materials.
  • Expert staff support from specialists in the field.
  • Collaborative learning to develop technical skills and knowledge.
  • Content delivered in bite-size blocks using various tools:
  • Recorded lectures
  • Video materials with associated activities
  • Readings and interactive exercises
  • Podcast/vodcast discussions and demonstrations
  • Discussion forums
  • Online case study analysis
  • Recordings of practical activities
  • Virtual classroom activities
  • Online supervision

How you are assessed:

  • Design a secure wireless network for a given case study.
  • Produce a research report on the designed network.

Assessment:


Assessment Methods:

  • Research report on a designed secure wireless network.

Assessment Criteria:

  • Demonstration of technical understanding and ability to apply relevant concepts.
  • Critical analysis of security issues and proposed solutions.
  • Effective communication of results and findings through a well-written report.

Teaching:


Teaching Methods:

  • Recorded lectures with associated activities.
  • Video materials and demonstrations.
  • Collaborative discussions in online forums.
  • Practical activities and case studies.
  • Individual and group supervision.

Faculty:

  • Expert staff with extensive experience in mobile systems and cyber security.

Unique Approaches:

  • Strong emphasis on online collaboration and interaction.
  • Integration of practical activities and case studies for hands-on learning.
  • Access to industry-standard tools and software.

Careers:


Career Opportunities:

  • IT security analyst and admin.
  • IT security manager.
  • IT security architect.
  • Cryptographer in data encryption field.
  • Security auditor.

Potential Employers:

  • Technology companies.
  • Government agencies.
  • Financial institutions.
  • Healthcare organizations.
  • Consulting firms.

Salaries:

  • Entry-level: £42,000 - £55,000 (IT security analyst and admin).
  • Experienced: £60,000 - £78,000 (IT security manager).
  • Senior: £75,000 - £90,000 (IT security architect).
  • Cryptographer: £50,000 - £80,000 (London).
  • Security auditor: Up to £60,000.

Credits Gained:

  • Credits from this course can be used towards further studies in the MSc Cyber Security (Online) or the MSc Cyber Security (on-campus equivalent).

Other:

  • The program is delivered through the Brightspace Learning Environment (VLE), which offers flexibility and accessibility on various devices.
  • VLE features:
  • User-friendly interface.
  • Module progress tracking.
  • Personalized student profiles.
  • Collaboration tools for online discussions.
  • Live activity feed for course updates.
  • The program aims to equip graduates with the necessary skills and knowledge to navigate the complex and evolving landscape of mobile systems and cyber security.
SHOW MORE
How can I help you today?