• University of Bristol Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • Ulster University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • Birmingham City University Featured Masters Courses
London Metropolitan University Featured Masters Courses
University of Manchester Featured Masters Courses
Cranfield University Featured Masters Courses
Queen Margaret University, Edinburgh Featured Masters Courses
University of Bath Featured Masters Courses
"computer" AND "security"…×
0 miles

Masters Degrees (Computer Security)

We have 518 Masters Degrees (Computer Security)

  • "computer" AND "security" ×
  • clear all
Showing 1 to 15 of 518
Order by 
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

There are six entry points through the year. This allows you to start when it is most suitable. The entry points are:

• September
• November
• January
• March
• June
• July

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics-12-months

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

This course gives you skills that are valuable for a career within Computer Security and Forensics but it is also relevant for a much wider range of applications.

The unit ‘Research Methodologies and Project Management’ in particular requires you to work in a team to apply current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

This course is offered via block delivery. There are two entry points (October and November). This allows you to start when it is most suitable.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics#entry

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
This master’s course is great if you want to become an expert in computer security and networks. Whether you want to continue in your computer science studies or turn your industry experience into qualifications, this is the ideal course for you. Read more

This master’s course is great if you want to become an expert in computer security and networks. Whether you want to continue in your computer science studies or turn your industry experience into qualifications, this is the ideal course for you.

Course details

Computer security and networks experts are in high demand around the world. You study a combination of modules, from Systems Administration and Security through to Mobile Systems and Communications, making sure you have the right skills for business. You gain a good understanding of planning and managing large development projects when studying our E-Commerce Management and Master’s Project modules – both will enhance your employability and career prospects even further.

There are three routes you can choose from to gain an MSc Computer Security and Networks:

  • full-time - 2 years with advanced practice (September start)
  • full-time - 1 year (September start) or 16 months (January start)
  • part-time - 2 years.

What you study

You study the concepts, principles and theories of computer networks and security, informed by current research and professional practice. For example, building and managing a secure and effective commercial web presence requires much more than coding expertise – it requires a sound combination of commercial acumen, technical understanding and effective operations management. Our lecturers have significant research and industry experience and are well placed to develop your skills and knowledge in this field. 

Course structure

Core modules

  • Computer and Network Security
  • e-Commerce Management
  • Master’s Project: Computer Security and Networks
  • Mobile Systems and Communications
  • Network Service Management
  • Research Methods for Computing
  • Systems Administration and Security

Modules offered may vary.

Teaching

How you learn

You learn about concepts and methods primarily through keynote lectures and tutorials using case studies and examples. Lectures include presentations from guest speakers from industry. Critical reflection is key to successful problem solving and essential to the creative process. You develop your own reflective practice at an advanced level, then test and assess your solutions against criteria that you develop in the light of your research. For example, in Mobile Systems and Communications and Network Service Management you research an agreed area, based on the topics introduced during lectures, and prepare a report on this.

How you are assessed

Assessment takes a variety of forms including:

  • designing and developing business solutions
  • presentations
  • peer reviews
  • reports.

We typically give on-going feedback during lectures and tutorials and assessment feedback using online methods.

Employability

Career opportunities

From the beginning of your programme, we prepare you for a career in industry. In addition to your taught classes, we create opportunities for you to meet and network with our industry partners through events such as our ExpoSeries, which showcases student work to industry. ExpoTees is the pinnacle of the ExpoSeries with over 100 businesses from across the UK coming to the campus to meet our exceptional students, with a view to recruitment.

Advanced practice

There are a number of internship options, including:

  • Vocational internship – spend one semester working full-time in industry or on placement in the University. We have close links with a range of national and international companies who will offer you the chance to develop your knowledge and professional skills in the workplace through an internship. Although we cannot guarantee internships, we will provide you with practical support and advice on how to find and secure your own internship position. A vocational internship is a great way to gain work experience and give your CV a competitive edge.
  • Research internship – develop your research and academic skills by undertaking a research internship within the University. Experience working as part of a research team in an academic setting. Ideal for those who are interested in a career in research or academia.


Read less
Computer security remains a hot topic in the media and there is strong demand for graduates with technical skills in this area. The programme addresses computer and information security holistically because vulnerability in any one component can compromise an entire system. Read more
Computer security remains a hot topic in the media and there is strong demand for graduates with technical skills in this area. The programme addresses computer and information security holistically because vulnerability in any one component can compromise an entire system.

This includes computer architectures, operating systems, network technologies, data storage and software development processes. A wide range of threats and other security issues (for example, denial-of-service attacks, hacking, viruses and worms) are covered along with defences and countermeasures.

The programme is aimed at computing graduates who are seeking careers as computer security professionals or who are interested in research. All taught Master’s programmes at Canterbury are available with an optional industrial placement.

Visit the website https://www.kent.ac.uk/courses/postgraduate/254/computer-security

About the School of Computing

Our world-leading researchers, in key areas such as systems security, programming languages, communications, computational intelligence and memory management, and in interdisciplinary work with biosciences and psychology, earned us an outstanding result in the most recent national research assessment.

In addition, two of our staff have been honoured as Distinguished Scientists by the ACM and we have also held Royal Society Industrial Fellowships.

As an internationally recognised Centre of Excellence for programming education, the School of Computing is a leader in computer science teaching. Two of our staff have received the ACM SIGCSE Award for Outstanding Contribution to Computer Science Education. We are also home to two National Teaching Fellows, to authors of widely used textbooks and to award-winning teaching systems such as BlueJ.

Modules

The following modules are indicative of those offered on this programme. This list is based on the current curriculum and may change year to year in response to new curriculum developments and innovation. Most programmes will require you to study a combination of compulsory and optional modules. You may also have the option to take modules from other programmes so that you may customise your programme and explore other subject areas that interest you.

CO834 - Trust, Security and Privacy Management (15 credits)
CO874 - Networks and Network Security (15 credits)
CO876 - Computer Security (15 credits)
CO880 - Project and Dissertation (60 credits)
CO885 - Project Research (15 credits)
CO899 - System Security (15 credits)
CO894 - Development Frameworks (15 credits)
CO889 - C++ Programming (15 credits)
CO846 - Cloud Computing (15 credits)
CO882 - Advanced Object-Oriented Programming (15 credits)
CO883 - Systems Architecture (15 credits)
CO836 - Cognitive Neural Networks (15 credits)
CO837 - Natural Computation (15 credits)
CO838 - Internet of Things and Mobile Devices (15 credits)
CO841 - Computing Law, Contracts and Professional Responsibility (15 credits)
CO528 - Introduction to Intelligent Systems (15 credits)
CO545 - Functional and Concurrent Programming (15 credits)
CO645 - IT Consultancy Practice 2 (15 credits)
CO832 - Data Mining and Knowledge Discovery (15 credits)
CO847 - Green Computing (15 credits)
CO890 - Concurrency and Parallelism (15 credits)
CO892 - Advanced Network Security (15 credits)
EL846 - Industrial Context of Biometrics (15 credits)
CO871 - Advanced Java for Programmers (15 credits)
CO881 - Object-Oriented Programming (15 credits)

Assessment

Assessment is through a mixture of written examinations and coursework, the relative weights of which vary according to the nature of the module. The final project is assessed by a dissertation.

Programme aims

This programme aims to:

- enhance the career prospects of graduates seeking employment in the computing/IT sector

- prepare you for research and/or professional practice at the forefront of the discipline

- develop an integrated and critically aware understanding of one or more areas of computing/IT and their applications (according to your degree title)

- develop a variety of advanced intellectual and transferable skills

- equip you with the lifelong learning skills necessary to keep abreast of future developments in the field.

Careers

Students can gain practical work experience as part of their degree through our industrial placements scheme and KITC (see above). Both of these opportunities consolidate academic skills with real world experience, giving our graduates a significant advantage in the jobs market. Our graduates go on to work for leading companies including Cisco, GlaxoSmithKline, IBM, Intel, Lilly, Microsoft, Morgan Stanley, Thomson Reuters and T-Mobile. Many have gone on to develop their careers as project leaders and managers.

Find out how to apply here - https://www.kent.ac.uk/courses/postgraduate/apply/

Read less
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree. Read more
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree.

The department of computer science offers a graduate certificate (consisting of four courses each) in Computer Security (IA).

Students will select four of the following courses:

CSC 525 Operating Systems
CSC 535 Networks and Data Communication
CSC 555 Software Engineering
CSC 583 Topics in Computer Security
CSC 586 Sytem Administration and Security
CSC 588 Wireless Programming and Security
CSC 603 Advanced Seminar in Security
CRJ 555 Topical Seminar in Criminal Justice

Please visit the website for more information about these modules:

http://catalog.wcupa.edu/graduate/sciences-mathematics/computer-science/#coursestext

The Computer Science Information Security Centre

The Computer Science Information Security Center (ISC) recognizes that no computer science graduate should be without information security knowledge. Toward this end, the Computer Science Department has introduced Information Security content such as computer and network security across the undergraduate and graduate curricula.

The curricula set forth by the ISC has been certified by the NSA to meet the National Training Standards for Information Systems Security Professionals (4011) and Systems Administrators (4013).

Career Prospects

Program graduates are employed in the following fields:

• Computer and Information Systems Managers
• Information Security Analysts
• Database Administrators
• Network and Computer Systems Administrators
• Computer Network Architects
• Telecommunications Engineering Specialists
• Computer Network Support Specialists

Read less
Individuals, governments and organizations now routinely connect their computers to the Internet to communicate, provide services, and access massive stores of shared information. Read more

Individuals, governments and organizations now routinely connect their computers to the Internet to communicate, provide services, and access massive stores of shared information. These on-line activities, many conducted beyond national boundaries, have opened up enormous opportunities for security attacks such as identity thefts, computer hackings, privacy breaches, technical sabotages, etc. Addressing security threats and attacks in this vast and complex distributed environment is an immensely challenging task.

The Computer Security pathway is centred round a core Security theme that introduces students to fundamental security topics that arise in the design, analysis, and implementation of networked and distributed systems. Subsidiary themes allow students to investigate broader areas in which they may apply their newly acquired skills. The pathway is designed for students who wish to specialize in the security aspect of the Information Technology field.

Teaching and learning

Computational thinking is becoming increasingly pervasive and is informing our understanding of phenomena across a range of areas; from engineering and physical sciences, to business and society. This is reflected in the way the Manchester course is taught, with students able to choose from an extremely broad range of units that not only cover core computer science topics, but that draw on our interdisciplinary research strengths in areas such as Medical and Health Sciences, Life Sciences and Humanities.

Coursework and assessment

Lectures and seminars are supported by practical exercises that impart skills as well as knowledge. These skills are augmented through an MSc project that enables students to put into practice the techniques they have been taught throughout the course.

Facilities

Disability support

Practical support and advice for current students and applicants is available from the Disability Advisory and Support Service. Email: 

Career opportunities

The MSc in Advanced Computer Science has an excellent record of employment for its graduates. Opportunities exist in fields as diverse as finance, films and games, pharmaceuticals, healthcare, consumer products, and public services - virtually all areas of business and society. Manchester Computer Science MSc courses are considered among the best in the country and our graduates are actively targeted for the very top jobs in industry and academia.

Security plays a role in almost all areas where computers are being used, including, for example, finance, healthcare, consumer products, and public services. Thus students who have followed the Computer Security pathway will be ideally placed in any of these areas, especially in positions where they need to be aware of security issues and solutions.

We maintain close relationships with potential employers and run various activities throughout the year, including career fairs, guest lectures, and projects run jointly with partners from industry. This is managed by our Employability Tutor; see the School of Computer Science's employability pages for more information.

Accrediting organisations

This programme is CEng accredited and fulfills the educational requirements for registration as a Chartered Engineer when presented with CEng accredited Bachelors programme.



Read less
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases. Read more
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases.

A number of very specific factors are contributing towards the growth of digital forensics and computer security specialists:

• The popularity of the Internet has an impact to the growth of malicious activity taking place in the Online world demanding a need for research and innovation in the areas.
• The cyber-attack threat levels have increased and there is a requirement for intelligent analysis of information and the investigation of digital devices.
• Digital devices capable of storing corporate and personal data are widely used increasing the need to secure information and provide solutions to complex attacks and their investigation.

Our MSc Digital Forensics and Computer Security has been developed at a time of rapid growth and continued demand in the digital forensics industry. If you’re from a computing, legal or law enforcement background, it is an ideal way to extend your professional interests and profile in an area that is becoming increasingly critical to organisations.

You’ll study fundamental – as well as advanced – research concepts in both computer forensics and security. There is an emphasis on professional research and you’ll be given opportunities throughout the course to get involved with key research areas, including industry-based projects developed through our excellent links with employers.

You’ll study in our computing suite which is equipped to industry standard providing the ideal training environment for your research and study.

You’ll study modules such as:

Studying at Masters Level and Research Methods
Advanced Concepts and Research in Digital Forensics
Advanced Security Protocols
Digital Forensics
Cybercrime Analysis and Investigation
Security: Attacks and Countermeasures
Independent Scholarship

Read less
Interest in computer security is booming. From whistle-blower Edward Snowden to the NHS ransomware attack, the increase in cybercrime has led to a strong demand for security experts in this area. Read more

Interest in computer security is booming. From whistle-blower Edward Snowden to the NHS ransomware attack, the increase in cybercrime has led to a strong demand for security experts in this area. This online course will teach you how to protect and safeguard the information stored on digital devices around the world.

With an in-depth focus on penetration testing and the implementation of defensive measures, your course will enhance your existing computing knowledge and develop your security expertise. We will teach you how to break systems in order to tighten their security and stop others from breaking into them, and you will develop new methods to protect a company's security.

You will gain hands-on experience in a Virtual Learning Environment. Connecting to a remote machine from your PC or laptop, you will discover how to 'hack' and defend machines in order to test their security using safe and legal training procedures.

Research Excellence Framework 2014

Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Core modules

  • Principles of Digital Security
  • Incident Response & Investigation
  • Network Security, Firewalls & Virtual Private Networks
  • Hacker Techniques, Tools & Incident Handling
  • Security Strategies for Web Applications & Social Networks
  • Research Practice
  • Project Management
  • Dissertation

Job prospects

Whether you are already in computing and looking to move into security or you are a student who has just finished a computing-related degree, this course will give you the skills to protect the information held by businesses across every sector, giving your career global potential. Your future roles could include penetration tester (system, network, web, and application), security architect, malware analyst, security analyst or security auditor.

  • Penetration tester (System, network, web, application)
  • Security architect
  • Malware analyst
  • Director of security


Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:

  • EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
  • Specialist input from guest lecturers
  • Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
  • Specialist technicians to ensure you can get the most out of these technologies.

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the full course document.

Core modules

Digital Forensics pathway

Cyber Security Pathway

Professional accreditation

This programme is accredited by BCS, The Chartered Institute for IT, for fully meeting the further learning educational requirement for Chartered IT Professional (CITP) status and for partially satisfying the underpinning knowledge requirements set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC) and the Science Council for Chartered or Incorporated Engineer (CEng or IEng) status. Note that there are additional requirements, including work experience, to achieve full CITP, CEng, or IEng status. Graduates of this accredited degree will also be eligible for professional membership of BCS (MBCS).

The BCS accreditation is an indicator of the programme’s quality to students and employers; it is also an important benchmark of the programme’s standard in providing high quality computing education, and commitment to developing future IT professionals that have the potential to achieve Chartered status. The programme is also likely to be recognised by other countries that are signatories to international accords.

Career path

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;


Read less
This course combines teaching and research in security and system reliability with human factors, verification and distributed systems. Read more
This course combines teaching and research in security and system reliability with human factors, verification and distributed systems. It gives you an integrated view of the technologies relevant to developing trustworthy systems.

You will develop the skills to design and assess computing systems to be secure and safe in the face of failure or attack. You will have the opportunity to assess a real system, such as a cybercrime incident room.

Computer security and resilience are dynamic areas of computing science. Security is not just about cryptography - it's about understanding the flow of information. Resilience is the capacity of a system to recover from damage, whether caused by errors made during software design, by accidental misuse, by human error or by malicious attack. Analysing and designing secure and reliable systems involves taking all these factors into account.

Our graduates have an excellent record of finding employment. Recent examples have included:
-Data Warehouse Consultant at NCR Corporation
-Senior Quality Assurance Engineer at Ixia
-Civil Servant at GCHQ

The course is intended for honours graduates with a degree in computing science, or a discipline with a significant computing component (eg, engineering, systems engineering or mathematics). We also value relevant industrial computing experience and transferable skills.

Newcastle has a first class record of research and development in dependable and secure computing. We have leading international research groups and three research centres focusing on a wide range of computer science fields, including:
-Security and resilience
-Dependable systems
-Cybercrime
-Cloud computing

The staff teaching you have international reputations for their contributions to the field. Many of them have extensive experience as practitioners in industry as well as research scientists.

As a student on this programme you will be encouraged to play a full part in the life of the School, taking advantage of dedicated computing and study facilities, participating in seminars delivered by researchers and distinguished external speakers.

Our experienced and helpful staff will be happy to offer help with all aspects of your course from admissions to graduation and developing your career beyond. You will have the experience of working as a team with the help and support of fellow students as well as staff.

Placements

Members of our industry advisory group help to ensure that the programme is relevant to the needs of business and industry today. You can choose a project for your final dissertation that has some industry involvement associated with it, including the possibility of working on-site.

Accreditation

The course is accredited by the British Computer Society (BCS). The BCS is the chartered institute for IT. Studying a BCS-accredited degree provides the foundation for professional membership of the BCS on graduation and is the first step to becoming a chartered IT professional.

The School of Computing Science at Newcastle University is an accredited and a recognised Partner in the Network of Teaching Excellence in Computer Science.

Read less
In the Master of Science in Information, Network, and Computer Security, you will. critically evaluate various technical/architectural solutions to limit risk, mitigate the effects of hostile action, and recover from attacks. Read more

In the Master of Science in Information, Network, and Computer Security, you will:

  • critically evaluate various technical/architectural solutions to limit risk, mitigate the effects of hostile action, and recover from attacks
  • design, implement, and maintain software tools to support network security across multiple operating systems
  • oversee the information life cycle of an organization, including planning, acquisition, and implementation of secure infrastructures
  • study algorithm concepts, computer forensics, risk management and legal issues, and intrusion detection and hacker exploits

NYIT professors have been awarded several prestigious research grants in the field, in areas including:

  • biometrics
  • conceptual modeling
  • cryptography
  • cyber behavioral authentication
  • genomic computation
  • mobile and cybersecurity
  • swarm intelligence

Our 30-credit curriculum also offers a thesis option in which you’ll take six credits relating to thesis courses. This allows you to gain specialization in areas that make you better qualified for specific research and development opportunities.

Our Entrepreneurship and Technology Innovation Center (ETIC) in Old Westbury offers you the opportunity to join research projects in areas such as cybersecurity, health care, and energy. This may lead to your work getting published in peer-reviewed journals and presented at major conferences. You can also join us at the annual Cybersecurity Conference at our Manhattan campus, where we welcome experts from academic, business, and government worldwide.



Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more

This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Through our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Full time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Part time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Year 2

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Careers

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.



Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
MSc IT Security helps you to develop your computing skills in the theory and practice of computer security and forensic technology. Read more
MSc IT Security helps you to develop your computing skills in the theory and practice of computer security and forensic technology. This requires an understanding of hardware, operating systems, communications software, attention to detail, creative problem-solving, investigative skills and an appreciation of computer threats and security counter-measures. You will also have the opportunity to work on a substantial project of your own choice. These skills can lead to a range of careers in systems management and computer security.

LEARNING ENVIRONMENT AND ASSESSMENT

The School of Physical Sciences and Computing provides an 'electronic learning' environment to facilitate flexible learning. This environment combines traditional face-to-face lecture/tutorial and practical sessions with additional, resource-rich, online materials allowing you to continue independent learning through a variety of approaches.

Assessment methods will include individual and group assignments, presentation, seminars and examinations.

LEARNING OUTCOMES & AIMS

We aim to explore the concept and principles of IT Security which will enable you to develop skills in critical evaluation and the tools and techniques that are used within IT Security and management. You will investigate the current trends and research that is relevant to IT Security which will enable you to develop a systematic approach to security policy and planning. You will plan, undertake and evaluate a substantial IT Security related project in which you will put into practice and develop your self-management, communication, critical evaluation and technical skills.

Our degree is designed to equip you with the theoretical knowledge and practical skills that are needed within industry.

OPPORTUNITIES

To enhance your work experience you will have an opportunity to undertake an industrial placement as part your MSc. This will extend your study time by six or twelve months depending on the length of the placement. Alternatively there are opportunities to choose an industry-based project.

The University will support you to seek employment as a security specialist. The skills developed by the course are also valuable in a range of computing environments.

There are opportunities to continue with your studies to MPhil or PhD.

FURTHER INFORMATION

As organisations become more dependent on sophisticated computers and communications to support their operations and to store valuable data, they become more vulnerable to IT-based attacks. The expertise of the information security professional is in managing corporate IT resources, protecting servers and computers, and tracking intruders on their networks. On this course you will learn about the tools and procedures that can be used to identify computer security weaknesses that could lead to the loss of sensitive computer data. You will develop the necessary skills to become an IT security problem-solver in order to meet the growing demand for specialists in this area.

You will develop transferable skills in evaluation of ideas and concepts, effective communication, synthesis of ideas and become a reflective practitioner. You will have the opportunity to plan and carry out a supervised project in the field of computer security or computer forensics.

Read less

Show 10 15 30 per page



Cookie Policy    X