• New College of the Humanities Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • Coventry University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • St Mary’s University, Twickenham Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • University of Glasgow Featured Masters Courses
University of Southampton Featured Masters Courses
Queen Mary University of London Featured Masters Courses
Ulster University Featured Masters Courses
Barcelona Executive Business School Featured Masters Courses
FindA University Ltd Featured Masters Courses
"computing" AND "security…×
0 miles

Masters Degrees (Computing Security)

  • "computing" AND "security" ×
  • clear all
Showing 1 to 15 of 376
Order by 
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security. Read more
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security.

Our course is provisionally certified by GCHQ and taught by experts, and equips you with the theoretical grounding and hands-on experience demanded by the information-security sector.

PROGRAMME OVERVIEW

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Dissertation
-Information and Network Security
-Symmetric Cryptography
-Asymmetric Cryptography
-Information Security Management
-Multimedia Security and Digital Forensics
-Secure Systems and Applications
-Information Security for Business and Government
-Project Management and Business Strategy
-Database Systems
-Cloud Computing

EDUCATIONAL AIMS OF THE PROGRAMME

The programme will:
-Provide students with advanced knowledge and understanding of information security theory and concepts
-Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
-Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
-Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

PROGRAMME LEARNING OUTCOMES

Knowledge and understanding
-Knowledge and understanding of the general information security aims and challenges
-Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
-Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
-Knowledge and understanding of technical concepts and mechanisms for digital forensics
-Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
-The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
-The ability to implement or apply existing information security mechanisms and technologies in practice
-The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
-The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills
-Analyse and solve problems of technical nature under consideration of various risks and constraints
-Make effective and efficient decisions in an environment of conflicting interests
-Think strategically
-Synthesise and critically evaluate the work of others
-Apply fundamental knowledge to investigate new and emerging technologies
-Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills
-Come up with technical solutions to a range of problems
-Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
Implement mechanisms and apply them in a wider context of more complex systems
-Present their opinions and findings and to produce a high-quality report

Key / transferable skills
-The ability to communicate concepts and results in a clear and effective manner
-The time and resource management planning
-The ability to work with available resources, to collect and analyse research-oriented material

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
The MSc in Computing & Security will provide you with the knowledge and practical expertise to evaluate, design and build computer security systems. Read more
The MSc in Computing & Security will provide you with the knowledge and practical expertise to evaluate, design and build computer security systems. Delivered by of the Department of Informatics, which has an enviable reputation for research-led teaching and project supervision from leading experts in their field.

Key benefits

- Unrivalled location in the heart of London giving access to major libraries and leading scientific societies, including the BCS Chartered Institute for IT, and the Institution of Engineering and Technology (IET).

- Addresses a growing interest in advance security methods by providing theoretical and practical knowledge of a broad range of techniques for developing security solutions.

- Aims to give coverage of the whole field of security and related computing areas, rather than specialising on one area.

- Develops critical awareness and appreciation of the changing role of computing in society, motivating graduates to pursue continuing professional development and further research.

- Access to speakers of international repute through seminars and external lectures, enabling students to keep abreast of emerging knowledge in computing and security and related fields.

Visit the website: http://www.kcl.ac.uk/study/postgraduate/taught-courses/computing-and-security-msc.aspx

Course detail

- Description -

This programme addresses the growth in interest in advanced security methods for solving a huge range of problems, including combating crime and terrorism. It is built around taught core modules such as cryptography and information security, access control and privacy policies and computer forensics and cybercrime. These modules are complemented by a range of optional modules that relate to various aspects of computing. The final part of the programme is an individual project which is closely linked with the Department's research activities.

- Course purpose -

For graduates in computer science, science, or engineering, this MSc will provide specialised training in computing and security. Completing research for your individual project will provide valuable preparation for a career in research or industry.

- Course format and assessment -

Lectures; tutorials; seminars; laboratory sessions; optional career planning workshops. Assessed through: coursework; written examinations; final project report.

Core modules:

- Individual Project
- Computer Forensics & Cybercrime
- Cryptography and Information Security
- Group Project
- Network Security

Career prospects

Via the Department’s Careers Programme, students are able to network with top employers and obtain advice on how to enhance career prospects. Our graduates have gone on to have very successful careers in industry and research. Our graduates are working in general software consultancy companies, specialised software development companies and the IT departments of large institutions (financial, telecommunications and public sector). Recent employers include Hang Seng Bank, Lloyds Banking Group and Merrill Corporation. Other graduates have entered into the field of academic and industrial research in areas such as software engineering, algorithms and computer networks.

How to apply: http://www.kcl.ac.uk/study/postgraduate/apply/taught-courses.aspx

About Postgraduate Study at King’s College London:

To study for a postgraduate degree at King’s College London is to study at the city’s most central university and at one of the top 20 universities worldwide (2015/16 QS World Rankings). Graduates will benefit from close connections with the UK’s professional, political, legal, commercial, scientific and cultural life, while the excellent reputation of our MA and MRes programmes ensures our postgraduate alumni are highly sought after by some of the world’s most prestigious employers. We provide graduates with skills that are highly valued in business, government, academia and the professions.

Scholarships & Funding:

All current PGT offer-holders and new PGT applicants are welcome to apply for the scholarships. For more information and to learn how to apply visit: http://www.kcl.ac.uk/study/pg/funding/sources

Free language tuition with the Modern Language Centre:

If you are studying for any postgraduate taught degree at King’s you can take a module from a choice of over 25 languages without any additional cost. Visit: http://www.kcl.ac.uk/mlc

Read less
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. Read more
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. In this course, you will develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and enhance and challenge your knowledge of computer networking and cyber security.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course, for example in networking, network security and cyber security, IT security, computer forensics. Careers range from the traditional network and network security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
This course has been developed in response to the demand from industry for cyber security professionals who have a systematic understanding of the principles and technologies underpinning today's IT systems. Read more
This course has been developed in response to the demand from industry for cyber security professionals who have a systematic understanding of the principles and technologies underpinning today's IT systems.

Cyber security is a key problem in the provision of services, from the application layer through to the basic building blocks of computer and network systems. People trained in cyber security are greatly sought after and in the UK analysts expect that there will be a shortage of security professionals for the next 10 years or more.

The digital world is a complex place, varied in form and distributed, serving different types of stakeholder who use a variety of devices to access information. Specialists who recognise the diversity of business needs and the breadth of technologies and techniques to combat cyber threats, and have a systematic approach to understanding the impact of technology on organisations, are essential to the success of today's and tomorrow's cyber systems.

Equal in importance to securing cyber systems and their supporting technologies, is the management and delivery of content and services through to the users. These systems are in reality socio-technical-economic systems incorporating people, technologies, service providers, content providers, governments (laws, regulations, policies) through to law enforcement. The cyber security specialist is a broadly based professional able to work with technologists, senior management, service providers and suppliers, through to the end users, with their aim to provide secure services and investigate breaches.

This course builds on typical undergraduate computing courses, or those degrees with a high degree of computing content, whose graduates are looking to develop new knowledge and skills in cyber security. This course is designed to help the student gain an understanding of how cyber security systems are designed and constructed, and of the impact of technology into an organisation. The course will also give you the skills you need to work effectively in a business environment, and provide a solid basis for cyber security research. The course is supported by several research groups within the School of Computing and Engineering and the school has received research funding in cyber security.

Course detail

The course will also give you the skills you need to work effectively in a business environment, and provide a solid basis for cyber security research and development. The course is supported by several research groups within the School of Computing and Engineering and the School has received research funding in cyber security.

Teaching consists of lectures, seminars and laboratory work to provide a basis for the intensive individual study you need to undertake to maximise your achievements and the potential outcomes from taking the course.

Modules

• Fundamentals of Cyber Security
• Security Management
• Network and Systems Security
• Security Operations and Assurance
• Learning and Professional Development
• Employability Skills and Employment
• Knowledge Management (option)
• Computer Networks (option)
• Distributed Application Development (option)
• Project Management (option)
• Mobile Application Development (option)
• Research Methods
• Dissertation.

Format

Diverse methods are used to explore all aspects of the field. A strong supportive culture exists amongst the course tutors which enables students to achieve their potential.

Assessment

Assessed work is a significant part of the total assessment in the masters. There is practical work, report writing, presentations, critical academic writing and the skills and knowledge gained in these contribute to a capacity to deliver a high quality dissertation.

There are a number of end of module exams. Course tutors provide appropriate support throughout the module to ensure candidates are well prepared.

Career and study progression

Graduates in cyber security have a good record of achieving employment and progressing in their professional work. The security industry is wide, including companies that need to protect themselves, government and law enforcement through to the providers of equipment and services, such as the:
• anti-virus, security software vendors (such as McAfee, Kaspersky, Symantec, Sophos, EMC/RSA, Entrust, etc.),
• network and computer vendors (such as Cisco, Juniper, Palo Alto, HP, Barracuda, etc.),
• network and service providers (such as British Telecom, Vodafone, Rackspace, Amazon, etc.),
• consultancies (such as KPMG, IBM, Fujitsu, HP, etc.)
• services companies and in government and law enforcement.

Outstanding graduates have gone on to further study at the level of MPhil and PhD at UWL and at other institutions.

We actively encourage students with potential for research to make their interest known early on in their course.

How to apply

Click the following link for information on how to apply to this course: http://www.uwl.ac.uk/students/postgraduate/how-apply

Scholarships and bursaries

Information about scholarships and bursaries can be found here: http://www.uwl.ac.uk/students/postgraduate/scholarships-and-bursaries

Read less
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Read more
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and work experience opportunities are available in a relevant working environment before you undertake your final project. This additional and crucial element will provide a unique student experience that will enhance your employability after graduation.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

Although each of the modules taught in the above courses have a significant hands-on practical workshops the idea of introducing actual "Work Experience" in a relevant working environment is unique and we believe this additional and crucial element will provide a unique student experience that will help their employability after graduation. The course team will guarantee a paid employment opportunity for all students taking the Computer Networking and Security With Work Experience. The Cisco Academy manager has built a network of relevant employers in the past 15 years through the Networking Academy and its contacts. The academy has currently 18 smaller academies providing continuous technical and academic support as well as training their instructors according to Cisco’s regulations. These academies are mainly local and range from schools to technical colleges. It is hoped that students on this course will be able to be placed in these academies for their work experience part of the course.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Work Experience (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course:for example in Networking, Network Security and Cyber Security, IT Security, Computer Forensics. Careers range from the traditional Network and Network Security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

[Moving to one campus]]
Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually. Read more
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually.

In addition, surveys from PricewaterhouseCoopers and the Department for Business, Innovation and Skills show a significant shortage of information security professionals and a lack of security awareness, especially in small and medium-sized enterprises (SMEs), indicating an urgent need for student education, the provision of up-to-date educational resources, industry training and the embedding of good practice.

This MSc in Cyber Security addresses these requirements by increasing relevant knowledge and skills in line with the UK Government’s National Cyber Security Strategy, while also addressing the national skills shortage in information security.

You will develop an understanding of current issues in information security and cyber security, as well as gain in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource and for analysing and controlling security risks.

What will I study?

You will study cyber security from the perspectives of technical aspects of network security, penetration testing and computer forensics, while also adopting a systematic approach to information security management.

The programme will cover topics including information security management; information risk management; implementing secure systems; information assurance methodologies and testing; operational security management; incident management; audit, assurance and review; and business continuity management.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars, one-to-one tutorials, and technology-enhanced learning (such as via a virtual learning environment). Classes are highly interactive, with the practical application of concepts being a key factor, as well as case studies drawn from real-life.

How will I be assessed?

We will assess your vocational capability, academic critical thinking and intellectual development throughout the programme. Coursework, case studies, exams and problem-solving exercises may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academic staff who are research-active and fully engaged with the wider business and academic community.

What are my career prospects?

The MSc has been designed to meet the Government Communications Headquarters (GCHQ) certification criteria for Masters degrees, as well as satisfying the professional body knowledge requirements of the Information Systems Audit and Control Association (ISACA) and the Information Systems Security Certification Consortium (ISC)².

The programme also aligns with international standards (ISO27001/2) for information security management systems and is informed by the PAS 555:2013 Cyber Security Risk Governance and Management Specification.

On successful completion of the course, you will be equipped with the necessary skills and expertise to work as a cyber security professional, or information security professional, in roles such as an information security engineer/manager, ISO27001 auditor, computer forensic analyst, cyber security specialist or security engineer.

Read less
On our highly regarded MSc Cyber Security, you will work with internationally renowned experts from our Centre for Cyber Security. Read more
On our highly regarded MSc Cyber Security, you will work with internationally renowned experts from our Centre for Cyber Security.

What's covered in the course?

This course provides a broad foundation for Cyber Security concepts while delivering advanced knowledge and skills in key technical areas. Designed to meet the growing demand from global business and industry for robust cyber security systems, this course underpins the principles and practical professional skills you’ll need to meet the future challenges faced by organisations, particularly when it comes to strategic security planning.

This course provides future Cyber Security professionals with the knowledge and skills needed by the employers. Our strong links with industry enable us to teach the most demanding topics. You will develop state of the art technical knowledge, intellectual know-how, management capabilities and hands-on practical skills to succeed in meeting the Cyber Security challenges faced by modern organisations.

Our academic staff members are actively engaged with government and industry to help solve their complex problems. These strong links provide you with plenty of professional opportunities that will help you to acquire valuable exposure to the real life challenges of Cyber Security.

Why choose us?

-Our Centre for Cyber Security is at the forefront of advancing information security.
-We provide research-led, practice-driven teaching underpinned by our research projects and strong industrial links.
-Our teaching staff have rich professional experience and are engaged with government and industry, helping to solve complex problems.
-You will have access to state-of-the-art, industry-standard equipment and laboratories with forensic software, network security software for penetration testing, and Cloud software.
-We are home to a Cisco Systems, Oracle academy, and the Microsoft Academy Centre. We are one of Microsoft’s top UK university-based academies and we are a member of the Microsoft Developer Network Academic Alliance. We are also a Cisco ASC (Academy Support Centre) and Cisco Instructor Training Centre (ITC) – one of only 10 such instructor training centres in the UK.

Course in depth

The MSc is normally studied over one year full-time or two years part-time.

The course is divided into taught modules of 20 credits and a Master’s project of 60 credits. Students complete 60 credits for Postgraduate Certificate, 120 credits for Postgraduate Diploma and 180 credits for the full MSc. Each credit represents 10 notional hours of student learning and assessment.

A range of assessment methods are employed, assessment criteria being published in each assignment brief. Knowledge and skills are assessed, formatively and summatively, by a number of methods: coursework, examinations (seen and unseen, open and closed-book), presentations, practical assignments, vivas, online forums, podcasts and project work.

Modules
-Information Security Management 20 credits
-Industrial Control Systems Security 20 credits
-Digital Forensics 20 credits
-Software Security and Cloud Security 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods and Project Management 20 credits
-Individual Project 60 credits

Enhancing your employability skills

This course is designed to ensure that you are a very sought-after graduate with the necessary first-hand, practical expertise of cyber security issues as well as a rigorous academic understanding of the sector.

Globally there is a shortage of experts who can work in cyber security at this very high level, so you will focus on the important technical material you will need for effective decision-making in a highly demanding career.

You will be equipped for a range of careers requiring advanced skills, such as:
-Security architect
-Security analyst
-Security administrator
-Security manager
-Incident response manager
-Risk and compliance analyst.

You will have the opportunity to get support for obtaining industry recognised Professional Certifications.

Read less

Show 10 15 30 per page



Cookie Policy    X