• University of Edinburgh Featured Masters Courses
  • Imperial College London Featured Masters Courses
  • Regent’s University London Featured Masters Courses
  • Swansea University Featured Masters Courses
  • University of York Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
De Montfort University Featured Masters Courses
University of Hertfordshire Featured Masters Courses
Cardiff University Featured Masters Courses
University of Kent Featured Masters Courses
University of Birmingham Featured Masters Courses
"cryptography"×
0 miles

Masters Degrees (Cryptography)

  • "cryptography" ×
  • clear all
Showing 1 to 15 of 80
Order by 
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. Read more
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. During the course critical awareness of problems in information transmission, data compression and cryptography is raised, and the mathematical techniques which are commonly used to solve these problems are explored.

The Mathematics Department at Royal Holloway is well known for its expertise in information security and cryptography and our academic staff include several leading researchers in these areas. Students on the programme have the opportunity to carry out their dissertation projects in cutting-edge research areas and to be supervised by experts.

The transferable skills gained during the MSc will open up a range of career options as well as provide a solid foundation for advanced research at PhD level.

See the website https://www.royalholloway.ac.uk/mathematics/coursefinder/mscmathematicsofcryptographyandcommunications(msc).aspx

Why choose this course?

- You will be provided with a solid mathematical foundation and a knowledge and understanding of the subjects of cryptography and communications preparing you for research or professional employment in this area.

- The mathematical foundations needed for applications in communication theory and cryptography are covered including Algebra, Combinatorics Complexity Theory/Algorithms and Number Theory.

- You will have the opportunity to carry out your dissertation project in a cutting-edge research area; our dissertation supervisors are experts in their fields who publish regularly in internationally competitive journals and there are several joint projects with industrial partners and Royal Holloway staff.

- After completing the course former students have a good foundation for the next step of their career both inside and outside academia.

Department research and industry highlights

The members of the Mathematics Department cover a range of research areas. There are particularly strong groups in information security, number theory, quantum theory, group theory and combinatorics. The Information Security Group has particularly strong links to industry.

Course content and structure

You will study eight courses as well as complete a main project under the supervision of a member of staff.

Core courses:
Advanced Cipher Systems
Mathematical and security properties of both symmetric key cipher systems and public key cryptography are discussed as well as methods for obtaining confidentiality and authentication.

Channels
In this unit, you will investigate the problems of data compression and information transmission in both noiseless and noisy environments.

Theory of Error-Correcting Codes
The aim of this unit is to provide you with an introduction to the theory of error-correcting codes employing the methods of elementary enumeration, linear algebra and finite fields.

Public Key Cryptography
This course introduces some of the mathematical ideas essential for an understanding of public key cryptography, such as discrete logarithms, lattices and elliptic curves. Several important public key cryptosystems are studied, such as RSA, Rabin, ElGamal Encryption, Schnorr signatures; and modern notions of security and attack models for public key cryptosystems are discussed.

Main project
The main project (dissertation) accounts for 25% of the assessment of the course and you will conduct this under the supervision of a member of academic staff.

Additional courses:
Applications of Field Theory
You will be introduced to some of the basic theory of field extensions, with special emphasis on applications in the context of finite fields.

Quantum Information Theory
‘Anybody who is not shocked by quantum theory has not understood it' (Niels Bohr). The aim of this unit is to provide you with a sufficient understanding of quantum theory in the spirit of the above quote. Many applications of the novel field of quantum information theory can be studied using undergraduate mathematics.

Network Algorithms
In this unit you will be introduced to the formal idea of an algorithm, when it is a good algorithm and techniques for constructing algorithms and checking that they work; explore connectivity and colourings of graphs, from an algorithmic perspective; and study how algebraic methods such as path algebras and cycle spaces may be used to solve network problems.

Advanced Financial Mathematics
In this unit you will investigate the validity of various linear and non-linear time series occurring in finance and extend the use of stochastic calculus to interest rate movements and credit rating;

Combinatorics
The aim of this unit is to introduce some standard techniques and concepts of combinatorics, including: methods of counting including the principle of inclusion and exclusion; generating functions; probabilistic methods; and permutations, Ramsey theory.

Computational Number Theory
You will be provided with an introduction to many major methods currently used for testing/proving primality and for the factorisation of composite integers. The course will develop the mathematical theory that underlies these methods, as well as describing the methods themselves.

Complexity Theory
Several classes of computational complexity are introduced. You will discuss how to recognise when different problems have different computational hardness, and be able to deduce cryptographic properties of related algorithms and protocols.

On completion of the course graduates will have:
- a suitable mathematical foundation for undertaking research or professional employment in cryptography and/or communications

- the appropriate background in information theory and coding theory enabling them to understand and be able to apply the theory of communication through noisy channels

- the appropriate background in algebra and number theory to develop an understanding of modern public key cryptosystems

- a critical awareness of problems in information transmission and data compression, and the mathematical techniques which are commonly used to solve these problems

- a critical awareness of problems in cryptography and the mathematical techniques which are commonly used to provide solutions to these problems

- a range of transferable skills including familiarity with a computer algebra package, experience with independent research and managing the writing of a dissertation.

Assessment

Assessment is carried out by a variety of methods including coursework, examinations and a dissertation. The examinations in May/June count for 75% of the final average and the dissertation, which has to be submitted in September, counts for the remaining 25%.

Employability & career opportunities

Our students have gone on to successful careers in a variety of industries, such as information security, IT consultancy, banking and finance, higher education and telecommunication. In recent years our graduates have entered into roles including Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security manager at London Underground.

How to apply

Applications for entry to all our full-time postgraduate degrees can be made online https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
This course covers a wide range of topics from both applied and applicable mathematics and is aimed at students who want to study the field in greater depth, in areas which are relevant to real life applications. Read more
This course covers a wide range of topics from both applied and applicable mathematics and is aimed at students who want to study the field in greater depth, in areas which are relevant to real life applications.

You will explore the mathematical techniques that are commonly used to solve problems in the real world, in particular in communication theory and in physics. As part of the course you will carry out an independent research investigation under the supervision of a member of staff. Popular dissertation topics chosen by students include projects in the areas of communication theory, mathematical physics, and financial mathematics.

The transferable skills gained on this course will open you up to a range of career options as well as provide a solid foundation for advanced research at PhD level.

See the website https://www.royalholloway.ac.uk/mathematics/coursefinder/mscmathematicsforapplications.aspx

Why choose this course?

- You will be provided with a solid mathematical foundation and knowledge and understanding of the subjects of cryptography and communications, preparing you for research or professional employment in this area.

- The Mathematics Department at Royal Holloway is well known for its expertise in information security and cryptography. The academics who teach on this course include several leading researchers in these areas.

- The mathematical foundations needed for applications in communication theory and cryptography are covered including Algebra, Combinatorics Complexity Theory/Algorithms and Number Theory.

- You will have the opportunity to carry out your dissertation project in a cutting-edge research area; our dissertation supervisors are experts in their fields who publish regularly in internationally competitive journals and there are several joint projects with industrial partners and Royal Holloway staff.

- After completing the course students have a good foundation for the next step of their career both inside and outside academia.

Department research and industry highlights

The members of the Mathematics Department cover a range of research areas. There are particularly strong groups in information security, number theory, quantum theory, group theory and combinatorics. The Information Security Group has particularly strong links to industry.

Course content and structure

You will study eight courses and complete a main project under the supervision of a member of staff.

Core courses:
Theory of Error-Correcting Codes
The aim of this unit is to provide you with an introduction to the theory of error-correcting codes employing the methods of elementary enumeration, linear algebra and finite fields.

Advanced Cipher Systems
Mathematical and security properties of both symmetric key cipher systems and public key cryptography are discussed, as well as methods for obtaining confidentiality and authentication.

Main project
The main project (dissertation) accounts for 25% of the assessment of the course and you will conduct this under the supervision of a member of academic staff.

Additional courses:
Applications of Field Theory
You will be introduced to some of the basic theory of field extensions, with special emphasis on applications in the context of finite fields.

Quantum Information Theory
‘Anybody who is not shocked by quantum theory has not understood it' (Niels Bohr). The aim of this unit is to provide you with a sufficient understanding of quantum theory in the spirit of the above quote. Many applications of the novel field of quantum information theory can be studied using undergraduate mathematics.

Network Algorithms
In this unit you will be introduced to the formal idea of an algorithm, when it is a good algorithm and techniques for constructing algorithms and checking that they work; explore connectivity and colourings of graphs, from an algorithmic perspective; and study how algebraic methods such as path algebras and cycle spaces may be used to solve network problems.

Advanced Financial Mathematics
In this unit you will investigate the validity of various linear and non-linear time series occurring in finance and extend the use of stochastic calculus to interest rate movements and credit rating;

Combinatorics
The aim of this unit is to introduce some standard techniques and concepts of combinatorics, including: methods of counting including the principle of inclusion and exclusion; generating functions; probabilistic methods; and permutations, Ramsey theory.

Computational Number Theory
You will be provided with an introduction to many major methods currently used for testing/proving primality and for the factorisation of composite integers. The course will develop the mathematical theory that underlies these methods, as well as describing the methods themselves.

Complexity Theory
Several classes of computational complexity are introduced. You will discuss how to recognise when different problems have different computational hardness, and be able to deduce cryptographic properties of related algorithms and protocols.

On completion of the course graduates will have:
- knowledge and understanding of: the principles of communication through noisy channels using coding theory; the principles of cryptography as a tool for securing data; and the role and limitations of mathematics in the solution of problems arising in the real world

- a high level of ability in subject-specific skills, such as algebra and number theory

- developed the capacity to synthesise information from a number of sources with critical awareness

- critically analysed the strengths and weaknesses of solutions to problems in applications of mathematics

- the ability to clearly formulate problems and express technical content and conclusions in written form

- personal skills of time management, self-motivation, flexibility and adaptability.

Assessment

Assessment is carried out by a variety of methods including coursework, examinations and a dissertation. The examinations in May/June count for 75% of the final average and the dissertation, which has to be submitted in September, counts for the remaining 25%.

Employability & career opportunities

Our students have gone on to successful careers in a variety of industries, such as information security, IT consultancy, banking and finance, higher education and telecommunication. In recent years our graduates have entered into roles including Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security Manager at London Underground.

How to apply

Applications for entry to all our full-time postgraduate degrees can be made online https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

Degree information

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits. The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules
-Computer Security I
-Computer Security II
-Introduction to Cryptography
-Research in Information Security

Optional modules - students choose four of the following:
-Distributed Systems and Security
-People and Security
-Applied Cryptography
-Information Security Management
-Language Based Security
-Philosophy, Politics and Economics of Security and Privacy
-Malware
-Cryptanalysis
-Cybercrime
-Privacy Enhancing Technologies
-Relevant options from other MSc degree programmes

Dissertation/report
All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning
The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Careers

UCL graduates are keenly sought by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Top career destinations for this degree:
-Risk IT RTB Support Administrator, Lloyds Banking Group
-Technical Analyst, The Royal Bank of Scotland (RBS)
-IT Lead Developer, MOVE Guides
-Software Developer, Oracle
-Cisco Certified Network Associate (CCNA) Routing and Switching, Cisco

Employability
Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts occur through the ACE-CS guest lecture series integrated into the course.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research, and was one of the top-rated departments in the UK government's recent Research Excellence Framework.

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. Students from the degree won the first UK Cyber Security Challenge in code cracking in 2013.

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Read less
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. Read more
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features
-This course is accredited by BCS, The Chartered Institute for IT.
-The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
-You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Work placement scheme

Kingston University has set up a scheme that allows postgraduate students in the Faculty of Science, Engineering and Computing to include a work placement element in their course starting from September 2017. The placement scheme is available for both international and home/EU students.

-The work placement, up to 12 months; is optional.
-The work placement takes place after postgraduate students have successfully completed the taught portion of their degree.
-The responsibility for finding the placement is with the student. We cannot guarantee the placement, just the opportunity to undertake it.
-As the work placement is an assessed part of the course for international students, this is covered by a student's tier 4 visa.

Details on how to apply will be confirmed shortly.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security MSc modules
-Cryptography and Applications
-Network and Information Security
-Data Communications
-Project Dissertation
-One option module

Read less
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. Read more
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features
-This course is accredited by BCS, The Chartered Institute for IT.
-The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
-You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Work placement scheme

Kingston University has set up a scheme that allows postgraduate students in the Faculty of Science, Engineering and Computing to include a work placement element in their course starting from September 2017. The placement scheme is available for both international and home/EU students.

-The work placement, up to 12 months; is optional.
-The work placement takes place after postgraduate students have successfully completed the taught portion of their degree.
-The responsibility for finding the placement is with the student. We cannot guarantee the placement, just the opportunity to undertake it.
-As the work placement is an assessed part of the course for international students, this is covered by a student's tier 4 visa.

Details on how to apply will be confirmed shortly.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security with Management Studies MSc modules
-Cryptography and Applications
-Network and Information Security
-Data Communications
-Business in Practice
-Project Dissertation

Read less
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security. Read more
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security.

Our course is provisionally certified by GCHQ and taught by experts, and equips you with the theoretical grounding and hands-on experience demanded by the information-security sector.

PROGRAMME OVERVIEW

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Dissertation
-Information and Network Security
-Symmetric Cryptography
-Asymmetric Cryptography
-Information Security Management
-Multimedia Security and Digital Forensics
-Secure Systems and Applications
-Information Security for Business and Government
-Project Management and Business Strategy
-Database Systems
-Cloud Computing

EDUCATIONAL AIMS OF THE PROGRAMME

The programme will:
-Provide students with advanced knowledge and understanding of information security theory and concepts
-Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
-Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
-Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

PROGRAMME LEARNING OUTCOMES

Knowledge and understanding
-Knowledge and understanding of the general information security aims and challenges
-Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
-Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
-Knowledge and understanding of technical concepts and mechanisms for digital forensics
-Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
-The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
-The ability to implement or apply existing information security mechanisms and technologies in practice
-The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
-The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills
-Analyse and solve problems of technical nature under consideration of various risks and constraints
-Make effective and efficient decisions in an environment of conflicting interests
-Think strategically
-Synthesise and critically evaluate the work of others
-Apply fundamental knowledge to investigate new and emerging technologies
-Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills
-Come up with technical solutions to a range of problems
-Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
Implement mechanisms and apply them in a wider context of more complex systems
-Present their opinions and findings and to produce a high-quality report

Key / transferable skills
-The ability to communicate concepts and results in a clear and effective manner
-The time and resource management planning
-The ability to work with available resources, to collect and analyse research-oriented material

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
Who is this course for?. Recent graduates in Electrical or Electronic Engineering or Computer Science, who wish to develop their skills in the field of distributed computing systems. Read more
Who is this course for?
Recent graduates in Electrical or Electronic Engineering or Computer Science, who wish to develop their skills in the field of distributed computing systems.
Practicing engineers and computer professionals who wish to develop their knowledge in this area.
People with suitable mathematical, scientific or other engineering qualifications, usually with some relevant experience, who wish to enter this field.

Modules

Computer Networks, which aims to advance knowledge on computer networks. Topics to be covered in this module include OSI reference model, Physical and Data Link Layer Protocols, TCP/IP Networking, IPv6, Routing Protocols, Asynchronous Transfer Mode (ATM) Networks, Packet Delay and Queuing Analysis, IP Quality of Services (Integrated Service Model and Differentiated Service Model), Resource Reservation Protocol (RSVP), Multi-Protocol Label Switching (MPLS), IP Multicasting, Network Application Layer Protocols such as HTTP, DNS, SNMP.

Network Computing, which focuses on principles and techniques for network computing. Topics to be covered in this module include Object-Oriented Software Engineering, Object-Oriented Programming with Java, Network Computing Models such as Client/Server Model and Peer-to-Peer Model, Socket Programming, Remote Procedure Call (RPC), Java Remote Method Invocation (RMI), Common Object Request Broker Architecture (CORBA), Web Computing Technologies (Java Servlet, Java Server Pages), Message Exchanging with XML, Service Oriented Architecture (SOA), XML based Web Services (WSDL, SOAP, UDDI).

Network Security and Encryption, which introduces the fundamental theory that enables what is achievable through the use of Security Engineering to be determined, and presents the practical techniques and algorithms that are currently important for the efficient and secure use of distributed /Grid computing systems. Topics to be covered in this module include Introduction to Security Engineering, Classical Cryptography (Monoalphabetic and Polyalphabetic Ciphers, Transposition, Substitution, Linear Transformation), Computational Fundamentals of Cryptosystems (Computational Complexity and Intractability, Modular Arithmetic and Elementary Number Theory), Modern Symmetric Key Cryptography (Feistel Ciphers, DES, Triple-DES and AES),Public Key Cryptography (The Diffie-Hellman Key Exchange Algorithm, Public Key Infrastructures, X.509 Certificates, PK Systems such as RSA and Elliptic Curves), Multilevel Security (the Bell-LaPadula Security Policy Model, the Biba Model, the NRL Pump), Multilateral Security (Compartmentation and the Lattice Model, the Chinese Wall, the BMA Model), Protecting e-Commerce Systems.

Distributed Systems Architecture, which presents a comprehensive evaluation of the design philosophies, fundamental constructs, performance issues and operational principles of distributed systems architectures, covering applications, algorithms and software architecture, engineering issues and implementation technology. Topics to be covered in this module include System Architecture (Bus Systems, High Performance I/O, Memory Hierarchies, Memory Coherence and File Coherence), Distributed Database, Processor Architecture, File Services, Inter-Process Communication, Naming Services, Resource Allocation and Scheduling, Distributed System Case Studies.

Grid Middleware Technologies, which introduces the principle, concepts and practice of Grid middleware technologies, and provides a practical knowledge on developing Grid applications. Topics to be covered in this module include Parallel Computing Paradigms, Parallel Programming with MPI/PVM, Cluster Computing Principles (Condor, Sun Grid Engine), Grid Computing Middleware Components (Job Submission, Resource Management and Job Scheduling, Information Service, Grid Portal, Grid Security Infrastructure), Grid Standards (OGSA/WSRF), Grid Middleware Case Study with Globus.

Grid System Analysis and Design, which aims to analyse representative production Grid systems and gain knowledge on how to design and optimise large-scale Grid systems. Topics to be covered in this module include System Analysis Methodologies with UML, Model Construction (Process Modelling, Static Class Modelling, Dynamic Modelling, Interface Modelling), Management of Large-Scale Grid System (Portal, Concurrent Version System (CVS)/Wiki), Grid System Analysis Case Study (GridPP, LCG/EGEE), Grid System Design (Performance Consideration, Open Standards, Design Patterns, Usability Analysis), Grid System Programming Models, Testing (Unit Testing, Integration Testing, Regression Testing), Debugging, Risk Analysis, System Maintenance.

Project Management, which introduces a range of formal methods and skills necessary to equip the student to function effectively at the higher levels of project management. Covers the need for the development of project management skills in achieving practical business objectives.

Workshop involves practical work, which is an important component of the course and gives students experience with relevant techniques and tools. Assignments are of practical nature and involve laboratory work with relevant equipment, hardware and software systems, conducted in a hands-on workshop environment. Typical assignments are:
TCP/IP Network Layered Protocol Analysis
Object-Oriented Programming, Java Socket Programming
Network Security and Encryption
Java RMI Programming for Distributed Systems
Grid Programming with Globus Toolkit 4 (GT4)
Grid System Analysis/Simulation

Dissertation, which is a stimulating and challenging part of the MSc programme. It provides the opportunity to apply the knowledge learnt in the taught part of the programme and to specialise in one aspect, developing students’ deep understanding and expertise in Distributed Systems related area of their choice. Students may carry out their projects wholly within the University, but industrial based projects are encouraged.

Read less
You will have the opportunity to engage with the very latest Cyber Security principles, practices, tools, and techniques through practical application analysing and evaluating problems and responding to challenges in real time. Read more

INSTITUTE FOR DESIGN INNOVATION

You will have the opportunity to engage with the very latest Cyber Security principles, practices, tools, and techniques through practical application analysing and evaluating problems and responding to challenges in real time.

This programme will provide students with a comprehensive understanding of the challenges in Cyber Security faced by industry and society, and will help you to develop the necessary skills to address those challenges in the most effective way. This programme will enable you to build knowledge and develop expertise in network security in cryptography and through action-based learning to provide you with employment skills essential to the Cyber Security industries and related businesses, e-commerce, and governmental organisations.

See the website http://www.lborolondon.ac.uk/study/institutes-programmes/cybersecurity-and-big-data/

Programme Aims

a) Provide students with a comprehensive understanding of the challenges in cyber security faced by industry and society, and will help them to develop the necessary skills to address those challenges in the most effective way

b) Utilise both cyber security and big data analytics techniques to analyse and evaluate problems and respond to challenges with practical applications in real time

c) Build students’ knowledge and develop expertise in network security and cryptography, including big data analytics to combat malicious activities and to detect anomalies in the network

d) Provide individuals and teams with employment skills essential to the cyber security industries and related businesses, such as IT, e-commerce, and governmental organisations using action-based learning

Programme Structure

To complete the MSc Cyber Security and Big Data students must complete 8 x 15 credit modules. Students must also choose and complete 3 of the 6 optional modules. Students will pick a second subject from the list of nominated second subject modules offered by the other Institutes in the first semester. All students must complete a Dissertation worth 60 credits.

ASSESSMENT

Modules are assessed primarily by exams and also include a combination of group exercises, presentations and time-constrained coursework and assignments with varying levels of weighting depending on the nature of each module.

CAREER PROSPECTS

Graduates from this programme will be in a very strong position to take on digital technology posts in a wide range of industries, including Internet and cloud based businesses, finance firms, governmental organisations, consultancy companies operating in information, communication and network security, as well as those sectors dealing with massive personal data, such as health and well being, where users' privacy and trust needs safeguarding.

Graduates will also have the opportunity to enhance their knowledge and career prospects further by undertaking a PhD programme.

COMPULSORY MODULES

- Collaborative Project
- Dissertation
- Applied Cryptography

OPTIONAL MODULES

Choose three modules only:
- Media Processing and Coding
- Internet and Communication Networks
- Internet of Things and Applications
- Introduction to Programming and MatLab

SECOND SUBJECT MODULES

Choose one module only
- Design Thinking
- Principles of Entrepreneurship and Innovation Management
- Sport Media and Marketing
- The Key Topics in Media and Creative Industries
- Introduction to Diplomacy
- Business Model Development

See here for information on modules: http://www.lborolondon.ac.uk/study/institutes-programmes/cybersecurity-and-big-data/

Scholarships

We are investing over half a million pounds (£0.5m) in our scholarship and bursary scheme to support your studies at Loughborough University London in 2017.

This package of support celebrates and rewards excellence, innovation and community. Our ambition is to inspire students of the highest calibre and from all backgrounds and nationalities to study with us and benefit from the wider Loughborough University experience and network. Our range of scholarships, bursaries and support packages are available to UK, EU and international students.View the sections below to discover which scholarship options are right for you.

What's on offer for 2017?
Inspiring Success Programme
-For unemployed and underemployed* graduates living in the East London Growth Boroughs of Hackney, Newham, Tower Hamlets or Waltham Forest
-Award value: 100% off your tuition fees
-We are joining forces with The London Legacy Development Company to offer a two day programme of specialist support for graduates, including workshops, skills seminars and networking opportunities to increase students' employability and support those looking to enter into postgraduate education.
-Eligibility: At the end of the programme, eight students will be selected for a 100% scholarship to study a masters course of their choice at our London campus in September 2017.

Dean's Award for Enterprise
-For students looking for the skills and support to launch a new business
-Award value: 90% off fees to launch your business idea
-Eligibility: The award will be given at the discretion of the Dean and the Senior Leadership Team, based on a one-page submission of your business idea.

East London Community Scholarship
-For any students who obtained their GCSE’s or A-levels (or equivalent qualifications) from The Growth Boroughs – Barking and Dagenham, Greenwich, Hackney, Newham, Tower Hamlets and Waltham Forest
-Award value: 50% off your tuition fees
-Eligibility: Competitive scholarship based on one-page submission showing your contribution to our community.

Alumni Bursary
-For all Loughborough University alumni
-Award value: 20% off your tuition fees
-Eligibility: International and UK/EU alumni holding a current offer for LoughboroughExcellence Scholarship
-For international and UK/EU high achieving students
-Eligibility: Any student holding a high 2:1 or first class undergraduate degree or equivalent from a recognised high quality institution will be considered

Find information on Scholarships here http://www.lborolondon.ac.uk/study/scholarships-and-bursaries/

Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
The MSc in Computing & Security will provide you with the knowledge and practical expertise to evaluate, design and build computer security systems. Read more
The MSc in Computing & Security will provide you with the knowledge and practical expertise to evaluate, design and build computer security systems. Delivered by of the Department of Informatics, which has an enviable reputation for research-led teaching and project supervision from leading experts in their field.

Key benefits

- Unrivalled location in the heart of London giving access to major libraries and leading scientific societies, including the BCS Chartered Institute for IT, and the Institution of Engineering and Technology (IET).

- Addresses a growing interest in advance security methods by providing theoretical and practical knowledge of a broad range of techniques for developing security solutions.

- Aims to give coverage of the whole field of security and related computing areas, rather than specialising on one area.

- Develops critical awareness and appreciation of the changing role of computing in society, motivating graduates to pursue continuing professional development and further research.

- Access to speakers of international repute through seminars and external lectures, enabling students to keep abreast of emerging knowledge in computing and security and related fields.

Visit the website: http://www.kcl.ac.uk/study/postgraduate/taught-courses/computing-and-security-msc.aspx

Course detail

- Description -

This programme addresses the growth in interest in advanced security methods for solving a huge range of problems, including combating crime and terrorism. It is built around taught core modules such as cryptography and information security, access control and privacy policies and computer forensics and cybercrime. These modules are complemented by a range of optional modules that relate to various aspects of computing. The final part of the programme is an individual project which is closely linked with the Department's research activities.

- Course purpose -

For graduates in computer science, science, or engineering, this MSc will provide specialised training in computing and security. Completing research for your individual project will provide valuable preparation for a career in research or industry.

- Course format and assessment -

Lectures; tutorials; seminars; laboratory sessions; optional career planning workshops. Assessed through: coursework; written examinations; final project report.

Core modules:

- Individual Project
- Computer Forensics & Cybercrime
- Cryptography and Information Security
- Group Project
- Network Security

Career prospects

Via the Department’s Careers Programme, students are able to network with top employers and obtain advice on how to enhance career prospects. Our graduates have gone on to have very successful careers in industry and research. Our graduates are working in general software consultancy companies, specialised software development companies and the IT departments of large institutions (financial, telecommunications and public sector). Recent employers include Hang Seng Bank, Lloyds Banking Group and Merrill Corporation. Other graduates have entered into the field of academic and industrial research in areas such as software engineering, algorithms and computer networks.

How to apply: http://www.kcl.ac.uk/study/postgraduate/apply/taught-courses.aspx

About Postgraduate Study at King’s College London:

To study for a postgraduate degree at King’s College London is to study at the city’s most central university and at one of the top 20 universities worldwide (2015/16 QS World Rankings). Graduates will benefit from close connections with the UK’s professional, political, legal, commercial, scientific and cultural life, while the excellent reputation of our MA and MRes programmes ensures our postgraduate alumni are highly sought after by some of the world’s most prestigious employers. We provide graduates with skills that are highly valued in business, government, academia and the professions.

Scholarships & Funding:

All current PGT offer-holders and new PGT applicants are welcome to apply for the scholarships. For more information and to learn how to apply visit: http://www.kcl.ac.uk/study/pg/funding/sources

Free language tuition with the Modern Language Centre:

If you are studying for any postgraduate taught degree at King’s you can take a module from a choice of over 25 languages without any additional cost. Visit: http://www.kcl.ac.uk/mlc

Read less
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
This programme covers traditional and contemporary approaches to software development, from formal methods to object-oriented programming. Read more

Course Summary

This programme covers traditional and contemporary approaches to software development, from formal methods to object-oriented programming. You will study with experts in subjects such as computer vision; critical systems; cryptography; distributed computing systems; e-business; intelligent agents; model checking and multimedia.

Modules

Semester one: Software Modelling Tools and Techniques; Software Project Management and Development; Web Architecture; Web Development; Intelligent Agents; Designing Usable and Accessible Technologies; Machine Learning; Implementing Cyber Security

Semester two: Automated Code Generation; Automated Software Verification; Semantic Web Technologies; E-Business Strategy; Science of Online Social Networks; Cryptography; Advanced Intelligent Agents; Advanced Machine Learning

Visit our website for further information...



Read less
You will gain deep knowledge of a chosen topic in mathematics or statistics and develop your research skills in project planning, reviewing literature, group discussions, research presentations and writing publications. Read more
You will gain deep knowledge of a chosen topic in mathematics or statistics and develop your research skills in project planning, reviewing literature, group discussions, research presentations and writing publications.

You can choose to work with experts from a range of areas including quantum cryptography, graph theory, statistical analysis, bioinformatics and mathematical modelling.

You will take three taught modules each providing you with the underpinning theory to support your research work.

What will I study?

You will undertake a year-long research project, one compulsory module on Research Methods and then choose any two from the options below:

Options in Statistics

:
-Computational Statistics and Data Analysis
-Applied Statistics
-Statistical Modelling

[[ Options in Applied Mathematics]]:
- Mathematical Recipes
- Topics in Mathematical Biology
- Linear Systems
- Topics in Applied Mathematics

Options in Pure Mathematics

- Topics in Pure Mathematics
- Coding Theory and Cryptography

COME VISIT US ON OUR NEXT OPEN DAY!

Register here: https://www.ntu.ac.uk/university-life-and-nottingham/open-days/find-your-open-day/science-and-technology-postgraduate-and-professional-open-event2.

The course is a part of the School of Science and Technology (http://www.ntu.ac.uk/sat) which has first-class facilities (http://www.ntu.ac.uk/sat/facilities).

Read less
Today there are high level tools easily available to perform sophisticated attacks on computer and network systems. As a result computer network security is a very important consideration in every organisation using computer networks. Read more
Today there are high level tools easily available to perform sophisticated attacks on computer and network systems. As a result computer network security is a very important consideration in every organisation using computer networks. Without proper implementation, businesses could suffer financial losses. There are excellent opportunities in this area with excellent rewards. At present there are skills shortages globally in some areas of security which is an indicator of the demand for highly skilled security professionals.

The MSc in Computer Networks with Security aims to produce postgraduates with an advanced understanding of modern networks with the integrated need of security. The course aims to prepare the student with specialist knowledge and skillset in key areas such as threat analysis, network security systems, cryptography, cybersecurity, penetration testing, wireless security and information security. Students will develop skills to critically evaluate the threats and vulnerabilities of network systems and to implement and integrate security strategies. They will also be able to develop the ability to critically evaluate and implement principles and practices used in modern day cryptography used to secure data and communication in computer network systems. There will be an opportunity to explore current security tools used in penetration testing and get hands on experience at configuring enterprise level security appliances such as firewalls, intrusion detection systems and VPNs.

Course structure

Each MSc course consists of three learning modules (40 credits each) plus an individual project (60 credits). Each learning module consists of a short course of lectures and initial hands-on experience. This is followed by a period of independent study supported by a series of tutorials. During this time you complete an Independent Learning Package (ILP). The ILP is matched to the learning outcomes of the module. It can be either a large project or a series of small tasks depending on the needs of each module. Credits for each module are awarded following the submission of a completed ILP and its successful defence in a viva voce examination. This form of assessment develops your communication and personal skills and is highly relevant to the workplace. Overall, each learning module comprises approximately 400 hours of study.

The project counts for one third of the course and involves undertaking a substantial research or product development project. For part-time students, this can be linked to their employment. It is undertaken in two phases. In the first part, the project subject area is researched and a workplan developed. The second part involves the main research and development activity. In all, the project requires approximately 600 hours of work.

Further flexibility is provided within the structure of the courses in that you can study related topic areas by taking modules from other courses as options (pre-requisite knowledge and skills permitting). Prior to starting your course, you are sent a Course Information and Preparation Pack which provides information to give you a flying start.

MSc Computer Networks Suite of Courses

The MSc in Computer Networks has three distinct pathways:
-Security
-Communications
-Cloud Technologies

The course structure is quite flexible, affording industry-based students an opportunity to attend and accumulate module credits over an extended period of time. It also simultaneously serves the full-time student cohort which generally progresses through the MSc pathway in a single calendar year.

The MSc programmes are short course based and feature assessment through sequentially submitted result portfolios for the work packages, ie the ILPs. These are assigned immediately on each short course module where the students are able to concentrate their study efforts just on the most recently-taught subject material. This greatly promotes efficient focused learning. The individual oral examination administered for each ILP furnishes valuable experience in oral defence, and frees students from written examination burdens.

The technical tasks undertaken in ILPs, along with the required major project, thoroughly exercise the concepts covered in the course modules and give scope for originality and industry-relevant study. Team-working activities encouraged within modules, along with the all-oral individual examination regimen employed in this Networks MSc Suite, have proven solidly beneficial in refining the communication and employability-enhancing skills that are strongly valued by industry.

Read less

Show 10 15 30 per page


Share this page:

Cookie Policy    X