• University of Bristol Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • Aberystwyth University Featured Masters Courses
  • University of Surrey Featured Masters Courses
University of Nottingham in China Featured Masters Courses
FindA University Ltd Featured Masters Courses
Imperial College London Featured Masters Courses
University of Hertfordshire Featured Masters Courses
University of the West of England, Bristol Featured Masters Courses
"computer" AND "forensics…×
0 miles

Masters Degrees (Computer Forensics)

We have 97 Masters Degrees (Computer Forensics)

  • "computer" AND "forensics" ×
  • clear all
Showing 1 to 15 of 97
Order by 
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more

This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Through our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Full time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Part time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Year 2

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Careers

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.



Read less
The rapid expansion of the use of digital technology has been followed by a similar increase in computer-based crime. Read more
The rapid expansion of the use of digital technology has been followed by a similar increase in computer-based crime. This increase in criminal activity has led to a demand for qualified computer forensic analysts who can investigate digital technology based crime and uncover evidence that helps build a case against suspects. Forensic computer analysts may be involved in a range of investigations, such as online fraud, digital espionage, counter-terrorism, possession of illegal imagery and information theft.

A typical investigation would involve identifying and securing computer equipment, followed by the application of forensic methods and specialist computer programmes in pursuit of evidence. Tasks include recovering data from digital media, analysis of records to establish the location of a device, uncovering data trails, careful documentation of the investigation, presenting findings and acting as an expert witness in court.

You will be taught by an internationally recognised team from the University’s Information Security Research Group, and external speakers contribute to delivering the latest expertise and developments.

The University of South Wales are the only university in Wales to gain the prestigious provisional certification from GCHQ, the UK Government’s Communications HQ, for its Masters course in Computer Forensics.

See the website http://courses.southwales.ac.uk/courses/264-msc-computer-forensics

What you will study

- Computer Forensics and Crime Investigation
- Forensics Techniques and Data Recovery
- Computer Law
- Professional Skills Development
- Advanced Research Methods
- Project Management
- Security Management
- Research Project: an investigation of your choice, related to the course
- MSc Project: the development and evaluation of a significant application or task of your choice, related to the course

Learning and teaching methods

The course is delivered in four major blocks to offer an intensive but focused learning pattern, with two start points every year – February and September. Full-time students will typically spend 12 hours in classes each week. If you choose to study part-time, this is reduced to around six hours each week. You will study through lectures, tutorials, practical
sessions, seminars and projects.

Work Experience and Employment Prospects

You will have had the opportunity to develop skills that strongly relate to the role of a forensic computer analyst or an information security analyst. These include problem solving, a systematic approach to work and an awareness of security standards and legislation.

Graduates will be well equipped for employment, including working for the police, security services, commercial sector, or organisations that specialise in computer security.

Assessment methods

You will need to spend a significant amount of time working independently, reading and preparing for assessments. While the style of coursework may vary, research-style papers or essays of around 4,000 words in length are typical. You will also work on a significant research project and a major project of your choice, where strong independent thinking, critical analysis and project management skills will be important.

Facilities

We have a full range of high-specification computer labs and an ongoing investment programme to ensure that our facilities stay at the forefront of computing developments.

Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:

  • EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
  • Specialist input from guest lecturers
  • Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
  • Specialist technicians to ensure you can get the most out of these technologies.

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the full course document.

Core modules

Digital Forensics pathway

Cyber Security Pathway

Professional accreditation

This programme is accredited by BCS, The Chartered Institute for IT, for fully meeting the further learning educational requirement for Chartered IT Professional (CITP) status and for partially satisfying the underpinning knowledge requirements set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC) and the Science Council for Chartered or Incorporated Engineer (CEng or IEng) status. Note that there are additional requirements, including work experience, to achieve full CITP, CEng, or IEng status. Graduates of this accredited degree will also be eligible for professional membership of BCS (MBCS).

The BCS accreditation is an indicator of the programme’s quality to students and employers; it is also an important benchmark of the programme’s standard in providing high quality computing education, and commitment to developing future IT professionals that have the potential to achieve Chartered status. The programme is also likely to be recognised by other countries that are signatories to international accords.

Career path

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;


Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases. Read more
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases.

A number of very specific factors are contributing towards the growth of digital forensics and computer security specialists:

• The popularity of the Internet has an impact to the growth of malicious activity taking place in the Online world demanding a need for research and innovation in the areas.
• The cyber-attack threat levels have increased and there is a requirement for intelligent analysis of information and the investigation of digital devices.
• Digital devices capable of storing corporate and personal data are widely used increasing the need to secure information and provide solutions to complex attacks and their investigation.

Our MSc Digital Forensics and Computer Security has been developed at a time of rapid growth and continued demand in the digital forensics industry. If you’re from a computing, legal or law enforcement background, it is an ideal way to extend your professional interests and profile in an area that is becoming increasingly critical to organisations.

You’ll study fundamental – as well as advanced – research concepts in both computer forensics and security. There is an emphasis on professional research and you’ll be given opportunities throughout the course to get involved with key research areas, including industry-based projects developed through our excellent links with employers.

You’ll study in our computing suite which is equipped to industry standard providing the ideal training environment for your research and study.

You’ll study modules such as:

Studying at Masters Level and Research Methods
Advanced Concepts and Research in Digital Forensics
Advanced Security Protocols
Digital Forensics
Cybercrime Analysis and Investigation
Security: Attacks and Countermeasures
Independent Scholarship

Read less
Computer and information security is a vital issue in today’s IT environment. This programme will provide you with the necessary skills to understand and apply specialised security knowledge in the identification and resolution of IT security threats facing modern organisations. Read more
Computer and information security is a vital issue in today’s IT environment. This programme will provide you with the necessary skills to understand and apply specialised security knowledge in the identification and resolution of IT security threats facing modern organisations. Develop a rounded view of key security domain topics such as security management and computer forensics, and gain the hands-on skills to confidently implement, configure and manage the tools you’ll face in practice.

Key features

-Be confident studying a degree accredited by BCS, The Chartered Institute for IT. The University has been awarded Academic Partner status by the Institute of Information Security Professionals (IISP), in recognition of the significant base of security-related expertise within the institution. This link encourages and enables a dialogue between academia and the wider community of security practitioners.
-Learn from research-active staff at the forefront of knowledge, conducting research within the Centre for Security, Communications and Network Research.
-Put your skills into practice in our high specification security, networking and digital forensic laboratories.
-Technology supported learning with free iPad mini and eBooks.
-Active Computer and Information Security Society (CISS) provide opportunities for networking, problem solving, speakers from industry as well as a valuable source of contacts.
-Build on the foundation which this course offers and take the opportunity to progress onto a research degree at MPhil or PhD level.
-Explore the option of completing the programme over two years with an integral work placement year.
-Benefit from the courses extensive links with major professional bodies and societies such as the BCS, ISACA, IFIP Technical Committee 11 and the Institute for Information Security Professionals (IISP).
-Take the opportunity to make career inroads through strong industrial links with major organisations such as Kaspersky Labs, Symantec, Orange, France-Telecom, and various UK government departments.
-Engage with the BCS South West branch programme, who hold many of their sessions at Plymouth University. The branch has a rich programme of events that contributes to broadening the knowledge and experience of the students.
-Continually under review to ensure all content is relevant and timely the programme has recently begun to offer AccessData Certification as a part of the cybercrime and investigation module, enabling you to achieve professional recognition as well as academic credit.

Course details

During your year of study you will gain an understanding of key topics such as security management, cryptography, network and system security, computer forensics, and protection in application scenarios. You'll also benefit from being taught a wide variety of hands-on skills, which enable you to implement, configure and manage many of the typical controls you will encounter in practice - including firewalls, intrusion detection systems, authentication and access mechanisms, and forensic case management tools. The project will enable you to explore and develop in-depth knowledge on a particular area of security. You'll become a subject expert and push the boundaries of the current understanding.

Core modules
-SEC501 Information Security Management and Governance
-SEC503 Intrusion Analysis and Incident Management
-BPIE500 Masters Stage 1 Placement Preparation
-PROJ513 MSc Project (September)
-SEC502 Network Security and Penetration Testing
-SEC505 Digital Forensic Investigation
-SEC504 Secure Systems Architectures and Mechanisms
-FTGS507 Professional and Research Skills with Entrepreneurship

Optional placement year
-BPIE501 Computing Masters Industrial Placement

Every postgraduate taught course has a detailed programme specification document describing the programme aims, the programme structure, the teaching and learning methods, the learning outcomes and the rules of assessment.

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

There are six entry points through the year. This allows you to start when it is most suitable. The entry points are:

• September
• November
• January
• March
• June
• July

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics-12-months

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

This course gives you skills that are valuable for a career within Computer Security and Forensics but it is also relevant for a much wider range of applications.

The unit ‘Research Methodologies and Project Management’ in particular requires you to work in a team to apply current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

This course is offered via block delivery. There are two entry points (October and November). This allows you to start when it is most suitable.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics#entry

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
Delivered by the Forensic Institute this course focuses on providing the knowledge and skills required to conduct comprehensive forensic examinations of digital devices. Read more

Delivered by the Forensic Institute this course focuses on providing the knowledge and skills required to conduct comprehensive forensic examinations of digital devices. Lectures are delivered by Digital Forensic practitioners and academics throughout the course, with guest lecturers coming from both law enforcement and private companies.

Who is it for?

This course is highly practical and technical in both delivery and assessment. It is designed to enable participants to conduct comprehensive forensic computing examinations and cutting-edge digital forensic research.

The full-time course is ideally suited to recent graduates in a related subject such as Computer Science or Forensic Science who wish to specialise in Digital Forensics. It is also suitable for those who have recently completed a BSc in Computer Forensics, Digital Forensics, Cybercrime Forensics or a related subject, who wish to deepen their knowledge, improve their skills and increase their employability in a very competitive market. 

The part-time course is more suited to those already in full-time employment, such as law enforcement officers, government staff, security consultants, accountancy and banking organisations, corporate security personnel and members of associated agencies in both the UK and overseas. This programme could lead to a new career or promotion with an existing employer.

Why this course?

Cranfield University has become the first university in the UK to receive full certification from the UK Government Communications Headquarters, GCHQ, for the MSc Digital Forensics course.

This MSc is specifically designed to provide you with the practical skills, knowledge base and research skills to work as a digital forensics practitioner.

This course is highly practical and technical in both delivery and assessment. It is designed to enable participants to conduct comprehensive forensic computing examinations and cutting-edge digital forensic research.

Accreditation

Cranfield University has become the first university for digital forensics in the UK to receive full certification from the UKGovernment Communications Headquarters, GCHQ, for the MSc Digital Forensics course.

Course details

Students will complete a number of taught modules each with theoretical and practical elements and, for the MSc, an individual research project.

Individual project

The individual project will involve academic research in a specific area of digital forensics. The student will produce a substantial dissertation detailing their investigation and findings. Students are pushed to produce high quality, novel research during this period, and research outcomes are often at the cutting edge of the subject.

Assessment

The assessments on this course are a mixture of written and practical exams, oral presentations, coursework assignments and (MSc only) a thesis.

Your career

Our MSc course and its individual modules, or equivalent, are regularly cited in job adverts for digital forensics jobs. This highlights our real-world learning, application to the work place and our relevance to practitioners.

If you would like to request a visit to Cranfield Defence & Security where you will be able to meet one or more members of the course team and see some of the facilities, please let me know and we will arrange for a member of the course team to contact you to make arrangements - Professor Andrew Shortland - Head of Centre for Cranfield Forensic Institute 



Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
Forensic accounting and the related discipline of forensic audit are fast-developing areas in the commercial world. The major professional accounting firms now have departments offering forensic accounting and audit services, and the demand for expertise in this area is growing exponentially. Read more
Forensic accounting and the related discipline of forensic audit are fast-developing areas in the commercial world. The major professional accounting firms now have departments offering forensic accounting and audit services, and the demand for expertise in this area is growing exponentially.

There is a need for people with specialist skills who can undertake fraud investigations, valuations, assist in dispute resolution, prepare expert reports, and conduct fraud and forensic analysis.

Additionally, you will be required to evaluate the principles of good corporate governance and the integrity of management, and understand the role of computer forensic techniques in an investigatory and legal context.

See the website http://courses.southwales.ac.uk/courses/491-msc-forensic-audit-and-accounting

What you will study

On this course you will study 180 credits from the following modules:

- Corporate Governance (20 credits)
Learn about the systems by which companies are directed and controlled, and their implication for fraud prevention and abuses of power.

- Forensic Audit and Accounting (20 credits)
You will be introduced to the principles of forensic audit and accounting, including theoretical concepts allied to investigation and analysis.

- Research Methods for Finance and Accounting (20 credits)
Gain an appreciation of the academic research process and the underlying elements and principles, developing the skills to critically evaluate and conduct postgraduate research.

- Dissertation (60 credits)
Undertake a significant piece of research into an appropriate area of study.

You will study 60 credits from the following option modules:

- Computer Forensics and Crime Investigation (20 credits)
Learn about the techniques and practices of computer forensics, applied to practical problems encountered by forensic accounting investigators.

- Audit and Assurance in a Global Environment (20 credits)
Gain an appreciation of the knowledge, skills and professional judgement needed in a variety of audit and assurance engagements.

- Expert Witnesses and Dispute Resolution (20 credits)
Gain an understanding of the role of an expert, including dispute resolution methods, legal and procedural requirements for experts in pre-trial and court situations.

- Contemporary Issues (20 credits)
Consider contemporary theories and developments in accounting and auditing thought and practice, including forensic accounting.

Learning and teaching methods

The course is delivered full-time through a combination of lectures, tutorials, computer workshops, case study analysis and discussion groups. You will be exposed to real-life situations and given the skills and opportunities to find practical solutions. You will have the opportunity to use state-of-the-art computer forensic and data analysis software.

Work Experience and Employment Prospects

Employment opportunities are numerous, from specialist firms of forensic accountants to specialist departments within accountancy firms. There are many opportunities in the public and regulatory sectors, as well as employment prospects in commercial organisations, as part of investigatory, internal audit, and compliance departments. Recent graduates from this course are employed in the forensic accounting department of a ‘Big Four’ accountancy firm, and as a Fraud Investigator for a national public sector auditor.

Assessment methods

Assessment methods include examinations and coursework-based assignments.

Facilities

Specialist IT facilities are used where appropriate including audit and computer forensic software.

Read less
Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings. Read more

Why take this course?

Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings.

This course will enable you to develop your understanding and application of security issues and cybercrime for the purpose of forensic computing and investigation.

What will I experience?

On this course you can:

Learn how to investigate hacking, fraud and deception using a range of digital forensic tools
Practise identifying intruders' trails and suspected inappropriate use of internet applications in order to compile scientific evidence to prosecute
Manage a real-life computer engineering project using appropriate techniques for writing and reasoning about security policies

What opportunities might it lead to?

Many police investigations or civil disputes involve investigation of computer systems, mobile phones or other information devices, and there are an increasing number of UK companies that undertake investigations as consultants. You can expect to find career opportunities in such companies as well as in law enforcement and other services.

Accredited by BCS, The Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional (CITP). This course also partially meets the academic requirement for registration, either as a Chartered Scientist (CSci) or (on behalf of the Engineering Council) as a Chartered Engineer (CEng)*.

*On condition that the Master's Engineering Project is successfully completed.

Module Details

You will study four key topics which will collaboratively develop your knowledge and ability to carry out forensic IT investigations as well as an introduction on how to build protected specification software for data and other web applications. You will also get to build your own test system as part of your final project.

Here are the units you will study:

Computer Forensic Investigation and Cryptography: This unit covers the practical aspects of conducting a forensic investigation of digital evidence. In order for the students to develop a critical understanding of computer forensics, a holistic approach of the forensics investigation process is adopted, with a full investigation ‘life cycle’ from seizure of evidence through to giving evidence in court as an expert witness. We look at a range of tools, operating systems and devices.

Computer Security: The unit provides an introduction to computer security concepts and their practical application, in both closed and interconnected networks. Students are expected to both understand and be able to critically evaluate different approaches to securing complex computer systems.

Cybercrime Security and Risk Management: This unit provides opportunities for participants to develop skills and knowledge in the understanding of corporate cyber threats. Drawing upon a range of practical examples, students will examine how rapid technological development and expansion in access to the internet has impacted upon crime (e.g. how anonymity and unfounded trust encourage deception), mapping out the terrain of information technology, and identifying the emerging areas of cyber crime. Areas explored will include the crossing of established boundaries into spaces over which control has already been established such as cyber-intrusion and cyber-theft, but also 'new cyber crimes' in the form of virtual trespass, Denial of Service attacks, and the development of opportunities for offending in the context of social networking websites.

Master's Project: You will undertake either an engineering unit or a study project, during the summer period. The project offers students the opportunity to apply the taught material in the solution of a real-world problem directly related to their course. The engineering project usually involves building a piece of software to solve a problem. An example of the sort of thing you might do would be building a tool to address a specific forensics requirement. The study project usually involves undertaking a study of an IT domain relevant to forensics. To prepare for this the project includes a number of preparatory sessions, which contribute to part of your final mark.

Specialist optional units include:

Systems, Security and Data Analysis: The first part of the unit provides an overview of computer organisation, operating systems and network design, with a strong focus on security considerations and aspects relevant to computer and digital forensics. The early part of the unit will provide an introduction to relevant issues in system architecture and file system organisation. Threats to computer systems will be considered. The first half of the unit is concluded with studying in some depth current technologies for securing real computer networks. The second part of the unit deals with the important topic of data analytics.

Advanced Programming Skills for the Web: This unit draws together a number of system development skills, focusing on how they can be applied to the development specifically of web applications. Topics covered include web programming, connecting databases to web applications, software tools, testing and security.

Programme Assessment

You will be taught through a combination of practical exercises, simulations, lectures, guest lectures and formative assessments, and will be expected to use a wide range of on and offline learning tools.

You will encounter a range of assessment styles depending on the content and nature of the unit topic. This can include written assignments, presentations as well as group and individual lab-based assessments. However, the most significant assessment element is the final dissertation, which reports and reflects on your final project.

Student Destinations

On completing this course, you will be equipped to seek employment in the following areas: IT auditing, information security, independent investigation, Computer Emergency Response Teams (CERT) and law enforcement agencies. Some of our previous graduates have been successful in finding employment within high-tech crime units, commercial investigation and national security bodies, while others go on to further research study at PhD level.

This course will also appeal to already practising professionals in related areas such as law enforcement, system administration, corporate security, IS auditing or security analysis and management for the commercial sector.

Read less
This exciting. MRes Computer Science. course is designed to give you the opportunity to develop research skills in a computing area that meets your interests and career development needs. Read more

This exciting MRes Computer Science course is designed to give you the opportunity to develop research skills in a computing area that meets your interests and career development needs. It allows you to combine material from any of our taught Masters courses in the computing suite with an extended research project over a one-year period.

Current demands are greater than ever for individuals to attain postgraduate levels of qualification in an increasingly competitive jobs market. As a result, the MRes Computer Science has been designed to meet the needs of students and employers, providing superior qualified graduates to national and international employers.

The MRes is divided into a taught element (60 credit points) and a laboratory-based research project (120 credit points).

This MSc Computer Science course offers the chance to study a range of topics in the computer science area, including principles of system design, software engineering, enterprise computing, computing architecture and applications of artificial intelligence. You will also have the opportunity to undertake an individual project, based on subjects that interest you, as well as research at the University or your industrial experience if you do a placement.

Demand for high-level software engineering skills continues to rise. Employers are finding it increasingly hard to recruit suitably qualified programmers and software technologists and so, with its emphasis on the application of the latest research ideas, the course will give you the skills to enjoy a highly rewarding career in the cutting-edge computing industry.

The MSc is divided into 60 credit point taught modules and the research project is worth 60 credit points.

Modules

  • Major Project
  • Research Methods
  • Advanced Software Engineering
  • Systems Analysis and Design
  • Service-oriented Cloud Technologies
  • Applied Artificial Intelligence
  • Mobile Interactive Systems
  • Internet Programming
  • 3D Games Algorithms
  • Computer Forensics
  • Robotics and Cybernetics
  • Computer Security
  • Embedded Systems
  • Mobile Networks
  • Network and Cloud Security
  • Wireless Communications

COME VISIT US ON OUR NEXT OPEN DAY!

Visit us on campus throughout the year, find and register for our next open event on http://www.ntu.ac.uk/pgevents.



Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less
The fascination of forensics combines with the complexity of computing in this stimulating course. Read more
The fascination of forensics combines with the complexity of computing in this stimulating course. A relatively new specialism, electronic security and digital forensics is an area of expertise that’s challenging and rapidly evolving- technology is constantly developing, and therefore so are the problems that go along with it.


Why study Electronic Security and Digital Forensics at Middlesex?

The smooth running of societies and economies is now dependent on the security of computer networks, and cyber crime, from fraud, identity theft and cyber stalking to terrorism and espionage, can affect anyone and is at the forefront of government policy. But many court cases have collapsed because of a lack of experts trained in the meticulous art of tracking down evidence. Our innovative course was created to meet the demand for skills in an area that’s chronically short of well-qualified graduates.

The course has a strong practical focus, with an emphasis on both in-depth technical and legal theory and hands-on project work. You’ll work in our specialist computer forensics laboratory in our award-winning technology centre, using the latest forensic software, including Forensic Toolkit version 5.0, Encase version 7.0 and Micro Systemation XRY Complete. You’ll also have the opportunity to achieve XRY Logical certification during the course.

Course highlights:

We have strong links with industry - we work with companies such as Microsoft and Siemens, and we are a Cisco local academy and a Xilinx university partner.
The course is accredited by the British Computer Society for Chartered IT Professional (CITP) status. This means that on graduation, you’ll have fulfilled the academic requirements for achieving those titles, though you’ll need to complete further professional development.
The course is led by Dr Carlisle George, a former barrister who has co-edited two books on regulatory issues in healthcare information. He is a member of the editorial board of the International Journal of Electronic Security and Digital Forensics and leads the university’s ALERT (Aspects of Law and Ethics Related to Technology) research group.
You’ll also improve your communication, teamwork, time-management, organisational, analytical and critical skills.

Read less

Show 10 15 30 per page



Cookie Policy    X