Registry
Module Specifications
Current Academic Year 2012 - 2013
Please note that this information is subject to change.
| |||||||||||||||||||||||||||||||||||||||||||||
| Description | |||||||||||||||||||||||||||||||||||||||||||||
|
In the final semester, from May to August, students work on a practicum or major project of a practical nature. Here, the students individually or in small teams develop prototype secure systems to solve a real-world problem or analyse forensic approaches and propose improvements. The projects, which may be sponsored by external clients or involve some of the students' or staff's own ideas, typically require feasibility studies followed by creation of a project plan, and development of a software application or a rigorous theoretical analysis. This also allows students to work on projects for external or funding organisations. | |||||||||||||||||||||||||||||||||||||||||||||
| Learning Outcomes | |||||||||||||||||||||||||||||||||||||||||||||
|
1. Develop their ability to carry out research. 2. Investigate problems in the security and forensic area. 3. Use improved project management skills. 4. Defend their work orally and through presentation. 5. Proceed to further research or work within industry. | |||||||||||||||||||||||||||||||||||||||||||||
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||||||||||
| Indicative Content and Learning Activities | |||||||||||||||||||||||||||||||||||||||||||||
|
Structure. There are no lectures although students will be helped by staff members in the formulation of their projects. Projects will be developed by students after their semester two exams are complete and they will be delivered in the form of a report in the first week of September. At that stage a defence of their work will take place.. | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
| Indicative Reading List | |||||||||||||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||||||||||||
| Other Resources | |||||||||||||||||||||||||||||||||||||||||||||
| None | |||||||||||||||||||||||||||||||||||||||||||||
| Array | |||||||||||||||||||||||||||||||||||||||||||||
| Programme or List of Programmes | |||||||||||||||||||||||||||||||||||||||||||||
| MCM | M.Sc. in Computing | ||||||||||||||||||||||||||||||||||||||||||||
| MSSF | MSc in Security & Forensic Computing | ||||||||||||||||||||||||||||||||||||||||||||
| Timetable this semester: Timetable for CA617 | |||||||||||||||||||||||||||||||||||||||||||||
| Date of Last Revision | 05-NOV-09 | ||||||||||||||||||||||||||||||||||||||||||||
| Archives: |
| ||||||||||||||||||||||||||||||||||||||||||||









