• University of Leeds Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • University of Southampton Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • Aberystwyth University Featured Masters Courses

Postgrad LIVE! Study Fair

Birmingham | Bristol | Sheffield | Liverpool | Edinburgh

University of Stuttgart Featured Masters Courses
Barcelona Technology school Featured Masters Courses
University of Bedfordshire Featured Masters Courses
University of Reading Featured Masters Courses
Teesside University Featured Masters Courses
"cyber" AND "intelligence…×
0 miles

Masters Degrees (Cyber Intelligence)

We have 42 Masters Degrees (Cyber Intelligence)

  • "cyber" AND "intelligence" ×
  • clear all
Showing 1 to 15 of 42
Order by 
IN BRIEF. You will develop  practical and real-world skills in all major areas of cyber security, cyber forensics, cyber warfare and cyber threat intelligence to fight against Advanced Persistent Threats (APTs). Read more

IN BRIEF:

  • You will develop  practical and real-world skills in all major areas of cyber security, cyber forensics, cyber warfare and cyber threat intelligence to fight against Advanced Persistent Threats (APTs)
  • You will prepare yourself to obtain professional security certifications such as CISSP and CCFP
  • You will be among the most employable people on the planet!
  • Part-time study option
  • International students can apply

COURSE SUMMARY

This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cyber security perspective.  

You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidences and present them in the court of law. You will use your knowledge of programming to analyse different malwares to determine how they work and how countermeasures can be developed. Only a small percentage of cyber security professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.

You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cyber security while you operate within a well-formed professional and ethical framework.

TEACHING

  • Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
  • Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
  • Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
  • Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
  • The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.

ASSESSMENT

  • Examination (25%) assesses your immediate response to  small or medium unseen problems
  • Coursework (40%) assesses your considered and in-depth response to a larger problem
  • Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.

CAREER PROSPECTS

Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.

LINKS WITH INDUSTRY

This course has contacts with local industry such as software companies (such as Web Applications UK), infrastructure providers (such as UKFast) and security consultants (such as KPMG). These companies will provide you with a real-world perspective to help you appreciate the barriers that exist and the compromises that must be made to manage conflicting demands (known as the C-I-A triad).

FURTHER STUDY

Your MSc project will need you to demonstrate “originality in the application of knowledge”. Given a suitable topic, this may be able to be developed into an area where you can undertake a higher research degree to demonstrate “an original contribution to knowledge” which is the target for a PhD. You will get a chance to learn about the research interests of the University’s research active staff in order to help you develop a suitable topic. This may be directly in a security field, or applications of other fields of computing such as artificial intelligence or big data in cyber security and cyber forensics.



Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
This one year MSc Cyber Security degree offers a multi-disciplinary approach to this critically important topic, embracing not only the technical subjects, but also aspects of criminology, risk management, law and social sciences giving you skills that are highly regarded by leading employers. Read more

This one year MSc Cyber Security degree offers a multi-disciplinary approach to this critically important topic, embracing not only the technical subjects, but also aspects of criminology, risk management, law and social sciences giving you skills that are highly regarded by leading employers.

Introducing your degree

Cyber security is a topic of critical importance to commercial and academic organisations, as well as to governments and their citizens. Our Cyber Security programme, primarily aimed as a broadening qualification for computer science graduates, offers a multi-disciplinary perspective to the subject, giving students an excellent basis for a future career in the cyber security field.

Overview

There is currently a worldwide shortage of skilled practitioners in cyber security. In the UK, the National Audit Office recently named "addressing the UK's current and future ICT and cyber security skills gap" as a "key challenge", whilst at a time when cybercrime “as-a-service” is on a steep rise, the Department for Business, Innovation & Skill calls for companies to make of cyber security a Board level responsibility. Our MSc is specifically designed to give students a well-rounded, multi-disciplinary view of the subject area, embracing not only the technical subjects, but also aspects of criminology, risk management, law and social sciences. We believe a broad grounding in cyber security will give our students a key advantage in the marketplace.

View the 2017/18 programme specification document for this course

View the 2018/19 programme specification document for this course

Career Opportunities

This programme provides an excellent platform for either immediate employment in the cyber security field or further research in industry or academia. Our graduates should not only understand technical aspects of cyber security, but also the broader context in which these sit.

Our students should be able to seek careers in:

  • Established companies designing and marketing specific off-the-shelf security products (anti-viruses, anti-spam, software analysers, firewalls, etc.)
  • Emerging cyber security professions embedded in companies and business of any sort. These include the expert figures required as companies are urged to take responsibility for the analysis of their cyber-threats and the design of their cyber-defences
  • A growing range of cyber security consultancy companies who study and analyse trends in cyber security and who provide advice to a wide range of clients
  • Professions for which cyber security plays a key role, and for which understanding the broader context is becoming increasingly important, e.g. the military, intelligence agencies, and crime prevention and investigation
  • Government departments, e.g. in the UK the Department for Business, Innovation and Skills (BiS), who provide analysis and strategy advice for the UK and its businesses

Academic possibilities include further study towards a Ph.D. qualification, or research assistant positions undertaking cyber security related research.

Visit our careers hub for more information.



Read less
The executive master’s programme in Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats. Read more

The executive master’s programme in Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.

Why study Cyber Security?

The programme, which is for working professionals, will teach you to make connections between the technical, legal, administrative, economic and psychological aspects of digital security. Being able to look at a security problem from all angles will help you develop sound strategies to protect both organisations and individuals.

During this programme, you will learn to:

  • Identify the complexities and interdependencies in cyber space
  • Contribute solutions to cyber risks, both from a technological and a policy and administrative approach
  • Relegate cyber threats to acceptable risks
  • Build a bridge between largely technical and more administrative-oriented professionals in organisations
  • Translate technical and operational issues to a strategic level
  • Reflect critically on new developments and results of research into cyber security
  • Offer independent contributions to cyber security research

This programme is offered by Leiden University, Delft University of Technology and The Hague University of Applied Sciences and various private partners, under the umbrella of the Cyber Security Academy.

Reasons to choose Cyber Security at Leiden University?

As a student in the Cyber Security programme, you will benefit from:

  • Expert instructors: The programme is taught by top experts from Leiden University, TU Delft and The Hague University of Applied Sciences. You will also have guest lectures from professionals such as management consultants (KPMG, VKA, KPN) and technical specialists (NFI, ENCS, FOX-IT).
  • Ties to the industry: You will learn at the The Hague Security Delta campus, which is the leading European security cluster of private and public organisations and knowledge institutions in the broad field of security.
  • Advanced facilities: You will have access to multifunctional spaces with modern IT facilities such as a Real Time Intelligence Centre and a Serious Gaming Lab

Is Cyber Security the right programme for you?

Are you a professional who deals with cyber security issues in the public or private sector? Do you have a background in administration, law or IT? Would you like to further your expertise in cyber security, improving your ability to meet the challenges of today and tomorrow?

This programme is designed for highly educated professionals (computer scientists, lawyers, policy makers) with several years of professional experience in and/or affinity with issues in the field of cyber security.



Read less
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. Read more
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. This includes the technical side of encryption, authentication, biometrics, network security, etc as well as information security management and cyber security risk.

This MSc is aimed at computing graduates with strong programming skills seeking careers as cyber security professionals or careers that need a systematic and deep understanding of the subject. It would also be an excellent starting point for those wishing to carry out further research in cyber security.

Visit the website https://www.kent.ac.uk/courses/postgraduate/1225/cyber-security

About the School of Computing

Our world-leading researchers, in key areas such as systems security, programming languages, communications, computational intelligence and memory management, and in interdisciplinary work with biosciences and psychology, earned us an outstanding result in the most recent national research assessment.

The School hosts the University's GCHQ/EPSRC accredited Academic Centre of Excellence in Cyber Security Research, one of only 13 in the country.

In addition, two of our staff have been honoured as Distinguished Scientists by the ACM and we have also held Royal Society Industrial Fellowships.

As an internationally recognised Centre of Excellence for programming education, the School of Computing is a leader in computer science teaching. Two of our staff have received the ACM SIGCSE Award for Outstanding Contribution to Computer Science Education. We are also home to two National Teaching Fellows, to authors of widely used textbooks and to award-winning teaching systems such as BlueJ.

Modules

The following modules are indicative of those offered on this programme. This list is based on the current curriculum and may change year to year in response to new curriculum developments and innovation. Most programmes will require you to study a combination of compulsory and optional modules. You may also have the option to take modules from other programmes so that you may customise your programme and explore other subject areas that interest you.

Assessment

Assessment is through a combination of unseen written examinations, written and practical coursework, student presentations, individual and group projects.

The substantial research or development project undertaken for other programmes is assessed by dissertation.

Programme aims

This programme aims to:

- enhance the career prospects of graduates seeking employment in the computing/IT sector

- prepare you for research and/or professional practice at the forefront of the discipline

- develop an integrated and critically aware understanding of one or more areas of computing/IT and their applications (according to your degree title)

- develop a variety of advanced intellectual and transferable skills

- equip you with the lifelong learning skills necessary to keep abreast of future developments in the field.

Study support

We provide an extensive support framework for our research students and encourage involvement in the international research community.

We have strong links with industry including Cisco, IBM, Microsoft and Oracle.

Postgraduate resources

The School of Computing has a large range of equipment providing both UNIX (TM) and PCbased systems and a cluster facility consisting of 30 Linux-based PCs for parallel computation. New resources include a multi-core enterprise server with 128 hardware threads and a virtual machine server that supports computer security experiments.

All students benefit from a well-stocked library, giving access to e-books and online journals as well as books, and a high bandwidth internet gateway. The School and its research groups hold a series of regular seminars presented by staff as well as by visiting speakers and our students are welcome to attend.

The School of Computing has a makerspace on the Canterbury campus, which offers exciting new teaching and collaboration opportunities. Among other equipment, it contains milling machines, a 3D printer, laser cutter and extensive space for building and making digital artefacts. The School also owns speciallist equipment for Internet of Things and media steganography.

Our taught postgraduate students enjoy a high level of access to academic staff and have their own dedicated laboratory and study room. Students whose course includes an industrial placement are supported by a dedicated team which helps them gain a suitable position and provides support throughout the placement.

Links with industry

Strong links with industry underpin all our work, notably with Cisco, Microsoft, Oracle, IBM, Agilent Technologies, Erlang Solutions, Hewlett Packard Laboratories, Ericsson, Nvidia and Nexor.

Global Skills Award

All students registered for a taught Master's programme are eligible to apply for a place on our Global Skills Award Programme (http://www.kent.ac.uk/graduateschool/skills/programmes/gsa.html). The programme is designed to broaden your understanding of global issues and current affairs as well as to develop personal skills which will enhance your employability.

Careers

Our graduates go on to work for leading companies including Cisco, GlaxoSmithKline, IBM, Intel, Lilly, Microsoft, Morgan Stanley, Thomson Reuters and T-Mobile. Many have gone on to develop their careers as project leaders and managers.

Find out how to apply here - https://www.kent.ac.uk/courses/postgraduate/apply/

Read less
The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry. Read more
The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry.

The programme is delivered by a dedicated team of cybersecurity experts and active researchers in the area and gives also the opportunity to acquire certain units from the programme as dedicated credit-based short courses outside the normal MSc route.

Using cutting edge and leading teaching and training techniques the course helps the candidates to realise the unique complexity and challenges associated with cybersecurity in a highly dynamic and constantly evolving threat landscape in a blended programme that amalgamates both management and hands-on skills required by cybersecurity professionals.

The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills.

The systematic application of teaching and learning methods with the GIS goals and clear references made to the University’s employability framework should further help students to develop their career prospects throughout the programme.

Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/cyber-security#entry

Course detail

Areas of study include:
• Cyber threat intelligence
• Ethical Hacking
• Network Security
• Information Governance and Compliance
• Research methodologies and project management
• Tactical and strategic cybersecurity management
• MSc thesis in cybersecurity

Modules

• Cyber Defence (Ptbm) (CIS098-6) Compulsory
• Information Governance And Compliance (Ptbm) (CIS102-6) Compulsory
• Msc Project - Cyber Security (CIS106-6) Compulsory
• Research Methodologies And Project Management (Ptbm) (CIS099-6) Compulsory
• Tactical And Strategic Cybersecurity Management (Ptbm) (CIS097-6) Compulsory

Assessment

The assessment strategy used is predominantly written assessments with only two (2) formal invigilated examinations throughout the course. The method used will depend on the nature of the subject matter being taught in each of the units, where the most appropriate method is chosen and analysed (See UIFs). Students will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by their tutors for each of the tasks allocated.

The assessment strategy for this course is designed around a holistic evaluation on knowledge and skills acquired with strong emphasis on the requirements for this mode of delivery and diverse skills, background and expectations of the target audience. All assessments used in the course are in perfect alignment with University requirements, regulations and policies. Coursework assignments typically incorporate formative feedback so that students can gain an insight into whether their work is meeting the necessary thresholds and focus on meaningful remarks to improve both their performance and understanding in the subject matter. The assessment strategy has been designed with strong influence by the requirements and needs of the audience in PT mode of delivery for this course.

Careers

The Careers Service is there to support you throughout the duration of your study and beyond. The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills. The systematic application of teaching and learning methods with the GIS goals and clear references made to the Universitys employability framework should further help students to develop their career prospects throughout the programme. Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

The unit `Research Methodologies and Project Management in particular requires you to work in a team so as to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control; you will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

In addition and somewhat complementary the final project fosters independent and autonomous study: typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor. That gives the ability to initiate discussion and project ideas that enrich the academic context in your studies and provide the foundations for a solid, relevant and strong project delivered at the end of your course.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. Read more
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. This MSc can lead to a career such as a network system administrator, security analyst, ethical hacker or a security consultant.

Why choose this course?

The MSc Cyber Security consists of two major parts: taught modules and an MSc project. Each taught module has an assigned number of credits (either 15 or 30). In order to obtain an MSc degree you must study and pass 120 credits of compulsory taught modules plus the project i.e. 180 credits in total.

[[Careers
Our masters programme is designed to give Computer Science graduates the specialist, up-to-date skills and knowledge sought after by employers, whether in business, industry, government or research. This particular course will prepare you for a career such as a software engineer, developer or project manager.

Teaching methods

Classes consist of lectures, small group seminars, and practical work in our well-equipped laboratories. We use modern, industry-standard software wherever possible. There are specialist facilities for networking and multimedia and a project laboratory especially for masters students. In addition to scheduled classes, you will be expected a significant amount of time in self-study, taking advantage of the extensive and up-to-date facilities. These include the Learning Resource Centres, open 24x7, with 1,500 computer workstations and wifi access, Studynet our versatile online study environment usable on and off campus, and open access to our labs.

Work Placement

This MSc is available with an optional one year industry placement. The 'with placement' programmes give you additional industrial experience by applying the skills you have learned throughout your studies.

This offers you the opportunity to work for one year in a highly professional and stimulating environment. You will be a full time employee in a company earning a salary and will learn new skills that can't be taught at University. During the placement, you will be able to gain further insight into industrial practice that you can take forward into your individual project.

We will provide excellent academic and personal support during both your academic and placement periods together with comprehensive careers guidance from our very experienced dedicated Careers and Placements Service.

Although the responsibility for finding a placement is with you, our Careers and Placements Service maintains a wide variety of employers who offer placement opportunities and organise special training sessions to help you secure a placement, from job application to the interview. Optional one-to-one consultations are also available.

In order to qualify for the placement period you must maintain an overall average pass mark of not less than 60% across all modules studied in semester ‘A’.

Structure

Core Modules
-Advanced Computer Science Masters Project
-Programming Paradigms

Optional
-Advanced Databases
-Artificial Life with Robotics
-Data Mining
-Digital Forensics
-Distributed Systems Security
-Human Computer Interaction: Principles and Practice
-Information Security, Management and Compliance
-Investigative Methods for Computer Science
-Measures and Models for Software Engineering
-Mobile Standards, Interfaces and Applications
-Multicast and Multimedia Networking
-Network System Administration
-Neural Networks and Machine Learning
-Penetration Testing
-Professional Issues
-Programming for Software Engineers
-Secure Systems Programming
-Software Engineering Practice and Experience
-Theory and Practice of Artificial Intelligence
-Wireless, Mobile and Ad-hoc Networking

Read less
Designed for. CSE is designed for Computer Science, Informatics, IT or other STEM graduates, looking to become a cyber security professional, or take a leading technical role in an organisation critically dependent upon data and information communication. Read more

Designed for

CSE is designed for Computer Science, Informatics, IT or other STEM graduates, looking to become a cyber security professional, or take a leading technical role in an organisation critically dependent upon data and information communication.

What will this course provide?

Cyber security is not simply about protecting the internet. As our world becomes ever more dependent upon digital systems, our vehicles, infrastructure, industrial controls, finances, and medical devices all exist within the cyber domain.

Studying Cyber Security with us will deepen your cyberspace knowledge, so you’ll understand the nature of this evolving cyber environment, and how to protect and enhance the human experience within it.

This MSc focuses on the technical aspects of cyber security and how these may be implemented in a multidisciplinary way. Throughout the course the practical applications of topics are emphasised, as well as developing your abstract and analytical skills.

Through studying Cyber Security at Warwick, you will gain unparalleled exposure to industry. All taught modules contain valuable input from industry experts who, through case studies and guest lectures, contribute to the design and delivery of material and make for a very rich learning environment.

GCHQ Certification

GCHQ, the UK government's National Technical Authority for Information Assurance, identified the shortage of cyber professionals as a concern that needed to be addressed. Part of their strategy was to identify cyber security master's courses that would "... help prospective students make better informed decisions when looking for a highly valued cyber security qualification".

At the University of Warwick, we specifically designed MSc Cyber Security Engineering to meet GCHQ's demanding requirements. MSc Cyber Security Engineering received provisional certification by GCHQ in 2015.

If you are an EU or international student, you should value GCHQ certification, just as much as any UK student. The content of the course is internationally applicable.

Course modules

CSE currently comprises eight compulsory 15-credit taught modules and a 60-credit dissertation. For 2018 entry, additional modules may be added.

  • Security Architectures and Network Defence Cyber Intelligence and Operations 
  • Cryptosystems and Data Protection Cyber-Physical Systems 
  • Information Risk Management and Governance Enterprise Cyber Security 
  • Industrial Espionage and Counterfeiting 
  • Digital Forensics 

The curriculum is divided in eight taught modules and the project. Each module is taught in a one week blocks. Typically these are spaced approximately three weeks apart. It is during this time between modules that you will complete assessed assignments.

The individual project commences in February. By June it will fully occupy your study time with taught modules typically finished in May.

The number of taught modules and the weighting of the project in MSc Cyber Security Engineering is different from most other programmes in the WMG taught Master's portfolio.

Teaching style

Tutors adopt their own distinctive style within their taught weeks. Most modules are taught by more than one tutor, which, together with the wide range of guest speakers, gives real breadth of insight into any topic. The external input is especially evident in the Enterprise Cyber Security module where colleagues from IBM make a substantial contribution to the week's activities.

After you graduate

Graduates can expect rapid career progression in within a wide range of organisations relating to cyber security in a range of roles. 



Read less
The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Read more

The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the US and beyond and the analysis of intelligence collection. The M.S. in National Security Affairs and International Relations is offered online worldwide.

National security affairs is one of the fastest growing professions with positions open in the public sector in the federal, state and local governments and in the private sector. This program is designed for professionals in the field seeking career advancement, those who aspire to enter the field, individuals in related professions, and those retired from the military and government seeking consulting and other positions. Examples of potential students include personnel in the military, federal, state and local governments, law enforcement, corporations, and academia, as well as recent college graduates.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes. 

M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the U.S. and beyond, and the analysis of intelligence collection. Students will also develop a deep understanding of the international context in which U.S. national security issues are shaped.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes.

Following completion of the program core, students must complete 15 credits of coursework from the list of available electives. The majority of the elective offerings were developed specifically for the national security and international relations program, with a small number drawn from closely related fields. The elective list contains both courses that emphasize domestic security and courses that have a broader international focus, resulting in sufficient breadth of subject matter to allow students to tailor their choices around particular academic or professional interests.

Students interested in Cyber Security can choose to take a specific concentration in this area. Students who choose this option must complete 9 credits from the Cyber Security concentration and 6 credits from the elective list. Before choosing this option, students must secure permission from the Department of History and Political Science. After a consultation, it will be determined whether the student can enter the Cyber Security concentration, or if additional foundation courses will be required in order to enter and successfully complete the concentration.

Core Courses (21 credits)

  • NSAM 5001 - Current Issues in National Security (3 credits)
  • NSAM 5003 - National Intelligence Collection and Analysis: Theory and Practice (3 credits)
  • NSAM 5004 - Border Protection and Military Issue (3 credits)
  • NSAM 5005 - Research and Evaluation in National Security Affairs (3 credits)
  • NSAM 5010 - US Foreign Policy and National Security (3 credits)
  • NSAM 5014 - Ethical Issues in National Security (3 credits)
  • NSAM 5016 - International Relations: Theory and Practice (3 credits)

Electives (15 credits)

  • NSAM 5002 - Terrorists and Terrorism: Theory and Practice (3 credits)
  • NSAM 5015 - Civil Liberties and National Security (3 credits)
  • NSAM 5020 - International Law and Institutions (3 credits)
  • NSAM 5030 - American Government and Domestic Security (3 credits)
  • NSAM 5040 - Cyber Conflict and Statecraft (3 credits)
  • DEM 5090 - Weapons of Mass Threat and Communicable Diseases (3 credits)
  • MHS 5314 - Bioterrorism and Weapons of Mass Destruction (3 credits)
  • NSAM 5502 - Directed Readings in National Security Affairs (3 credits)
  • NSAM 5650 - Economic Statecraft in National Security Affairs (3 credits)
  • NSAM 6130 - Practicum/Internship (3 credits)
  • NSAM 6690 - Special Topics in National Security Affairs and International Relations (3 credits)
  • NSAM 6700 - Directed Thesis in National Security Affairs and International Relations (6 credits)

Optional Cyber Security Concentration

  • MMIS 0683 - Fundamentals of Security Technologies (3 credits)
  • MMIS 0684 - Information Security Management (3 credits)
  • MMIS 0685 - Information Security Governance (3 credits)
  • MMIS 0686 - Information Systems Auditing (3 credits)
  • MMIS 0687 - Information Security Project (3 credits)

Practicum

In addition to successfully completing all course work, students must pass a tabletop examination to be awarded the M.S. in National Security Affairs and International Relations. When a student has completed all coursework, has maintained a minimum of 3.0 GPA with no "incomplete" grades, and is a "student in good standing" with no disciplinary actions pending or disciplinary tasks to complete, the student will be eligible to take the tabletop examination. The tabletop exam is an assessment of the student's ability to integrate the knowledge and skills gained through course work.The exam tests the student's written ability to critically analyze and apply conflict assessment, theory, and research methodology to hypothetical conflict situations. The exam also tests knowledge of material specific to the academic curriculum.



Read less
IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. Read more

IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. .. to be able to mitigate the possible cyber attacks to their organizations.

This master's degree, aimed mainly at professionals with experience in systems engineering or in the world of programming, who seek to turn their career and specialize in the world of cybersecurity.

This program has 136 hours of face-to-face training in Madrid, which will work with a theoretical-practical methodology through real cases, conferences with professionals of the sector and seminars, enhancing Networking.

Students who successfully complete this program will obtain a Dual Degree from the Universidad Camilo José Cela and a Master's Degree from the IMF Business School. They will also get a Deloitte CyberSOC Degree and 3 Deloitte Associate level certifications for Safe Development, Ethical Hacking and Forensic Analysis. They will have at their disposal all the advantages of MFI:

  • Program Scholarships and Study Grants
  • Recruiters with over 12,000 vacancies posted in the last year
  • Unlimited tutoring
  • Financing up to 12 months without interest or bank intervention
  • Virtual library with over 30,000 references
  • Virtual library with access to any master classes
  • Access to the VIP Club with discounts on leisure, travel, restaurants ...

TEMARY:

  • MODULE I - Cyber ​​intelligence
  • MODULE II - Safe Development
  • MODULE III - Monitoring and Correlation of Security Events (SIEM)
  • MODULE IV - Ethical Hacking
  • MODULE V - Forensic Analysis
  • MODULE VI - Reverse Engineering
  • MODULE VII - Security in Mobile Environments
  • MODULE VIII - Final Master's Work


Read less
The . MSc in Cyber Security and Management.  is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology. Read more

The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology. It is suitable for those from a computer science or information technology education background or courses with a significant component of either. Work experience will also be considered.

Delivering effective cyber security in a global business environment

In 2010, the UK government announced a 650 million pound investment strategy into Cyber Security & declared that Cyber-Security had become a ‘tier 1’ priority alongside international terrorism and major national incidents. The UK is one of many governments around the world which recognize the serious nature of the threat that is emerging from the cyber-sphere. Our goal for the MSc programme is to give focus to the strategic deployment and implementation of Cyber Security within an organization. We want to develop strategic thinkers who understand the Cyber threat to an organization and its resources and are able to build and support secure systems that support the strategic growth of a business. The course covers all aspects of Cyber Security including network security, computer security and information security. Alongside this, the course focuses on the business context so that students can progress their careers more rapidly through organisations and aim very particularly at management positions.

A Master's course uniquely embedded in industry

When you study the MSc Cyber Security and Management at WMG, Warwick, you will gain an exposure to industry that is unparalleled in many HEIs. All the cyber security modules contain a considerable input from industry, for instance in the academic year 2012-2013 alone, we had the following companies giving guest lectures to our students: HP, Amethyst Consulting, Deep Secure Ltd, Siskin Technolgy, SOCA (Serious Organised Crime Agency), CSC, VMware, OCSIA, Nottingham Police, Mozilla, Metropolitan Police, Kaspersky, Berwin Leighton Paisner, LW Risk Associates, Telefonica, IBM, Garren James Associates, Blackstage Forensics, Derbyshire NHS Trust and Nettitude.* But this is just one way in which students on the course engage with industry. Further to this, you will have opportunities to visit and present at conferences, participate in specialist industrial trips and even receive mentoring/advice from industry in key stages of your work.

Course Structure

The course is modular; each student takes a combination of core and elective modules. 9 modules are studied and assessed in total. Modules consist of nominally 40 hours directed tuition in the form of lectures, seminars, group work, presentations, case studies and e-learning. This is covered in a full-immersion, intensive week.

Modules are assessed by Post Module Assignment - this is typically a further 40 -60 hours of work.The taught modules account for 50% of the Master's degree. A major individual research project, submitted in the form of a dissertation accounts for the other 50%. This should take approximately 900 hours of study time. An oral examination is held upon completion.

For the current academic year (2017/18), the course comprises nine 10-credit modules and a 90-credit dissertation.Please note:Our course and module content and schedule is continually reviewed and updated to reflect the latest research expertise at Warwick, so it is therefore very important that you check the website for the latest information before you apply and when you accept an offer. warwick.ac.uk/wmgmasters/csm

Core modules

  • Security Architectures and Network Defence
  • Cryptosystems and Data Protection
  • Information Risk Management and Governance
  • Industrial Espionage and Counterfeiting
  • Digital Forensics

Plus choose 3 from the list of modules below:

  • Cyber Intelligence and Operations*
  • Cyber-Physical Systems*
  • Enterprise Cyber Security*
  • Globalisation and Outsourcing
  • Financial Analysis and Control Systems
  • Leadership
  • Organisations, People and Performance

* Modules required for the GCHQ Provisionally Certified Pathway Plus a ninth module from the full list of modules.

After you Graduate

  • Graduates can expect to go on to work within corporate information - security and technology teams, consultancies, government information-security departments, management tracks in information critical organisations and cyber security related research.




Read less
This course is subject to approval. Cybersecurity is a fast developing and exciting subject. There is an unprecedented rise in cybercrime, cyber attacks and cyber threats to individuals, businesses and society. Read more
This course is subject to approval.

Cybersecurity is a fast developing and exciting subject. There is an unprecedented rise in cybercrime, cyber attacks and cyber threats to individuals, businesses and society. Resilient cybersecurity systems and infrastructures attempt to prevent attack and protect individuals and businesses from such attacks.

Course overview

This newly developed Cybersecurity course will provide you with the technical and organisational skills to make a difference to society by providing safe and secure digital environments, allowing the public, business and industry, and the economy to function safely.

As a student studying Cybersecurity, you'll contribute to the wellbeing of society by raising awareness of threats and attacks and designing systems, structures and networks to identify attacks and recover from them allowing business continuity.

The course has been designed to cover a wide range of relevant, interesting and current topics in the cybersecurity field. You'll study industry-specific topics and specialise in areas such as network security, cybersecurity in organisations, big data security and breach and incident response.

Our close links to industry and businesses in the North East, as well as the research expertise of our academics makes this course unique and ensures that the course structure is developed according to the needs of the employment sector. We work alongside the following companies: Net Defence, PWC, Northumbria Police, SAGE, Accenture and Sapphire.

This course will provide you with a thorough grounding in the creation of cybersecurity solutions for information security, systems security and network security. You’ll develop the skills to determine, establish and maintain cybersecurity infrastructures, and you’ll examine the underlying technologies of secure systems and their inherent risks and privacy issues. You’ll also learn how to select appropriate tools and techniques to address and manage risks, threats, vulnerabilities and potential attacks, in order to deliver cyber resilience.

You’ll cover topics such as digital forensic tools, network technologies, security procedures and defensive programming. You’ll also choose an optional module that covers a particular specialism such as big data security, user experience design or artificial intelligence for cybersecurity.

Throughout the course you’ll develop skills and knowledge that give you the confidence to apply cybersecurity tools and techniques; to be innovative in using cybersecurity skills; to solve cybersecurity problems, identify breaches and attacks; to create opportunities for information security management, risk management and business continuity; and to enable effective and efficient implementation of cybersecurity systems and infrastructures.

You’ll be taught by research active academics that have a wealth of experience, and the research produced underpins the teaching you'll receive.

The course is pending accreditation from the British Computer Society, the UK’s Chartered Institute for IT.

Course content

The course mixes taught elements with independent research and supportive supervision. At Masters level, responsibility for learning lies as much with you as with your tutor.

Modules on this course include:
-Research Skills and Academic Literacy (15 Credits)
-Network Security (15 Credits)
-Cybersecurity in Organisations (15 Credits).
-Fundamentals of Cybersecurity (30 Credits)
-Breach and Incident Response (15 Credits)
-Principles of Cybersecurity and Cyber Resilience (15 Credits)
-Masters Project (60 Credits)

Optional Modules – (choose one module from the following)
-Big Data Security (15 Credits)
-Cybersecurity and User Experience Design (15 credits)
-Cybersecurity and Artificial Intelligence (15 credits)

Teaching and assessment

We use a wide variety of teaching and learning methods which include lectures, group work, research, discussion groups and seminars.

Compared to an undergraduate course, you will find that this Masters requires a higher level of independent working. Assessment methods include written reports and research papers, practical assignments and the Masters project.

Facilities & location

The course is taught at the David Goldman Informatics Centre, based at the Sir Tom Cowie Campus at St Peter’s, it looks out over the River Wear and is less than a mile from the seaside.

Sunderland offers one of the most modern and best equipped computing environments in the UK. The open-plan David Goldman Informatics Centre is equipped with over 300 computers, which are continuously upgraded and have attracted praise in an independent evaluation by the BCS.

Join an accredited Cisco Academy department and have access to laboratories fully equipped with Cisco networking equipment, including: routers, switches, terminals and specialist equipment for simulating frame relay and ISDN links.

Benefit from the Remote Global Cisco Academy and have access to our software whether you’re using the WiFi in our halls of residence or you’re at home.

We host high-performance computing platforms, including a Beowulf cluster and a grid distributed system, for concurrent processing of complex computational tasks. You can also access the equipment and licences for our own public mobile cellular network.
Access hundreds of PCs, Apple Macs, or the free WiFi zones across the campus and find the best place for you to study in our unique and vibrant learning space. The University is very diverse with a strong international presence and provides you with the opportunity to explore different cultures.

Study at a uniquely designed library and have access to more than 430,000 books, 9,000 electronic journal articles and benefit from a £1 million annual investment in new resources.

Employment & careers

Progress in some of the most attractive fields and industries as we prepare you for a range of cyber security jobs, including roles such as: information security manager, security analyst, security architect, security administrator, incident responder, security engineer, security auditor, security software developer and vulnerability assessor.

Graduates studying Cybersecurity have gone on to secure employment with a range of companies and organisations including: GCHQ, (ISC)2, Accenture, HPE, BT, PWC, SAGE, Sunderland City Council, Northumbria and Durham Police forces and the Cybersecurity Workforce Alliance.

Businesses and industries across the UK have identified a skills gap in Cybersecurity and there is a demand for cybersecurity professionals in the public and private sectors as well as in the not profit and education sectors. You'll benefit from the University’s close links with businesses and employers in the North East and join an industry-driven programme.

The cybersecurity provision is underpinned by strong collaboration with employers. The provision is further enhanced by the contribution from cybersecurity employers and external experts in a number of ways including a series of guest lectures, master classes and seminars.

Read less
In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. Read more

In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. And in 2015 cybersecurity has been identified at the World Economic Forum as one of the major risks in the world economy.

Therefore, given the growing demand for skilled professionals, IMF Business School, Deloitte and the University Camilo Jose Cela, have developed this Master in Cybersecurity, who manages to accommodate the needs of stakeholders, opting for an online high-level training with the ease of do it from anywhere. It is the only fully online master market 60 ECTS and supported by a University Moreover, the best students will be selected by Deloitte to perform CyberSOC internship at Deloitte, with high rates of joining Deloitte after completion.

This Master enables you to:

  • Acquire the skills to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • Develop techniques and use tools to fully exploit your skills and knowledge to perform penetration testing to systems and networks.
  • Get a general and introductory vision to the world of cybersecurity, explaining the most important attacks and how to mitigate them.
  • Knowing the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • Assimilate enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Knowing the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • Perform developments in secure programming and improve your skills in security audit in the analysis and evaluation of the application source code.

Objectives

Get a comprehensive and thorough knowledge in disciplines such as Cyber ​​Intelligence, malware analysis, technical audits of systems and networks (ethical hacking), forensic analysis and management of security incidents, secure web application development and monitoring and correlation of security events (SIEM through technologies).

Students:

  • You get a general and introductory vision to the world of cybersecurity, knowing the most important attacks and how to mitigate them.
  • It will acquire the necessary steps to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • It will develop technical skills and learn to use tools to fully exploit their skills and knowledge to perform penetration testing to systems and networks.
  • You know the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • He assimilated enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Learn the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • He will qualify as a developer in secure programming skills and improve security auditors in the analysis and evaluation of the application source code.

Methodology and Evaluation

Methodology

MFI offers a flexible methodology adapted to your needs, whatever your geographical location or time availability. This master can be studied under:

  • Online Methodology: All the agenda will be on hand from our virtual campus 24 hours a day, 7 days a week.
  • Distance methodology: have course material in book form.

All contents are fully updated and have great technical, easily understandable and with a clear practical vocation rigor. In addition, IMF offers you:

  • e-face tutoring staff (via forums, chat, phone, email).
  • Webinars.
  • Debates and discussion groups through forums and chats.
  • Self-assessment test.
  • Readings, case studies and documentation.

Evaluation

Continuous assessment as advances in the study of the Master.

Each module will be assessed by combining online and development of case examination; overcoming will free each subject.

Likewise, obtaining the titles of Master of IMF and Masters from the University Camilo Jose Cela, subject to overcoming the trials of each module (continuous assessment) without final examination, and conducting a Final Project Master.

Career prospects

Booming Sector

According to a recent report by the European Union, it is expected to create one million jobs in the area Cybersecurity 2020.

At the end of our master you will be ready to serve as:

  • Security Analyst
  • Malware analyst
  • forensic analyst
  • ethical hacker
  • Cyber ​​Intelligence expert and ciberfraude
  • Developers and analysts source
  • Cybersecurity consultant

Guaranteed internships in companies

IMF Business School, through its website and Employment Practices ensures students of the Masters in Cybersecurity, practices in companies. Query conditions.



Read less
Want to make a real difference to society? With the Master of Security and Crime Science, you will develop the skills required to become a leader in the security, intelligence and crime-prevention areas in the public and private sectors. Read more

Want to make a real difference to society? With the Master of Security and Crime Science, you will develop the skills required to become a leader in the security, intelligence and crime-prevention areas in the public and private sectors.

You will combine skills from different disciplines such as Statistics, Computer Science, Geographic Information Systems, Population Studies, Psychology and Management. You'll develop analytical and creative methods to tackle real-world crime, and improve security in an ever-changing society.

This degree will provide a pathway to a career in policy development, crime or accident detection and analysis in both the public and private sectors. The skills you gain from the degree will enable you to promote and enhance security and community safety.

Learn from the experts

The Master of Security and Crime Science is the first of its kind in New Zealand and the Asia Pacific region, lead by the New Zealand Institute for Security and Crime Science (NZISCS).  The Institute is the primary research partner for the New Zealand Police, and a partner at the Evidence Based Policing Centre in Wellington. Papers and research topics will be delivered by world-leading researchers in psychology, statistics, artificial intelligence including machine learning, cyber security, political science, economics, management, law, education, Māori and indigenous development, and demographic research.

Develop real-world solutions

In collaboration with the New Zealand Police, students and researchers investigated drug abuse intervention, developed software to help police monitor offenders on bail, invented new methods to research burglary offences, researched sex abuse attitudes amongst school age children, and optimised traffic patrolling. The Masters degree requires students to investigate and tackle real security and crime problems in collaboration with public and private partners.

Career opportunities

  • Policy development for social agencies
  • Intelligence analyst (eg for MPI, National or International Police forces)
  • Traffic accident analyst
  • Security enhancement engineer
  • Senior law enforcement officer
  • Social investment expert
  • Senior policy adviser
  • Crime data scientist
  • Analyst specialising in emerging, organised or cyber crime
  • Counter-terrorism analyst


Read less
The accredited Master of Science program in Computer Science is a two-year program that has been designed for international and German graduate students. Read more
The accredited Master of Science program in Computer Science is a two-year program that has been designed for international and German graduate students. The curriculum is very flexible. Students can compile their individual study plans based on their background and interests. It is also a very practical program. In addition to lectures and tutorials, students will complete two seminars, one or two projects and the master thesis.

In the beginning students will choose one or two key courses. Key courses are courses which introduce the students to the research areas represented at the Department of Computer Science. The following key courses are offered:

• Algorithm Theory
• Pattern Recognition
• Databases and Information Systems
• Software Engineering
• Artificial Intelligence
• Computer Architecture

After that, students can specialize in one of the following three areas:

• Cyber-Physical Systems
• Information Systems
• Cognitive Technical Systems

Here are some examples of subjects offered in the three specialization areas:

Cyber-Physical Systems:

• Cyber-Physical Systems – Discrete Models
• Cyber-Physical Systems – Hybrid Control
• Real Time Operation Systems and Reliability
• Verification of Embedded Systems
• Test and Reliability
• Decision Procedures
• Software Design, Modeling and Analysis in UML
• Formal Methods for Java
• Concurrency: Theory and Practice
• Compiler Construction
• Distributed Systems
• Constraint Satisfaction Problems
• Modal Logic
• Peer-to-Peer Networks
• Program Analysis
• Model Driven Engineering

Information Systems:

• Information Retrieval Data Models and Query Languages
• Peer-to-Peer Networks
• Distributed Storage
• Software Design, Modeling and Analysis in UML
• Security in Large-Scale Distributed Enterprises
• Machine Learning
• Efficient Route Planning
• Bioinformatics I
• Bioinformatics II
• Game Theory
• Knowledge Representation
• Distributed Systems

Cognitive Technical Systems:

• Computer Vision I
• Computer Vision II
• Statistical Pattern Recognition
• Mobile Robotics II
• Simulation in Computer Graphics
• Advanced Computer Graphics
• AI Planning
• Game Theory
• Knowledge Representation
• Constraint Satisfaction Problems
• Modal Logic
• Reinforcement Learning
• Machine Learning
• Mobile Robotics I

We believe that it is important for computer science students to get a basic knowledge in a field in which they might work after graduation. Therefore, our students have the opportunity to complete several courses and/or a project in one of the following application areas:

• Bioinformatics
• Educational Sciences
• Geosciences
• Cognitive Sciences
• Mathematics
• Medicine
• Meteorology
• Microsystems Engineering
• Physics
• Political Sciences
• Psychology
• Sociology
• Economics

In the last semester, students work on their master’s thesis. They are expected to tackle an actual research question in close cooperation with a professor and his/her staff.

Read less

Show 10 15 30 per page



Cookie Policy    X