• Northumbria University Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Aberystwyth University Featured Masters Courses

Postgrad LIVE! Study Fair

Birmingham | Bristol | Sheffield | Liverpool | Edinburgh

University College London Featured Masters Courses
Cass Business School Featured Masters Courses
University of Cambridge Featured Masters Courses
FindA University Ltd Featured Masters Courses
London School of Economics and Political Science Featured Masters Courses
"computing" AND "security…×
0 miles

Masters Degrees (Computing Security)

We have 366 Masters Degrees (Computing Security)

  • "computing" AND "security" ×
  • clear all
Showing 1 to 15 of 366
Order by 
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Course Overview. This masters degree course in Cyber Security is being offered by the School of Computing and Engineering and has been developed in response to a high demand for cyber security professionals with systematic understanding of the principles and technologies underpinning today's IT systems. Read more

Course Overview

This masters degree course in Cyber Security is being offered by the School of Computing and Engineering and has been developed in response to a high demand for cyber security professionals with systematic understanding of the principles and technologies underpinning today's IT systems.

The School of Computing and Engineering has partnered with leaders within the security industry to provide you with a course which will enable you to gain comprehensive knowledge and critical skills in computer security. This course will enable you to pursue a career as a cyber security professional in either the public or the private sector.

Why choose this course?

This course is offered with a 6 months internship. The internship on the course will allow you to gain first hand work experience within the industry, it will enable you to improve and acquire new skills. Throughout the internship you will be encourages to explore various career opportunities, network and work with others as part of a team. It will also enhance your understanding of the world and what constitutes professional practice in the workplace.

In today’s digital world cyber security plays an integral role, people trained in this field are greatly sought after and the course is designed to meet the huge market demand for cyber security professionals. Partnering with leading security industry, this course combines theory and practice, balancing cutting-edge security technologies and solutions with concepts and principles of cyber security.

The course aims to develop your ability to analyse the legal, social, ethical and professional issues involved in the human aspects of cyber security and be guided by the adoption of appropriate professional, ethical and legal practices. 

The course aims to develop your critical skills and techniques to appropriately solve typical cyber security problems, enabling you to choose from a range of security related jobs/roles in a rapidly evolving and diverse environment.

This course provides routes into a diverse range of career opportunities in the information and communications technology (ICT) industry and in organisations that are data and knowledge intensive. Employers require information security officers at all levels including:

  • Chief Information Security Officer
  • Network and Computer Security Engineers
  • Security Managers and Consultants
  • Penetration Testers
  • Cybersecurity Analysts
  • Security Investigators
  • Security Researchers.

You will have access to laboratories and dedicated ICT suites with specialist networks and software as well as excellent resources for study space and meetings.

Modules

  • Fundamentals of Cyber Security
  • Security Management
  • Network and Systems Security
  • Research Methods
  • Learning and Professional Development 
  • Employability Skills and Employment
  • Dissertation

Optional Modules:

  • Distributed Application Development 
  • Mobile Web Component Development 
  • Principles of Project Management 
  • Consultancy and Technical Innovation 
  • Security Operations and Assurance 
  • Data Architecture
  • Knowledge Management

Career and study progression

The security industry includes government and law enforcement as well as providers of equipment and services, such as the:

  • anti-virus, security software vendors (such as McAfee, Kaspersky, Symantec, Sophos)
  • network and computer vendors (such as Cisco, Juniper, Palo Alto, HP, Barracuda)
  • network and service providers (such as British Telecom, Vodafone, Rackspace, Amazon)
  • consultancies (such as KPMG, IBM, Fujitsu, HP)

The School of Computing and Engineering also has a growing research and enterprise culture with thirty PhD students as well as a diversity of research groups.

Outstanding graduates can continue their studies at the level of MPhil and PhD at UWL.

How to apply

Click the following link for information on how to apply to this course.

Scholarships and bursaries

Information about scholarships and bursaries can be found here.



Read less
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society. Read more

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The programme will:

  • Provide students with advanced knowledge and understanding of information security theory and concepts
  • Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
  • Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
  • Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

Programme learning outcomes

Knowledge and understanding

Students will gain:

  • Knowledge and understanding of the general information security aims and challenges
  • Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
  • Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
  • Knowledge and understanding of technical concepts and mechanisms for digital forensics
  • Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
  • The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
  • The ability to implement or apply existing information security mechanisms and technologies in practice
  • The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
  • The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills

Students will leave the programme with the ability to:

  • Analyse and solve problems of technical nature under consideration of various risks and constraints
  • Make effective and efficient decisions in an environment of conflicting interests
  • Think strategically 
  • Synthesise and critically evaluate the work of others
  • Apply fundamental knowledge to investigate new and emerging technologies
  • Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills

Students will gain the ability to:

  • Come up with technical solutions to a range of problems
  • Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
  • Implement mechanisms and apply them in a wider context of more complex systems
  • Present their opinions and findings and to produce a high-quality report

Key / transferable skills

Students will have:

  • The ability to communicate concepts and results in a clear and effective manner
  • The time and resource management planning
  • The ability to work with available resources, to collect and analyse research-oriented material

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less
The computing industry's next decade will be dominated by advances in cloud computing. That's because today's businesses increasingly prefer cloud computing platforms for powerful, flexible IT infrastructures. Read more

The computing industry's next decade will be dominated by advances in cloud computing. That's because today's businesses increasingly prefer cloud computing platforms for powerful, flexible IT infrastructures. With GCU's MSc Cloud Computing, available full-time or part-time, you can develop the knowledge and skills to lead the way in this cutting-edge field.

Our career-focused curriculum emphasises relevant, practical skills for the real world.

  • Investigate related cloud-computing topics such as cloud security and cloud software engineering
  • Explore how cloud computing supports other new technologies such as big data and the internet of things
  • Gain essential skills in software development for cloud-computing technologies
  • Study project management and research methods

When you study at GCU, you'll join a welcoming community of smart, entrepreneurial professionals who care about making real change - both in their own lives and careers, and in their workplaces and industries.

As a cloud computing expert, you'll possess the skills to connect colleagues and collaborations across the globe. And as a GCU graduate, you'll bring a socially driven perspective to your work, enabling connections that support the common good.

What you will study

The MSc Cloud Computing programme equips you with the skills necessary to fully understand cloud computing and associated technologies such as Big Data and IoT. You will also learn about cloud security, cloud software engineering, project management and research methods. In addition to gaining an understanding of the fundamental principles underpinning these areas, you will gain essential skills in developing software applications using these technologies. The MSc study culminates with a three month individual dissertation project and is underpinned by the wide range of interesting research and knowledge transfer work carried out by the School of Engineering and Built Environment.

Full-time students complete six taught modules; three in trimester A and three in trimester B and an MSc dissertation in trimester C. Part-time students complete six taught modules; three in Year 1, three in Year 2 and an MSc dissertation in Year 3.

Cloud Computing and Web Services

This module provides analytical and practical coverage of cloud computing and web services. It focuses on the technology, frameworks and associated standards: cloud models, cloud platforms and scalability. It also provides coverage of current web service technology and data transport representations, and integrated cloud and web service application development. Current examples from industry technology are used throughout.

Cloud Virtualisation Security

This module provides a systematic study of the techniques and practices of protecting systems level security in cloud computing, i.e. virtualisation, which, in the event of being compromised, would cause catastrophic consequences for cloud infrastructures and service customers.

The module covers major techniques of cloud virtualisation security, including big data analytics for cyber security, which is important for virtualised environments of cloud computing.

Big Data Landscape

This module covers the process of managing Big Data throughout its lifecycle, from requirements through retirement. The lifecycle crosses different application systems, databases and storage media. Students will gain an understanding of the full Big Data value chain. They will be able to analyse the challenges and opportunities associated with the different stages that Big Data passes through.

Cloud Software Engineering

This module is concerned with the approach taken to software engineering when developing modern cloud hosted software systems. The module covers the cloud computing design patterns that govern the architecture of typical cloud platforms. In addition, software engineering techniques and the approach taken to developing software including Application Lifecycle Management (ALM)and the use of Development Operations (DevOps) services is covered.

Internet of Things

This module provides fundamental and practical coverage of the set of converging technologies known as the Internet of Things (IoT). It focuses on representative IoT applications, technologies, frameworks and associated standards that support and underpin IoT applications, such as sensor networks, messaging protocols, security, data storage, analytics, services and human interaction. The module provides indepth practical coverage of representative IoT implementation frameworks including cloud-based service delivery models.

IT Professional Issues and Project Methods

This module seeks to develop understanding and practical skills in advanced project methods which are inline with industry regulations, standards and practices and are applicable to complex IT projects. Study is undertaken in an integrated fashion to ensure that the professional frameworks within which such projects are developed, deployed and managed are fully understood.

Masters Dissertation

Students will investigate a topical or emerging theme in Cloud Computing or related technologies. The dissertation acts as a vehicle for extending the knowledge and understanding of the student and the technical community in some specialist technical area. It serves through its length, complexity and rigour as a suitable vehicle for extending students' range of personal, interpersonal and communication skills. In addition it serves to develop and extend a range of high-level thinking skills, including analysing and synthesising skills and affords the opportunity for the student to demonstrate initiative and creativity in a major piece of technical work.

Placements

Students will be made aware of placement opportunities provided by our industry partners. Typically a placement would be undertaken after graduating from the MSc programme but opportunities can sometimes be made available for students to undertake their MSc Dissertation in partnership with a commercial company.

Assessment methods

Assessment is used to demonstrate achievement of learning outcomes. The methods of assessment include class tests, coursework assignments, practical tests and technical reports. Practical implementation and evaluation form a significant part of the assessment for the taught modules and for the work of the MSc dissertation.

Graduate prospects

Cloud computing is a fast-expanding field, and expert professionals are in high demand. That need will only continue to grow. As a graduate of GCU's MSc Cloud Computing programme, you'll be ideally positioned to find a rewarding role.

The job options in this industry include cloud software architect, cloud software engineer, cloud services developer, cloud sales consultant, cloud engineer, cloud management or cloud security professional. You will also be prepared to pursue a career in research.



Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. Read more
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. In this course, you will develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and enhance and challenge your knowledge of computer networking and cyber security.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course, for example in networking, network security and cyber security, IT security, computer forensics. Careers range from the traditional network and network security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
This course has been developed in response to the demand from industry for cyber security professionals who have a systematic understanding of the principles and technologies underpinning today's IT systems. Read more

This course has been developed in response to the demand from industry for cyber security professionals who have a systematic understanding of the principles and technologies underpinning today's IT systems.

Cyber security is a key problem in the provision of services, from the application layer through to the basic building blocks of computer and network systems. People trained in cyber security are greatly sought after and in the UK analysts expect that there will be a shortage of security professionals for the next 10 years or more.

The digital world is a complex place, varied in form and distributed, serving different types of stakeholder who use a variety of devices to access information. Specialists who recognise the diversity of business needs and the breadth of technologies and techniques to combat cyber threats, and have a systematic approach to understanding the impact of technology on organisations, are essential to the success of today's and tomorrow's cyber systems.

Equal in importance to securing cyber systems and their supporting technologies, is the management and delivery of content and services through to the users. These systems are in reality socio-technical-economic systems incorporating people, technologies, service providers, content providers, governments (laws, regulations, policies) through to law enforcement. The cyber security specialist is a broadly based professional able to work with technologists, senior management, service providers and suppliers, through to the end users, with their aim to provide secure services and investigate breaches.

This course builds on typical undergraduate computing courses, or those degrees with a high degree of computing content, whose graduates are looking to develop new knowledge and skills in cyber security. This course is designed to help the student gain an understanding of how cyber security systems are designed and constructed, and of the impact of technology into an organisation. The course will also give you the skills you need to work effectively in a business environment, and provide a solid basis for cyber security research. The course is supported by several research groups within the School of Computing and Engineering and the school has received research funding in cyber security.

Course detail

The course will also give you the skills you need to work effectively in a business environment, and provide a solid basis for cyber security research and development. The course is supported by several research groups within the School of Computing and Engineering and the School has received research funding in cyber security.

Teaching consists of lectures, seminars and laboratory work to provide a basis for the intensive individual study you need to undertake to maximise your achievements and the potential outcomes from taking the course.

Modules

  • Fundamentals of Cyber Security
  • Security Management
  • Network and Systems Security
  • Research Methods
  • Learning and Professional Development 
  • Employability Skills and Employment
  • Dissertation

Optional Modules:

  • Distributed Application Development 
  • Mobile Web Component Development 
  • Principles of Project Management 
  • Consultancy and Technical Innovation 
  • Programming Support 
  • Security Operations and Assurance 
  • Data Architecture
  • Knowledge Management

Format

Diverse methods are used to explore all aspects of the field. A strong supportive culture exists amongst the course tutors which enables students to achieve their potential.

Assessment

Assessed work is a significant part of the total assessment in the masters. There is practical work, report writing, presentations, critical academic writing and the skills and knowledge gained in these contribute to a capacity to deliver a high quality dissertation.

There are a number of end of module exams. Course tutors provide appropriate support throughout the module to ensure candidates are well prepared.

Career and study progression

Graduates in cyber security have a good record of achieving employment and progressing in their professional work. The security industry is wide, including companies that need to protect themselves, government and law enforcement through to the providers of equipment and services, such as the:

• anti-virus, security software vendors (such as McAfee, Kaspersky, Symantec, Sophos, EMC/RSA, Entrust, etc.),

• network and computer vendors (such as Cisco, Juniper, Palo Alto, HP, Barracuda, etc.),

• network and service providers (such as British Telecom, Vodafone, Rackspace, Amazon, etc.),

• consultancies (such as KPMG, IBM, Fujitsu, HP, etc.)

• services companies and in government and law enforcement.

Outstanding graduates have gone on to further study at the level of MPhil and PhD at UWL and at other institutions.

We actively encourage students with potential for research to make their interest known early on in their course.

How to apply

Click the following link for information on how to apply to this course.

Scholarships and bursaries

Information about scholarships and bursaries can be found here.



Read less
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Read more
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and work experience opportunities are available in a relevant working environment before you undertake your final project. This additional and crucial element will provide a unique student experience that will enhance your employability after graduation.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

Although each of the modules taught in the above courses have a significant hands-on practical workshops the idea of introducing actual "Work Experience" in a relevant working environment is unique and we believe this additional and crucial element will provide a unique student experience that will help their employability after graduation. The course team will guarantee a paid employment opportunity for all students taking the Computer Networking and Security With Work Experience. The Cisco Academy manager has built a network of relevant employers in the past 15 years through the Networking Academy and its contacts. The academy has currently 18 smaller academies providing continuous technical and academic support as well as training their instructors according to Cisco’s regulations. These academies are mainly local and range from schools to technical colleges. It is hoped that students on this course will be able to be placed in these academies for their work experience part of the course.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Work Experience (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course:for example in Networking, Network Security and Cyber Security, IT Security, Computer Forensics. Careers range from the traditional Network and Network Security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

[Moving to one campus]]
Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
The Computing & Security MSc course aims to provide graduates with the knowledge and practical expertise to evaluate, design and build computer security systems that protect networks and data from cyber-crime or terrorist attack. Read more

The Computing & Security MSc course aims to provide graduates with the knowledge and practical expertise to evaluate, design and build computer security systems that protect networks and data from cyber-crime or terrorist attack. This course is an ideal study pathway for graduates who already possess a good foundation in computer science.

Key benefits

  • Located in central London, giving access to major libraries and leading scientific societies, including the Chartered Institute for IT (BCS) , and the Institution of Engineering and Technology (IET).
  • You will learn advanced practical techniques and implementation skills for solving complex computational problems.
  • Opportunities to address a growing interest in advanced security methods by providing theoretical and practical knowledge of a broad range of techniques for developing security solutions.
  • Flexible study pathway that covers a broad range of security and related computing topics
  • Frequent access to speakers of international repute through seminars and external lectures, enabling you to keep abreast of emerging knowledge in advanced computing and related fields.
  • The Department of Informatics has a reputation for delivering research-led teaching and project supervision from leading experts in their field.

Description

The Computing & Security MSc programme responds to the growth in interest in advanced security methods for solving a huge range of problems, including combating crime and terrorism. You will study Cryptography and Information Security, Security Engineering, Network Security, and Computer Forensics and Cybercrime. There are also opportunities to explore a broad range of optional modules allowing you the freedom to develop your study pathway to reflect your interests. You will complete the course in one year, studying September to September and taking a combination of required and optional modules totalling 180 credits, including 60 credits that will come from an individual project of around 15,000 words. 

Course purpose

For graduates in computer science, science, or engineering, this MSc will provide specialised training in computing and security. Completing research for your individual project will provide valuable preparation for a career in research or industry.

Course format and assessment

Teaching

We use lectures, seminars and group tutorials to deliver most of the modules on the programme. You will also be expected to undertake a significant amount of independent study.

Assessment

The primary method of assessment for this course is a combination of written examinations, essays, coursework and individual or group projects and oral presentations. The individual project will be assessed through a 15,000 word report. 

Career prospects

Some graduates work in general software consultancy companies, specialised software development businesses and the IT departments of large institutions (financial, telecommunications and public sector). Recent employers include Hang Seng Bank, Lloyds Banking Group and Merrill Corporation. Other graduates have entered into the field of academic and industrial research in areas such as software engineering, algorithms and computer networks.



Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less

Show 10 15 30 per page



Cookie Policy    X