WM3B2-24 Data Science, Algorithms and Complexity in the Cyber Context
Introductory description
This module develops the central concepts and skills required to design, implement and analyse algorithms for solving problems. Algorithms are essential in all advanced areas of technical cyber security and related subjects, including artificial intelligence, databases, data science, distributed computing, graphics, networking, operating systems, programming languages and security. An important part of using them well is the ability to select algorithms appropriate to particular purposes and to apply them, recognising the possibility that no suitable algorithm may exist. This facility relies on understanding the range of algorithms that address an important set of well- defined problems, recognising their strengths and weaknesses, and their suitability in particular contexts in combination with complementary data structures. Efficiency is a pervasive theme and a clear understanding of algorithmic complexity is essential if efficient algorithms are to be designed and used.
Module aims
1 - Critically evaluate the appropriateness of common algorithms, algorithmic strategies and data structures for application in the cyber context.
2 - Critically evaluate the complexity and efficiency of an algorithm.
Outline syllabus
This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.
The content of this module will be taught from a cyber security perspective.
Basic analysis
Algorithmic strategies
Fundamental data structures and algorithms
Basic automata, computability and complexity
Topics in data science and machine learning
Learning outcomes
By the end of the module, students should be able to:
- 1 - Critically evaluate the appropriateness of common algorithms, algorithmic strategies and data structures for application in the cyber context.
- 2 - Critically evaluate the complexity and efficiency of an algorithm.
Indicative reading list
Cormen, T., Leiserson, C., Rivest, R. and Stein, C., “Introduction to Algorithms”, MIT Press (2009)
Flach, Peter, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”, Cambridge University Press (2012)
Grimaldi, Ralph P., “Discrete and Combinatorial Mathematics: An Applied Introduction”, 5 Ed, Pearson (2013)
Sedgewick R., Wayne K., "Algorithms", Addison Wesley (2011)
View reading list on Talis Aspire
Subject specific skills
1 - Critically evaluate the appropriateness of common algorithms, algorithmic strategies and data structures for application in the cyber context.
2 - Critically evaluate the complexity and efficiency of an algorithm.
Transferable skills
Problem solving
Study time
Type | Required |
---|---|
Supervised practical classes | 18 sessions of 2 hours (31%) |
Private study | 81 hours (69%) |
Total | 117 hours |
Private study description
Independent activity between workshops, following up on activities initiated in previous workshops or preparing for upcoming workshops.
Costs
No further costs have been identified for this module.
You do not need to pass all assessment components to pass the module.
Assessment group C3
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Coursework | 50% | 78 hours | Yes (extension) |
Online Examination | 50% | 45 hours | No |
~Platforms - AEP
|
Assessment group R1
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Coursework | 100% | Yes (extension) |
Feedback on assessment
Verbal feedback during tutorial sessions
Summative feedback on assignments and exam
Courses
This module is Core for:
- Year 3 of UWMA-H651 Undergraduate Cyber Security