• Goldsmiths, University of London Featured Masters Courses
  • Coventry University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • St Mary’s University, Twickenham Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • New College of the Humanities Featured Masters Courses
De Montfort University Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
FindA University Ltd Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
Northumbria University Featured Masters Courses
"computer" AND "security"…×
0 miles

Masters Degrees (Computer Security)

  • "computer" AND "security" ×
  • clear all
Showing 1 to 15 of 498
Order by 
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

There are six entry points through the year. This allows you to start when it is most suitable. The entry points are:

• September
• November
• January
• March
• June
• July

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics-12-months

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

This course gives you skills that are valuable for a career within Computer Security and Forensics but it is also relevant for a much wider range of applications.

The unit ‘Research Methodologies and Project Management’ in particular requires you to work in a team to apply current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
This master's degree aims to provide students with professional training in computer engineering, telematic engineering and related ambits that specialise in Computer Security and Artificial Intelligence. Read more
This master's degree aims to provide students with professional training in computer engineering, telematic engineering and related ambits that specialise in Computer Security and Artificial Intelligence. Specifically, the master's degree:
-Provides students with the skills to use advanced ICT for designing and implementing safe intelligent systems.
-Provides students with the skills to use advanced ICT to ensure the safety of information in applications, services and ICT systems and the privacy of their users.
-Provides students with the skills to lead, manage and carry out ICT systems projects based on Artificial Intelligence.
-Provides students with the skills to innovate and conduct research in the field of Computer Security and Artificial Intelligence.

Student Profile

Students wishing to study the master's degree should possess the following personal and academic qualities:
-Bachelor's degree in computer engineering
-Knowledge of Engineering Programming and Mathematics.
-Personal maturity and skills deriving from their previous university training that will be strengthened and improved further by the master's degree (e.g. work planning, knowledge of information research tools, oral and written communications skills, English, the ability to work in a team or autonomously).

Career Opportunities

The Master's produces professionals with the skills to work in the following positions, among others:
-Head of Computer Security and Artificial Intelligence projects.
-Management of groups of developers for Computer Security and Artificial Intelligence projects.
-Analyst of advanced ICT applications, particularly in the ambits of Computer Security and Artificial Intelligence.
-Academic and research career in universities and research centres.

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

This course is offered via block delivery. There are two entry points (October and November). This allows you to start when it is most suitable.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics#entry

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
Computer security remains a hot topic in the media and there is strong demand for graduates with technical skills in this area. The programme addresses computer and information security holistically because vulnerability in any one component can compromise an entire system. Read more
Computer security remains a hot topic in the media and there is strong demand for graduates with technical skills in this area. The programme addresses computer and information security holistically because vulnerability in any one component can compromise an entire system.

This includes computer architectures, operating systems, network technologies, data storage and software development processes. A wide range of threats and other security issues (for example, denial-of-service attacks, hacking, viruses and worms) are covered along with defences and countermeasures.

The programme is aimed at computing graduates who are seeking careers as computer security professionals or who are interested in research. All taught Master’s programmes at Canterbury are available with an optional industrial placement.

Visit the website https://www.kent.ac.uk/courses/postgraduate/254/computer-security

About the School of Computing

Our world-leading researchers, in key areas such as systems security, programming languages, communications, computational intelligence and memory management, and in interdisciplinary work with biosciences and psychology, earned us an outstanding result in the most recent national research assessment.

In addition, two of our staff have been honoured as Distinguished Scientists by the ACM and we have also held Royal Society Industrial Fellowships.

As an internationally recognised Centre of Excellence for programming education, the School of Computing is a leader in computer science teaching. Two of our staff have received the ACM SIGCSE Award for Outstanding Contribution to Computer Science Education. We are also home to two National Teaching Fellows, to authors of widely used textbooks and to award-winning teaching systems such as BlueJ.

Modules

The following modules are indicative of those offered on this programme. This list is based on the current curriculum and may change year to year in response to new curriculum developments and innovation. Most programmes will require you to study a combination of compulsory and optional modules. You may also have the option to take modules from other programmes so that you may customise your programme and explore other subject areas that interest you.

CO834 - Trust, Security and Privacy Management (15 credits)
CO874 - Networks and Network Security (15 credits)
CO876 - Computer Security (15 credits)
CO880 - Project and Dissertation (60 credits)
CO885 - Project Research (15 credits)
CO899 - System Security (15 credits)
CO894 - Development Frameworks (15 credits)
CO889 - C++ Programming (15 credits)
CO846 - Cloud Computing (15 credits)
CO882 - Advanced Object-Oriented Programming (15 credits)
CO883 - Systems Architecture (15 credits)
CO836 - Cognitive Neural Networks (15 credits)
CO837 - Natural Computation (15 credits)
CO838 - Internet of Things and Mobile Devices (15 credits)
CO841 - Computing Law, Contracts and Professional Responsibility (15 credits)
CO528 - Introduction to Intelligent Systems (15 credits)
CO545 - Functional and Concurrent Programming (15 credits)
CO645 - IT Consultancy Practice 2 (15 credits)
CO832 - Data Mining and Knowledge Discovery (15 credits)
CO847 - Green Computing (15 credits)
CO890 - Concurrency and Parallelism (15 credits)
CO892 - Advanced Network Security (15 credits)
EL846 - Industrial Context of Biometrics (15 credits)
CO871 - Advanced Java for Programmers (15 credits)
CO881 - Object-Oriented Programming (15 credits)

Assessment

Assessment is through a mixture of written examinations and coursework, the relative weights of which vary according to the nature of the module. The final project is assessed by a dissertation.

Programme aims

This programme aims to:

- enhance the career prospects of graduates seeking employment in the computing/IT sector

- prepare you for research and/or professional practice at the forefront of the discipline

- develop an integrated and critically aware understanding of one or more areas of computing/IT and their applications (according to your degree title)

- develop a variety of advanced intellectual and transferable skills

- equip you with the lifelong learning skills necessary to keep abreast of future developments in the field.

Careers

Students can gain practical work experience as part of their degree through our industrial placements scheme and KITC (see above). Both of these opportunities consolidate academic skills with real world experience, giving our graduates a significant advantage in the jobs market. Our graduates go on to work for leading companies including Cisco, GlaxoSmithKline, IBM, Intel, Lilly, Microsoft, Morgan Stanley, Thomson Reuters and T-Mobile. Many have gone on to develop their careers as project leaders and managers.

Find out how to apply here - https://www.kent.ac.uk/courses/postgraduate/apply/

Read less
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases. Read more
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases.

A number of very specific factors are contributing towards the growth of digital forensics and computer security specialists:

• The popularity of the Internet has an impact to the growth of malicious activity taking place in the Online world demanding a need for research and innovation in the areas.
• The cyber-attack threat levels have increased and there is a requirement for intelligent analysis of information and the investigation of digital devices.
• Digital devices capable of storing corporate and personal data are widely used increasing the need to secure information and provide solutions to complex attacks and their investigation.

Our MSc Digital Forensics and Computer Security has been developed at a time of rapid growth and continued demand in the digital forensics industry. If you’re from a computing, legal or law enforcement background, it is an ideal way to extend your professional interests and profile in an area that is becoming increasingly critical to organisations.

You’ll study fundamental – as well as advanced – research concepts in both computer forensics and security. There is an emphasis on professional research and you’ll be given opportunities throughout the course to get involved with key research areas, including industry-based projects developed through our excellent links with employers.

You’ll study in our computing suite which is equipped to industry standard providing the ideal training environment for your research and study.

You’ll study modules such as:

Studying at Masters Level and Research Methods
Advanced Concepts and Research in Digital Forensics
Advanced Security Protocols
Digital Forensics
Cybercrime Analysis and Investigation
Security: Attacks and Countermeasures
Independent Scholarship

Read less
Individuals, governments and organizations now routinely connect their computers to the Internet to communicate, provide services, and access massive stores of shared information. Read more
Individuals, governments and organizations now routinely connect their computers to the Internet to communicate, provide services, and access massive stores of shared information. These on-line activities, many conducted beyond national boundaries, have opened up enormous opportunities for security attacks such as identity thefts, computer hackings, privacy breaches, technical sabotages, etc. Addressing security threats and attacks in this vast and complex distributed environment is an immensely challenging task.

The Computer Security pathway is centred round a core Security theme that introduces students to fundamental security topics that arise in the design, analysis, and implementation of networked and distributed systems. Subsidiary themes allow students to investigate broader areas in which they may apply their newly acquired skills. The pathway is designed for students who wish to specialize in the security aspect of the Information Technology field.

Teaching and learning

Computational thinking is becoming increasingly pervasive and is informing our understanding of phenomena across a range of areas; from engineering and physical sciences, to business and society. This is reflected in the way the Manchester course is taught, with students able to choose from an extremely broad range of units that not only cover core computer science topics, but that draw on our interdisciplinary research strengths in areas such as Medical and Health Sciences, Life Sciences and Humanities.

Coursework and assessment

Lectures and seminars are supported by practical exercises that impart skills as well as knowledge. These skills are augmented through an MSc project that enables students to put into practice the techniques they have been taught throughout the course.

Facilities

-Newly refurbished computing labs furnished with modern desktop computers
-Access to world leading academic staff
-Collaborative working labs complete with specialist computing and audio visual equipment to support group working
-Over 300 Computers in the School dedicated exclusively for the use of our students
-An Advanced Interfaces Laboratory to explore real time collaborative working
-A Nanotechnology Centre for the fabrication of new generation electronic devices
-An e-Science Centre and Access Grid facility for world wide collaboration over the internet
-Access to a range of Integrated Development Environments (IDEs)
-Specialist electronic system design and computer engineering tools

Career opportunities

The MSc in Advanced Computer Science has an excellent record of employment for its graduates. Opportunities exist in fields as diverse as finance, films and games, pharmaceuticals, healthcare, consumer products, and public services - virtually all areas of business and society. Manchester Computer Science MSc courses are considered among the best in the country and our graduates are actively targeted for the very top jobs in industry and academia.

Security plays a role in almost all areas where computers are being used, including, for example, finance, healthcare, consumer products, and public services. Thus students who have followed the Computer Security pathway will be ideally placed in any of these areas, especially in positions where they need to be aware of security issues and solutions.

We maintain close relationships with potential employers and run various activities throughout the year, including career fairs, guest lectures, and projects run jointly with partners from industry.

Accrediting organisations

This programme is CEng accredited and fulfills the educational requirements for registration as a Chartered Engineer when presented with CEng accredited Bachelors programme.

Read less
This master’s course is great if you want to become an expert in computer security and networks. Whether you want to continue in your computer science studies or turn your industry experience into qualifications, this is the ideal course for you. Read more
This master’s course is great if you want to become an expert in computer security and networks. Whether you want to continue in your computer science studies or turn your industry experience into qualifications, this is the ideal course for you.

Course details

Employers are crying out for security and network experts in all areas. You study a combination of modules, from Systems Administration and Security through to Mobile Systems and Communications, making sure you have the right skills for business. You gain a good understanding of planning and managing large development projects when studying our E-Commerce Management and Master’s Project modules – both will enhance your employability and career prospects even further.

We offer you the opportunity to complete a six-month internship within industry before completing your master’s project. Internships are optional and competitive but if interested we work with you to find an appropriate industry match and prepare you for interview. There is also the potential for you to go on to study for a PhD in a specialist area.

What you study

You study the concepts, principles and theories of computer networks and security, informed by current research and professional practice. For example, building and managing a secure and effective commercial web presence requires much more than coding expertise – it requires a sound combination of commercial acumen, technical understanding and effective operations management. Our lecturers have significant research and industry experience and are well placed to develop your skills and knowledge in this field.

Modules
-Computer and Network Security
-e-Commerce Management
-Master’s Project: Computer Security and Networks
-Mobile Systems and Communications
-Network Service Management
-Research Methods for Computing
-Systems Administration and Security

Modules offered may vary.

Teaching

You learn about concepts and methods primarily through keynote lectures and tutorials using case studies and examples. Lectures include presentations from guest speakers from industry. Critical reflection is key to successful problem solving and essential to the creative process. You develop your own reflective practice at an advanced level, then test and assess your solutions against criteria that you develop in the light of your research. For example, in Mobile Systems and Communications and Network Service Management you research an agreed area, based on the topics introduced during lectures, and prepare a report on this.

Assessment takes a variety of forms including:
-Designing and developing business solutions
-Presentations
-Peer reviews
-Reports

We typically give on-going feedback during lectures and tutorials and assessment feedback using online methods.

Read less
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree. Read more
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree.

The department of computer science offers a graduate certificate (consisting of four courses each) in Computer Security (IA).

Students will select four of the following courses:

CSC 525 Operating Systems
CSC 535 Networks and Data Communication
CSC 555 Software Engineering
CSC 583 Topics in Computer Security
CSC 586 Sytem Administration and Security
CSC 588 Wireless Programming and Security
CSC 603 Advanced Seminar in Security
CRJ 555 Topical Seminar in Criminal Justice

Please visit the website for more information about these modules:

http://catalog.wcupa.edu/graduate/sciences-mathematics/computer-science/#coursestext

The Computer Science Information Security Centre

The Computer Science Information Security Center (ISC) recognizes that no computer science graduate should be without information security knowledge. Toward this end, the Computer Science Department has introduced Information Security content such as computer and network security across the undergraduate and graduate curricula.

The curricula set forth by the ISC has been certified by the NSA to meet the National Training Standards for Information Systems Security Professionals (4011) and Systems Administrators (4013).

Career Prospects

Program graduates are employed in the following fields:

• Computer and Information Systems Managers
• Information Security Analysts
• Database Administrators
• Network and Computer Systems Administrators
• Computer Network Architects
• Telecommunications Engineering Specialists
• Computer Network Support Specialists

Read less
This course combines teaching and research in security and system reliability with human factors, verification and distributed systems. Read more
This course combines teaching and research in security and system reliability with human factors, verification and distributed systems. It gives you an integrated view of the technologies relevant to developing trustworthy systems.

You will develop the skills to design and assess computing systems to be secure and safe in the face of failure or attack. You will have the opportunity to assess a real system, such as a cybercrime incident room.

Computer security and resilience are dynamic areas of computing science. Security is not just about cryptography - it's about understanding the flow of information. Resilience is the capacity of a system to recover from damage, whether caused by errors made during software design, by accidental misuse, by human error or by malicious attack. Analysing and designing secure and reliable systems involves taking all these factors into account.

Our graduates have an excellent record of finding employment. Recent examples have included:
-Data Warehouse Consultant at NCR Corporation
-Senior Quality Assurance Engineer at Ixia
-Civil Servant at GCHQ

The course is intended for honours graduates with a degree in computing science, or a discipline with a significant computing component (eg, engineering, systems engineering or mathematics). We also value relevant industrial computing experience and transferable skills.

Newcastle has a first class record of research and development in dependable and secure computing. We have leading international research groups and three research centres focusing on a wide range of computer science fields, including:
-Security and resilience
-Dependable systems
-Cybercrime
-Cloud computing

The staff teaching you have international reputations for their contributions to the field. Many of them have extensive experience as practitioners in industry as well as research scientists.

As a student on this programme you will be encouraged to play a full part in the life of the School, taking advantage of dedicated computing and study facilities, participating in seminars delivered by researchers and distinguished external speakers.

Our experienced and helpful staff will be happy to offer help with all aspects of your course from admissions to graduation and developing your career beyond. You will have the experience of working as a team with the help and support of fellow students as well as staff.

Placements

Members of our industry advisory group help to ensure that the programme is relevant to the needs of business and industry today. You can choose a project for your final dissertation that has some industry involvement associated with it, including the possibility of working on-site.

Accreditation

The course is accredited by the British Computer Society (BCS). The BCS is the chartered institute for IT. Studying a BCS-accredited degree provides the foundation for professional membership of the BCS on graduation and is the first step to becoming a chartered IT professional.

The School of Computing Science at Newcastle University is an accredited and a recognised Partner in the Network of Teaching Excellence in Computer Science.

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. Read more
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. In this course, you will develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and enhance and challenge your knowledge of computer networking and cyber security.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course, for example in networking, network security and cyber security, IT security, computer forensics. Careers range from the traditional network and network security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less

Show 10 15 30 per page



Cookie Policy    X