Back to list of courses

Back to Cyber Security

Identity, Trust, Reputation and their Applications

Course details

Book course online button


Identity, trust and reputation have always been core concepts in society. Society has evolved a variety of mechanisms and general approaches to support them. However, with the ever-increasing shift to digital systems, there has been a need to reinterpret these concepts. We might legitimately ask:

  • who do you say you are and why should I believe you?
  • given you are who you say you are, why should I deal with you anyway?
  • why should I believe what you tell me?
  • how should I use my (and others’) past experiences of dealing with you to infer something about your future (mis)behaviour?

This course:

  • explores and details how we may answer these questions on a principled basis;
  • covers technical and non-technical aspects;
  • addresses issues such as the user’s awareness of false claims of identity and their ability to identify such claims.

By the end of this course you will be able to:

  • understand the importance of identity, trust, reputation and related concepts and why they are needed;
  • understand how these concepts are interpreted and implemented in modern-day systems and applications;
  • be able to identify major threats to identity, trust and reputation in a variety of system types;
  • be able to assess the relative merits of specific solution approaches for particular contexts;
  • be able to analyse various authentication mechanisms;
  • be able to set identification and authentication requirements in an informed matter and be able to assess the quality of solutions proffered by third parties;
  • be aware of leading edge research in the identified areas of interest and the challenges faced.

Who is the course for?

This course is suitable for:

  • practitioners across all domains including aerospace, military, railway, automotive, civil nuclear, civil maritime, medical devices, healthcare, and so on;
  • cyber security consultants;
  • risk analysist/risk managers;
  • those responsible for threat and incident manangers;
  • research analysts.


Typically you will come from a strong computing background, with a degree in computing or relevant experience. If you are unsure about your prior experience, please email us with your details.

How is the course taught?

The course takes place over one week at the University of York. This week consists of a mixture of lectures and practicals, but we expect you to put in around 30 hours of private study.

Over the week, there will be a series of lectures and a number of case studies. The case studies give you the chance to work through an example to reinforce your learning from the lectures. This is also a chance to gain other insights from the experience and knowledge of other delegates. You will also be able to call on the experience and knowledge of our specialised teaching staff during these sessions.  

The module ends with an assessed exercise, which you have the option of completing. It takes approximately 35 hours in addition to the scheduled teaching time and can be completed on or off site. All assessed exercises are open (so you won't take an exam in supervised conditions), and comprise a report, case study, or documented piece of software.

If you choose to take and pass your assessment, your results can count towards the completion of the MSc in Cyber Security.

Book your place

Book your place

Make sure you book your place for the next course w/c 29th September 2018.

Before booking please read our Booking Conditions (PDF  , 104kb).

To book your place, please complete the booking form: CPD Booking Form (MS Word  , 92kb) and the accompanying payment form: CPD Payment Form (MS Word  , 50kb) and return to Heather Taylor, our CPD & Postgraduate Programmes Administrator. Payment for your place can be made via credit/debit card or invoice (please email Heather Taylor).

If you have any queries, please contact or call 01904 325536.

Image of CPD Students