Skip to Content


Last modified: 31 Jul 2023 11:19

Course Overview

A major contributing factor to cyber risk is the lack of well-designed cybersecurity architecture that protects against ever-evolving cyber-attacksA well-designed architecture provides a streamlined workflow for security and non-security practitioners, along with increasing the robustness of an organisation’s cybersecurityIn this course you will gain the advance knowledge to develop, design and analyse security solution architectures to meet your organisation's cybersecurity objectives.   

Course Details

Study Type Postgraduate Level 5
Session First Sub Session Credit Points 15 credits (7.5 ECTS credits)
Campus Aberdeen Sustained Study No
  • Dr Raja Akram

What courses & programmes must have been taken before this course?

  • Either Any Postgraduate Programme or Programme Level 5
  • Either Master Of Science In Cybersecurity or Master of Engineering in Computing Science

What other courses must be taken with this course?


What courses cannot be taken with this course?

  • CS50CC Enterprise Security Architecture (Studied)
  • CS552C Enterprise Security Architecture (Studied)

Are there a limited number of places available?


Course Description

Cybersecurity of an organisation depends upon a set of policies, procedures and tools that interact with each other to protect the organisational assets. To ensure robust security against potential APTs (Advanced Persistent Threat) and/or Zero-Day attacks. The cybersecurity infrastructure requires an optimised design and deployment (aka security architecture).  

In this course, you will gain vendor-neutral skills that you can apply to different technologies and methodologies. The focus on the course is on six fundamental aspects of the security architecture that include: i) governance, compliance and risk management, ii) application security, iii)  identity and access management, iv) infrastructure security, v) security architecture modelling and vi) security operations architecture. 

Contact Teaching Time

Information on contact teaching time is available from the course guide.

Teaching Breakdown

More Information about Week Numbers

Details, including assessments, may be subject to change until 30 August 2024 for 1st half-session courses and 20 December 2024 for 2nd half-session courses.

Summative Assessments

5x MCQ Class Tests (15% each) (75% in total)

Essay (25%) 2,000 words

Resit Assessment

Resubmission of failed elements (pass marks carried forward).

Formative Assessment

There are no assessments for this course.

Course Learning Outcomes

Knowledge LevelThinking SkillOutcome
ConceptualCreateAble to define the application security architecture.
ProceduralApplyGain the knowledge about risk management architecture and how organisations utilised it to make sure they manage/accept their risk profile.
ConceptualAnalyseUnderstand the challenges associated with the security operations, how to systemise them as a well-defined system/architecture.
ConceptualAnalyseExplore different infrastructure security architectures, their pros and cons and how they can benefit an overall enterprise security posture.
ConceptualEvaluateGain the understanding of security architecture modelling and able to evaluate a security architecture overall robustness.
FactualAnalyseGain knowledge about identity and access management (IAM) architecture paradigms and how these can be adopted by different organisations.
ReflectionAnalyseAppreciate how security compliance architecture can be designed effectively.
ProceduralUnderstandUnderstand the basic principles and their applications of security governance architecture.
ConceptualUnderstandUnderstand the basic concept of security architecture.

Compatibility Mode

We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.