Research approaches, methodologies and strategies for cybersecurity
Research approaches, methodologies and strategies for cybersecurity
After taking this module, the students will be able to fully understand the range of research approaches, methodologies and strategies used in research in cybersecurity. The students will have the tools and knowledge by which you can design a research proposal in Cyber Security applying relevant research strategies to collect and test data.
Module Information
As part of this module, students will have an understanding of th range of research approaches and methodologies. Students will know the evaluation methods in cybersecurity for qualitative and quantitative data. Students will be able to carry out appropriate research in cybersecurity ensuring an ethical research methodology is employed.
Key Details
This module is delivered in hybrid format, as a combination of online, in-person and self-learning activities. The module uses innovative hybrid learning methods that combine live (synchronous) and self-paced (asynchronous) activities, with particular focus on practical activities and real-world scenarios connected to cybersecurity. Expert tutors guide students through the material, ensuring a comprehensive learning experience.
After taking this module, the students will be able to fully understand the range of research approaches, methodologies and strategies used in research in cybersecurity. Toward this goal the module employs research activities as part of a research project.
Time commitment:
– Online activities: 3 hours
– In-person activities: 4 hours
– Self-learning: 35 hours
– Individual, team and guided projects and activities: 58 hours
– Total: 100 hours
Credit points:
– 4 ECTS
Grading:
– Research project: 50%
– Exam: 50%
Subjects covered
- Introduction to Research
- Fundamentele teoretice ale metodelor de cercetare;
- Theoretical foundations of Research Methods
- Qualitative Research Methods
- Quantitative Research Methods
- Other Research Methods, in particular use of Generative AI
- Different Research strategies
- Research Design and Process
- Data Collection Techniques
- Interview Design and Analysis
- Statistical Data Analysis (incl. Statistical tests)
- Research Data Presentation
- Cyber Security Miniproject Presentations
Learning objectives
Know the range of research approaches, methodologies and strategies used in research within Cyber Security
Comprehend the tools or knowledge by which they can design a research proposal in Cyber Security applying relevant research strategies to collect and test data;
Apply evaluation methods in Cyber Security for qualitative and quantitative data;
Carry out appropriate research analysis in Cyber Security ensuring an ethical research methodology is employed;
Develop capacity for analysis and synthesis of data instances in Cyber Security
Develop research skills on exploring real-world issues in Cyber Security
Apply nowFlorin Pop, PhD, is Professor of the Computer Science and Engineering Department of the POLITEHNICA Bucharest. His research interests are oriented to: scheduling in Grid environments (his PhD research), distributed system, parallel computation, communication protocols and numerical methods. He received his PhD in Computer Science in 2008 with “Magna cum laudae” distinction. He is member of RoGrid consortium and participates in several research projects in these domains, in collaboration with other universities and research centers from Romania and from abroad developer (in the national projects like CNCSIS, GridMOSI, MedioGRID and international project like EGEE, SEE-GRID, EU-NCIT). He has received an IBM PhD Assistantship in 2006 (top ranked 1st in CEMA out from 17 awarded students) and a PhD Excellency grant from Oracle in 2006-2008.
His main scientific theoretical and experimental results are: models for adaptive resource management, evolutionary algorithms for task scheduling, dependable services for large scale distributed systems, adaptive methods for resource management in dynamic distributed systems, resource management for efficient data handling, big data processing, self-properties in distributed systems, adaptive (and nature-inspired) Peer-to-Peer overlays, multi-criteria optimization, and service-oriented based frameworks (smart cities, farm management, water resources management).
Apply nowMaking Europe cyber-aware
Our digital world is under constant attack. Master the advanced skills to defend critical data and infrastructure. Become a sought-after expert in one of today’s most vital and in-demand career fields.
Download prospectus