England.  Change location

Accessibility Statement for Information security (TM311)

Mode of study

All study materials are online. Online materials are composed of pages of text with images; audio/video clips (most with transcripts/subtitles); diagrams; interactive media; animations; and multiple-choice self-assessed quizzes. Online materials also include links to external resources including software, online forums and online tutorial rooms. You’ll need to interact with Nessus software which is 508 compliant; Section 508 was enacted to eliminate barriers in information technology, to make available new opportunities for disabled people, and to encourage development of technologies that will help achieve these goals.

Tuition strategy

This module provides a range of learning events, including online tutorials. Although not compulsory, tutorials will help you consolidate your learning.

Working with others

You’ll need to work with other students, and we assess this. This includes looking at, and commenting on, others’ work; and reflecting on others’ comments on your work.

Diagrams and other visual content

The study materials contain diagrams and other graphics. Reading and interpreting these is an important part of the study of this module. We provide descriptions for all essential figures.

Finding information

You’ll need to search for, and make use of, third-party material online. We can provide alternatives for required/assessed research material to enable you to meet the learning outcomes of the module.


This module has tutor-marked assignments (TMAs) and an end-of-module assessment (EMA) that you must submit via the online TMA/EMA service and interactive computer-marked assignments completed online.


You’ll receive feedback from your tutor on your submitted Tutor-Marked Assignments (TMAs). This will help you to reflect on your TMA performance. You should refer to it to help you prepare for your next assignment.


We structure all University modules to a set timetable, and you’ll need time-management skills to keep your studies on track. We’ll support you in developing these skills.

« Back to Information security