• Ross University School of Veterinary Medicine Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • Swansea University Featured Masters Courses
  • University of Southampton Featured Masters Courses
  • Anglia Ruskin University Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
Cranfield University Featured Masters Courses
Queen Mary University of London Featured Masters Courses
FindA University Ltd Featured Masters Courses
Cass Business School Featured Masters Courses
Swansea University Featured Masters Courses
"computer" AND "networks"…×
0 miles

Masters Degrees (Computer Networks And Security)

We have 199 Masters Degrees (Computer Networks And Security)

  • "computer" AND "networks" AND "security" ×
  • clear all
Showing 1 to 15 of 199
Order by 
Companies are becoming ever more dependent on their information networks for mission-critical operations. They want highly trained networking professionals to keep them operational, available, resilient and efficient. Read more
Companies are becoming ever more dependent on their information networks for mission-critical operations. They want highly trained networking professionals to keep them operational, available, resilient and efficient.

The myriad of threats towards these networks are changing constantly. Security polices and mitigation techniques have to keep pace with these threats in order to allow genuine traffic out of and into our corporate networks whilst controlling the malicious users.

This course will give you the knowledge, lifelong learning skills and enthusiasm needed to support and manage both corporate networks and security systems. As part of the award you will participate in the CISCO Networking Academy Programme and you'll prepare for the widely accepted industry CCNA Security and Cisco Certified Network Professional (CCNP) certifications.

We encourage you to complete a one-year industrial placement as part of this course. You could work with small enterprises or large companies like Cisco, Amazon and Thomson Reuters. We even send our students on placements to Cisco's European HQ in Brussels, we are the only UK University that currently does so.
We encourage International students on the Tier 4 visa , once enrolled, to apply for a placement. Students who are successful with finding a placement will be provided with help and advice with their visa extension application (subject to the University deadlines and Immigration requirements).

Course content

In your first study stage, the PgC, you will study five modules - a mix of award cores and networking or networking and security options. In the second stage the PgD you will study a further four modules. (Upon successful completion of 4 modules you will be eligible for a PgC in Computer Science) On finishing the PgC and before starting the dissertation you have the opportunity to undertake a work placement of 12 months. You will finish your award by completing a dissertation on a network related topic.

Core modules
-Networking Concepts (Two weeks pre-enrolment)
-Research Methods
-Professional Switched Networks
-Network Security
-Computer Security: Low-Level
-Virtualisation
-Advanced Quality of Service Techniques over a Converged Network
-Professional Routed Networks
-Maintaining a Converged IP Based Network
-Dissertation

Graduate destinations

Graduates from our Computer Networks and Security award join large and small organisations within graduate programs and as direct employees. Our graduates are in high demand by the networking industry. Companies include Cisco, Meraki, GCHQ, BT, Amazon and Layer3.

Read less
The programme is to educate our students in the design, implementation and troubleshooting of Computer Networks and high performance cluster computing scenarios. Read more
The programme is to educate our students in the design, implementation and troubleshooting of Computer Networks and high performance cluster computing scenarios. The programme includes material required for the Cisco Certified Network Professional (CCNP) qualification, and students can work towards this internationally recognised qualification alongside their MSc degree.

Course Overview

This programme aims to provide in-depth knowledge and skills in the specialist area of networking. It has been developed in response to the need for personnel equipped with the skills needed to design, implement and troubleshoot an enterprise computer network infrastructure

The course is designed primarily for science and technology graduates who have some prior knowledge of computing and/or networking and who wish to specialise in computer networking.

The School is a Cisco Academy, an Academy Support Centre and an Instructor Training Centre. The School has been delivering Cisco Networking Academy programme since 1999. The Master’s programme is blended with Cisco Certified Network Professional (CCNP) curriculum. Cisco is the world’s leading network device manufacturer and the CCNP is a prominent professional qualification in the networking industry.

Modules

Part 1:
-Emerging Network Technologies(20 credits)
-Implementing IP Routing (20 credits)
-IP Switched Networks (20 credits)
-Leadership and Management (20 credits)
-Network Security (20 credits)
-Research Methods and Data Analysis (20 credits)

Part 2:
-Major Project (60 credits)

Key Features

The Internet has now become part of our day-to-day life and is growing rapidly even during recessions. An expanding mobile communications backbone (as evinced by the number of smartphones being projected to rise from 500 million in 2011 to 2 billion by 2015) has led to greatly increased mobile internet traffic.

To take advantage of this opportunity, companies will require staff who are skilled in network design, implementation, administration, management and analysis. Students on this programme will also be given an opportunity to study towards industrial qualifications such as Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professionals (CCNP).

Assessment

Student works are assessed through combination of coursework, lab-based practical exams and written examinations. The final mark for some modules may include one or more pieces of course work set and completed during the module. Project work is assessed by a written report and oral presentation. Part 2 requires the student to research and prepare an individual project/dissertation of a substantial nature.

University students who are unable to successfully complete all aspects of the Part 1 may be eligible for a Postgraduate Diploman (120 credits) or Postgraduate Certificate (60 credits).

Career Opportunities

The programme emphasises four key themes within Computer Networking: routing and switching, emerging network technologies, network design, and security. Graduates will undertake a range of tasks associated with networking in organisations, and will be capable developing sophisticated solutions to networking problems. It is anticipated that graduates in the field of computer networks would be able to find employment in a number of different areas, including routing and switching, network design, VoIP, and security.

It is expected that graduates would seek positions such as:
-Network Administrators
-Network Associates
-Network Engineers
-Senior Network Engineers
-Network Support Engineers
-Security Engineers
-Systems Engineers
-Network Specialists
-Network Analysts

Read less
Increasingly, computer networks cannot be considered without the important issue of security; without secure networks, businesses, commerce and communications would all fail. Read more
Increasingly, computer networks cannot be considered without the important issue of security; without secure networks, businesses, commerce and communications would all fail. This course addresses the need for modern computer network professionals.

You cover topics such as current and future internet protocols, programming networked services and securing these systems. We offer a strong practical element through laboratory programmes in software engineering and in computer networking; laboratory work in security includes unique environments where the techniques of the attackers can be observed and stopped using specialist security tools.

Our School is a community of scholars leading the way in technological research and development. Today’s computer scientists are creative people who are focused and committed, yet restless and experimental. We are home to many of the world’s top scientists, and our work is driven by creativity and imagination as well as technical excellence.

We are ranked Top 10 in the UK in the 2015 Academic Ranking of World Universities, with more than two-thirds of our research rated ‘world-leading’ or ‘internationally excellent (REF 2014).

This course is also available on a part-time basis.

Professional accreditation

This degree is accredited by the Institution of Engineering and Technology (IET).This accreditation is increasingly sought by employers, and provides the first stage towards eventual professional registration as a Chartered Engineer (CEng).

Our expert staff

Specialist staff researching computer networks include Professor Mohammed Ghanbari, Dr Nigel Newton, Professor Stuart Walker, and Professor Klaus McDonald-Maier.

More broadly, our research covers a range of topics, from materials science and semiconductor device physics, to the theory of computation and the philosophy of computer science, with most of our research groups based around laboratories offering world-class facilities.

In recent years we have attracted many highly active research staff and we are conducting world-leading research in areas such as evolutionary computation, brain-computer interfacing, intelligent inhabited environments and financial forecasting.

Our impressive external research funding stands at over £4 million and we participate in a number of EU initiatives and undertake projects under contract to many outside bodies, including government and industrial organisations.

Specialist facilities

We are one of the largest and best resourced computer science and electronic engineering schools in the UK. Our work is supported by extensive networked computer facilities and software aids, together with a wide range of test and instrumentation equipment.
-We have six laboratories that are exclusively for computer science and electronic engineering students. Three are open 24/7, and you have free access to the labs except when there is a scheduled practical class in progress
-All computers run either Windows 7 or are dual boot with Linux
-Software includes Java, Prolog, C++, Perl, Mysql, Matlab, DB2, Microsoft Office, Visual Studio, and Project
-Students have access to CAD tools and simulators for chip design (Xilinx) and computer networks (OPNET)
-We also have specialist facilities for research into areas including non-invasive brain-computer interfaces, intelligent environments, robotics, optoelectronics, video, RF and MW, printed circuit milling, and semiconductors

Your future

Graduates of our degree in this area have found work in a variety of networking roles and companies including, network management for companies, Internet service providers and developers for security products both in the UK and overseas.

Our recent graduates have progressed to a variety of senior positions in industry and academia. Some of the companies and organisations where our former graduates are now employed include:
-Electronic Data Systems
-Pfizer Pharmaceuticals
-Bank of Mexico
-Visa International
-Hyperknowledge (Cambridge)
-Hellenic Air Force
-ICSS (Beijing)
-United Microelectronic Corporation (Taiwan)

We also work with the university’s Employability and Careers Centre to help you find out about further work experience, internships, placements, and voluntary opportunities.

Example structure

-MSc Project and Dissertation
-Computer Security
-IP Networking and Applications
-Networking Principles
-Networks Laboratory
-Professional Practice and Research Methodology
-Programming in Python
-Cloud Technologies and Systems (optional)
-Data Science and Decision Making (optional)
-Converged Networks and Services (optional)
-Creating and Growing a New Business Venture (optional)
-Mobile Communications (optional)
-Advanced Transport Networks (optional)
-Network Security and Cryptographic Principles (optional)

Read less
Increasingly, computer networks cannot be considered without the important issue of security; without secure networks, businesses, commerce and communications would all fail. Read more
Increasingly, computer networks cannot be considered without the important issue of security; without secure networks, businesses, commerce and communications would all fail. This course addresses the need for modern computer network professionals.

You cover topics such as current and future internet protocols, programming networked services and securing these systems. We offer a strong practical element through laboratory programmes in software engineering and in computer networking; laboratory work in security includes unique environments where the techniques of the attackers can be observed and stopped using specialist security tools.

Our School is a community of scholars leading the way in technological research and development. Today’s computer scientists are creative people who are focused and committed, yet restless and experimental. We are home to many of the world’s top scientists, and our work is driven by creativity and imagination as well as technical excellence.

We are ranked Top 10 in the UK in the 2015 Academic Ranking of World Universities, with more than two-thirds of our research rated ‘world-leading’ or ‘internationally excellent (REF 2014).

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Today there are high level tools easily available to perform sophisticated attacks on computer and network systems. As a result computer network security is a very important consideration in every organisation using computer networks. Read more
Today there are high level tools easily available to perform sophisticated attacks on computer and network systems. As a result computer network security is a very important consideration in every organisation using computer networks. Without proper implementation, businesses could suffer financial losses. There are excellent opportunities in this area with excellent rewards. At present there are skills shortages globally in some areas of security which is an indicator of the demand for highly skilled security professionals.

The MSc in Computer Networks with Security aims to produce postgraduates with an advanced understanding of modern networks with the integrated need of security. The course aims to prepare the student with specialist knowledge and skillset in key areas such as threat analysis, network security systems, cryptography, cybersecurity, penetration testing, wireless security and information security. Students will develop skills to critically evaluate the threats and vulnerabilities of network systems and to implement and integrate security strategies. They will also be able to develop the ability to critically evaluate and implement principles and practices used in modern day cryptography used to secure data and communication in computer network systems. There will be an opportunity to explore current security tools used in penetration testing and get hands on experience at configuring enterprise level security appliances such as firewalls, intrusion detection systems and VPNs.

Course structure

Each MSc course consists of three learning modules (40 credits each) plus an individual project (60 credits). Each learning module consists of a short course of lectures and initial hands-on experience. This is followed by a period of independent study supported by a series of tutorials. During this time you complete an Independent Learning Package (ILP). The ILP is matched to the learning outcomes of the module. It can be either a large project or a series of small tasks depending on the needs of each module. Credits for each module are awarded following the submission of a completed ILP and its successful defence in a viva voce examination. This form of assessment develops your communication and personal skills and is highly relevant to the workplace. Overall, each learning module comprises approximately 400 hours of study.

The project counts for one third of the course and involves undertaking a substantial research or product development project. For part-time students, this can be linked to their employment. It is undertaken in two phases. In the first part, the project subject area is researched and a workplan developed. The second part involves the main research and development activity. In all, the project requires approximately 600 hours of work.

Further flexibility is provided within the structure of the courses in that you can study related topic areas by taking modules from other courses as options (pre-requisite knowledge and skills permitting). Prior to starting your course, you are sent a Course Information and Preparation Pack which provides information to give you a flying start.

MSc Computer Networks Suite of Courses

The MSc in Computer Networks has three distinct pathways:
-Security
-Communications
-Cloud Technologies

The course structure is quite flexible, affording industry-based students an opportunity to attend and accumulate module credits over an extended period of time. It also simultaneously serves the full-time student cohort which generally progresses through the MSc pathway in a single calendar year.

The MSc programmes are short course based and feature assessment through sequentially submitted result portfolios for the work packages, ie the ILPs. These are assigned immediately on each short course module where the students are able to concentrate their study efforts just on the most recently-taught subject material. This greatly promotes efficient focused learning. The individual oral examination administered for each ILP furnishes valuable experience in oral defence, and frees students from written examination burdens.

The technical tasks undertaken in ILPs, along with the required major project, thoroughly exercise the concepts covered in the course modules and give scope for originality and industry-relevant study. Team-working activities encouraged within modules, along with the all-oral individual examination regimen employed in this Networks MSc Suite, have proven solidly beneficial in refining the communication and employability-enhancing skills that are strongly valued by industry.

Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. Read more
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. In this course, you will develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and enhance and challenge your knowledge of computer networking and cyber security.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course, for example in networking, network security and cyber security, IT security, computer forensics. Careers range from the traditional network and network security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Read more
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and work experience opportunities are available in a relevant working environment before you undertake your final project. This additional and crucial element will provide a unique student experience that will enhance your employability after graduation.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

Although each of the modules taught in the above courses have a significant hands-on practical workshops the idea of introducing actual "Work Experience" in a relevant working environment is unique and we believe this additional and crucial element will provide a unique student experience that will help their employability after graduation. The course team will guarantee a paid employment opportunity for all students taking the Computer Networking and Security With Work Experience. The Cisco Academy manager has built a network of relevant employers in the past 15 years through the Networking Academy and its contacts. The academy has currently 18 smaller academies providing continuous technical and academic support as well as training their instructors according to Cisco’s regulations. These academies are mainly local and range from schools to technical colleges. It is hoped that students on this course will be able to be placed in these academies for their work experience part of the course.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Work Experience (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course:for example in Networking, Network Security and Cyber Security, IT Security, Computer Forensics. Careers range from the traditional Network and Network Security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

[Moving to one campus]]
Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree. Read more
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree.

The department of computer science offers a graduate certificate (consisting of four courses each) in Computer Security (IA).

Students will select four of the following courses:

CSC 525 Operating Systems
CSC 535 Networks and Data Communication
CSC 555 Software Engineering
CSC 583 Topics in Computer Security
CSC 586 Sytem Administration and Security
CSC 588 Wireless Programming and Security
CSC 603 Advanced Seminar in Security
CRJ 555 Topical Seminar in Criminal Justice

Please visit the website for more information about these modules:

http://catalog.wcupa.edu/graduate/sciences-mathematics/computer-science/#coursestext

The Computer Science Information Security Centre

The Computer Science Information Security Center (ISC) recognizes that no computer science graduate should be without information security knowledge. Toward this end, the Computer Science Department has introduced Information Security content such as computer and network security across the undergraduate and graduate curricula.

The curricula set forth by the ISC has been certified by the NSA to meet the National Training Standards for Information Systems Security Professionals (4011) and Systems Administrators (4013).

Career Prospects

Program graduates are employed in the following fields:

• Computer and Information Systems Managers
• Information Security Analysts
• Database Administrators
• Network and Computer Systems Administrators
• Computer Network Architects
• Telecommunications Engineering Specialists
• Computer Network Support Specialists

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less

Show 10 15 30 per page



Cookie Policy    X