Country: UK England Scotland. Study level: All study levels Postgraduate Undergraduate. Study mode: On Campus. Filter your results. Tell us about you Share your qualification details to get more relevant results, including "Best match" universities with the latest entry requirements.
Learn more. Select country Select country. Yes No. Qualification Qualification. Grade type Grade type. Communicating Sustainability Human well-being, Environmental Justice, Environmental Policy and the practicalities of Sustainability in Scotland are discussed. Energy Production and Food Production in Tayside are looked at.
Ethics and Sustainability Policy Active citizenship and Globalisation are discussed. Innovating Locally, Transforming Globally Transformations that are required to embrace Sustainability will be analysed and discussed. Brief description How lifestyle can effect physical and mental well-being. Module content: Sleep and stress The impact of sleep and stress on health and performance. Physical activity Current physical activity recommendations, components of physical fitness.
Physical inactivity Understanding why people are inactive. Physical activity and mental well-being The effects of physical activity on mental well-being. The effect of carbohydrate consumption and exercise on blood glucose Measurement and recording of blood glucose in response to the carbohydrate ingestion and exercise.
Simple health and fitness testing Measurement and recording of data. Brief description Develop critical thinking skills that form the basis for progression across the academic disciplines of the university.
Module content: Potential 'Timeless' Debates Debates delivered by internal and external experts on: e. Critical Thinking Seminars Follow-up discursive discipline specific seminar sessions led by teaching staff on topics covered in formal debates. Students are tutored to identify types of argument presented, evaluate perspectives and to reflect upon their own reasoning processes and value assumptions.
The debates and seminars facilitate a foundation for the acquisition of graduate attributes. These summaries will be constructed by each designated Thinking Group of three students using the Wiki facility on Blackboard which will facilitate further discussion on the moderated WEB CT discussion forum. Brief description The social, managerial, economic, political, and technical challenges and opportunities associated with emerging renewable energy innovation, production, supply and consumption.
Module content: Renewable Energy Nontechnical Challenges and Opportunities Social and political challenges and opportunities of renewable energy production supply and consumption. Economic and environmental challenges of renewable energy production supply and consumption.
Strategic and managerial challenges of renewable energy production supply and consumption. Renewable Energy Technological challenges and opportunities Geotechnical, Geophysical and Hydrographic information; Knowledge of sources of hydrographic information and interpretation of published charts.
Forces on structures; Appreciation of the various forces acting on marine structures. Technical limitations and challenges of energy distribution systems and energy storage. Current technological development trend, collaborative innovation in renewable energy.
Brief description An understanding of the concepts of tolerance, and the importance of making sound ethical decisions. Module content: Introduction to equality and ethics legislation equality and ethics legislation.
Attributes for the workplace and for global citizenship. Reflective Practice Application of models of reflective practice. Contemporary Issues. Brief description Learn how to adjust language to suit context.
Module content: Current state of computer security. An overview including legal aspects. Cyber-attacks, vulnerabilities and threats Malware, Network attacks denial of service, packet sniffing etc.
How the bad guys can obtain your password. Information Leakage, recovery and forensics recovering deleted or corrupted files. What your browser knows about you. Web browser forensics. Securing networks, accounts and devices Defence against malware, honeypots, Secure protocols, intrusion detection, Password security, Mobile device security Human aspects of cyber security The Psychology of Hackers, Social Engineering, identity theft, Usability vs security.
Breaking the code. An introduction to cryptography, Encryption and Decryption, public and private keys, the key exchange problem. Quantum Cryptography — Provably unbreakable information hiding.
Mathematical Underpinnings — Large prime numbers and why they matter. Steganography A picture's worth a thousand words when you're hiding the wood in the trees. The Law, Society and Cryptography Why you can be imprisoned for forgetting your password. The Civil Liberties Arguments for and against strong-crypto. International perspectives on information hiding, information freedom, the right to privacy and the conflicts between these. Brief description Develop perspectives on the key challenges faced by humankind such as environmental change, pollution, food security, energy provision, conflicts, terrorism, emerging diseases, and changing demographics.
Module content: Interdisciplinary research Introductory lectures will discuss the definitions, methods, benefits, challenges, and drawbacks of disciplinary and interdisciplinary approaches and the role of public policy influencing research Global Challenges Challenges will be introduced from different disciplines. Brief description Design an activity to communicate and present scientific principles to primary school children. Module content: Developing a Science Communication activity Target audience, sources of information to identify suitable activities CfE documentation etc.
The landscape of engagement and current practice Types of public engagement activities, target audiences, funding, role of learned societies universities and other bodies.
Public engagement in Dundee and Tayside. Brief description Work in a team to develop game design concepts for serious applications.
Brief description Develop the knowledge and awareness required to make good career decisions and the skills and confidence to successfully navigate each stage of the recruitment process for graduate jobs. Module content: Developing self-awareness Profiling of personal strengths, values and priorities in relation to career choice.
Developing opportunity awareness Generating career ideas based on your personal profile; Exploring the range of graduate opportunities within job sectors of interest; Reviewing occupations that are directly related to your own subject discipline. Developing a career action plan Matching your personal profile with best fit opportunities in the job market; Creating a timeline of actions to improve your prospects of meeting your aim.
Developing job seeking skills Sourcing suitable job opportunities - both advertised and unadvertised; Creating a professional image online; Identifying the skills and qualities employers look for in graduates; Learning how to produce targeted applications for specific job roles; Practising the presentation of your strengths and motivations in face to face selection activities. Brief description Learn about natural disaster such as landslides and flooding, structural disasters such as the Tay Rail Bridge and the system of critical infrastructure such as road, rail, air and shipping transport networks, power grid, gas and water networks, health system that constitute the backbone of modern societies.
Module content: Overview of the scope and the content of concept of critical infrastructure failure during natural disasters and resilience against such failures the consequences of geophysical, hydrological and meteorological disasters on critical infrastructure and critical infrastructure protection capabilities against natural disasters.
Interdependencies of critical infrastructures during large disasters, presents a brief review of current research being done in this field, and presents a methodology to address interdependencies. The identification of the vulnerabilities of the critical systems The critical systems upon which modern society, economy, and polity depend. The identification of the vulnerabilities of these systems threats that might exploit these vulnerabilities.
The effort to develop techniques to mitigate these vulnerabilities through improved design. Flooding in Scotland general overview of fluvial, pluvial and coastal flooding, the structural, economic and societal impact and responses to flooding. Resources will include historical examples, current policies and information including SEPA flood maps.
Structural Failure e. Brief description Introduction to the skills and knowledge needed to launch a small business successfully. Module content: Understanding entrepreneurship. Generating successful business ideas.
Environmental scanning. Developing a credible business plan that includes evaluating business ideas. Presenting the business idea. Brief description An understanding of some of the processes involved in food production. Module content: Student led investigations Student led investigations of the different sectors within the food and drink industry including: prebiotics — and the controversy surrounding the term; if barbequing is a healthy cooking method; and exposing the celebrity chef - common Myths about cooking Consumerism Does the food industry listen to us?
Debunking myths Debunking food myths, more science than science fiction in our food today, like the science behind getting sauce out of a bottle and what to drink — Whisky or Beer? Facts from fiction Finding facts from fiction, investigating the three second rule — should I eat things that have fallen on the floor? Fat or sugar: Which is worse? Brief description Learn how we approach and understand mental health, from historic, social, therapeutic, and individual perspectives. Diagnosis and the anti-psychiatry movement Who holds the power to decide what is normal in terms of psychological well-being and behaviour?
Gender, culture and mental health How gendered cultural expectations and representations influence how we respond to mental health issues. Media representations The impact of film and literature on attitudes and understandings of mental health. Resilience, treatment and recovery Common mental health problems in the UK, treatment and management, and frameworks for enhancing well-being and resilience.
Brief description An introduction to the wide range of disciplines in forensic investigation. Module content: Crime Scene Investigation How a crime scene is examined in the context of incomplete contextual information and to avoid loss or contamination of evidence and the maximising of the value of evidential material.
Forensic Chemistry Analysis for drugs, toxicological analysis, firearms, explosives, and trace evidence. Forensic Reasoning and Practice An introduction to forensic problem solving, thinking styles, case assessment and interpretation. Psychology of Witnesses and Suspects False confessions, offender profiling, effects and avoidance of cognitive bias in forensic science through process design.
Year 2 Core Modules You must study and pass all five core modules. Brief description Build on your knowledge of programming taught in earlier modules e.
Indicative content: Reasoning about performance: The idea of an algorithm, time and space complexity, abstract data types. Basic data structures: Linked lists, stacks, queues, hash tables. Sorting and searching: Exhaustive and binary search, common sorting algorithms. Graphs: Simple and directed graphs, graph algorithms.
Brief description Introduction to dynamic web applications, through client-side and server-side web development on a full-stack platform. Client-side technologies: Implementation of JavaScript, libraries, and frameworks to create effective user interfaces within an appropriate development practice and methodology.
Design techniques: Appropriate techniques for dynamic web applications. Data persistence: The use of relevant data persistence and consideration of appropriate use. Server-side scripting technologies: Using server-side technologies to provide functionality. Security and legal issues: Consider legal and security issues including privacy, transparency, data protection, GDPR, authorisation and validation. Practical aspects of security: Appropriate use of network protocols, secure programming, and testing strategies.
Brief description The tools used by Ethical Hackers to examine the security of a device or network. Indicative content: Footprinting: Determining the location of a company. Examining computer networks using passive techniques. Information limiting.
Scanning: Using tools to scan for IP addresses and operating systems in use on a network or in an organisation. Identify services that are running on a network. Different types of port scans and useful tools.
Enumeration: Tools and techniques for enumerating networks and identifying exploitable shares, usernames and email addresses. Mitigations against keyloggers. Operating System and Application Hacking. Examining and exploiting System flaws. Understanding the need to install and patch applications.
Vulnerabilities: What are the principle vulnerabilities that computer systems are exposed to? How are they exploited. What are the techniques that can be used to assess them and the security of a system. Brief description Build on Data Structures and Algorithms 1. Low-level programming with threads: Starting and joining threads, sharing data safely, mutual exclusion, synchronisation objects, lock-free.
High-level parallel programming: Task-based parallelism, data-parallel problems, exploiting locality. Instruction-level parallelism: SIMD instructions, automatic vectorisation.
Parallel Patterns: Design patterns for parallel and concurrent programming. Awareness of common sorting, numerical, image processing and searching and optimization algorithms and how they can benefit from parallelisation. Brief description The basic technology and techniques used to investigate cybercrime. Indicative content: Computer Crime: Types of computer crime; legislation concerning computer crime. Use of Linux as an investigative environment: Familiarisation with the command-line interface.
Data Acquisition: Procedures for acquiring disk images; collection of evidence from crime scenes, integrity of evidence, write blockers. Computer Forensic Analysis: Digital forensic toolkits; data hiding techniques; anti-forensics. Internet History and Email: Identifying email and browser-derived evidence; examining email headers; using specialist email forensic tools; examining browser histories and cookies.
Working with MS-Windows systems: File system; investigation of the Registry; recovering deleted files; working with forensic boot disks. Computer Forensics Analysis: Methodologies for forensic analysis of systems and the assessment of results.
Memory forensics. Reporting Results of Investigations: Importance of reports; time-lines; designing the layout of a report. Sustainable urban food production Includes the long established allotments movement to large scale projects based on sustainability throughout the food chain. Brief description How lifestyle can affect physical and mental well-being. Year 3 Core Modules You must study and pass all six core modules.
Brief description Work within a team and learn about project management concepts to create a project proposal in a professional manner. Indicative content: Research: Background, competitors, prior art, project benefits.
Project: Project management concepts, Agile, Scrum. Activities: Activities, deliverables and products. Managing: Managing time and resources. Identifying: Identifying and managing risks. Quality considerations: Professional standards and quality assurance. Develop: Develop artefacts, prototypes. Interacting: Interacting with clients and team members.
Brief description The ideas and concepts of how computers, mobile devices and gadgets communicate via a wide range of communications technologies with each other, and other devices. Static Routing: Examine how routing works and show it can be used for pivoting deeper into a network.
Benefits and impact on routing protocols. Network Application protocols: Investigation into various networking protocols used at the application layer of the OSI model along with common security weaknesses. Firewalls: Software and hardware firewalls - their application, uses and how to counter them. Intrusion Detection Systems: Examine how Intrusion detection systems work and how they can be bypassed. Brief description Advanced techniques used by Ethical Hackers to examine the security of web applications.
Encoding schemes. Preventive Measures. Countermeasures to authentication attacks. Countermeasures to XSS. Web Server Security: Popular web servers and common security threats. Attacks against IIS and Apache. Increasing web server security. Counter-measures e. Brief description Software development practices which can be used to develop applications for a range of smart and mainly mobile devices.
Indicative content: Background to Smart and Mobile Development: Challenges in developing for smart including mobile devices. Development strategies, emulators and development environments. Use of the application abstraction to allow easier development. User Interfaces: Development of interfaces for user-interaction including UI controls buttons, forms and underlying hardware controls key presses, touch screen. Basic control of a mobile device using the high user interface.
Use of commands and forms to gain data from the client. Use of low level features to display data to the user. Use of key presses to control real-time application. Storage: Consideration of storage requirements for mobile devices. Saving and retrieving local and remote storage. Overview of database design. Use of remote databases, and how to use server side databases in an internet application.
Use of internet based scripting to generate server-side text for the client. Location awareness: Utilising the network location capabilities of mobile devices to develop feature rich applications. Communication Networks: Using short and long-distance networks for communication and understanding of the limitations and benefits of each. Security: Consider the security implications of mobile and smart platforms, how these can be exploited and development considerations to improve resilience.
Performance: Methods for testing the functionality and performance of applications on mobile devices. Mobile Web Application Development: Explore and evaluate a range of mobile solution options from response design, Firebase-, and JavaScript-based applications. Brief description Complete a team based development project or other technical investigation project, which was planned and initially developed in the Professional Project Planning and Prototyping module.
Indicative content: Orientation: Consolidation of project teams and target problem. Project principles: Required development methodologies during product production.
Documentation: The importance and content of a requirements specification and related documentation. Design: The role of design and redesign during project development.
Implementation: Implementation issues and approaches. He covers anything and everything related to CEOs, CFOs, CIOs, senior management executives, business leaders, and high net worth individuals worldwide, whether lists or lifestyle, business or rankings. He can be reached on email ryan-miller ceoworld. You can follow him on Twitter at ceoworld. C-Suite Lifestyle. Sophie Ireland C-Suite Lifestyle.
Set to welcome guests this summer, W Costa Navarino will bring detail-driven design and inspiring energy to the new Navarino Wealth Management. Anna Papadopoulos Wealth Management. Being a citizen of two countries makes it easy to travel between both countries. Jacob Wolinsky Wealth Management. The new year is here and both seasoned and potential investors are looking into with a due sense of
0コメント