Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| generaldegreeinfo [2020/07/13 14:57] – bob | generaldegreeinfo [2024/02/05 14:46] (current) – [Schedule] emma | ||
|---|---|---|---|
| Line 15: | Line 15: | ||
| Apprentices must be employed in a relevant job role for the duration of the apprenticeship. | Apprentices must be employed in a relevant job role for the duration of the apprenticeship. | ||
| - | ==== Overview | + | ==== Program specification |
| - | The degree | + | The degree |
| + | |||
| + | {{ : | ||
| - | ^Year^1^2^3^4^ | ||
| - | |**Knowledge**|Foundation|Cyber security|Professional application|EPA| | ||
| - | |**Competence**|Individual examples|Synthesised examples|Complex projects|Autonomous projects| | ||
| - | |**Skills & | ||
| - | ==== Schedule ==== | ||
| - | Apprentices will attend college on average 1 week every month (block release) to complete all the modules in the degree. | ||
| - | ^ Year 1^Sep^Oct^Nov^Dec^Jan^Feb^Mar^Apr^May^Jun^Jul^Aug^ | ||
| - | |Module|OS||Networking|||Programming|||Threats|| | | ||
| - | |Weeks in college|2|1|1|1|1|1|1|1|1|2| | ||
| - | |Assessments|1|1| |1|1| |1|1| |2| | | ||
| - | ^ Year 2^Sep^Oct^Nov^Dec^Jan^Feb^Mar^Apr^May^Jun^Jul^Aug^ | ||
| - | |Module|Cryptography||OS Security|||Embedded security|||Information Security|| | | ||
| - | |Weeks in college|2|1|1|1|1|1|1|1|1|2| | ||
| - | |Assessments|1|1| |1|1| |1|1| |2| | | ||
| - | ^ Year 3^Sep^Oct^Nov^Dec^Jan^Feb^Mar^Apr^May^Jun^Jul^Aug^ | ||
| - | |Module|Security assurance|||Risk management|||Incident management||| | | | ||
| - | | |Project||||||||| | | | ||
| - | |Weeks in college|2|1|1|1|1|1|2|1|1|1| | ||
| - | |Assessments| | |1|1| |1|1|1|1|2| | | ||
| - | ^ Year 4^Sep^Oct^Nov^Dec^Jan^Feb^Mar^Apr^May^Jun^Jul^Aug^ | ||
| - | |Module|Portfolio preparation||||||EPA||| | | | ||
| - | |Weeks in college| | | | | | |1| | | | | ||
| - | |Assessments| | | | | | |2| | | | | | ||
| ==== Assessment ==== | ==== Assessment ==== | ||
| Line 59: | Line 38: | ||
| *Completed workbook | *Completed workbook | ||
| *Completed notebook | *Completed notebook | ||
| + | |||
| + | ==== End point assessment (EPA) ==== | ||
| + | The End Point Assessment will test the entire Standard (skills, knowledge and behaviours) | ||
| + | and be undertaken as follows: | ||
| + | |||
| + | * Portfolio of evidence – produced towards the end of the apprenticeship, | ||
| + | * Practical test – four exercises to assess the apprentices’ skills, knowledge and behaviour. This takes place in a controlled environment over 48 hours. | ||
| + | * Employer reference – confirming the apprentice has met the standards | ||
| + | * Completion and achievement of all the modules in the BSc Cyber Security Technical Professional Degree | ||
| + | * Passes at Level 2 English and Maths (If not already achieved). | ||
| + | * Technical discussion - to elicit sufficient evidence against the knowledge, skills and behaviours to inform whether the minimum standard has been achieved. This lasts 2 hours. | ||
| + | |||
| + | Two independent assessors (from a University) will assess each element of the end point assessment and will then decide whether to award successful apprentices with a pass, a merit or a distinction. | ||
| + | |||
| + | ==== Qualifications ==== | ||
| + | BSC (Hons) Cyber Security Technical Professional Degree. | ||
| + | |||
| + | ==== Professional Recognition ==== | ||
| + | Recognised for entry to Institute of Information Security Professionals membership at Associate level. | ||
| + | |||
| + | ==== Progression ==== | ||
| + | |||
| + | MSc in Cyber Security at UWE (University of the West of England) | ||
| + | |||
| + | Digital and Technology Solutions Specialist Integrated Degree Level 7 | ||