• Northumbria University Featured Masters Courses
  • Aberystwyth University Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
King’s College London Featured Masters Courses
Nottingham Trent University Featured Masters Courses
University of the West of England, Bristol Featured Masters Courses
University of Leicester Featured Masters Courses
University of the West of England, Bristol Featured Masters Courses
"computer" AND "network" …×
0 miles

Masters Degrees (Computer Network Security)

We have 232 Masters Degrees (Computer Network Security)

  • "computer" AND "network" AND "security" ×
  • clear all
Showing 1 to 15 of 232
Order by 
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:

  • EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
  • Specialist input from guest lecturers
  • Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
  • Specialist technicians to ensure you can get the most out of these technologies.

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the full course document.

Core modules

Digital Forensics pathway

Cyber Security Pathway

Professional accreditation

This programme is accredited by BCS, The Chartered Institute for IT, for fully meeting the further learning educational requirement for Chartered IT Professional (CITP) status and for partially satisfying the underpinning knowledge requirements set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC) and the Science Council for Chartered or Incorporated Engineer (CEng or IEng) status. Note that there are additional requirements, including work experience, to achieve full CITP, CEng, or IEng status. Graduates of this accredited degree will also be eligible for professional membership of BCS (MBCS).

The BCS accreditation is an indicator of the programme’s quality to students and employers; it is also an important benchmark of the programme’s standard in providing high quality computing education, and commitment to developing future IT professionals that have the potential to achieve Chartered status. The programme is also likely to be recognised by other countries that are signatories to international accords.

Career path

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;


Read less
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. Read more
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. In this course, you will develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and enhance and challenge your knowledge of computer networking and cyber security.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course, for example in networking, network security and cyber security, IT security, computer forensics. Careers range from the traditional network and network security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
Overview. Keeping computer systems secure is one of the most important challenges of our time. Heriot-Watt has created a programme which teaches the theory, methods and tools of computer network security. Read more

Overview

Keeping computer systems secure is one of the most important challenges of our time. Heriot-Watt has created a programme which teaches the theory, methods and tools of computer network security. It’ll give you the knowledge to help you keep networks safe from attacks and threats by hostile parties, plus the skills to formulate policies, deploy network security solutions and validate their effectiveness. The course also offers a detailed understanding of contemporary issues in network security research areas. Our masters in Network Security is ideally suited for honours graduates with an IT background.

Course length

The full-time Network Security masters starts in mid September and lasts one year. The course can also be taken part-time over two years, or as a nine month Postgraduate Diploma.

Course content

Core Courses:

  • Computer Network Security
  • Industrial Programming
  • Advanced Network Security
  • Research Methods and Project Planning
  • Masters Project and Dissertation

Optional Courses:

  • Database and Information Systems
  • Data Communications and Networking
  • Mobile Communications and Programming
  • Rigorous Methods for Software Engineering
  • Software Engineering Foundations
  • Advanced Software Engineering
  • Big Data Management
  • Distributed and Parallel Technologies
  • Network Applications

8 taught courses (4 mandatory + 4 optional) plus a dissertation

For more detailed information on this programme or the opportunity to talk directly with one of our programme director's please email: " target="_blank">



Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more

This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Through our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Full time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Part time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Year 2

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Careers

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.



Read less
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Read more
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and work experience opportunities are available in a relevant working environment before you undertake your final project. This additional and crucial element will provide a unique student experience that will enhance your employability after graduation.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

Although each of the modules taught in the above courses have a significant hands-on practical workshops the idea of introducing actual "Work Experience" in a relevant working environment is unique and we believe this additional and crucial element will provide a unique student experience that will help their employability after graduation. The course team will guarantee a paid employment opportunity for all students taking the Computer Networking and Security With Work Experience. The Cisco Academy manager has built a network of relevant employers in the past 15 years through the Networking Academy and its contacts. The academy has currently 18 smaller academies providing continuous technical and academic support as well as training their instructors according to Cisco’s regulations. These academies are mainly local and range from schools to technical colleges. It is hoped that students on this course will be able to be placed in these academies for their work experience part of the course.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Work Experience (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course:for example in Networking, Network Security and Cyber Security, IT Security, Computer Forensics. Careers range from the traditional Network and Network Security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

[Moving to one campus]]
Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
Would you like to update, extend and deepen your knowledge in Networking Technologies? This course combines learning opportunities designed to enhance the depth and breadth of your knowledge in core themes including routing, switching, wireless and network security. Read more
Would you like to update, extend and deepen your knowledge in Networking Technologies? This course combines learning opportunities designed to enhance the depth and breadth of your knowledge in core themes including routing, switching, wireless and network security.

By studying this course you will develop the theoretical knowledge and practical skills required for employment in the network industry. The course has been designed with a complementary set of modules to enable you to complete external CISCO and CCNP examinations in addition to achieving the MSc qualification. You will graduate with the educational requirements for BCS, the Chartered Institute for IT, Chartered IT Professional Registration and for Chartered Engineer status.

This course can also be taken in January and has an advanced practice option - for more information, please view the relevant web-page:
16 months full time - https://www.northumbria.ac.uk/study-at-northumbria/courses/computer-network-technology-msc-ft-dtfcty6/

2 years full time with advanced practice - https://www.northumbria.ac.uk/study-at-northumbria/courses/computer-network-technology-with-advanced-practice-msc-dtscte6/

Learn From The Best

Our course is at the forefront of current knowledge and practice, shaped by world-leading and internationally excellent research. Our staff are both inspirational academics with a passion for their subject and industry experts with extensive experience in their field. They combine their research passions, teaching interests and professional expertise to shape the curriculum and ensure the currency of the course. The team include published authors and senior members of IEEE, with interests including web design and development, web programming, image engineering and security, computer networks, image processing and information research methods.

Teaching And Assessment

Studying with us will provide you with a wide range of learning opportunities in a challenging, stimulating and dynamic environment. You will participate in lectures, small group seminars, laboratory sessions, simulated practical skills sessions, and field study visits where appropriate. There is an emphasis on independent learning and using new research development in the relevant subject area. You will be expected to evaluate theoretical or practical frameworks for the analysis and critical evaluation of a variety of issues, informed by recent research.

Module Overview
KD7048 - Switch: IP Switched Networks and Troubleshooting (Core, 20 Credits)
KF7003 - Network Security (Core, 20 Credits)
KF7026 - ROUTE: IP Routing and Troubleshooting (Core, 20 Credits)
KF7028 - Research Methods and Project Management (Core, 20 Credits)
KF7029 - MSc Computer Science & Digital Technologies Project (Core, 60 Credits)
KF7031 - Wireless Networks and Security (Core, 20 Credits)
KF7046 - Computer Network Implementation (Core, 20 Credits)

Learning Environment

When you want to get hands-on with technology and really understand how everything connects, how to create games or protect data integrity, our range of specialist facilities will support you. Through our computer network technology labs, digital security lab, animation and visual effects studios, games studio, and other specialist facilities, you will be able to investigate, diagnose, apply fixes and protections to ensure that organisations can make the best use of their technology.

You will be supported in your learning, where appropriate, via an eLearning portal (Blackboard) that provides remote access to course materials, by electronic submission and feedback on your assessments, and online reading lists.

Research-Rich Learning

Industry practice has strongly influenced the design of this course, and the content will evolve in line with developments in industry and in the subject as an academic discipline. Staff research and industrial expertise informs the teaching in all years with 58% of the department of Computer Science and Digital Technologies research outputs were ranked world-leading or internationally excellent according to the 2014 UK-wide Research Excellence Framework. This figure makes us the leading Modern University in the North East for research power.

The department’s academic research interests include imaging for forensics and security, biometrics, homeland security, image/video watermarking and cryptography.

Give Your Career An Edge

This course is designed to provide you with the knowledge and skills necessary for postgraduate employment in computer networking and network security, and progression to further study if desired. Within the course the choice of skill and knowledge areas, tools, techniques and methods has been made to ensure you are immediately valuable to employers, both at the placement and at the graduate stage.

Because of our reputation for strong partnerships with employers and the success of our graduates, we have an incredibly strong and international industry network. Our students have benefited from working with household names like CERN, Nissan, IBM, Hewlett Packard, Procter & Gamble, Nintendo, Microsoft, Accenture and many more.

Your Future

The increasing demand for specialists in network security and network programming means that graduates have excellent employment prospects in Computer Network Technology, including roles such as Network designer, Network manager, and Network engineer, as well as many other roles across public and private organisations. Alternatively, you will be very well equipped for further research in an academic or research and development environment, and the mix of research, numerical and problem-solving skills are desirable to careers outside of this subject.

Through your coursework, you will have developed and applied computational, communication, research and team-working skills. Learning independently, managing yourself and others on project tasks, and evaluating and reflecting upon practitioner experience are all essential skills of the computing professional which your modules help to develop, providing you with opportunities to practise and demonstrate proficiency for your future career.

Read less
On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. Read more

On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. In the Cyber Security course, Swansea Computer Science takes a holistic and interdisciplinary approach, bringing together modules on diverse topics such as penetration testing, formal modelling, information security management, cryptography and AI in order to equip our students with a suitable mindset for a career in cyber security. The department's cyber security lab provides the perfect backdrop for exploring the security landscape, allowing Cyber Security students and staff to carry out experiments in network security, mobile security, and to explore threats and defence mechanisms in the context of the Internet of Things.

Key Features of the MSc in Cyber Security

  • We are top in the UK for career prospects [Guardian University Guide 2018]
  • 5th in the UK overall [Guardian University Guide 2018]
  • 7th  in the UK for student satisfaction with 98% [National Student Survey 2016]
  • We are in the UK Top 10 for teaching quality [Times & Sunday Times University Guide 2017]
  • 12th in the UK overall and Top in Wales [Times & Sunday Times University Guide 2017]
  • 91.9% in graduate employment or further study six months after leaving University [DHLE Survey 2016]
  • UK TOP 20 for Research Excellence [Research Excellence Framework 2014]
  • Our Project Fair allows students to present their work to local industry
  • Strong links with industry
  • £31m Computational Foundry for computer and mathematical sciences will provide the most up-to-date and high quality teaching facilities featuring world-leading experimental set-ups, devices and prototypes to accelerate innovation and ensure students will be ready for exciting and successful careers. (From September 2018)
  • Top University in Wales [Times & Sunday Times University Guide 2017]

Our increasingly connected world presents continual new and serious security threats. From privacy violations (hacking, monitoring communications, leaking sensitive data, stealing and publishing private information) through to the drugs trade, sex trafficking and terrorism, Computer Science can provide the techniques required for mitigating such risks, in order to provide secure, reliable and trustworthy systems.

Taught component: The MSc in Cyber Security offers a range of modules, taught by internationally renowned researchers and covering topics such as: Cryptography and Network Security, Penetration Testing, Information Security Management, Embedded Systems Modelling and Verification Techniques, Web Application Development, Blockchain, Cryptocurrencies and Smart Contracts, Advanced Topics: AI and Cyber Security Invention and Innovation in Computing.

Dissertation component: A further four months duration is spent undertaking a substantial research project (60 credits), which will involve using and exploring cutting edge techniques for specifying, developing, verifying and accessing systems against security criteria. Cyber Security Students will benefit from our broad range of industrial partners and internationally leading research expertise.

Possible Future Pathways: Cyber Threat Analyst - Penetration Tester PhD Researcher - Data Security Analyst Secure Web Developer - Verification Engineer.

Modules

Modules on the Cyber Security course may include:

  • Information Security Management
  • Computer Science Project Research Methods
  • Critical Systems
  • IT-Security: Cryptography and Network Security
  • Security Vulnerabilities and Penetration Testing
  • Invention and Innovation in Computing
  • Blockchain, Cryptocurrencies and Smart Contracts
  • Advanced Topics: Artificial Intelligence and Cyber Security
  • Web Application Development
  • Embedded System Design

Facilities for MSc in Cyber Security

The Department is well equipped for teaching, and is continually upgrading its laboratories to ensure equipment is up-to-date – equipment is never more than three years old, and rarely more than two. Currently, students use three fully networked laboratories: one, running Windows; another running Linux; and a project laboratory, containing specialised equipment. These laboratories support a wide range of software, including the programming languages Java, C# and the .net framework, C, C++, Haskell and Prolog among many; integrated programme development environments such as Visual Studio and Netbeans; the widely-used Microsoft Office package; web access tools; and many special purpose software tools including graphical rendering and image manipulation tools; expert system production tools; concurrent system modelling tools; World Wide Web authoring tools; and databases.

As part of our expansion, we are building the Computational Foundry on our Bay Campus for computer and mathematical sciences. As a student on the MSc in Cyber Security, you will study at the Bay Campus in the new Computational Foundry, a dedicated £32 million building for computational studies, providing the latest labs, resources and ecosystems for world leading, interdisciplinary research.

Careers for MSc in Cyber Security Graduates

All Computer Science courses including the MSc in Cyber Security will provide you the transferable skills and knowledge to help you take advantage of the excellent employment and career development prospects in an ever growing and changing computing and ICT industry.

94% of our Postgraduate Taught Graduates were in professional level work or study [DLHE 14/15].

Jobs include:

  • Software Engineer: Motorola Solutions
  • Change Coordinator: Logica
  • Software Developer/Engineer: NS Technology
  • Workflow Developer: Irwin Mitchell
  • IT Developer: Crimsan Consultants
  • Consultant: Crimsan Consultants
  • Programmer: Evil Twin Artworks
  • Web Developer & Web Support: VSI Thinking
  • Software Developer: Wireless Innovations
  • Associate Business Application Analyst: CDC Software
  • Software Developer: OpenBet Technologies
  • Technical Support Consultant: Alterian
  • Programming: Rock It
  • Software Developer: BMJ Group


Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

There are six entry points through the year. This allows you to start when it is most suitable. The entry points are:

• September
• November
• January
• March
• June
• July

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics-12-months

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

This course gives you skills that are valuable for a career within Computer Security and Forensics but it is also relevant for a much wider range of applications.

The unit ‘Research Methodologies and Project Management’ in particular requires you to work in a team to apply current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

This course is offered via block delivery. There are two entry points (October and November). This allows you to start when it is most suitable.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics#entry

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
The programme is to educate our students in the design, implementation and troubleshooting of Computer Networks and high performance cluster computing scenarios. Read more
The programme is to educate our students in the design, implementation and troubleshooting of Computer Networks and high performance cluster computing scenarios. The programme includes material required for the Cisco Certified Network Professional (CCNP) qualification, and students can work towards this internationally recognised qualification alongside their MSc degree.

Course Overview

This programme aims to provide in-depth knowledge and skills in the specialist area of networking. It has been developed in response to the need for personnel equipped with the skills needed to design, implement and troubleshoot an enterprise computer network infrastructure

The course is designed primarily for science and technology graduates who have some prior knowledge of computing and/or networking and who wish to specialise in computer networking.

The School is a Cisco Academy, an Academy Support Centre and an Instructor Training Centre. The School has been delivering Cisco Networking Academy programme since 1999. The Master’s programme is blended with Cisco Certified Network Professional (CCNP) curriculum. Cisco is the world’s leading network device manufacturer and the CCNP is a prominent professional qualification in the networking industry.

Modules

Part 1:
-Emerging Network Technologies(20 credits)
-Implementing IP Routing (20 credits)
-IP Switched Networks (20 credits)
-Leadership and Management (20 credits)
-Network Security (20 credits)
-Research Methods and Data Analysis (20 credits)

Part 2:
-Major Project (60 credits)

Key Features

The Internet has now become part of our day-to-day life and is growing rapidly even during recessions. An expanding mobile communications backbone (as evinced by the number of smartphones being projected to rise from 500 million in 2011 to 2 billion by 2015) has led to greatly increased mobile internet traffic.

To take advantage of this opportunity, companies will require staff who are skilled in network design, implementation, administration, management and analysis. Students on this programme will also be given an opportunity to study towards industrial qualifications such as Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professionals (CCNP).

Assessment

Student works are assessed through combination of coursework, lab-based practical exams and written examinations. The final mark for some modules may include one or more pieces of course work set and completed during the module. Project work is assessed by a written report and oral presentation. Part 2 requires the student to research and prepare an individual project/dissertation of a substantial nature.

University students who are unable to successfully complete all aspects of the Part 1 may be eligible for a Postgraduate Diploman (120 credits) or Postgraduate Certificate (60 credits).

Career Opportunities

The programme emphasises four key themes within Computer Networking: routing and switching, emerging network technologies, network design, and security. Graduates will undertake a range of tasks associated with networking in organisations, and will be capable developing sophisticated solutions to networking problems. It is anticipated that graduates in the field of computer networks would be able to find employment in a number of different areas, including routing and switching, network design, VoIP, and security.

It is expected that graduates would seek positions such as:
-Network Administrators
-Network Associates
-Network Engineers
-Senior Network Engineers
-Network Support Engineers
-Security Engineers
-Systems Engineers
-Network Specialists
-Network Analysts

Read less
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree. Read more
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree.

The department of computer science offers a graduate certificate (consisting of four courses each) in Computer Security (IA).

Students will select four of the following courses:

CSC 525 Operating Systems
CSC 535 Networks and Data Communication
CSC 555 Software Engineering
CSC 583 Topics in Computer Security
CSC 586 Sytem Administration and Security
CSC 588 Wireless Programming and Security
CSC 603 Advanced Seminar in Security
CRJ 555 Topical Seminar in Criminal Justice

Please visit the website for more information about these modules:

http://catalog.wcupa.edu/graduate/sciences-mathematics/computer-science/#coursestext

The Computer Science Information Security Centre

The Computer Science Information Security Center (ISC) recognizes that no computer science graduate should be without information security knowledge. Toward this end, the Computer Science Department has introduced Information Security content such as computer and network security across the undergraduate and graduate curricula.

The curricula set forth by the ISC has been certified by the NSA to meet the National Training Standards for Information Systems Security Professionals (4011) and Systems Administrators (4013).

Career Prospects

Program graduates are employed in the following fields:

• Computer and Information Systems Managers
• Information Security Analysts
• Database Administrators
• Network and Computer Systems Administrators
• Computer Network Architects
• Telecommunications Engineering Specialists
• Computer Network Support Specialists

Read less
Course Overview. This masters degree course in Cyber Security is being offered by the School of Computing and Engineering and has been developed in response to a high demand for cyber security professionals with systematic understanding of the principles and technologies underpinning today's IT systems. Read more

Course Overview

This masters degree course in Cyber Security is being offered by the School of Computing and Engineering and has been developed in response to a high demand for cyber security professionals with systematic understanding of the principles and technologies underpinning today's IT systems.

The School of Computing and Engineering has partnered with leaders within the security industry to provide you with a course which will enable you to gain comprehensive knowledge and critical skills in computer security. This course will enable you to pursue a career as a cyber security professional in either the public or the private sector.

Why choose this course?

This course is offered with a 6 months internship. The internship on the course will allow you to gain first hand work experience within the industry, it will enable you to improve and acquire new skills. Throughout the internship you will be encourages to explore various career opportunities, network and work with others as part of a team. It will also enhance your understanding of the world and what constitutes professional practice in the workplace.

In today’s digital world cyber security plays an integral role, people trained in this field are greatly sought after and the course is designed to meet the huge market demand for cyber security professionals. Partnering with leading security industry, this course combines theory and practice, balancing cutting-edge security technologies and solutions with concepts and principles of cyber security.

The course aims to develop your ability to analyse the legal, social, ethical and professional issues involved in the human aspects of cyber security and be guided by the adoption of appropriate professional, ethical and legal practices. 

The course aims to develop your critical skills and techniques to appropriately solve typical cyber security problems, enabling you to choose from a range of security related jobs/roles in a rapidly evolving and diverse environment.

This course provides routes into a diverse range of career opportunities in the information and communications technology (ICT) industry and in organisations that are data and knowledge intensive. Employers require information security officers at all levels including:

  • Chief Information Security Officer
  • Network and Computer Security Engineers
  • Security Managers and Consultants
  • Penetration Testers
  • Cybersecurity Analysts
  • Security Investigators
  • Security Researchers.

You will have access to laboratories and dedicated ICT suites with specialist networks and software as well as excellent resources for study space and meetings.

Modules

  • Fundamentals of Cyber Security
  • Security Management
  • Network and Systems Security
  • Research Methods
  • Learning and Professional Development 
  • Employability Skills and Employment
  • Dissertation

Optional Modules:

  • Distributed Application Development 
  • Mobile Web Component Development 
  • Principles of Project Management 
  • Consultancy and Technical Innovation 
  • Security Operations and Assurance 
  • Data Architecture
  • Knowledge Management

Career and study progression

The security industry includes government and law enforcement as well as providers of equipment and services, such as the:

  • anti-virus, security software vendors (such as McAfee, Kaspersky, Symantec, Sophos)
  • network and computer vendors (such as Cisco, Juniper, Palo Alto, HP, Barracuda)
  • network and service providers (such as British Telecom, Vodafone, Rackspace, Amazon)
  • consultancies (such as KPMG, IBM, Fujitsu, HP)

The School of Computing and Engineering also has a growing research and enterprise culture with thirty PhD students as well as a diversity of research groups.

Outstanding graduates can continue their studies at the level of MPhil and PhD at UWL.

How to apply

Click the following link for information on how to apply to this course.

Scholarships and bursaries

Information about scholarships and bursaries can be found here.



Read less
The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Read more

The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Whilst these technologies bring us untold benefits, they also expose businesses, governments and individuals to repeated threats, such as fraud through data manipulation, deliberate sabotage and blackmail. As a result, businesses, governments and individuals around the world rely on the expertise and innovations of information security specialists, without which global communications systems would grind to a halt.

Want to join this expanding field and learn from the very best? Our flagship Information Security programme was the first of its kind in the world. It is certified by GCHQ, the UK Government Communications Headquarters, and taught by academics and industrial partners in one of the largest and most established Information Security Groups in the world. We are a UK Academic Centre of Excellence for cyber security research, and an Engineering and Physical Sciences Research Council (EPSRC) Centre for Doctoral Training in cyber security. We work closely with industry, and much of our curriculum and research is informed and audited by the industry itself. Our teachers are specialists in the field, with backgrounds in computer science, engineering, mathematics, statistics and the social sciences.

Our broad curriculum encompasses cryptography, fraud detection, system security, network security, device security and the study of how security itself should be managed. You will learn about the technical, legal and commercial aspects of the industry and have the chance to complete a supervised dissertation on a topic of your choice. In a typical year you could benefit from lectures and seminars given by as many as 50 different guest speakers. You will also have access to our virtualisation software, for experimenting with network security settings and ideas, as well as to our Penetration Testing Laboratory and industry-sponsored Smart Card Centre.

We offer a friendly, supportive learning environment and you will have a dedicated personal adviser to guide you through your studies. The skills you gain will open up a range of high-level career options and provide a solid foundation if you wish to progress to a PhD. Our graduates are in demand for their cutting-edge grasp of the field as well as their technical expertise and transferrable skills such as data handling, analysis, problem solving and research. The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

  • Join a world-class Information Security Group, recognised as an Academic Centre of Excellence by the UK Government.
  • Learn from an interdisciplinary team of renowned information security specialists who are involved in pioneering research in the field.
  • Benefit from our close ties with the information security industry.
  • Enjoy the flexibility to tailor your degree to your particular interests and complete a supervised research project of your own.

The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

Course structure

Core modules

  • Security Management
  • Introduction to Cryptography and Security Mechanisms
  • Project
  • Network Security
  • Computer Security (Operating Systems)
  • Security Technologies
  • Secure Business Architectures

Optional modules

In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.

  • Legal and Regulatory Aspects of Information Security
  • Advanced Cryptography
  • Database Security
  • Cyber Crime
  • Smart Cards, RFIDs and Embedded Systems Security
  • Software Security
  • Digital Forensics
  • Security Testing - Theory and Practice
  • Cyber Security

Teaching & assessment

We use a range of teaching methods, including seminars, lectures and practical lab work. There is a strong focus on small group teaching. The programme has a flexible, modular structure, combining a sueprvised dissertation and mandatory courses that together make up 120 of the 180 credits required to pass, with a range of optional modules on specialist topics, worth 20 credits each.

During your studies you will be invited to attend an intensive, two-day revision course to prepare for the Certified Information Systems Security Professional (CISSP) exams, which you will then be able to sit on campus, through an established arrangement with (ISC)2.

Assessment is through a combination of end-of-year examinations sat in May or June and the written dissertation, which has to be submitted in September.

Your future career

By the end of this programme you will possess the knowledge and skills to pursue a career as a cyber security professional, and an ideal basis for moving on to further postgraduate research if you prefer. You will have an advanced knowledge and understanding of the latest breakthroughs and techniques, as well as key challenges and opportunities in the field. This programme will also give you valuable transferable skills such as advanced IT skills, data handling, analysis, research, communication, problem solving, time management, adaptability and self-motivation.

Our graduates are highly employable and in recent years they have gone on to forge successful careers in a wide range of sectors, including: banking, telecommunications, security consultancies, the civil service, public utilities and the retail sector.

You will be assigned a personal advisor to guide you through your studies and advise you on further postgraduate opportunities. The campus Careers team will be on hand to offer advice and guidance on your chosen career and the University of London Careers Advisory Service runs regular sessions on finding summer internships or vacation employment and securing employment after graduation.



Read less

Show 10 15 30 per page



Cookie Policy    X