• Loughborough University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Queen Mary University of London Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • Ulster University Featured Masters Courses
  • Loughborough University London Featured Masters Courses
  • University of Leeds Featured Masters Courses
London School of Hygiene & Tropical Medicine Featured Masters Courses
University of Hertfordshire Featured Masters Courses
Nottingham Trent University Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
FindA University Ltd Featured Masters Courses
"cyber" AND "intelligence…×
0 miles

Masters Degrees (Cyber Intelligence)

  • "cyber" AND "intelligence" ×
  • clear all
Showing 1 to 15 of 32
Order by 
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. Read more
This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cyber security perspective.

Key benefits

• We welcome applications from students who may not have formal/traditional entry criteria but who have relevant experience or the ability to pursue the course successfully.

• The Accreditation of Prior Learning (APL) process could help you to make your work and life experience count. The APL process can be used for entry onto courses or to give you exemptions from parts of your course.

• Two forms of APL may be used for entry: the Accreditation of Prior Certificated Learning (APCL) or the Accreditation of Prior Experiential Learning (APEL).

Visit the website: http://www.salford.ac.uk/pgt-courses/cyber-security,-threat-intelligence-and-forensics

Course detail

You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidences and present them in the court of law. You will use your knowledge of programming to analyse different malwares to determine how they work and how countermeasures can be developed. Only a small percentage of cyber security professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.

You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cyber security while you operate within a well-formed professional and ethical framework.

Suitable For

Suitable for graduates of a computing subject that includes programming and networking, and who love go down to a low level to discover how things work.

Format

• Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
• Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
• Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
• The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.

Modules

• Cyber Forensics and Malware Investigation
• Information Security in Practice
• Penetration Testing and Exploit Development
• Cyber Threat Intelligence
• Project

Assessment

• Examination (20%) assesses your immediate response to small or medium unseen problems
• Coursework (45%) assesses your considered and in-depth response to a larger problem
• Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.

Career Prospects

Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.

How to apply: http://www.salford.ac.uk/study/postgraduate/applying

Read less
The MSc in Cyber Security Engineering is designed for those wishing to develop a career as a cyber security professional. Cyberspace comprises the network of digital devices, used to store, modify and communicate information. Read more

Designed for

The MSc in Cyber Security Engineering is designed for those wishing to develop a career as a cyber security professional.

Cyber Security

Cyberspace comprises the network of digital devices, used to store, modify and communicate information. It is global, interactive and completely changes our environment. It extends beyond the Internet, mediating interaction between individuals and groups.
Our world is increasingly shaped by cyberspace. Opportunities for interaction are emerging in ways, only imagined by previous generations. As the influence of cyberspace in our lives continues to grow, so does the associated security risk.
As organisations worldwide harness the opportunities of cyberspace, they create huge demand for cyber security professionals. Cyber security professionals who can function at various strata within an organisation - server room, operations room, board room - you choose. Their task is beguilingly simple: enable the good and prevent the bad.

GCHQ Certification

GCHQ, the UK government's National Technical Authority for Information Assurance, identified the shortage of cyber professionals as a concern that needed to be addressed. Part of their strategy was to identify cyber security master's courses that would "... help prospective students make better informed decisions when looking for a highly valued cyber security qualification".

Course Content

You will study a broad range of cyber security topics. Some focus on technology, some on people, some on organisations. Insofar as possible, we seek to avoid teaching topics in silos of narrow expertise. Throughout, the practical application of insight is valued equally with abstract analytical skill. The following should give you a sense of the course content:
◾Cryptography
◾Counterfeiting
◾Risk
◾Digital forensics
◾Governance
◾Data protection
◾Network security
◾Intelligence
◾The enterprise cyber perspective
◾Security architecture
◾Industrial espionage
◾Cyber-physical systems
◾Standards and guidance
◾Cyber security research

Teaching Style

Tutors adopt their own distinctive style within their taught weeks. Most modules are taught by more than one tutor, which, together with the wide range of guest speakers, gives real breadth of insight into any topic. The external input is especially evident in the Enterprise Cyber Security module where colleagues from IBM make a substantial contribution to the week's activities.

After You Graduate

Graduates can expect rapid career progression in within a wide range of organisations relating to cyber security in a range of roles.

Read less
The Executive Master’s in Cyber Security is a multidisciplinary programme that focuses on the technological, as well as the legal, administrative, economic and psychological aspects of digital security. Read more
The Executive Master’s in Cyber Security is a multidisciplinary programme that focuses on the technological, as well as the legal, administrative, economic and psychological aspects of digital security.

Key benefits

- The programme has been accredited by the Accreditation Organisation of the Netherlands and Flanders (NVAO).

- The programme has been developed by Leiden University, Delft University of Technology and The Hague University of Applied Sciences and various private partners, organised in the Cyber Security Academy (CSA).

Visit the website: http://en.mastersinleiden.nl/programmes/cyber-security/en/introduction

Course detail

Are you professionally involved with the organisation and approach of issues in the field of cyber security in the private of public sector?

Do you have professional knowledge in the administrative / legal field or in the field of IT?

Would you like to broaden and deepen your knowledge of cyber security, improving your ability to meet the challenges of today and tomorrow?

This master’s programme will teach you to make connections between technical, legal and social scientific aspects of cyber security, so you can arrive at effective and sustainable solutions for cyber risks and threats You will then be in a position to contribute effectively to sustainable strategies for digital defensibility and security of society as a whole, including both organisations and citizens.

Format

The programme will be taught at the HSD Campus, Beatrixkwartier The Hague. The campus is the home base of the European security cluster The Hague Security Delta , a network organisation of private and public organisations and knowledge institutions in the broad field of security.

At this campus the participants are provided with multifunctional spaces with modern IT facilities such as a Real Time intelligence Centre and a Serious Gaming Lab. The location has excellent parking and catering facilities.

PLEASE NOTE: the starting date is provisional, depending on there being an adequate number of participants. The programme information is subject to change.

Careers

The programme is aimed at professionals with a relevant master’s degree from a university (of applied sciences) and several years of professional experience who wish to broaden or deepen their knowledge of cyber security.

Graduates work in the field of Cyber Security either in private or public and semi-public companies.

How to apply: http://en.mastersinleiden.nl/arrange/admission

Funding

For information regarding funding, please visit the website: http://prospectivestudents.leiden.edu/scholarships

Read less
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. Read more
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. This includes the technical side of encryption, authentication, biometrics, network security, etc as well as information security management and cyber security risk.

This MSc is aimed at computing graduates with strong programming skills seeking careers as cyber security professionals or careers that need a systematic and deep understanding of the subject. It would also be an excellent starting point for those wishing to carry out further research in cyber security.

Visit the website https://www.kent.ac.uk/courses/postgraduate/1225/cyber-security

About the School of Computing

Our world-leading researchers, in key areas such as systems security, programming languages, communications, computational intelligence and memory management, and in interdisciplinary work with biosciences and psychology, earned us an outstanding result in the most recent national research assessment.

The School hosts the University's GCHQ/EPSRC accredited Academic Centre of Excellence in Cyber Security Research, one of only 13 in the country.

In addition, two of our staff have been honoured as Distinguished Scientists by the ACM and we have also held Royal Society Industrial Fellowships.

As an internationally recognised Centre of Excellence for programming education, the School of Computing is a leader in computer science teaching. Two of our staff have received the ACM SIGCSE Award for Outstanding Contribution to Computer Science Education. We are also home to two National Teaching Fellows, to authors of widely used textbooks and to award-winning teaching systems such as BlueJ.

Modules

The following modules are indicative of those offered on this programme. This list is based on the current curriculum and may change year to year in response to new curriculum developments and innovation. Most programmes will require you to study a combination of compulsory and optional modules. You may also have the option to take modules from other programmes so that you may customise your programme and explore other subject areas that interest you.

Assessment

Assessment is through a combination of unseen written examinations, written and practical coursework, student presentations, individual and group projects.

The substantial research or development project undertaken for other programmes is assessed by dissertation.

Programme aims

This programme aims to:

- enhance the career prospects of graduates seeking employment in the computing/IT sector

- prepare you for research and/or professional practice at the forefront of the discipline

- develop an integrated and critically aware understanding of one or more areas of computing/IT and their applications (according to your degree title)

- develop a variety of advanced intellectual and transferable skills

- equip you with the lifelong learning skills necessary to keep abreast of future developments in the field.

Study support

We provide an extensive support framework for our research students and encourage involvement in the international research community.

We have strong links with industry including Cisco, IBM, Microsoft and Oracle.

Postgraduate resources

The School of Computing has a large range of equipment providing both UNIX (TM) and PCbased systems and a cluster facility consisting of 30 Linux-based PCs for parallel computation. New resources include a multi-core enterprise server with 128 hardware threads and a virtual machine server that supports computer security experiments.

All students benefit from a well-stocked library, giving access to e-books and online journals as well as books, and a high bandwidth internet gateway. The School and its research groups hold a series of regular seminars presented by staff as well as by visiting speakers and our students are welcome to attend.

The School of Computing has a makerspace on the Canterbury campus, which offers exciting new teaching and collaboration opportunities. Among other equipment, it contains milling machines, a 3D printer, laser cutter and extensive space for building and making digital artefacts. The School also owns speciallist equipment for Internet of Things and media steganography.

Our taught postgraduate students enjoy a high level of access to academic staff and have their own dedicated laboratory and study room. Students whose course includes an industrial placement are supported by a dedicated team which helps them gain a suitable position and provides support throughout the placement.

Links with industry

Strong links with industry underpin all our work, notably with Cisco, Microsoft, Oracle, IBM, Agilent Technologies, Erlang Solutions, Hewlett Packard Laboratories, Ericsson, Nvidia and Nexor.

Global Skills Award

All students registered for a taught Master's programme are eligible to apply for a place on our Global Skills Award Programme (http://www.kent.ac.uk/graduateschool/skills/programmes/gsa.html). The programme is designed to broaden your understanding of global issues and current affairs as well as to develop personal skills which will enhance your employability.

Careers

Our graduates go on to work for leading companies including Cisco, GlaxoSmithKline, IBM, Intel, Lilly, Microsoft, Morgan Stanley, Thomson Reuters and T-Mobile. Many have gone on to develop their careers as project leaders and managers.

Find out how to apply here - https://www.kent.ac.uk/courses/postgraduate/apply/

Read less
The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry. Read more
The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry.

The programme is delivered by a dedicated team of cybersecurity experts and active researchers in the area and gives also the opportunity to acquire certain units from the programme as dedicated credit-based short courses outside the normal MSc route.

Using cutting edge and leading teaching and training techniques the course helps the candidates to realise the unique complexity and challenges associated with cybersecurity in a highly dynamic and constantly evolving threat landscape in a blended programme that amalgamates both management and hands-on skills required by cybersecurity professionals.

The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills.

The systematic application of teaching and learning methods with the GIS goals and clear references made to the University’s employability framework should further help students to develop their career prospects throughout the programme.

Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/cyber-security#entry

Course detail

Areas of study include:
• Cyber threat intelligence
• Ethical Hacking
• Network Security
• Information Governance and Compliance
• Research methodologies and project management
• Tactical and strategic cybersecurity management
• MSc thesis in cybersecurity

Modules

• Cyber Defence (Ptbm) (CIS098-6) Compulsory
• Information Governance And Compliance (Ptbm) (CIS102-6) Compulsory
• Msc Project - Cyber Security (CIS106-6) Compulsory
• Research Methodologies And Project Management (Ptbm) (CIS099-6) Compulsory
• Tactical And Strategic Cybersecurity Management (Ptbm) (CIS097-6) Compulsory

Assessment

The assessment strategy used is predominantly written assessments with only two (2) formal invigilated examinations throughout the course. The method used will depend on the nature of the subject matter being taught in each of the units, where the most appropriate method is chosen and analysed (See UIFs). Students will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by their tutors for each of the tasks allocated.

The assessment strategy for this course is designed around a holistic evaluation on knowledge and skills acquired with strong emphasis on the requirements for this mode of delivery and diverse skills, background and expectations of the target audience. All assessments used in the course are in perfect alignment with University requirements, regulations and policies. Coursework assignments typically incorporate formative feedback so that students can gain an insight into whether their work is meeting the necessary thresholds and focus on meaningful remarks to improve both their performance and understanding in the subject matter. The assessment strategy has been designed with strong influence by the requirements and needs of the audience in PT mode of delivery for this course.

Careers

The Careers Service is there to support you throughout the duration of your study and beyond. The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills. The systematic application of teaching and learning methods with the GIS goals and clear references made to the Universitys employability framework should further help students to develop their career prospects throughout the programme. Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

The unit `Research Methodologies and Project Management in particular requires you to work in a team so as to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control; you will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

In addition and somewhat complementary the final project fosters independent and autonomous study: typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor. That gives the ability to initiate discussion and project ideas that enrich the academic context in your studies and provide the foundations for a solid, relevant and strong project delivered at the end of your course.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. Read more
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. This MSc can lead to a career such as a network system administrator, security analyst, ethical hacker or a security consultant.

Why choose this course?

The MSc Cyber Security consists of two major parts: taught modules and an MSc project. Each taught module has an assigned number of credits (either 15 or 30). In order to obtain an MSc degree you must study and pass 120 credits of compulsory taught modules plus the project i.e. 180 credits in total.

[[Careers
Our masters programme is designed to give Computer Science graduates the specialist, up-to-date skills and knowledge sought after by employers, whether in business, industry, government or research. This particular course will prepare you for a career such as a software engineer, developer or project manager.

Teaching methods

Classes consist of lectures, small group seminars, and practical work in our well-equipped laboratories. We use modern, industry-standard software wherever possible. There are specialist facilities for networking and multimedia and a project laboratory especially for masters students. In addition to scheduled classes, you will be expected a significant amount of time in self-study, taking advantage of the extensive and up-to-date facilities. These include the Learning Resource Centres, open 24x7, with 1,500 computer workstations and wifi access, Studynet our versatile online study environment usable on and off campus, and open access to our labs.

Work Placement

This MSc is available with an optional one year industry placement. The 'with placement' programmes give you additional industrial experience by applying the skills you have learned throughout your studies.

This offers you the opportunity to work for one year in a highly professional and stimulating environment. You will be a full time employee in a company earning a salary and will learn new skills that can't be taught at University. During the placement, you will be able to gain further insight into industrial practice that you can take forward into your individual project.

We will provide excellent academic and personal support during both your academic and placement periods together with comprehensive careers guidance from our very experienced dedicated Careers and Placements Service.

Although the responsibility for finding a placement is with you, our Careers and Placements Service maintains a wide variety of employers who offer placement opportunities and organise special training sessions to help you secure a placement, from job application to the interview. Optional one-to-one consultations are also available.

In order to qualify for the placement period you must maintain an overall average pass mark of not less than 60% across all modules studied in semester ‘A’.

Structure

Core Modules
-Advanced Computer Science Masters Project
-Programming Paradigms

Optional
-Advanced Databases
-Artificial Life with Robotics
-Data Mining
-Digital Forensics
-Distributed Systems Security
-Human Computer Interaction: Principles and Practice
-Information Security, Management and Compliance
-Investigative Methods for Computer Science
-Measures and Models for Software Engineering
-Mobile Standards, Interfaces and Applications
-Multicast and Multimedia Networking
-Network System Administration
-Neural Networks and Machine Learning
-Penetration Testing
-Professional Issues
-Programming for Software Engineers
-Secure Systems Programming
-Software Engineering Practice and Experience
-Theory and Practice of Artificial Intelligence
-Wireless, Mobile and Ad-hoc Networking

Read less
The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology. Read more

Designed for

The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology.

It is suitable for those from a computer science or information technology education background. The programme is also able to cater for those with no formal studies in computer science but where significant interest in cyber security can instead be demonstrated.

The Course Provides:

1. Cyber Security in the UK has become a ‘tier 1’ priority alongside international terrorism and major national incidents. The serious threats emerging from the cyber-sphere are a recognised phenomenon worldwide and as such studies in cyber security are strategically important on a global scale.

2. Our goal for the MSc programme is to give focus to the strategic deployment and implementation of Cyber Security within an organization. We want to develop strategic thinkers who understand the Cyber threat to an organization and its resources and are able to build and support secure systems that support the strategic growth of a business.

3. The course covers all aspects of Cyber Security including network security, computer security and information security. You will learn the most important technical concepts of security—such as encryption, intrusion detection, penetration testing, access control, digital forensics and investigation, risk management, security governance and network security.

4. Alongside this, the course focuses on the business context so that students can progress their careers more rapidly through organisations and aim very particularly at management positions.

When you study the MSc Cyber Security and Management at Warwick, you will gain an unparalleded exposure to industry. All taught modules contain considerable input from industry experts who, through case studies and guest lectures, contribute to the design and delivery of material making for a vey rich learning environment.

An example of some of the companies involved in the CSM programme since it was launched in 2012 include HP, Amethyst Consulting, Deep Secure Ltd, Siskin Technology, SOCA (Serious Organised Crime Agency), CSC, VMware, OCSIA, Nottingham Police, Mozilla, Metropolitan Police, Kaspersky, Berwin Leighton Paisner, Telefonica, IBM, Blackstage Forensics, Derbyshire NHS Trust and Nettitude.

You will have additional opportunity to engage with industry through industry visits, conferences, and mentoring or advice from industry experts at key stages of your work.

Course Content

Students study nine taught modules as part of the programme of study.
Core Modules:
1. Security Architectures and Network Defence
2. Cryptosystems and Data Protection
3. Information Risk Management and Governance
4. Industrial Espionage and Counterfeiting
5. Digital Forensics

Elective Modules (3 from this list):
1. Cyber Intelligence and Operations
2. Cyber-Physical Systems
3. Enterprise Cyber Security
4. Globalisation and Outsourcing
5. Financial Analysis and Control Systems
6. Organisations, People and Performance
7. Leadership

A ninth module to be selected from the full list of WMG elective modules.

Learning Style

The taught component of the course is highly interactive and varied with a mixture of lectures, syndicate or group work, practical and lab based work, and technology enabled learning.
Class sizes are kept to a maximum of 30 students per class.
Module leaders are experts in their fields and are supported by external speakers working in organisations at the forefront of their fields.
Assessment is through Post Module Assignment based on the learning objectives of each respective module.
50% of the Masters credit is achieved through your individual project or dissertation, for which you will have close 1-1 supervision
Each module will usually be delivered in intensive one-week blocks so you are fully immersed in the subject area for that period. These one-week sessions are scheduled at intervals from October through to June.

After Your Graduate

Graduates can expect to go on to work within corporate information - security and technology teams, consultancies, government information-security departments, management tracks in information critical organisations and cyber security related research.

Read less
This course is subject to approval. Cybersecurity is a fast developing and exciting subject. There is an unprecedented rise in cybercrime, cyber attacks and cyber threats to individuals, businesses and society. Read more
This course is subject to approval.

Cybersecurity is a fast developing and exciting subject. There is an unprecedented rise in cybercrime, cyber attacks and cyber threats to individuals, businesses and society. Resilient cybersecurity systems and infrastructures attempt to prevent attack and protect individuals and businesses from such attacks.

Course overview

This newly developed Cybersecurity course will provide you with the technical and organisational skills to make a difference to society by providing safe and secure digital environments, allowing the public, business and industry, and the economy to function safely.

As a student studying Cybersecurity, you'll contribute to the wellbeing of society by raising awareness of threats and attacks and designing systems, structures and networks to identify attacks and recover from them allowing business continuity.

The course has been designed to cover a wide range of relevant, interesting and current topics in the cybersecurity field. You'll study industry-specific topics and specialise in areas such as network security, cybersecurity in organisations, big data security and breach and incident response.

Our close links to industry and businesses in the North East, as well as the research expertise of our academics makes this course unique and ensures that the course structure is developed according to the needs of the employment sector. We work alongside the following companies: Net Defence, PWC, Northumbria Police, SAGE, Accenture and Sapphire.

This course will provide you with a thorough grounding in the creation of cybersecurity solutions for information security, systems security and network security. You’ll develop the skills to determine, establish and maintain cybersecurity infrastructures, and you’ll examine the underlying technologies of secure systems and their inherent risks and privacy issues. You’ll also learn how to select appropriate tools and techniques to address and manage risks, threats, vulnerabilities and potential attacks, in order to deliver cyber resilience.

You’ll cover topics such as digital forensic tools, network technologies, security procedures and defensive programming. You’ll also choose an optional module that covers a particular specialism such as big data security, user experience design or artificial intelligence for cybersecurity.

Throughout the course you’ll develop skills and knowledge that give you the confidence to apply cybersecurity tools and techniques; to be innovative in using cybersecurity skills; to solve cybersecurity problems, identify breaches and attacks; to create opportunities for information security management, risk management and business continuity; and to enable effective and efficient implementation of cybersecurity systems and infrastructures.

You’ll be taught by research active academics that have a wealth of experience, and the research produced underpins the teaching you'll receive.

The course is pending accreditation from the British Computer Society, the UK’s Chartered Institute for IT.

Course content

The course mixes taught elements with independent research and supportive supervision. At Masters level, responsibility for learning lies as much with you as with your tutor.

Modules on this course include:
-Research Skills and Academic Literacy (15 Credits)
-Network Security (15 Credits)
-Cybersecurity in Organisations (15 Credits).
-Fundamentals of Cybersecurity (30 Credits)
-Breach and Incident Response (15 Credits)
-Principles of Cybersecurity and Cyber Resilience (15 Credits)
-Masters Project (60 Credits)

Optional Modules – (choose one module from the following)
-Big Data Security (15 Credits)
-Cybersecurity and User Experience Design (15 credits)
-Cybersecurity and Artificial Intelligence (15 credits)

Teaching and assessment

We use a wide variety of teaching and learning methods which include lectures, group work, research, discussion groups and seminars.

Compared to an undergraduate course, you will find that this Masters requires a higher level of independent working. Assessment methods include written reports and research papers, practical assignments and the Masters project.

Facilities & location

The course is taught at the David Goldman Informatics Centre, based at the Sir Tom Cowie Campus at St Peter’s, it looks out over the River Wear and is less than a mile from the seaside.

Sunderland offers one of the most modern and best equipped computing environments in the UK. The open-plan David Goldman Informatics Centre is equipped with over 300 computers, which are continuously upgraded and have attracted praise in an independent evaluation by the BCS.

Join an accredited Cisco Academy department and have access to laboratories fully equipped with Cisco networking equipment, including: routers, switches, terminals and specialist equipment for simulating frame relay and ISDN links.

Benefit from the Remote Global Cisco Academy and have access to our software whether you’re using the WiFi in our halls of residence or you’re at home.

We host high-performance computing platforms, including a Beowulf cluster and a grid distributed system, for concurrent processing of complex computational tasks. You can also access the equipment and licences for our own public mobile cellular network.
Access hundreds of PCs, Apple Macs, or the free WiFi zones across the campus and find the best place for you to study in our unique and vibrant learning space. The University is very diverse with a strong international presence and provides you with the opportunity to explore different cultures.

Study at a uniquely designed library and have access to more than 430,000 books, 9,000 electronic journal articles and benefit from a £1 million annual investment in new resources.

Employment & careers

Progress in some of the most attractive fields and industries as we prepare you for a range of cyber security jobs, including roles such as: information security manager, security analyst, security architect, security administrator, incident responder, security engineer, security auditor, security software developer and vulnerability assessor.

Graduates studying Cybersecurity have gone on to secure employment with a range of companies and organisations including: GCHQ, (ISC)2, Accenture, HPE, BT, PWC, SAGE, Sunderland City Council, Northumbria and Durham Police forces and the Cybersecurity Workforce Alliance.

Businesses and industries across the UK have identified a skills gap in Cybersecurity and there is a demand for cybersecurity professionals in the public and private sectors as well as in the not profit and education sectors. You'll benefit from the University’s close links with businesses and employers in the North East and join an industry-driven programme.

The cybersecurity provision is underpinned by strong collaboration with employers. The provision is further enhanced by the contribution from cybersecurity employers and external experts in a number of ways including a series of guest lectures, master classes and seminars.

Read less
The accredited Master of Science program in Computer Science is a two-year program that has been designed for international and German graduate students. Read more
The accredited Master of Science program in Computer Science is a two-year program that has been designed for international and German graduate students. The curriculum is very flexible. Students can compile their individual study plans based on their background and interests. It is also a very practical program. In addition to lectures and tutorials, students will complete two seminars, one or two projects and the master thesis.

In the beginning students will choose one or two key courses. Key courses are courses which introduce the students to the research areas represented at the Department of Computer Science. The following key courses are offered:

• Algorithm Theory
• Pattern Recognition
• Databases and Information Systems
• Software Engineering
• Artificial Intelligence
• Computer Architecture

After that, students can specialize in one of the following three areas:

• Cyber-Physical Systems
• Information Systems
• Cognitive Technical Systems

Here are some examples of subjects offered in the three specialization areas:

Cyber-Physical Systems:

• Cyber-Physical Systems – Discrete Models
• Cyber-Physical Systems – Hybrid Control
• Real Time Operation Systems and Reliability
• Verification of Embedded Systems
• Test and Reliability
• Decision Procedures
• Software Design, Modeling and Analysis in UML
• Formal Methods for Java
• Concurrency: Theory and Practice
• Compiler Construction
• Distributed Systems
• Constraint Satisfaction Problems
• Modal Logic
• Peer-to-Peer Networks
• Program Analysis
• Model Driven Engineering

Information Systems:

• Information Retrieval Data Models and Query Languages
• Peer-to-Peer Networks
• Distributed Storage
• Software Design, Modeling and Analysis in UML
• Security in Large-Scale Distributed Enterprises
• Machine Learning
• Efficient Route Planning
• Bioinformatics I
• Bioinformatics II
• Game Theory
• Knowledge Representation
• Distributed Systems

Cognitive Technical Systems:

• Computer Vision I
• Computer Vision II
• Statistical Pattern Recognition
• Mobile Robotics II
• Simulation in Computer Graphics
• Advanced Computer Graphics
• AI Planning
• Game Theory
• Knowledge Representation
• Constraint Satisfaction Problems
• Modal Logic
• Reinforcement Learning
• Machine Learning
• Mobile Robotics I

We believe that it is important for computer science students to get a basic knowledge in a field in which they might work after graduation. Therefore, our students have the opportunity to complete several courses and/or a project in one of the following application areas:

• Bioinformatics
• Educational Sciences
• Geosciences
• Cognitive Sciences
• Mathematics
• Medicine
• Meteorology
• Microsystems Engineering
• Physics
• Political Sciences
• Psychology
• Sociology
• Economics

In the last semester, students work on their master’s thesis. They are expected to tackle an actual research question in close cooperation with a professor and his/her staff.

Read less
The traditional military threats which defined global security matters for the best part of the 20th century have been quickly replaced by new and re-emerging security challenges. Read more
The traditional military threats which defined global security matters for the best part of the 20th century have been quickly replaced by new and re-emerging security challenges. This programme offers you the opportunity to examine many of these contemporary threats..

Why this programme

◾You will develop your knowledge of the security challenges impacting our rapidly changing social and political environment at a local, national and global level. These range from terrorism and cyber warfare to disease, migration and climate change.
◾You can combine a broad spectrum of subject areas into your degree, including politics, sociology, Central & East European studies, war studies, archaeology, computing science, geography, law, business and education.
◾You will have the opportunity to take part in policy development exercises: working with government officials and policy-makers to simulate the process of responding to major international security crises.
◾The programme will also include a series of master classes from high profile professionals and academics working in the field of security.

Programme structure

You will take four core and selection of optional courses. You will also complete a dissertation as a piece of independent research. In addition to the general degree programme, you have the opportunity to study one of three specialised pathways.

Core courses
◾Comparative approaches to warfare and violent conflict
◾International security and global politics
◾Research design OR Qualitative methods
◾Thematic issues in global security.

Optional courses

Pathways

Cyber security and intelligence

Provides you with the opportunity to examine how cyber issues and information communications technologies challenge the way states and citizens alike attempt to use and constrain information in a range of societies for security purposes. Specialised courses within this pathway include
◾Human-centred security
◾Information systems and databases
◾Systems and networks.

Social and cultural perspectives (not running in 2017-18)

Provides you with the opportunity to examine global security from a critical perspective, reflecting on social and cultural aspects and constructions of 'security'. Important to this pathway will be an interrogation of the relationship between security, vulnerability and the ethics of care. Specialised courses within this pathway include:
◾Critical perspectives on securities and vulnerabilities
◾A range of related optional courses.

Strategy and defence

Provides you with the opportunity to examine shifts in Western strategic thought in both a historical and contemporary setting. Particular attention will be given to how strategy and defence is currently developing within a new interdependent global context. Specialised courses within this pathway include
◾Comparative approaches to warfare and violent conflict
◾The American way of war: from Revolution to the War on Terror
◾A range of related optional courses.

Career prospects

You can move into careers such as working with governmental and non-governmental organisations, business and international/transnational organisations. Recent graduates have gone on to work for the BBC, the United Nations, the UK armed forces, a US based research agency and UK based private security and risk analysis companies. Others have gone to undertake a PhD.

Read less
The Masters in Computing Science provides you with a thorough grounding in advanced computing science, together with experience of conducting a development project, preparing you for responsible positions in the IT industry. Read more
The Masters in Computing Science provides you with a thorough grounding in advanced computing science, together with experience of conducting a development project, preparing you for responsible positions in the IT industry.

Why this programme

◾The School of Computing Science is consistently highly ranked achieving 2nd in Scotland and 10th in the UK (Complete University Guide 2017)
◾The School is a member of the Scottish Informatics and Computer Science Alliance: SICSA. This collaboration of Scottish universities aims to develop Scotland's place as a world leader in Informatics and Computer Science research and education.
◾You will have opportunities to meet employers who come to make recruitment presentations, and often seek to recruit our graduates during the programme.
◾You will benefit from having 24-hour access to a computer laboratory equipped with state-of-the-art hardware and software.
◾With a 92% overall student satisfaction in the National Student Survey 2015, computing at Glasgow continues to meet student expectations combining both teaching excellence and a supportive learning environment.

Programme structure

Modes of delivery of the MSc in Computing Science include lectures, seminars and tutorials and allow students the opportunity to take part in lab, project and team work.

Core courses
◾Research methods and techniques
◾Masters team project

Optional courses
◾Advanced networking and communications
◾Advanced operating systems
◾Algorithmics
◾Artificial intelligence
◾Big data: systems, programming and management
◾Computer architecture
◾Computer vision methods and applications
◾Cryptography and secure development
◾Cyber security forensics
◾Cyber security fundamentals
◾Distributed algorithms and systems
◾Enterprise cyber security
◾Functional programming
◾Human computer interaction
◾Human computer interaction: design and evaluation
◾Human-centred security
◾Information retrieval
◾Internet technology
◾IT architecture
◾Machine learning
◾Mobile human computer interaction
◾Modelling reactive systems
◾Safety critical systems.
◾Software project management
◾Theory of Computation
◾Web Science

Depending on staff availability, the optional courses listed here may change.

If you wish to engage in part-time study, please be aware that dependent upon your optional taught courses, you may still be expected to be on campus on most week days.

Accreditation

MSc Computing Science is accredited by the British Computer Society (BCS) and the Institution of Engineering & Technology (IET)

Our specialist MSc graduates in Computing Science, Software Engineering and Information Security are recognised by the British Computer Society (BCS), The Chartered Institute for IT, for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional (CITP Further Learning) and partially meeting the academic requirement for registration as a Chartered Scientist (CSci). These programmes have also been awarded the Euro-Info Master Label.

[[Industry links and employability ]]

◾The School of Computing Science has extensive contacts with industrial partners who contribute to several of their taught courses, through active teaching, curriculum development, and panel discussion. Recent contributors include representatives from IBM, J.P. Morgan, Amazon, Adobe and Red Hat.
◾Employers are interested in graduates who have a combination of good technical skills and well-developed personal skills, and in this respect graduates of the MSc in Computing Science from the University of Glasgow are particularly well placed.
◾During the programme students have an opportunity to develop and practice relevant professional and transferrable skills, and to meet and learn from employers about working in the IT industry.

Read less
The Masters in Information Security provides you with a thorough grounding in professional software development, together with experience of conducting a development project, preparing you for responsible positions in the IT industry. Read more
The Masters in Information Security provides you with a thorough grounding in professional software development, together with experience of conducting a development project, preparing you for responsible positions in the IT industry.

Why this programme

◾The School of Computing Science is consistently highly ranked achieving 2nd in Scotland and 10th in the UK (Complete University Guide 2017)
◾The School is a member of the Scottish Informatics and Computer Science Alliance: SICSA. This collaboration of Scottish universities aims to develop Scotland's place as a world leader in Informatics and Computer Science research and education.
◾You will have opportunities to meet employers who come to make recruitment presentations, and often seek to recruit our graduates during the programme.
◾You will benefit from having 24-hour access to a computer laboratory equipped with state-of-the-art hardware and software.

Programme structure

Modes of delivery of the MSc in Information Security include lectures, seminars and tutorials and allow students the opportunity to take part in lab, project and team work.

Core courses

◾Crytography and secure development
◾Cyber security fundamentals
◾Cyber security forensics
◾Enterprise cyber security
◾Human-centred security
◾Research methods and techniques
◾Safety critical systems
◾Masters team project

Optional courses

◾Advanced networking and communications
◾Advanced operating systems
◾Algorithmics
◾Artificial intelligence
◾Big data: systems, programming and management
◾Computer architecture
◾Computer vision methods and applications
◾Distributed algorithms and systems
◾Enterprise computing
◾Functional programming
◾Human computer interaction
◾Human computer interaction: design and evaluation
◾Information retrieval
◾Internet technology
◾IT architecture
◾Machine learning
◾Mobile human computer interaction
◾Modelling reactive systems
◾Software project management
◾Theory of computation
◾Web science

Depending on staff availability, the optional courses listed here may change.

If you wish to engage in part-time study, please be aware that dependent upon your optional taught courses, you may still be expected to be on campus on most week days.

Accreditation

MSc Information Security is accredited by the British Computer Society (BCS).

Our specialist MSc graduates in Computing Science, Software Engineering and Information Security are recognised by the British Computer Society (BCS), The Chartered Institute for IT, for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional (CITP Further Learning) and partially meeting the academic requirement for registration as a Chartered Scientist (CSci). These programmes have also been awarded the Euro-Info Master Label.

Industry links and employability

◾Computer systems are frequently compromised by the efforts of opportunistic hackers. In many countries, legislation is forcing companies to take information security more seriously. Information security requires a clear understanding of relevant technological, social, and organizational issues, as well as the relationships between them.
◾The programme includes a thorough grounding in professional software development, together with experience of conducting a development project. The programme will prepare you for a responsible position in the IT industry.
◾The School of Computing Science has extensive contacts with industrial partners who contribute to several of their taught courses, through active teaching, curriculum development, and panel discussion. Recent contributors include representatives from IBM, J.P. Morgan, Amazon, Adobe and Red Hat.
◾During the programme students have an opportunity to develop and practice relevant professional and transferrable skills, and to meet and learn from employers about working in the IT industry.

Read less
Gain a prestigious MSc in Information Security. by distance learning. Read more

Gain a prestigious MSc in Information Security

by distance learning

A world renowned programme; the first of its kind in the world, this Information Security course looks at both technical and management aspects of cyber security and teaches you about technologies including cryptography, computer security, fraud detection, and digital forensics.

- You will gain cyber security skills for senior level careers by focusing on principles and issues, and you will learn how information security can best be managed.

- You will benefit from Royal Holloway’s wealth of research, expertise and practical consulting experience, which ensures that the degree is up to date and commercially relevant.

- You can study most modules on a stand alone basis and earn CPE credits. Students come from a variety of backgrounds, ranging from new graduates through to senior security managers in blue chip enterprises seeking a formal qualification in Information Security.

Hear from a graduate

“Achieving the Masters has significantly benefited my career in Information Security; previously, I provided specific technical advice to customers, but now, with the breadth and depth of knowledge gained during the MSc, I also deliver security strategy consulting to senior executives.” Paul Schwarzenberger, MSc Information Security

Prestige

The programme has been developed by academics within the Information Security Group (ISG) [external link] at Royal Holloway, University of London, one of the foremost academic security groups in the world.

ISG awarded Centre of Excellence status - Royal Holloway, University of London has been recognised for its world class research in the field of cyber security by UK intelligence agencies GCHQ.

The ISG is at the cutting edge of research into the design and evaluation of smart cards, electronic commerce, security management, mobile telecommunications security, and the integration of security techniques into specific applications. The ISG was awarded a Queen's Anniversary Prize in 1998 in recognition of it providing "a unique national resource for the training of information security specialists".

"A pioneering course that continues to provide students with the essential knowledge and understanding of information security, with many graduates going on to fill senior roles." Malcolm Marshall, Partner, KPMG.

Career progression

Graduates of the programme can be found in many organisations, ranging from large financial institutions to technology and research- oriented organisations, as well as security specialists. The MSc is also a foundation for further postgraduate research.

Continuing Professional Education (CPE)

You can study any of the compulsory core modules, plus the optional module 'Digital forensics', on a stand-alone basis and earn CPE credits. On successful completion of each module you will receive a University of London certificate.

Your time commitment

This programme is offered online, enabling you to fit your studies around work and family commitments. To complete in the minimum study period you will need to study 24 hours per week during the academic session (September-April). To complete the degree in four years, which is normal for those in full time employment, you will need to study about 12 hours per week over the academic session.

Excellent support

Fully supported by a Virtual Learning Environment, you will take part in online tutor-supported seminars and discussions; a virtual student cafe allows you to interact and network with other students.

Contact us

If you have any questions, please contact our Student Advice Centre.



Read less
During this programme, students study, employ and reflect on the principles underpinning computer science. The programme is designed for individuals wishing to pursue careers as computer science professionals. Read more
During this programme, students study, employ and reflect on the principles underpinning computer science. The programme is designed for individuals wishing to pursue careers as computer science professionals.

From organisational culture and human-computer interaction to web services and distributed computing on virtualised and cloud based systems, this programme leads students to reflect on the choice of methods and tools. It will provide practical experience in the analysis and understanding of problems, systems and structures through the study of realistic case studies. The student will be equipped to deal with the intense demands of modern software development, critically evaluate and employ appropriate concepts and principles to build solutions of commercial, industrial or research value.

Students may choose options focusing on cyber security and forensics, data warehousing and business intelligence or user-centered web engineering and software engineering management.

Through our short course centre opportunity may also be provided to study for the following professional qualifications: Microsoft Technology Associate Exams; Certified Professional Java SE Programmer; Java Certified Associate; Oracle Certified Associate (OCA).

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry.

Visit the website http://www2.gre.ac.uk/study/courses/pg/com/cgcs

Computing - General

Come and study in the award-winning Department of Computing & Information Systems on the magnificent Greenwich Campus. Welcoming home and international students from all backgrounds, CIS provides an exciting, diverse and friendly environment in which to study.

The latest university league table published in the Sunday Times, has rated the computer science department as seventh in the UK for teaching excellence.

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (SST) (60 credits)
Systems Development Management and Governance (15 credits)
Enterprise Software Engineering Development (15 credits)
Enterprise Patterns and Frameworks (15 credits)
Programming Enterprise Components (15 credits)
Clouds, Grids and Virtualisation (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
User Centred Web Engineering (15 credits)
Big Data (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
Data Warehousing (15 credits)
Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Business Intelligence and Data Mining (15 credits)
Enterprise Systems Integration (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Systems Development Management and Governance (15 credits)
Programming Enterprise Components (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Enterprise Software Engineering Development (15 credits)
Enterprise Patterns and Frameworks (15 credits)
Clouds, Grids and Virtualisation (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (SST) (60 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Software Engineering Development (15 credits)
Enterprise Patterns and Frameworks (15 credits)
Clouds, Grids and Virtualisation (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Data Warehousing (15 credits)
User Centred Web Engineering (15 credits)
Big Data (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Business Intelligence and Data Mining (15 credits)
Enterprise Systems Integration (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Graduates from this programme are equipped for employment in industry, commerce or education with a proficiency in the key theoretical and practical areas in computer science, including their application to modern software systems development.

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less

Show 10 15 30 per page



Cookie Policy    X