• Regent’s University London Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • University of York Featured Masters Courses
London School of Hygiene & Tropical Medicine Featured Masters Courses
University of St Andrews Featured Masters Courses
University of Bradford Featured Masters Courses
FindA University Ltd Featured Masters Courses
Cardiff University Featured Masters Courses
"cyber" AND "law"×
0 miles

Masters Degrees (Cyber Law)

  • "cyber" AND "law" ×
  • clear all
Showing 1 to 15 of 34
Order by 
This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs. Read more

About the course

This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs.

Cyber Technology MSc consists of four main themes; Cyber Security, Software Engineering, Digital Forensics, and Management. It can be studied by combining modules from all four themes allowing you to specialise in your chosen area of interest. You have the opportunity to choose mixed pathways, for example the choices of modules could lead to a degree in Cyber Security with Management.

Reasons to study:

• Develop skills required for a rapidly changing sector
gain the latest skills, techniques and knowledge required in one of the most exciting areas of computing

• Developed in conjunction with industry experts
modules are developed with Deloitte PLC, Airbus Group, BT and Rolls-Royce ensuring that you explore issues relevant to industry

• Dedicated Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in digital forensics

• Taught by expert academic staff
taught by expert staff within our Cyber Security Centre and Software Technology Research Laboratory who recognised leaders in the cyber security domain

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Excellent career prospects
graduates are prepared for roles such as consultancy, software houses or project management within organisations that are cyber security specialists within law enforcement, government; in commercial IT departments and security consultancies

Teaching and Assessment

Each module is delivered over the duration of four full days. It targets both concepts and practical skills that are relevant to industry. A multiple choice (MC) test at the end of the course provides attendees feedback on their achievements and must be passed before continuation of the academic assessment through coursework.

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects, multiple choice and laboratory-based assessments.

Contact and learning hours

You will normally attend 3 hours of timetabled taught sessions each week for each module undertaken during term time, for full time study this would be 12 hours per week during term time. You are expected to undertake around 24 further hours of independent study and assignments as required per week. Alternate study modes and entry points may change the timetabled session available, please contact us for details.

Academic Expertise

The programme is managed and delivered through our renowned Cyber Security Centre and Software Technology Research Laboratory.

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex-vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors.

Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Security and the maintenance and promotion of security are key issues in international law and international relations. Read more

Why study International Law & Security at Dundee?

Security and the maintenance and promotion of security are key issues in international law and international relations. There are many career opportunities in these areas ranging from employment with an intergovernmental organisation such as the United Nations, to employment in an international court or tribunal, to advising government and securing a role in the military. If you intend to pursue such a career, then you will need a good understanding of why and how the international community and individual states are to respond to threats to international security. For this, you will need to understand the context in which decisions are made. international law and international relations provide that context.

Our MLitt in International Law & Security provides an overview of concepts and themes relating to the study of international security in the contemporary world, from a legal as well as an international relations point of view. It introduces both traditional and 'new' approaches to defining and conceptualising security and considers the impact of International Relations theories upon the subject. It also examines key issues such as war, the proliferation of weapons of mass destruction, terrorism, the privatisation of warfare, energy security and environmental degradation.

Our course will equip you with the necessary analytical tools to understand and evaluate all aspects of security in the contemporary world. The issues outlined above lie at the heart of our course, which provides an opportunity to gain a deep understanding of the interactions of law and international relations and the way they combine to shape the responses of states to threats to security. The course also provides an opportunity to understand how those responses in turn shape international law and international relations.

What's so good about International Law & Security at Dundee?

The University of Dundee runs two parallel masters degree in International Law & Security: MLitt International Law & Security for graduates in International Relations or similar subjects, and LLM International Law & Security for Law graduates.

Each degree has one core module, and you will also be able to choose specialist option modules from the same list. You will also research and write a dissertation in your chosen area of interest, or work on a research project with integrated internship.

Internship opportunity:
The opportunity to undertake an approved internship as a part the programme of studies is an exciting innovation in this area of study which will enable students to gain a unique insight into the application of the materials addressed in taught modules and to gain valuable experience to add to their CV.

How you will be taught

The course starts in September or January, each year and lasts for 12 months on a full time basis or 24 months on a part time basis. A variety of teaching methods will be used, including: small group teaching, supervised study, independent research, seminars and presentations.

What you will study

The course is made up of two International Relations modules and two Law modules which are delivered during our two teaching semesters (Sep-Dec and Jan-Apr), and detailed below.

During the summer vacation students normally write a dissertation.

All students take the Law week-long induction in January, plus the first half of the module Legal Research Skills(including the first assessment), usually in your first semester, but can be deferred to your second semester if you don't select any first semester Law modules. You also take the non-credit bearing generic skills training seminars offered by the Humanities.

First Semester (Jan-Apr)

International Security (core module), plus one other taught 30-credit modules (from the list below).

Summer period (May-Aug)

Politics Dissertation (60 credits)

Second Semester (Sep-Dec)

Two taught 30-credit modules (from the list below).

Part time study

For part-time students the taught modules will be spread out over two years instead of one in a similar format as above, and the Dissertation or Research Project (with integrated internship) will be undertaken during the summer period of the second year of study.

Typical optional modules available

Individual Criminal Liability in International Criminal Law
Transnational Crime and Counter Terrorism
International Dispute Resolution
UN Human Rights Law
Regional Human Rights Systems
Global Human Rights: Traditions & Inspirations
Critical Studies on Terrorism
The Middle East and Terrorism
State Terror
Strategic Intelligence Studies
International Security of Drugs & Organised Crime
Human Rights in International Relations
Russian Politics & Security
Politics and Security in South Asia
Terrorism and Counter-Terrorism in Europe
Geopolitics of Natural Resources
Governing and Securing Cyber Space
European Union Security
Explaining and Understanding International Politics

How you will be assessed

By assessed coursework, examination and dissertation (or research project report).

Careers

Graduates from this degree are likely to pursue careers with international organisations such as the United Nations, the European Union, or institutions such as the International Court of Justice. You will also be well placed to pursue a career as a government adviser. Graduates from our Politics & International Relations degrees have successfully pursued careers in politics and diplomacy.

Read less
This course has been developed in response to the demand from industry for cyber security professionals who have a systematic understanding of the principles and technologies underpinning today's IT systems. Read more
This course has been developed in response to the demand from industry for cyber security professionals who have a systematic understanding of the principles and technologies underpinning today's IT systems.

Cyber security is a key problem in the provision of services, from the application layer through to the basic building blocks of computer and network systems. People trained in cyber security are greatly sought after and in the UK analysts expect that there will be a shortage of security professionals for the next 10 years or more.

The digital world is a complex place, varied in form and distributed, serving different types of stakeholder who use a variety of devices to access information. Specialists who recognise the diversity of business needs and the breadth of technologies and techniques to combat cyber threats, and have a systematic approach to understanding the impact of technology on organisations, are essential to the success of today's and tomorrow's cyber systems.

Equal in importance to securing cyber systems and their supporting technologies, is the management and delivery of content and services through to the users. These systems are in reality socio-technical-economic systems incorporating people, technologies, service providers, content providers, governments (laws, regulations, policies) through to law enforcement. The cyber security specialist is a broadly based professional able to work with technologists, senior management, service providers and suppliers, through to the end users, with their aim to provide secure services and investigate breaches.

This course builds on typical undergraduate computing courses, or those degrees with a high degree of computing content, whose graduates are looking to develop new knowledge and skills in cyber security. This course is designed to help the student gain an understanding of how cyber security systems are designed and constructed, and of the impact of technology into an organisation. The course will also give you the skills you need to work effectively in a business environment, and provide a solid basis for cyber security research. The course is supported by several research groups within the School of Computing and Engineering and the school has received research funding in cyber security.

Course detail

The course will also give you the skills you need to work effectively in a business environment, and provide a solid basis for cyber security research and development. The course is supported by several research groups within the School of Computing and Engineering and the School has received research funding in cyber security.

Teaching consists of lectures, seminars and laboratory work to provide a basis for the intensive individual study you need to undertake to maximise your achievements and the potential outcomes from taking the course.

Modules

• Fundamentals of Cyber Security
• Security Management
• Network and Systems Security
• Security Operations and Assurance
• Learning and Professional Development
• Employability Skills and Employment
• Knowledge Management (option)
• Computer Networks (option)
• Distributed Application Development (option)
• Project Management (option)
• Mobile Application Development (option)
• Research Methods
• Dissertation.

Format

Diverse methods are used to explore all aspects of the field. A strong supportive culture exists amongst the course tutors which enables students to achieve their potential.

Assessment

Assessed work is a significant part of the total assessment in the masters. There is practical work, report writing, presentations, critical academic writing and the skills and knowledge gained in these contribute to a capacity to deliver a high quality dissertation.

There are a number of end of module exams. Course tutors provide appropriate support throughout the module to ensure candidates are well prepared.

Career and study progression

Graduates in cyber security have a good record of achieving employment and progressing in their professional work. The security industry is wide, including companies that need to protect themselves, government and law enforcement through to the providers of equipment and services, such as the:
• anti-virus, security software vendors (such as McAfee, Kaspersky, Symantec, Sophos, EMC/RSA, Entrust, etc.),
• network and computer vendors (such as Cisco, Juniper, Palo Alto, HP, Barracuda, etc.),
• network and service providers (such as British Telecom, Vodafone, Rackspace, Amazon, etc.),
• consultancies (such as KPMG, IBM, Fujitsu, HP, etc.)
• services companies and in government and law enforcement.

Outstanding graduates have gone on to further study at the level of MPhil and PhD at UWL and at other institutions.

We actively encourage students with potential for research to make their interest known early on in their course.

How to apply

Click the following link for information on how to apply to this course: http://www.uwl.ac.uk/students/postgraduate/how-apply

Scholarships and bursaries

Information about scholarships and bursaries can be found here: http://www.uwl.ac.uk/students/postgraduate/scholarships-and-bursaries

Read less
This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. Read more
This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cyber security perspective.

Key benefits

• We welcome applications from students who may not have formal/traditional entry criteria but who have relevant experience or the ability to pursue the course successfully.

• The Accreditation of Prior Learning (APL) process could help you to make your work and life experience count. The APL process can be used for entry onto courses or to give you exemptions from parts of your course.

• Two forms of APL may be used for entry: the Accreditation of Prior Certificated Learning (APCL) or the Accreditation of Prior Experiential Learning (APEL).

Visit the website: http://www.salford.ac.uk/pgt-courses/cyber-security,-threat-intelligence-and-forensics

Course detail

You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidences and present them in the court of law. You will use your knowledge of programming to analyse different malwares to determine how they work and how countermeasures can be developed. Only a small percentage of cyber security professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.

You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cyber security while you operate within a well-formed professional and ethical framework.

Suitable For

Suitable for graduates of a computing subject that includes programming and networking, and who love go down to a low level to discover how things work.

Format

• Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
• Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
• Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
• The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.

Modules

• Cyber Forensics and Malware Investigation
• Information Security in Practice
• Penetration Testing and Exploit Development
• Cyber Threat Intelligence
• Project

Assessment

• Examination (20%) assesses your immediate response to small or medium unseen problems
• Coursework (45%) assesses your considered and in-depth response to a larger problem
• Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.

Career Prospects

Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.

How to apply: http://www.salford.ac.uk/study/postgraduate/applying

Read less
The MSc Cyber Security Management is a specialist programme aimed at both graduate students who have previously studied business and management subjects and students wishing to covert to management from STEM subjects. Read more
The MSc Cyber Security Management is a specialist programme aimed at both graduate students who have previously studied business and management subjects and students wishing to covert to management from STEM subjects.

The course has been created in response to current market demands and new political measures put in place by worldwide Governments. These measures are aiming to educate organisations on the risk of cyber attacks on businesses.

Specifically, this MSc addresses the needs identified in the UK National Cyber Security Strategy. The Global Information Security Workforce Study estimates that the global cyber security workforce shortage will widen to 1.5 million by 2020. This MSc is designed to address this problem.

WHY CHOOSE THIS COURSE?

The MSc Cyber Security Management has been designed explicitly to develop the knowledge and skills required by Government and industry, and has been developed in direct response to calls from the UK Government, and leading industry figures, to build cybersecurity management capacity in the workforce.

Coventry Business School is working in partnership with the Coventry Law School, to deliver MSc Cyber Security Management, a course that addresses the management of IT security challenges faced by today’s organisations. The Cyber Security Management Research Group within the Business Faculty Research Centre (CBiS), includes highly qualified academics with considerable practical experience of network and computer systems security and risk management from a variety of backgrounds including law enforcement, accounting, business and commerce.

WHAT WILL I LEARN?

Specialist modules include International Cyber and Digital Law, Cybersecurity Risk Management and Network Defence Management. Taught materials delivered in these modules have been developed by research active staff as members of the Cyber Security Management Research Group and in association with thought leaders and industry experts.

HOW WILL THIS COURSE ENHANCE MY CAREER PROSPECTS?

Organisations, both private and public, realise the need for their management staff to be aware of information security risks and for their staff to have the ability to put plans in place to reduce and mitigate risks, threats, and crises. Furthermore, managers also need to have the relevant skills and knowledge to carry out a security audit and assurance process, have risk management strategies in place to counter cyber attacks and to have a working knowledge of cyber security terminology for effective communication.

The course is aimed at future managers who have a need to deal with cyber security.

OPPORTUNITIES FOR AN INTERNATIONAL EXPERIENCE

There will be an emphasis on intercultural experiences for students on the MSc programme via:
-The opportunity for students to enrol on the Global Leaders programme.
-Advertised field trips throughout the School.
-The use of international case studies and examples throughout the programme.

GLOBAL LEADERS PROGRAMME

To prepare students for the challenges of the global employment market and to strengthen and develop their broader personal and professional skills Coventry University has developed a unique Global Leaders Programme.

The objectives of the programme, in which postgraduate and eligible undergraduate students can participate, is to provide practical career workshops and enable participants to experience different business cultures.

Read less
Our specialised MBA (Cyber Security) degree gives you the opportunity to not only develop your expertise in finance, marketing, leadership and other vital business areas, but also to learn about the growing field of cyber security. Read more
Our specialised MBA (Cyber Security) degree gives you the opportunity to not only develop your expertise in finance, marketing, leadership and other vital business areas, but also to learn about the growing field of cyber security. The modules include Cyber Security, Cybercrime and Cyber Security Management. You’ll study alongside MBA students from a variety of related disciplines and postgraduate students from courses in the computer sciences, providing you with an abundance of networking opportunities. Successfully complete the degree, and you’ll be ready to take on leadership of cyber security departments and organisations around the world.

More about this course

The London Met MBA (Cyber Security) gives you the opportunity to develop your understanding of key business functions as well as focus on cyber security. With increasingly sophisticated cyber attacks on both national governments and international corporations, this is a growing sector.

The modules on this course are related to accounting, marketing, leadership and other vital managerial functions within companies and organisations. They are designed to help you evolve into a successful leader in the business world.

The cyber security modules introduce you to the fundamentals of leadership and risk management within cyber security organisations, as well as specific challenges faced by all organisations, such as identity theft, scams, fraud and attacks on computer systems.

Our teaching staff and visiting academics, who you’ll meet both informally and formally through lectures and social events, are experts in areas including cybersecurity, management and leadership, ensuring you’ll develop the skills you need to steer a business to success.

You’ll collaborate alongside MBA students from a variety of professions and educational disciplines, such as specialist postgraduate computer science students. Your training will be supplemented with regular informal learning activities including the weekly student-led Business Breakfast, a monthly dinner, networking events, meetings with business leaders, entrepreneurs and consultants and lively charity fundraising events in the City.

We’ll provide regular coaching sessions to help improve your career potential, while you can also make use of our Careers and Employability Unit to help you find new roles for life after the MBA.

You’ll be assessed through individual and group work. This is likely to come in a variety of forms including reports, portfolios, presentations, videos, conferences and competitions, enabling you to develop the skills to master a multitude of situations in the world of cyber security.

Modular structure

Core modules:
-Accounting and Finance for Managers
-Leadership and Strategic Management
-People and Organisations: Principles and Practices in Global Contexts
-Marketing, Marketing Communications and Operations

Cyber security modules:
-Cyber Security Management
-Cybercrime and Cyber Security

Research-focused modules:
-Management Learning and Research
-Business Research Project

After the course

Graduates of the MBA may continue in their existing careers or choose to explore new opportunities. Recent graduates of our business related degrees are employed by companies including Oxademy, ALDI, Schwab Versand Hanau, Sapa, UBM plc, Carillion, Hanson Hispania SA, Triometric, BNP Paribas. They work in management roles in the fields of international sales, area management, business development and clients services.

Roles particularly relevant to the evolving field of cybersecurity management include application and security risk manager, security operations manager and information security manager.

Collaborative and international Llnks

The MBA programme has close links with ESoft, Sri Lanka’s largest education network and Islington College Nepal. London Met’s experience in delivering cultural variations of this MBA abroad means you’ll be learning from globally connected teaching staff in London.

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of- the-art facilities, flexible teaching areas and stunning social spaces.

Read less
Becoming an expert designer and coordinator of information systems projects, with knowledge in data analysis and cyber law, and thus enabling you to take a leading role when tackling any ICT project. Read more

Overview

Becoming an expert designer and coordinator of information systems projects, with knowledge in data analysis and cyber law, and thus enabling you to take a leading role when tackling any ICT project.

There is hardly a company in the world that doesn’t use ICT in some shape or form and many of them face problems in getting ICT to do what it’s supposed to do. So they turn to ICT technicians for advice. However, more often than not, technical problems are only the tip of the iceberg, and a broader perspective is needed to understand and solve them. Radboud University’s Master’s programme in Information Sciences will teach you to become a digital architect who can look beyond mere technical sides to ICT adoption and assist in designing competitive business solutions.

We’ll teach you the broad theoretical foundations you’ll need to understand the technological aspect of any ICT project that may come your way and we’ll help you look beyond technological concerns when tackling ICT-related problems in practice. Radboud University is well known in the field of information architecture, systems theory, and the quality and security of information systems.

There is a large demand for well-trained information experts who can help implement sound, secure, user-friendly technology. Many of our students are offered jobs even before they graduate, as consultants, project managers or ICT specialists.

See the website http://www.ru.nl/masters/toxicology

Why study Information Sciences at Radboud University?

- Data analysis, privacy and cyber law are the essential components of modern ICT. Radboud University is unique in offering this combination within the field of Information Sciences.
- This programme offers a good mix: forming a solid technical, organisational and legal foundation, getting hands-on experience and developing the insights needed to take a leading role in successful change programmes with active engagement from both technical savvy people and those unfamiliar with the field.
- The field of Information Sciences has the highest chance of finding employment and graduates are offered some of the highest salary for starter position in the Netherlands.
- The second half of your programme offers the possibility of an internship, which in this field is paid and can contribute to financing your Master’s study. We have close contacts with the private sector which can help you to find your own internship position.
- Electives enable you in fine-tuning the focus of this specialisation to meet your own academic and professional interests.
- You will be taught by top researchers and ICT experts of the Institute for Computing and Information Sciences (iCIS), which was ranked first in the latest national research assessment.
- Some graduates even start their own businesses, something that the Mercator Incubator right here in Nijmegen could help you with.

Technical and management students

This programme is suited for both students with a technological background with management ambitions, as those with a management background and a strong affinity with technology wanting to specialise in ICT. As the programme is a technological programme we do expect the management students to have taken a minor in Information Sciences during their Bachelor’s study, or they will need to take a half-year pre-Master’s programme before being admitted

Our approach to this field

At Radboud University, we believe that a good information specialist is more than an expert in information architecture, systems theory, and the quality and security of information systems. They form the bridge between the people involved. You’ll therefore need to learn to work together with different stakeholders within a project, for example, the super technical programmer, the demanding client and, in some cases, the computer illiterate user. You’ll need to be able represent all their interests and find a solution that’s satisfactory to all. By the end of the programme you’ll be a well-trained digital architect with the necessary managerial skills.

Radboud University's information specialists also work closely with colleagues from other disciplines, such as law, medicine, brain research, and artificial intelligence. Because information systems have a wide application, this Master’s programme shows you how to look beyond the borders of your own discipline. And the annual study trips in the elective ICT in a Different Culture – to countries such as India, Brazil, and South Africa – will also enable you to extend your own boundaries.

Career prospects

There is a big demand for highly trained information experts who can apply good, user-friendly technology. Many of our students are offered jobs even before they graduate. Most go into industry, banking and insurance, or to public-sector organisations such as schools and hospitals.

Students with this Master’s could think of positions as consultants, project managers or ICT specialists. And more companies are adding the position of Chief Information Officer (CIO) to their board of directors. This Master’s programme is definitely a good stepping stone to reaching this kind of position in your future career.

- Your own company
Some students develop their own ideas and innovations while taking part in this Master’s. They see what’s on offer, understand what’s lacking and realise where the possibilities lie. In Nijmegen there are plenty of opportunities for those wanting to start their own business. For example, the Mercator Incubator could help those with a good business plan with advice or even by offering affordable accommodation and other facilities for the first year or two of setting up a company.

See the website http://www.ru.nl/masters/toxicology

Read less
This course is delivered via Blended Learning and students will be required to occasionally attend the Coventry Campus. Please contact us for further advice in regard to short term study visas if required. Read more
This course is delivered via Blended Learning and students will be required to occasionally attend the Coventry Campus. Please contact us for further advice in regard to short term study visas if required.

This qualification has been developed in direct response to the need for government and industry to increase cyber management knowledge and expertise in the workplace.

WHY CHOOSE THIS COURSE?

The MBA in Cyber Security (MBACS) aims to provide an educational experience which enables individuals to achieve an integrated understanding of the operation and strategy of management and to develop appropriate intellectual and personal skills.

The MBACS will enable individuals to understand complex business problems and key issues in cyber security whilst exploring many associated business issues such as globalisation and ethics to ensure successful global trade.

There is an exciting opportunity to apply theoretical knowledge gained in the MBACS to business. This can be achieved by undertaking an appropriate individual or group research project based on a real cyber security issue at the dissertation stage.

The MBACS is designed to explicitly cultivate the knowledge and skills necessary to fulfil the gap in the workforce.

The first of its kind, the MBACS is structured so that you are exposed to a common core of key management issues within the fields of Strategy, Finance and Accounting, Human Resource Management and Marketing.

As distinct from MSc courses in this field, the MBACS aims to provide individuals with the skills to become effective managers by making informed decisions around cyber security risk management issues. The course provides a number of specialist modules that allows the individual to tailor their own pathway to complement and build on their existing knowledge.

WHAT WILL I LEARN?

Mandatory modules
-Cyber Security: Strategic Thinking and Analysis
-Cyber Security: Management and Leadership
-Network Security
-Cyber Security: Financial Accounting and Decision Making
-Cyber Security: Human Resource Management, Trust and People
-Cyber Security: Marketing Principles and Crisis Communications

Optional modules
-Digital Security Risk and Audit Management
-Enterprise and Big Data Management
-International Cyber and Digital Law
-Network Defence Management

The titles and content of the modules will continue to evolve with help from our Industry Advisory Board.

HOW WILL THIS COURSE BE TAUGHT?

This is a blended MBA, so individuals will have the opportunity to manage their own time and choose how and when to study. There will be mandatory events on campus but learning will occur mostly online. For each module individuals will have engaging video lectures and a variety of interactive content and activities. The online interaction between lectures and colleagues will help individuals to stay motivated and committed to the learning experience.

HOW WILL I BE ASSESSED?

Assessment on the course will vary depending on the module being studied. Some modules are 100% coursework and others assessed through a mixture of assignments, viva voce and formal examinations. In addition to written tasks you will be required to deliver presentations to ensure that you develop a full range of communication skills. Coursework can be individual or set in groups, demonstrating a full range of communication skills.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:
-EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
-Specialist input from guest lecturers
-Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
-Specialist technicians to ensure you can get the most out of these technologies

Course content

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Modules

The following modules are indicative of what you will study on this course.
-COMPUTER FORENSICS FUNDAMENTALS
-COMPUTER SYSTEM TOOLS
-EVIDENCE AND PROCEDURE
-NETWORK SECURITY
-POSTGRADUATE PROJECT MODULE
-RESEARCH METHODS

Digital Forensics pathway
-DATA RECOVERY AND ANALYSIS
-ADVANCED COMPUTER FORENSICS

Cyber Security pathway
-CYBER SECURITY
-THREATS AND COUNTERMEASURES

Associated careers

Depending on their chosen pathway graduates of the course are expected to find employment as information security/senior security officers and related cyber security roles or more technical roles investigating threats and safeguarding digital assets their life-cycle. Such roles will range from supporting industry, the public sector in general and the police and law enforcement agencies specifically, while some may focus more on researching new security threats and countermeasures. Additional also arrive for a supportive alumni community, including graduates with work experience who use their new skills and qualification to progress their career to more senior posts.

Read less
The MSc Cyber Security Risk Management is designed to provide training and education in the application of the concepts, techniques, methods and approaches of cyber security and risk management in practical organisational contexts. Read more

Summary

The MSc Cyber Security Risk Management is designed to provide training and education in the application of the concepts, techniques, methods and approaches of cyber security and risk management in practical organisational contexts. The programme aims to deliver a multi- disciplinary programme, primarily aimed at business school graduates, but also as a course that may appeal to suitable graduates from other disciplines such as economics, computer science, engineering, psychology, law and related areas.

Modules

Principles of Risk Management; Corporate Risk Management Processes; Cyber Crime; Insecurity and the Dark Web; The Management of Corporate Security; Qualitative and Quantitative Research; Risk Taking and Decision Making; Foundations of Cyber Security; Information Systems Management and Strategy; Implementing Cyber Security; Quantitative Methods; Multivariate Statistics for Data Mining; Business Ethics; Project Risk Management; Insurance; Game Theory for Business; Applied Cyber Security; Secure Systems

Visit our website for further information...



Read less
This programme provides an excellent path to the advanced study of new global developments in the field of crime, criminal law, justice and security. Read more

Programme description

This programme provides an excellent path to the advanced study of new global developments in the field of crime, criminal law, justice and security.

The MSc is suitable both for students familiar with law, politics or criminology from undergraduate study and for those who are new to these subjects.

The programme draws on the latest research in the field of crime, security and justice. Two courses introduce students to a range of theoretical perspectives on global crime, justice and security and the ways in which these issues play out in specific contexts.

Knowledge and understanding gained from core components complement specialist options in areas such as policing, cyber-crime, EU and international law, migration, and criminal justice policy. Students intending to go on to doctoral study will be guided to appropriate research skills training.

Programme structure

This programme offers a wide range of courses from law, criminology, social sciences and international policy. You can tailor the degree to meet your specific interests.

The 2016/17 programme structure for will consist of 180 credits, comprising taught courses worth 120 credits and a 10,000 word dissertation worth 60 credits.

In each semester you will take 60 credits of mandatory, core and option courses.

Mandatory courses (40 credits):

Global Crime and Insecurity (20 credits, semester 1)
Responding to Global Crime and Insecurity (20 credits, semester 2)

Core courses (40-80 credits):

Criminological Research Methods (40 credits, full year)
Fundamental Issues in International Law (40 credits, full year)
International Criminal Law (40 credits, full year)
General Principles of Criminal Law (20 credits, semester 1)
Theoretical Criminology (20 credits, semester 1)
Criminal Justice and Penal Process (20 credits, semester 1)
International Human Rights Law (20 credits, semester 1)
Current Issues in Criminal Law (20 credits, semester 2)
Cybercrime (20 credits, semester 2)
Surveillance and Security (20 credits, semester 2)
Inter-State Conflict and Humanitarian Law (20 credits, semester 2)
Human Rights and Conflict Resolution (20 credits, semester 2)
Human Rights Law in Europe (20 credits, semester 2)

The remaining credits can be taken from a selection of courses provided by the School of Social and Political Sciences (list to be made available soon) or optional Law School courses, including those listed above.

Learning outcomes

Students who complete the MSc will acquire an advanced understanding of the major contemporary debates and theoretical perspectives on crime, justice and security in a global context, and will enhance their research and analytic skills.

Read less
This programme provides an excellent path to the advanced study of new global developments in the field of crime, criminal law, justice and security. Read more

Programme description

This programme provides an excellent path to the advanced study of new global developments in the field of crime, criminal law, justice and security.

The MSc is suitable both for students familiar with law, politics or criminology from undergraduate study and for those who are new to these subjects.

The programme draws on the latest research in the field of crime, security and justice. Two courses introduce students to a range of theoretical perspectives on global crime, justice and security and the ways in which these issues play out in specific contexts.

Knowledge and understanding gained from core components complement specialist options in areas such as policing, cyber-crime, EU and international law, migration, and criminal justice policy. Students intending to go on to doctoral study will be guided to appropriate research skills training.

Programme structure

This programme offers a wide range of courses from law, criminology, social sciences and international policy. You can tailor the degree to meet your specific interests.

The programme structure for 2017/18 is currently being finalised. You will take a total of 120 credits in taught courses, 60 in each semester, which may include the following:

Global Crime and Insecurity
Responding to Global Crime and Insecurity
Criminological Research Methods
Fundamental Issues in International Law
International Criminal Law
General Principles of Criminal Law
Theoretical Criminology
Criminal Justice and Penal Process
International Human Rights Law
Current Issues in Criminal Law
Cybercrime
Surveillance and Security
Inter-State Conflict and Humanitarian Law
Human Rights and Conflict Resolution
Human Rights Law in Europe

You will also complete a 10,000 word dissertation worth 60 credits.

Learning outcomes

Students who complete the MSc will acquire an advanced understanding of the major contemporary debates and theoretical perspectives on crime, justice and security in a global context, and will enhance their research and analytic skills.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less

Show 10 15 30 per page


Share this page:

Cookie Policy    X