• University of Northampton Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • Cardiff University Featured Masters Courses
London Metropolitan University Featured Masters Courses
Imperial College London Featured Masters Courses
Nottingham Trent University Featured Masters Courses
Cranfield University at Shrivenham Featured Masters Courses
University of Bath Featured Masters Courses
"cryptography"×
0 miles

Masters Degrees (Cryptography)

We have 103 Masters Degrees (Cryptography)

  • "cryptography" ×
  • clear all
Showing 1 to 15 of 103
Order by 
Excited by the role of mathematics in securing the modern electronics and communications that we all rely on? This intensive MSc programme explores the mathematics behind secure information and communications systems, in a department that is world renowned for research in the field. Read more

Excited by the role of mathematics in securing the modern electronics and communications that we all rely on? This intensive MSc programme explores the mathematics behind secure information and communications systems, in a department that is world renowned for research in the field.

You will learn to apply advanced mathematical ideas to cryptography, coding theory and information theory, by studying the relevant functions of algebra, number theory and combinatorial complexity theory and algorithms. In the process you will develop a critical appreciation of the challenges that mathematicians face in facilitating secure information transmission, data compression and encryption. You will learn to use advanced cypher systems, correcting codes and modern public key crypto-systems. As part of your studies you will have the opportunity to complete a supervised dissertation in an area of your choice, under the guidance of experts in the field who regularly publish in internationally competitive journals and work closely with partners in industry.

We are a lively, collaborative and supportive community of mathematicians and information security specialists, and thanks to our relatively compact scale we will take the time to get to know you as an individual. You will be assigned a personal advisor to guide you through your studies.

Mathematicians who can push the boundaries and stay ahead when it comes to cryptography and information security are in demand, and the skills you gain will open up a range of career options and provide a solid foundation if you wish to progress to a PhD. These include transferable skills such as familiarity with a computer-based algebra package, experience of carrying out independent research and managing the writing of a dissertation.

  • Learn from internationally renowned mathematicians, cryptographers and communications specialists.
  • Complete a cutting-edge research project under the supervision of cryptography and communications experts.
  • Enjoy the flexibility to tailor your degree to your interests and specialisms.
  • Join a mathematics department that ranks second in the UK for research impact and fourth for world leading or internationally excellent research output (Research Excellence Framework 2014).
  • Feel at home in a friendly department where you will be known as an individual.

Course structure

Core modules

  • Main Project
  • Advanced Cipher Systems
  • Channels
  • Theory of Error-Correcting Codes
  • Public Key Cryptography

Optional modules

In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.

  • Applications of Field Theory
  • Quantum Information and Coding
  • Principles of Algorithm Design
  • Advanced Financial Mathematics
  • Combinatorics
  • Computational Number Theory
  • Complexity Theory
  • Inference
  • Topology
  • Applied Probability

Teaching & assessment

You will initially choose 8 courses from the list of available options, of which you specify 6 courses during the second term that will count towards your final award. You will also complete a core research project under the supervision of one of our academic staff.There is a strong focus on small group teaching throughout the programme.

Assessment is carried out through a variety of methods, including coursework, examinations and the main project. End-of-year examinations in May or June will count for 66.7% of your final award, while the dissertation will make up the remaining 33.3% and has to be submitted by September.

Your future career

By the end of this programme you will have an advanced knowledge and understanding of all the key mathematical principles and applications that underpin modern cryptography and communications. You will have advanced skills in coding, algebra and number theory, and be able to synthesise and interpret information from multiple sources with insight and critical awareness. You will have learnt to formulate problems clearly, to undertake independent research and to express your technical work and conclusions clearly in writing. You will also have valuable transferable skills such as advanced numeracy and IT skills, time management, adaptability and self-motivation.

Graduates from this programme have gone on to carry out cutting-edge research in the fields of communication theory and cryptography, as well as to successful careers in industries such as: information security, IT consultancy, banking and finance, higher education and telecommunications. Our mathematics postgraduates have taken up roles such as: Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security Manager at London Underground.

The campus Careers team will be on hand to offer advice and guidance on your chosen career. The University of London Careers Advisory Service runs regular, tailored sessions for mathematics students, on finding summer internships or vacation employment and getting into employment.

  • Open doors to a range of exciting opportunities in academic research or professional employment.
  • Our strong ties with industry mean we understand the needs of employers and we have a strong track record of helping graduates into successful, high-level careers.
  • 90% of our graduates are in work or undertaking further study within six months of leaving (Unistats 2015).


Read less
On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. Read more

On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. In the Cyber Security course, Swansea Computer Science takes a holistic and interdisciplinary approach, bringing together modules on diverse topics such as penetration testing, formal modelling, information security management, cryptography and AI in order to equip our students with a suitable mindset for a career in cyber security. The department's cyber security lab provides the perfect backdrop for exploring the security landscape, allowing Cyber Security students and staff to carry out experiments in network security, mobile security, and to explore threats and defence mechanisms in the context of the Internet of Things.

Key Features of the MSc in Cyber Security

  • We are top in the UK for career prospects [Guardian University Guide 2018]
  • 5th in the UK overall [Guardian University Guide 2018]
  • 7th  in the UK for student satisfaction with 98% [National Student Survey 2016]
  • We are in the UK Top 10 for teaching quality [Times & Sunday Times University Guide 2017]
  • 12th in the UK overall and Top in Wales [Times & Sunday Times University Guide 2017]
  • 91.9% in graduate employment or further study six months after leaving University [DHLE Survey 2016]
  • UK TOP 20 for Research Excellence [Research Excellence Framework 2014]
  • Our Project Fair allows students to present their work to local industry
  • Strong links with industry
  • £31m Computational Foundry for computer and mathematical sciences will provide the most up-to-date and high quality teaching facilities featuring world-leading experimental set-ups, devices and prototypes to accelerate innovation and ensure students will be ready for exciting and successful careers. (From September 2018)
  • Top University in Wales [Times & Sunday Times University Guide 2017]

Our increasingly connected world presents continual new and serious security threats. From privacy violations (hacking, monitoring communications, leaking sensitive data, stealing and publishing private information) through to the drugs trade, sex trafficking and terrorism, Computer Science can provide the techniques required for mitigating such risks, in order to provide secure, reliable and trustworthy systems.

Taught component: The MSc in Cyber Security offers a range of modules, taught by internationally renowned researchers and covering topics such as: Cryptography and Network Security, Penetration Testing, Information Security Management, Embedded Systems Modelling and Verification Techniques, Web Application Development, Blockchain, Cryptocurrencies and Smart Contracts, Advanced Topics: AI and Cyber Security Invention and Innovation in Computing.

Dissertation component: A further four months duration is spent undertaking a substantial research project (60 credits), which will involve using and exploring cutting edge techniques for specifying, developing, verifying and accessing systems against security criteria. Cyber Security Students will benefit from our broad range of industrial partners and internationally leading research expertise.

Possible Future Pathways: Cyber Threat Analyst - Penetration Tester PhD Researcher - Data Security Analyst Secure Web Developer - Verification Engineer.

Modules

Modules on the Cyber Security course may include:

  • Information Security Management
  • Computer Science Project Research Methods
  • Critical Systems
  • IT-Security: Cryptography and Network Security
  • Security Vulnerabilities and Penetration Testing
  • Invention and Innovation in Computing
  • Blockchain, Cryptocurrencies and Smart Contracts
  • Advanced Topics: Artificial Intelligence and Cyber Security
  • Web Application Development
  • Embedded System Design

Facilities for MSc in Cyber Security

The Department is well equipped for teaching, and is continually upgrading its laboratories to ensure equipment is up-to-date – equipment is never more than three years old, and rarely more than two. Currently, students use three fully networked laboratories: one, running Windows; another running Linux; and a project laboratory, containing specialised equipment. These laboratories support a wide range of software, including the programming languages Java, C# and the .net framework, C, C++, Haskell and Prolog among many; integrated programme development environments such as Visual Studio and Netbeans; the widely-used Microsoft Office package; web access tools; and many special purpose software tools including graphical rendering and image manipulation tools; expert system production tools; concurrent system modelling tools; World Wide Web authoring tools; and databases.

As part of our expansion, we are building the Computational Foundry on our Bay Campus for computer and mathematical sciences. As a student on the MSc in Cyber Security, you will study at the Bay Campus in the new Computational Foundry, a dedicated £32 million building for computational studies, providing the latest labs, resources and ecosystems for world leading, interdisciplinary research.

Careers for MSc in Cyber Security Graduates

All Computer Science courses including the MSc in Cyber Security will provide you the transferable skills and knowledge to help you take advantage of the excellent employment and career development prospects in an ever growing and changing computing and ICT industry.

94% of our Postgraduate Taught Graduates were in professional level work or study [DLHE 14/15].

Jobs include:

  • Software Engineer: Motorola Solutions
  • Change Coordinator: Logica
  • Software Developer/Engineer: NS Technology
  • Workflow Developer: Irwin Mitchell
  • IT Developer: Crimsan Consultants
  • Consultant: Crimsan Consultants
  • Programmer: Evil Twin Artworks
  • Web Developer & Web Support: VSI Thinking
  • Software Developer: Wireless Innovations
  • Associate Business Application Analyst: CDC Software
  • Software Developer: OpenBet Technologies
  • Technical Support Consultant: Alterian
  • Programming: Rock It
  • Software Developer: BMJ Group


Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more

The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

About this degree

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits.

The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules

  • Computer Security I (15 credits)
  • Computer Security II (15 credits)
  • Introduction to Cryptography (15 credits)
  • Research in Information Security (15 credits)

Optional modules

Students choose 60 credits from the following:

  • Applied Cryptography (15 credits)
  • Cryptanalysis (15 credits)
  • Cybercrime (15 credits)
  • Distributed Systems and Security (15 credits)
  • Information Security Management (15 credits)
  • Language Based Security (15 credits)
  • Malware (15 credits)
  • People and Security (15 credits)
  • Philosophy, Politics and Economics of Security and Privacy (15 credits)
  • Privacy Enhancing Technologies (15 credits)

Please note: the availability and delivery of optional modules may vary, depending on your selection.

Dissertation/report

All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning

The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Further information on modules and degree structure is available on the department website: Information Security MSc

Careers

UCL graduates are keenly sought after by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Recent career destinations for this degree

  • Information Security Expert, State Oil Company of Azerbaijan Republic
  • IT Risk and Cyber Security Associate, PwC
  • PhD Research Student in Computer Science, UCL
  • Security Engineer, Morgan Stanley
  • Technical Analyst, The Royal Bank of Scotland (RBS)

Employability

Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts arise through the ACE-CS guest lecture series integrated into the degree.

Careers data is taken from the ‘Destinations of Leavers from Higher Education’ survey undertaken by HESA looking at the destinations of UK and EU students in the 2013–2015 graduating cohorts six months after graduation.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research.

UCL received the highest percentage (96%) for quality of research in Computer Science and Informatics in the UK's most recent Research Excellence Framework (REF2014).

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. 

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Accreditation

Information Security has been successfully awarded full certification from the National Cyber Security Centre (NCSC). Students who wish to gain the certification with their degree need to choose COMPGA14 Information Security Management as one of their optional modules.

Research Excellence Framework (REF)

The Research Excellence Framework, or REF, is the system for assessing the quality of research in UK higher education institutions. The 2014 REF was carried out by the UK's higher education funding bodies, and the results used to allocate research funding from 2015/16.

The following REF score was awarded to the department: Computer Science

96% rated 4* (‘world-leading’) or 3* (‘internationally excellent’)

Learn more about the scope of UCL's research, and browse case studies, on our Research Impact website.



Read less
The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Read more

The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Whilst these technologies bring us untold benefits, they also expose businesses, governments and individuals to repeated threats, such as fraud through data manipulation, deliberate sabotage and blackmail. As a result, businesses, governments and individuals around the world rely on the expertise and innovations of information security specialists, without which global communications systems would grind to a halt.

Want to join this expanding field and learn from the very best? Our flagship Information Security programme was the first of its kind in the world. It is certified by GCHQ, the UK Government Communications Headquarters, and taught by academics and industrial partners in one of the largest and most established Information Security Groups in the world. We are a UK Academic Centre of Excellence for cyber security research, and an Engineering and Physical Sciences Research Council (EPSRC) Centre for Doctoral Training in cyber security. We work closely with industry, and much of our curriculum and research is informed and audited by the industry itself. Our teachers are specialists in the field, with backgrounds in computer science, engineering, mathematics, statistics and the social sciences.

Our broad curriculum encompasses cryptography, fraud detection, system security, network security, device security and the study of how security itself should be managed. You will learn about the technical, legal and commercial aspects of the industry and have the chance to complete a supervised dissertation on a topic of your choice. In a typical year you could benefit from lectures and seminars given by as many as 50 different guest speakers. You will also have access to our virtualisation software, for experimenting with network security settings and ideas, as well as to our Penetration Testing Laboratory and industry-sponsored Smart Card Centre.

We offer a friendly, supportive learning environment and you will have a dedicated personal adviser to guide you through your studies. The skills you gain will open up a range of high-level career options and provide a solid foundation if you wish to progress to a PhD. Our graduates are in demand for their cutting-edge grasp of the field as well as their technical expertise and transferrable skills such as data handling, analysis, problem solving and research. The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

  • Join a world-class Information Security Group, recognised as an Academic Centre of Excellence by the UK Government.
  • Learn from an interdisciplinary team of renowned information security specialists who are involved in pioneering research in the field.
  • Benefit from our close ties with the information security industry.
  • Enjoy the flexibility to tailor your degree to your particular interests and complete a supervised research project of your own.

The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

Course structure

Core modules

  • Security Management
  • Introduction to Cryptography and Security Mechanisms
  • Project
  • Network Security
  • Computer Security (Operating Systems)
  • Security Technologies
  • Secure Business Architectures

Optional modules

In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.

  • Legal and Regulatory Aspects of Information Security
  • Advanced Cryptography
  • Database Security
  • Cyber Crime
  • Smart Cards, RFIDs and Embedded Systems Security
  • Software Security
  • Digital Forensics
  • Security Testing - Theory and Practice
  • Cyber Security

Teaching & assessment

We use a range of teaching methods, including seminars, lectures and practical lab work. There is a strong focus on small group teaching. The programme has a flexible, modular structure, combining a sueprvised dissertation and mandatory courses that together make up 120 of the 180 credits required to pass, with a range of optional modules on specialist topics, worth 20 credits each.

During your studies you will be invited to attend an intensive, two-day revision course to prepare for the Certified Information Systems Security Professional (CISSP) exams, which you will then be able to sit on campus, through an established arrangement with (ISC)2.

Assessment is through a combination of end-of-year examinations sat in May or June and the written dissertation, which has to be submitted in September.

Your future career

By the end of this programme you will possess the knowledge and skills to pursue a career as a cyber security professional, and an ideal basis for moving on to further postgraduate research if you prefer. You will have an advanced knowledge and understanding of the latest breakthroughs and techniques, as well as key challenges and opportunities in the field. This programme will also give you valuable transferable skills such as advanced IT skills, data handling, analysis, research, communication, problem solving, time management, adaptability and self-motivation.

Our graduates are highly employable and in recent years they have gone on to forge successful careers in a wide range of sectors, including: banking, telecommunications, security consultancies, the civil service, public utilities and the retail sector.

You will be assigned a personal advisor to guide you through your studies and advise you on further postgraduate opportunities. The campus Careers team will be on hand to offer advice and guidance on your chosen career and the University of London Careers Advisory Service runs regular sessions on finding summer internships or vacation employment and securing employment after graduation.



Read less
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. Read more
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features
-This course is accredited by BCS, The Chartered Institute for IT.
-The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
-You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Work placement scheme

Kingston University has set up a scheme that allows postgraduate students in the Faculty of Science, Engineering and Computing to include a work placement element in their course starting from September 2017. The placement scheme is available for both international and home/EU students.

-The work placement, up to 12 months; is optional.
-The work placement takes place after postgraduate students have successfully completed the taught portion of their degree.
-The responsibility for finding the placement is with the student. We cannot guarantee the placement, just the opportunity to undertake it.
-As the work placement is an assessed part of the course for international students, this is covered by a student's tier 4 visa.

Details on how to apply will be confirmed shortly.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security MSc modules
-Cryptography and Applications
-Network and Information Security
-Data Communications
-Project Dissertation
-One option module

Read less
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. Read more
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features
-This course is accredited by BCS, The Chartered Institute for IT.
-The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
-You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Work placement scheme

Kingston University has set up a scheme that allows postgraduate students in the Faculty of Science, Engineering and Computing to include a work placement element in their course starting from September 2017. The placement scheme is available for both international and home/EU students.

-The work placement, up to 12 months; is optional.
-The work placement takes place after postgraduate students have successfully completed the taught portion of their degree.
-The responsibility for finding the placement is with the student. We cannot guarantee the placement, just the opportunity to undertake it.
-As the work placement is an assessed part of the course for international students, this is covered by a student's tier 4 visa.

Details on how to apply will be confirmed shortly.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security with Management Studies MSc modules
-Cryptography and Applications
-Network and Information Security
-Data Communications
-Business in Practice
-Project Dissertation

Read less
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society. Read more

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The programme will:

  • Provide students with advanced knowledge and understanding of information security theory and concepts
  • Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
  • Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
  • Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

Programme learning outcomes

Knowledge and understanding

Students will gain:

  • Knowledge and understanding of the general information security aims and challenges
  • Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
  • Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
  • Knowledge and understanding of technical concepts and mechanisms for digital forensics
  • Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
  • The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
  • The ability to implement or apply existing information security mechanisms and technologies in practice
  • The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
  • The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills

Students will leave the programme with the ability to:

  • Analyse and solve problems of technical nature under consideration of various risks and constraints
  • Make effective and efficient decisions in an environment of conflicting interests
  • Think strategically 
  • Synthesise and critically evaluate the work of others
  • Apply fundamental knowledge to investigate new and emerging technologies
  • Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills

Students will gain the ability to:

  • Come up with technical solutions to a range of problems
  • Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
  • Implement mechanisms and apply them in a wider context of more complex systems
  • Present their opinions and findings and to produce a high-quality report

Key / transferable skills

Students will have:

  • The ability to communicate concepts and results in a clear and effective manner
  • The time and resource management planning
  • The ability to work with available resources, to collect and analyse research-oriented material

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
About the programme. In addition to being a science in its own right, mathematics plays a fundamental role in the quantitative areas of practically all other academic disciplines, particularly in the natural sciences, engineering, business administration, economics, medicine and psychology. Read more

About the programme

In addition to being a science in its own right, mathematics plays a fundamental role in the quantitative areas of practically all other academic disciplines, particularly in the natural sciences, engineering, business administration, economics, medicine and psychology. Mathematical results permeate nearly all facets of life and are a necessary prerequisite for the vast majority of modern technologies – and as our IT systems become increasingly powerful, we are able to mathematically handle enormous amounts of data and solve ever more complex problems.

Special emphasis is placed on developing students' ability to formalise given problems in a way that facilitates algorithmic processing as well as enabling them to choose or develop, and subsequently apply, suitable algorithms to solve problems in an appropriate manner. The degree programme is theoretical in its orientation, with strongly application-oriented components. Studying this programme, you can gain advanced knowledge in the mathematical areas of Cryptography, Computer Algebra, Algorithmic Algebra and Geometry, Image and Signals Processing, Statistics and Stochastic Simulation, Dynamical Systems and Control Theory as well as expert knowledge in Computer Science fields such as Data Management, Machine Learning and Data Mining.

Furthermore, you will have the chance to learn how to apply your knowledge to tackle problems in areas as diverse as Marketing, Predictive Analytics, Computational Finance, Digital Humanities, IT Security and Robotics.

Programme syllabus

The core modules consist of two mathematics seminars and the presentation of your master's thesis.The compulsory elective modules are divided into eight module groups:

1)   Algebra, Geometry and Cryptography

This module group imparts advanced results in the areas of algebra and geometry, which constitute the fundament for algorithmic calculations, particularly in cryptography but also in many other mathematical areas.

2)   Mathematical Logic and Discrete Mathematics

The theoretical possibilities and limitations of algorithm-based solutions are treated in this module group.

3)   Analysis, Numerics and Approximation Theory

Methods from the fields of mathematical analysis, applied harmonic analysis and approximation theory for modelling and approximating continuous and discrete data and systems as well as efficient numerical implementation and evaluation of these methods are the scope of this module group.

4) Dynamical Systems and Optimisation

Dynamical systems theory deals with the description of change over time. This module group is concerned with methods used for the modelling, analysis, optimisation and design of dynamical systems, as well as the numerical implementation of such techniques.

5) Stochastics, Statistics

This module group deals with methods for modelling and analysing complex random phenomena as well as the construction, analysis and optimisation of stochastic algorithms and techniques used in statistical data analysis.

6) Data Analysis and Data Management and Programming

This module group examines the core methods used in computer science for the analysis of data of heterogeneous modalities (e.g. multimedia data, social networks and sensor data) and for the realisation of data analysis systems.

7) Applications

In this module group, you will practise applying the mathematical methods learned in module groups 1 to 6 to real-world applications such as Marketing, Predictive Analytics and Computational Finance.

8) Key Competencies and Language Training

In this module group, you will choose seminars that develop your non-subject-specific skills, such as public speaking and academic writing and other soft skills; you may also undertake internships. This serves to complement your technical expertise gained during your degree studies and helps to prepare you for your professional life after university.



Read less
“There is no branch of mathematics, however abstract, which may not someday be applied to phenomena of the real world.” –. Nikolai Ivanovich Lobachevsky. Read more

“There is no branch of mathematics, however abstract, which may not someday be applied to phenomena of the real world.” – Nikolai Ivanovich Lobachevsky

If you're looking to take your undergraduate mathematics experience to new levels and develop advanced research skills, this intensive programme covers the wide spectrum of discrete mathematics, applied mathematics and statistics, and addresses some of the key quantifiable challenges and opportunities in the world around us. An interdisciplinary subject by nature, we will help you to apply mathematical concepts and methods to the ever-changing worlds of science, engineering, business, digital technology and industry, and particularly to communication theory, mathematical physics and financial mathematics, where some of our key research interests lie.

The skills you gain will open up a range of career options and provide a solid foundation if you wish to progress to a PhD. You will be guided by renowned specialists in the field who publish in internationally competitive journals and work closely with partners in industry.

Join our friendly and inspiring department and you will benefit from a thoroughly supportive learning environment, with generous staff office hours and a dedicated personal advisor to help you with any queries and guide you through your degree. Our graduates are in demand for their skills in research, numeracy, data handling and analysis, logical thinking and creative problem solving.

  • Apply your mathematics to real-world situations and gain the skills to work at a high level in industry, business or research.
  • Learn from internationally renowned mathematicians. We rank second in the UK for our research impact and fourth for world leading or internationally excellent research output (Research Excellence Framework 2014).
  • Feel at home in a friendly department where you will be known as an individual.

Course structure

Core modules

  • Main Project: You will carry out a detailed study into a topic of your choosing in mathematics, analysing information from a range of sources. You will submit a written report of between 8,000 and 16,000 words in length.

Optional modules

In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.

  • Theory of Error-Correcting Codes
  • Channels
  • Advanced Cipher Systems
  • Public Key Cryptography
  • Applications of Field Theory
  • Quantum Information and Coding
  • Principles of Algorithm Design
  • Advanced Financial Mathematics
  • Combinatorics
  • Computational Number Theory
  • Applied Probability
  • Inference
  • Topology

Teaching & assessment

You will initially choose eight modules from the list of available options, of which you specify modules during the second term that will count towards your final award. You will also complete a core research project under the supervision of one of our academic staff. There is a strong focus on small group teaching throughout the programme.

Assessment is carried out through a variety of methods, including coursework, examinations and the main project. End-of-year examinations in May or June will count for 66.7% of your final award, while the dissertation will make up the remaining 33.3%.

Your future career

By the end of this programme you will have completed a major research project and acquired an advanced knowledge and understanding of: the role and limitations of mathematics in solving problems that arise in real-world scenarios. You will also have impressive skills in selected areas of mathematics and their applications, and the ability to synthesise and interpret information from multiple sources with insight and critical awareness. We will teach you to formulate problems clearly and express your technical work and conclusions clearly in writing, and you will develop valuable transferable skills such as time management, adaptability and self-motivation.

Our graduates have gone on to carry out cutting-edge research in the fields of communication theory and cryptography, as well as successful careers in industries such as: information security, IT consultancy, banking and finance, higher education and telecommunication. They have taken up roles such as: Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security Manager at London Underground.

You will have a dedicated personal adviser to guide you through your studies and advise you on postgraduate opportunities, and the campus Careers team will be on hand to offer advice and guidance on your chosen career. The University of London Careers Advisory Service offers regular, tailored sessions for Mathematics students, on finding summer internships or vacation employment and getting into employment.

  • Open doors to a range of exciting opportunities in advanced research, science and industry.
  • 90% of our graduates are in work or undertaking further study within six months of leaving (Unistats 2015).
  • Our strong ties with industry mean we understand the needs of employers.
  • Take advantage of our summer work placement scheme and fine-tune your CV before you enter your final year.
  • Benefit from a personal advisor who will guide you through your studies and future options.


Read less
Our one year MSc Software Engineering degree will allow you to broaden your skills in traditional and contemporary software development with opportunities to study specialist subjects such as computer vision, critical systems, cryptography, distributed computing systems, e-business, intelligent agents, model checking and multimedia. Read more

Our one year MSc Software Engineering degree will allow you to broaden your skills in traditional and contemporary software development with opportunities to study specialist subjects such as computer vision, critical systems, cryptography, distributed computing systems, e-business, intelligent agents, model checking and multimedia.

Introducing your degree

Explore both traditional and contemporary approaches to software development to give a strong foundation to advance your ideas.

Overview

This programme covers formal methods as well as object-oriented programming. You will enhance your skills in software modelling, design, development, and testing, with opportunities to study specialist subjects such as:

  • computer vision
  • critical systems
  • cryptography
  • distributed computing systems
  • e-business
  • intelligent agents
  • model checking
  • multimedia

You will undertake both a major project and a dissertation, which will give you the opportunity to integrate the material covered in the taught modules.

View the programme specification document for this course

Career Opportunities

Graduates with this qualification typically go on to work in software engineering research or advanced software development projects.

"After my MSc in Software Engineering I went on to study the topic at PhD level because of the interest I developed while studying in ECS. This was helped by the guidance and support available from the faculty members and factors including programme’s ranking among the top in the UK." Ali Gondal MSc Software Engineering

Through an extensive blend of networks, mentors, societies and our on-campus startup incubator, we also support aspiring entrepreneurs looking to build their professional enterprise skills. Discover more about enterprise and entrepreneurship opportunities.



Read less
In this. MRes Mathematical Sciences. course, you will gain deep knowledge of a chosen topic in mathematics or statistics and develop your research skills in project planning, reviewing literature, group discussions, research presentations and writing publications. Read more

In this MRes Mathematical Sciences course, you will gain deep knowledge of a chosen topic in mathematics or statistics and develop your research skills in project planning, reviewing literature, group discussions, research presentations and writing publications.

You can choose to work with experts from a range of areas including quantum cryptography, graph theory, statistical analysis, bioinformatics and mathematical modelling.

You will take three taught modules each providing you with the underpinning theory to support your research work.

Modules:

  • Computational Statistics and Data Analysis
  • Applied Statistics
  • Statistical Modelling
  • Mathematical Recipes
  • Topics in Mathematical Biology
  • Linear Systems
  • Topics in Applied Mathematics#
  • Numerical Analysis and Dynamical Systems
  • Topics in Pure Mathematics
  • Coding Theory and Cryptography
  • Research Methods
  • Research Project

COME VISIT US ON OUR NEXT OPEN DAY!

Visit us on campus throughout the year, find and register for our next open event on http://www.ntu.ac.uk/pgevents.



Read less
The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. Read more
The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. This title also includes the basic, key elements of forensic computing: forensics and the legal and ethical issues involved in any digital investigation.

Students will gain a broad understanding of the different levels of computer and network security together with the basic phases of a forensic investigation and of computing in general. They will examine wireless communication systems; networks; operating systems and interfacing socket programming; servers and their security implications; and the planning and implementation of network security management, including security, risk analysis and disaster recovery planning.

Non means-tested loans of up to a maximum of £10,000 will be available to postgraduate master’s students.

Features and benefits of the course

-The School has an extensive range of equipment in our own specialist laboratories which is supported by a dedicated team of technical staff.
-Research in the School was rated 'internationally excellent' with some rated 'world-leading' in the 2014 Research Excellence Framework (REF).
-Our online virtual learning platform Moodle, provides access to lectures, course materials and assessment information.
-Classes are concentrated on certain days of the week to facilitate part-time students’ attendance and allow full-time students to undertake part-time employment if necessary.
-The School of Computing, Mathematics and Digital Technology is a member of the Oracle Academy.
-We are an academic partner of the Institute of Information Security Professionals (IISP). This partner status recognises our expertise in the field of information and cyber security.
-We are also an Academy of the Computer Technology Industry Association (CompTIA) and deliver their partner programme which provides a pathway for students towards a rewarding, high-growth IT career.

About the Course

You will study advanced topics in computer networks and operating systems, focusing on principles, architectures and protocols used in modern large scale networked systems.

Cryptography and encryption studies cover classical cryptography, key encryption algorithms, how to code algorithms and their variants in a modern programming language and implement cryptosystems over a computer network.

You will develop skills to design and implement advanced security mechanisms in a network environment, considering in depth wired and wireless network security and the best practice in the field.

All course units combine with a flexible approach, which allows students to undertake practical project work while attending work placements. With one-third of the course project-based, it may be possible to undertake yours in collaboration with an external organisation or within the School.

The Masters project will involve practical system creation or experimentation work. Where appropriate, the implementation or experimentation may be work-based.

Assessment details

Assessment will be through coursework, examination and dissertation.

Read less
Aim of the program. The M.Sc. program in Computer Engineering aims to provide advanced education and a cutting edge research experience in computer engineering. Read more

Aim of the program

The M.Sc. program in Computer Engineering aims to provide advanced education and a cutting edge research experience in computer engineering. The focus of the program is excellence in research. Graduates of the program can join industry or continue their research careers in Ph.D. in Computer Engineering programs.

The program aims to provide advanced education and a cutting edge research experience in computer engineering or in electrical and computer engineering crossing the boundary of the two disciplines.

Research interests:

• Advanced Design Technologies

• Artificial Intelligence

• Computational Systems Biology

• Cryptography, Security, Privacy

• Intelligent User Interfaces

• Multicore Software Engineering

• Multimedia, vision, and Graphics

• Networked and Distributed systems

• Parallel and Multicore Computing

Faculty Members's sample projects and laboratories



Read less
The international Master's programme with three main specialties - . Cyber Security. , . Digital Forensics.  and . Read more

The international Master's programme with three main specialties - Cyber SecurityDigital Forensics and Cryptography - provides students with core skills in wide aspects of the security of information systems and specialized skills in the chosen specialization. Students get a unique chance to study under high-level cyber security practitioners from Estonian banks, telecoms, law enforcement, CERT and the NATO Cooperative Cyber Defence Centre of Excellence.

The programme is taught jointly by the two largest public universities in Estonia. The Cyber Security and Digital Forensics studies are concentrated in Tallinn, while Cryptography specialization is concentrated in Tartu. Upon successful completion of the programme students will receive a joint degree signed by both universities - Tallinn University of Technology and University of Tartu.

Key features:

  • A programme that is unique in Europe and offered in a country that has national experience of cyber-attacks
  • Teaching staff with the latest high-level experience and know-how
  • International guest lecturers from related industries and institutions (banks, CERT, law enforcement, NATO Cooperative Cyber Defence Centre of Excellence, et al.)
  • An internationally recognised qualification

Main specialties:

Cyber Security

The public focus on the field of cyber security is growing around the world. Estonia is well known for its eagerness to put innovative IT solutions into everyday use. It is a pioneer in electronic identities and electronic voting and enthusiastically adopts mobile technology, online banking and electronic government services. However, with so many e-solutions and such extensive use of the internet, attention also needs to be turned to the security issue.

Read more

Digital Forensics

Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The area is becoming critical for both data security and law enforcement and is involved in a complicated interplay between surveillance and counter-surveillance issues.



Read less

Show 10 15 30 per page



Cookie Policy    X