• Leeds Beckett University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Imperial College London Featured Masters Courses
  • University of York Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Regent’s University London Featured Masters Courses
University of Lincoln Featured Masters Courses
University of St Andrews Featured Masters Courses
Institute for Advanced Architecture of Catalonia Featured Masters Courses
University of Leeds Featured Masters Courses
Aberdeen University Featured Masters Courses
"cryptographic"×
0 miles

Masters Degrees (Cryptographic)

  • "cryptographic" ×
  • clear all
Showing 1 to 12 of 12
Order by 
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. Read more
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. During the course critical awareness of problems in information transmission, data compression and cryptography is raised, and the mathematical techniques which are commonly used to solve these problems are explored.

The Mathematics Department at Royal Holloway is well known for its expertise in information security and cryptography and our academic staff include several leading researchers in these areas. Students on the programme have the opportunity to carry out their dissertation projects in cutting-edge research areas and to be supervised by experts.

The transferable skills gained during the MSc will open up a range of career options as well as provide a solid foundation for advanced research at PhD level.

See the website https://www.royalholloway.ac.uk/mathematics/coursefinder/mscmathematicsofcryptographyandcommunications(msc).aspx

Why choose this course?

- You will be provided with a solid mathematical foundation and a knowledge and understanding of the subjects of cryptography and communications preparing you for research or professional employment in this area.

- The mathematical foundations needed for applications in communication theory and cryptography are covered including Algebra, Combinatorics Complexity Theory/Algorithms and Number Theory.

- You will have the opportunity to carry out your dissertation project in a cutting-edge research area; our dissertation supervisors are experts in their fields who publish regularly in internationally competitive journals and there are several joint projects with industrial partners and Royal Holloway staff.

- After completing the course former students have a good foundation for the next step of their career both inside and outside academia.

Department research and industry highlights

The members of the Mathematics Department cover a range of research areas. There are particularly strong groups in information security, number theory, quantum theory, group theory and combinatorics. The Information Security Group has particularly strong links to industry.

Course content and structure

You will study eight courses as well as complete a main project under the supervision of a member of staff.

Core courses:
Advanced Cipher Systems
Mathematical and security properties of both symmetric key cipher systems and public key cryptography are discussed as well as methods for obtaining confidentiality and authentication.

Channels
In this unit, you will investigate the problems of data compression and information transmission in both noiseless and noisy environments.

Theory of Error-Correcting Codes
The aim of this unit is to provide you with an introduction to the theory of error-correcting codes employing the methods of elementary enumeration, linear algebra and finite fields.

Public Key Cryptography
This course introduces some of the mathematical ideas essential for an understanding of public key cryptography, such as discrete logarithms, lattices and elliptic curves. Several important public key cryptosystems are studied, such as RSA, Rabin, ElGamal Encryption, Schnorr signatures; and modern notions of security and attack models for public key cryptosystems are discussed.

Main project
The main project (dissertation) accounts for 25% of the assessment of the course and you will conduct this under the supervision of a member of academic staff.

Additional courses:
Applications of Field Theory
You will be introduced to some of the basic theory of field extensions, with special emphasis on applications in the context of finite fields.

Quantum Information Theory
‘Anybody who is not shocked by quantum theory has not understood it' (Niels Bohr). The aim of this unit is to provide you with a sufficient understanding of quantum theory in the spirit of the above quote. Many applications of the novel field of quantum information theory can be studied using undergraduate mathematics.

Network Algorithms
In this unit you will be introduced to the formal idea of an algorithm, when it is a good algorithm and techniques for constructing algorithms and checking that they work; explore connectivity and colourings of graphs, from an algorithmic perspective; and study how algebraic methods such as path algebras and cycle spaces may be used to solve network problems.

Advanced Financial Mathematics
In this unit you will investigate the validity of various linear and non-linear time series occurring in finance and extend the use of stochastic calculus to interest rate movements and credit rating;

Combinatorics
The aim of this unit is to introduce some standard techniques and concepts of combinatorics, including: methods of counting including the principle of inclusion and exclusion; generating functions; probabilistic methods; and permutations, Ramsey theory.

Computational Number Theory
You will be provided with an introduction to many major methods currently used for testing/proving primality and for the factorisation of composite integers. The course will develop the mathematical theory that underlies these methods, as well as describing the methods themselves.

Complexity Theory
Several classes of computational complexity are introduced. You will discuss how to recognise when different problems have different computational hardness, and be able to deduce cryptographic properties of related algorithms and protocols.

On completion of the course graduates will have:
- a suitable mathematical foundation for undertaking research or professional employment in cryptography and/or communications

- the appropriate background in information theory and coding theory enabling them to understand and be able to apply the theory of communication through noisy channels

- the appropriate background in algebra and number theory to develop an understanding of modern public key cryptosystems

- a critical awareness of problems in information transmission and data compression, and the mathematical techniques which are commonly used to solve these problems

- a critical awareness of problems in cryptography and the mathematical techniques which are commonly used to provide solutions to these problems

- a range of transferable skills including familiarity with a computer algebra package, experience with independent research and managing the writing of a dissertation.

Assessment

Assessment is carried out by a variety of methods including coursework, examinations and a dissertation. The examinations in May/June count for 75% of the final average and the dissertation, which has to be submitted in September, counts for the remaining 25%.

Employability & career opportunities

Our students have gone on to successful careers in a variety of industries, such as information security, IT consultancy, banking and finance, higher education and telecommunication. In recent years our graduates have entered into roles including Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security manager at London Underground.

How to apply

Applications for entry to all our full-time postgraduate degrees can be made online https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
This course covers a wide range of topics from both applied and applicable mathematics and is aimed at students who want to study the field in greater depth, in areas which are relevant to real life applications. Read more
This course covers a wide range of topics from both applied and applicable mathematics and is aimed at students who want to study the field in greater depth, in areas which are relevant to real life applications.

You will explore the mathematical techniques that are commonly used to solve problems in the real world, in particular in communication theory and in physics. As part of the course you will carry out an independent research investigation under the supervision of a member of staff. Popular dissertation topics chosen by students include projects in the areas of communication theory, mathematical physics, and financial mathematics.

The transferable skills gained on this course will open you up to a range of career options as well as provide a solid foundation for advanced research at PhD level.

See the website https://www.royalholloway.ac.uk/mathematics/coursefinder/mscmathematicsforapplications.aspx

Why choose this course?

- You will be provided with a solid mathematical foundation and knowledge and understanding of the subjects of cryptography and communications, preparing you for research or professional employment in this area.

- The Mathematics Department at Royal Holloway is well known for its expertise in information security and cryptography. The academics who teach on this course include several leading researchers in these areas.

- The mathematical foundations needed for applications in communication theory and cryptography are covered including Algebra, Combinatorics Complexity Theory/Algorithms and Number Theory.

- You will have the opportunity to carry out your dissertation project in a cutting-edge research area; our dissertation supervisors are experts in their fields who publish regularly in internationally competitive journals and there are several joint projects with industrial partners and Royal Holloway staff.

- After completing the course students have a good foundation for the next step of their career both inside and outside academia.

Department research and industry highlights

The members of the Mathematics Department cover a range of research areas. There are particularly strong groups in information security, number theory, quantum theory, group theory and combinatorics. The Information Security Group has particularly strong links to industry.

Course content and structure

You will study eight courses and complete a main project under the supervision of a member of staff.

Core courses:
Theory of Error-Correcting Codes
The aim of this unit is to provide you with an introduction to the theory of error-correcting codes employing the methods of elementary enumeration, linear algebra and finite fields.

Advanced Cipher Systems
Mathematical and security properties of both symmetric key cipher systems and public key cryptography are discussed, as well as methods for obtaining confidentiality and authentication.

Main project
The main project (dissertation) accounts for 25% of the assessment of the course and you will conduct this under the supervision of a member of academic staff.

Additional courses:
Applications of Field Theory
You will be introduced to some of the basic theory of field extensions, with special emphasis on applications in the context of finite fields.

Quantum Information Theory
‘Anybody who is not shocked by quantum theory has not understood it' (Niels Bohr). The aim of this unit is to provide you with a sufficient understanding of quantum theory in the spirit of the above quote. Many applications of the novel field of quantum information theory can be studied using undergraduate mathematics.

Network Algorithms
In this unit you will be introduced to the formal idea of an algorithm, when it is a good algorithm and techniques for constructing algorithms and checking that they work; explore connectivity and colourings of graphs, from an algorithmic perspective; and study how algebraic methods such as path algebras and cycle spaces may be used to solve network problems.

Advanced Financial Mathematics
In this unit you will investigate the validity of various linear and non-linear time series occurring in finance and extend the use of stochastic calculus to interest rate movements and credit rating;

Combinatorics
The aim of this unit is to introduce some standard techniques and concepts of combinatorics, including: methods of counting including the principle of inclusion and exclusion; generating functions; probabilistic methods; and permutations, Ramsey theory.

Computational Number Theory
You will be provided with an introduction to many major methods currently used for testing/proving primality and for the factorisation of composite integers. The course will develop the mathematical theory that underlies these methods, as well as describing the methods themselves.

Complexity Theory
Several classes of computational complexity are introduced. You will discuss how to recognise when different problems have different computational hardness, and be able to deduce cryptographic properties of related algorithms and protocols.

On completion of the course graduates will have:
- knowledge and understanding of: the principles of communication through noisy channels using coding theory; the principles of cryptography as a tool for securing data; and the role and limitations of mathematics in the solution of problems arising in the real world

- a high level of ability in subject-specific skills, such as algebra and number theory

- developed the capacity to synthesise information from a number of sources with critical awareness

- critically analysed the strengths and weaknesses of solutions to problems in applications of mathematics

- the ability to clearly formulate problems and express technical content and conclusions in written form

- personal skills of time management, self-motivation, flexibility and adaptability.

Assessment

Assessment is carried out by a variety of methods including coursework, examinations and a dissertation. The examinations in May/June count for 75% of the final average and the dissertation, which has to be submitted in September, counts for the remaining 25%.

Employability & career opportunities

Our students have gone on to successful careers in a variety of industries, such as information security, IT consultancy, banking and finance, higher education and telecommunication. In recent years our graduates have entered into roles including Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security Manager at London Underground.

How to apply

Applications for entry to all our full-time postgraduate degrees can be made online https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. Read more
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features
-This course is accredited by BCS, The Chartered Institute for IT.
-The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
-You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Work placement scheme

Kingston University has set up a scheme that allows postgraduate students in the Faculty of Science, Engineering and Computing to include a work placement element in their course starting from September 2017. The placement scheme is available for both international and home/EU students.

-The work placement, up to 12 months; is optional.
-The work placement takes place after postgraduate students have successfully completed the taught portion of their degree.
-The responsibility for finding the placement is with the student. We cannot guarantee the placement, just the opportunity to undertake it.
-As the work placement is an assessed part of the course for international students, this is covered by a student's tier 4 visa.

Details on how to apply will be confirmed shortly.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security MSc modules
-Cryptography and Applications
-Network and Information Security
-Data Communications
-Project Dissertation
-One option module

Read less
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. Read more
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features
-This course is accredited by BCS, The Chartered Institute for IT.
-The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
-You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Work placement scheme

Kingston University has set up a scheme that allows postgraduate students in the Faculty of Science, Engineering and Computing to include a work placement element in their course starting from September 2017. The placement scheme is available for both international and home/EU students.

-The work placement, up to 12 months; is optional.
-The work placement takes place after postgraduate students have successfully completed the taught portion of their degree.
-The responsibility for finding the placement is with the student. We cannot guarantee the placement, just the opportunity to undertake it.
-As the work placement is an assessed part of the course for international students, this is covered by a student's tier 4 visa.

Details on how to apply will be confirmed shortly.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security with Management Studies MSc modules
-Cryptography and Applications
-Network and Information Security
-Data Communications
-Business in Practice
-Project Dissertation

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

There are six entry points through the year. This allows you to start when it is most suitable. The entry points are:

• September
• November
• January
• March
• June
• July

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics-12-months

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

This course gives you skills that are valuable for a career within Computer Security and Forensics but it is also relevant for a much wider range of applications.

The unit ‘Research Methodologies and Project Management’ in particular requires you to work in a team to apply current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
Cloud-based systems are the latest development in large-scale computing, and it is predicted that billions of Euros will be spent by European businesses on cloud computing in the coming years. Read more
Cloud-based systems are the latest development in large-scale computing, and it is predicted that billions of Euros will be spent by European businesses on cloud computing in the coming years. But despite this, there are still surprisingly few graduate-level courses in this area.

Our course targets a known need in industry, providing an opportunity for you to study this exciting underlying technology. You gain hands-on experience with various types of cloud models and modern computing systems that use or support cloud computing. You will master areas including:
-Application development for cloud systems
-Cloud management technologies
-System architectures
-High-performance computing
-Social networking application development
-Computer and Network Security

We equip you with the knowledge and understanding to contribute fully to this quickly changing and developing area so that you can enter a range of employment roles related to cloud systems, including developing cloud based applications, managing cloud systems and designing cloud infrastructures.

Our School is a community of scholars leading the way in technological research and development. Today’s computer scientists are creative people who are focused and committed, yet restless and experimental. We are home to many of the world’s top scientists, and our work is driven by creativity and imagination as well as technical excellence.

We are ranked Top 10 in the UK in the 2015 Academic Ranking of World Universities, with more than two-thirds of our research rated ‘world-leading’ or ‘internationally excellent (REF 2014).

Professional accreditation

This degree is accredited by the Institution of Engineering and Technology (IET).This accreditation is increasingly sought by employers, and provides the first stage towards eventual professional registration as a Chartered Engineer (CEng).

Our expert staff

Our course is supported by the strong research interest and expertise in cloud and related technologies within our School of Computer Science and Electronic Engineering, ensuring you will learn the most up-to-date information in an engaging manner.

Our research covers a range of topics, from materials science and semiconductor device physics, to the theory of computation and the philosophy of computer science, with most of our research groups based around laboratories offering world-class facilities.

Our impressive external research funding stands at over £4 million and we participate in a number of EU initiatives and undertake projects under contract to many outside bodies, including government and industrial organisations.

In recent years we have attracted many highly active research staff and we are conducting world-leading research in areas such as evolutionary computation, brain-computer interfacing, intelligent inhabited environments and financial forecasting.

Specialist facilities

We are one of the largest and best resourced computer science and electronic engineering schools in the UK. Our work is supported by extensive networked computer facilities and software aids, together with a wide range of test and instrumentation equipment.
-We have six laboratories that are exclusively for computer science and electronic engineering students. Three are open 24/7, and you have free access to the labs except when there is a scheduled practical class in progress
-All computers run either Windows 7 or are dual boot with Linux
-Software includes Java, Prolog, C++, Perl, Mysql, Matlab, DB2, Microsoft Office, Visual Studio, and Project
-Students have access to CAD tools and simulators for chip design (Xilinx) and computer networks (OPNET)
-We also have specialist facilities for research into areas including non-invasive brain-computer interfaces, intelligent environments, robotics, optoelectronics, video, RF and MW, printed circuit milling, and semiconductors

Your future

Our recent graduates have progressed to a variety of senior positions in industry and academia. Some of the companies and organisations where our former graduates are now employed include:
-Electronic Data Systems
-Pfizer Pharmaceuticals
-Bank of Mexico
-Visa International
-Hyperknowledge (Cambridge)
-Hellenic Air Force
-ICSS (Beijing)
-United Microelectronic Corporation (Taiwan)

We also work with the university’s Employability and Careers Centre to help you find out about further work experience, internships, placements, and voluntary opportunities.

Example structure

-MSc Project and Dissertation
-Cloud Technologies and Systems
-Computer Security
-Converged Networks and Services
-Group Project
-High Performance Computing
-Professional Practice and Research Methodology
-E-Commerce Programming (optional)
-IP Networking and Applications (optional)
-Mobile & Social Application Programming (optional)
-Network Security and Cryptographic Principles (optional)
-Advanced Web Technologies (optional)
-Creating and Growing a New Business Venture (optional)
-Information Retrieval (optional)

Read less
Increasingly, computer networks cannot be considered without the important issue of security; without secure networks, businesses, commerce and communications would all fail. Read more
Increasingly, computer networks cannot be considered without the important issue of security; without secure networks, businesses, commerce and communications would all fail. This course addresses the need for modern computer network professionals.

You cover topics such as current and future internet protocols, programming networked services and securing these systems. We offer a strong practical element through laboratory programmes in software engineering and in computer networking; laboratory work in security includes unique environments where the techniques of the attackers can be observed and stopped using specialist security tools.

Our School is a community of scholars leading the way in technological research and development. Today’s computer scientists are creative people who are focused and committed, yet restless and experimental. We are home to many of the world’s top scientists, and our work is driven by creativity and imagination as well as technical excellence.

We are ranked Top 10 in the UK in the 2015 Academic Ranking of World Universities, with more than two-thirds of our research rated ‘world-leading’ or ‘internationally excellent (REF 2014).

This course is also available on a part-time basis.

Professional accreditation

This degree is accredited by the Institution of Engineering and Technology (IET).This accreditation is increasingly sought by employers, and provides the first stage towards eventual professional registration as a Chartered Engineer (CEng).

Our expert staff

Specialist staff researching computer networks include Professor Mohammed Ghanbari, Dr Nigel Newton, Professor Stuart Walker, and Professor Klaus McDonald-Maier.

More broadly, our research covers a range of topics, from materials science and semiconductor device physics, to the theory of computation and the philosophy of computer science, with most of our research groups based around laboratories offering world-class facilities.

In recent years we have attracted many highly active research staff and we are conducting world-leading research in areas such as evolutionary computation, brain-computer interfacing, intelligent inhabited environments and financial forecasting.

Our impressive external research funding stands at over £4 million and we participate in a number of EU initiatives and undertake projects under contract to many outside bodies, including government and industrial organisations.

Specialist facilities

We are one of the largest and best resourced computer science and electronic engineering schools in the UK. Our work is supported by extensive networked computer facilities and software aids, together with a wide range of test and instrumentation equipment.
-We have six laboratories that are exclusively for computer science and electronic engineering students. Three are open 24/7, and you have free access to the labs except when there is a scheduled practical class in progress
-All computers run either Windows 7 or are dual boot with Linux
-Software includes Java, Prolog, C++, Perl, Mysql, Matlab, DB2, Microsoft Office, Visual Studio, and Project
-Students have access to CAD tools and simulators for chip design (Xilinx) and computer networks (OPNET)
-We also have specialist facilities for research into areas including non-invasive brain-computer interfaces, intelligent environments, robotics, optoelectronics, video, RF and MW, printed circuit milling, and semiconductors

Your future

Graduates of our degree in this area have found work in a variety of networking roles and companies including, network management for companies, Internet service providers and developers for security products both in the UK and overseas.

Our recent graduates have progressed to a variety of senior positions in industry and academia. Some of the companies and organisations where our former graduates are now employed include:
-Electronic Data Systems
-Pfizer Pharmaceuticals
-Bank of Mexico
-Visa International
-Hyperknowledge (Cambridge)
-Hellenic Air Force
-ICSS (Beijing)
-United Microelectronic Corporation (Taiwan)

We also work with the university’s Employability and Careers Centre to help you find out about further work experience, internships, placements, and voluntary opportunities.

Example structure

-MSc Project and Dissertation
-Computer Security
-IP Networking and Applications
-Networking Principles
-Networks Laboratory
-Professional Practice and Research Methodology
-Programming in Python
-Cloud Technologies and Systems (optional)
-Data Science and Decision Making (optional)
-Converged Networks and Services (optional)
-Creating and Growing a New Business Venture (optional)
-Mobile Communications (optional)
-Advanced Transport Networks (optional)
-Network Security and Cryptographic Principles (optional)

Read less
Our graduates work in major telecommunications companies around the world. We have run this course for over 25 years and, in that time, educated over a thousand communications specialists. Read more
Our graduates work in major telecommunications companies around the world. We have run this course for over 25 years and, in that time, educated over a thousand communications specialists.

Starting from the concept of a signal, we cover the fundamentals of how signals are acquired, processed and transmitted over a wide range of media — electronic, optical and radio. Our laboratory work shows how these principles are put into practice and your software development skills are improved through a series of lectures, exercises and assignments.

Building on this, we explore a number of state-of-the-art topics in detail, including:
-Modern digital transmission systems
-Wireless communication systems
-Computer security and cryptography
-Complex electronic circuits
-Networked systems

Our School is a community of scholars leading the way in technological research and development. Today’s telecommunications engineers are creative people who are focused and committed, yet restless and experimental. We are home to many of the world’s top engineers, and our work is driven by creativity and imagination as well as technical excellence.

We are ranked Top 10 in the UK in the 2015 Academic Ranking of World Universities, with more than two-thirds of our research rated ‘world-leading’ or ‘internationally excellent (REF 2014).

This course is also available on a part-time basis.

This degree is accredited by the Institution of Engineering and Technology (IET).This accreditation is increasingly sought by employers, and provides the first stage towards eventual professional registration as a Chartered Engineer (CEng).

Our expert staff

We have been one of the leading electronics departments in the country throughout our history, and in recent years, our prolific research staff have contributed to some major breakthroughs.

We invented the world's first telephone-based system for deaf people to communicate with each other in 1981, with cameras and display devices that were able to work within the limited telephone bandwidth. Our academics have also invented a streamlined protocol system for worldwide high speed optical communications.

Specialist facilities

We are one of the largest and best resourced computer science and electronic engineering schools in the UK. Our work is supported by extensive networked computer facilities and software aids, together with a wide range of test and instrumentation equipment.
-We have six laboratories that are exclusively for computer science and electronic engineering students. Three are open 24/7, and you have free access to the labs except when there is a scheduled practical class in progress
-All computers run either Windows 7 or are dual boot with Linux
-Software includes Java, Prolog, C++, Perl, Mysql, Matlab, DB2, Microsoft Office, Visual Studio, and Project
-Students have access to CAD tools and simulators for chip design (Xilinx) and computer networks (OPNET)
-We also have specialist facilities for research into areas including non-invasive brain-computer interfaces, intelligent environments, robotics, optoelectronics, video, RF and MW, printed circuit milling, and semiconductors

Your future

Our recent graduates have progressed to a variety of senior positions in industry and academia. Some of the companies and organisations where our former graduates are now employed include:
-Elitecore Technologies Ltd
-Juniper Networks
-Cisco Systems
-Incendio Technologies

We also work with the university’s Employability and Careers Centre to help you find out about further work experience, internships, placements, and voluntary opportunities.

Example structure

Postgraduate study is the chance to take your education to the next level. The combination of compulsory and optional modules means our courses help you develop extensive knowledge in your chosen discipline, whilst providing plenty of freedom to pursue your own interests. Our research-led teaching is continually evolving to address the latest challenges and breakthroughs in the field, therefore to ensure your course is as relevant and up-to-date as possible your core module structure may be subject to change.

MSc Advanced Communications Systems
-Theory of Signals and Systems
-Digital Communications
-Networking Principles
-Mobile Communications
-Communications Laboratory
-Mathematical Research Techniques Using Matlab
-MSc Project and Dissertation
-Professional Practice and Research Methodology
-Converged Networks and Services (optional)
-Creating and Growing a New Business Venture (optional)
-Data Science and Decision Making (optional)
-Electronic System Design & Integration
-Network Security and Cryptographic Principles
-Computer Security

Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
The M.Sc. programme Computer Science for Digital Media at the Bauhaus-Universität Weimar is an internationally oriented 2-years degree programme. Read more
The M.Sc. programme Computer Science for Digital Media at the Bauhaus-Universität Weimar is an internationally oriented 2-years degree programme. It aims at creative and innovative thinking graduates of Computer Science or related subjects with the desire of deepening their knowledge in applied Computer Science, with a focus on applications relevant to the media.

Programme Features

In accordance with the »Weimar Model«, research-oriented projects are a large and defining part of the Master’s programme. Additional elective modules allow students to select courses from other degree programmes such as Computational Engineering, Arts and Design, Architecture, as well as courses from the Computer Science for Digital Media course catalogue. Graded language courses up to 6 ECTS may also be included. The fourth and final semester is dedicated entirely to the Master’s thesis.

The degree programme offers students to focus on different fields. Core components of the programme and areas of specialisation include:
• Web Technologies
• Information Retrieval and Data Mining
• Big Data Analytics
• Intelligent Software Systems
• Computer Graphics and Visualization
• Computer Vision
• Virtual Reality, 3D Interfaces
• Human Computer Interfaces
• Usability
• Secure Protocols and Cryptographic Algorithms

Key skills and competences are acquired through a project-based teaching approach: on a semester basis, students work in teams to solve assigned research tasks in the labs of the faculty. This approach provides our graduates with soft- and hard- skills which are very welcome in research and development institutions. Within the recently built »Digital Bauhaus Lab«, the faculty of media has excellent research facilities equipped with the latest advanced hardware.

Visit the Computer Science for Digital Media on the Bauhaus-Universität Weimar website for more details on the programme.

Career Options

Our graduates find employment in the R&D departments of companies in the automotive, telecommunication, software, gaming and animation industry, as well as at academic institutions in Germany and overseas. A specialisation in Computer Science with focus on media opens the door for employment and research in innovative areas such as system development, algorithm development, data analysis, data mining, scientific visualisation, image processing, physical simulation, interface development and testing and security protocols development.

Application Process

Applicants who graduated outside of Europe should apply online on http://www.uni-assist.de/index_en.html. Applicants who graduated in Europe and do not require a visa can apply online at: https://movein-uni-weimar.moveonnet.eu/movein/portal/studyportal.php?_language=en

Please find further information for your application on http://www.uni-weimar.de/en/media/studies/computer-science-and-media-hci/application-master-csm/

We also maintain a FAQ page: http://www.uni-weimar.de/en/media/studies/computer-science-and-media-hci/faq-application-csm/

Studying in Weimar

The »Bauhaus « was the most influential design school in the 20th century and was founded in 1919 in Weimar. The Bauhaus-Universität Weimar is the living continuation of this tradition. We are an international university in the unique, cultural city of Weimar. We are a vibrant institution, not a museum! Experimentation and excellence are our mission throughout our university faculties Media, Architecture and Urbanism, Civil Engineering and Art and Design. Across our Faculties, transdisciplinary projects and co-operations in research and education are an important part of this mission.

Find out more about student life in Weimar on http://www.uni-weimar.de/en/university/studies/einblickbauhaus/university-town-of-weimar/

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

This course is offered via block delivery. There are two entry points (October and November). This allows you to start when it is most suitable.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics#entry

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less

  • 1
Show 10 15 30 per page


Share this page:

Cookie Policy    X