Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.
The course has four main focuses
This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.
You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.
On this course you
Free training and certification exam
Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.
Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.
BSI lead auditor qualification
• ISO27001 Lead Auditor
BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.
Guest Speakers from industry
Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.
In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.
We developed this course along two main lines.
The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.
The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.
Semester one modules
Semester two modules
Semester three modules
You study research methods and do a substantial research project leading to a dissertation.
Group and individual coursework. You also do a range of
On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.
The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.
Strategy, policy, governance
• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)
Risk management, verification and compliance
• risk analyst • risk assessor • business information security officer • reviewer • auditor
Incident and threat management and response
• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity
Operations and security management
• network security officer • systems security officer • information security officer • crypto custodian • information manager
Engineering, architecture and design
• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation
Education, training and awareness
• security programme manager
• security researcher
Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.
The M.Sc. program in Computer Engineering aims to provide advanced education and a cutting edge research experience in computer engineering. The focus of the program is excellence in research. Graduates of the program can join industry or continue their research careers in Ph.D. in Computer Engineering programs.
The program aims to provide advanced education and a cutting edge research experience in computer engineering or in electrical and computer engineering crossing the boundary of the two disciplines.
• Advanced Design Technologies
• Artificial Intelligence
• Computational Systems Biology
• Cryptography, Security, Privacy
• Intelligent User Interfaces
• Multicore Software Engineering
• Multimedia, vision, and Graphics
• Networked and Distributed systems
• Parallel and Multicore Computing
The MSc in Computational Finance will introduce students to the computational methods that are widely used by practitioners and financial institutions in today's markets. This will provide students with a solid foundation not only in traditional quantitative methods and financial instruments, but also scientific computing, numerical methods, high-performance computing, distributed ledgers, big-data analytics, and agent-based modelling. These techniques will be used to understand financial markets from a post-crisis perspective which incorporates findings from the study of financial markets at high-frequency time scales, modern approaches to understanding systematic risk and financial contagion, and disruptive technologies such as distributed-ledgers and crypto-currencies. The programme is highly practical, and students will have the opportunity to apply their learning to real-world data and case studies in hands-on laboratory sessions.
Computational Finance studies problems of optimal investment, risk management and trade execution from a computational perspective. As with any engineering discipline, computational finance analyses a given problem by first building a model for it and then examining the model. In computational finance, however, our model is typically analysed by running computer programs, rather than solving mathematical equations. In addition to standard computational methods such as Monte-Carlo option pricing, you will also learn more advanced modelling techniques such as agent-based modelling, in which the model itself takes the form of a computer program.
The programme will provide a foundation in the core skills required for successful risk management and optimal investment by giving a grounding in the key quantitative methods used in finance, including computer programming, numerical methods, scientific computing, numerical optimisation, and an overview of the financial markets. You can then go on to study more advanced topics, including the market micro-structure of modern electronic exchanges, high-frequency finance, distributed-ledger technology and agent-based modelling.
Students are expected to go in to careers such as Investment Banking, Hedge Funds and Regulatory Bodies.