• University of York Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • Regent’s University London Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Imperial College London Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
University of Birmingham Featured Masters Courses
University of Kent Featured Masters Courses
University of Leeds Featured Masters Courses
Cardiff University Featured Masters Courses
Loughborough University Featured Masters Courses
"cybercrime"×
0 miles

Masters Degrees (Cybercrime)

  • "cybercrime" ×
  • clear all
Showing 1 to 15 of 72
Order by 
This programme will help you join and create the next generation of cybercrime research and investigation experts in both professional and academic research fields. Read more

Why take this course?

This programme will help you join and create the next generation of cybercrime research and investigation experts in both professional and academic research fields.

You will study the critical knowledge and analytical skills needed to meet the growing challenges of cybercrime, allowing you to facilitate investigations and to operate as a link between the traditional police officer and the technological forensic investigators.

What will I experience?

On this course you can:

Experience high-level academic experts in cybercrime, whilst drawing upon relevant specialist industry, policing and government expertise via an external speaker programme.
Undertake a supervised research project with the opportunity for staff-student collaborative research and/or research projects for industry.
Engage in practical scenarios to deconstruct cybercrime issues, gain unique skills to develop appropriate strategies against the cybercrime threat and be in a position to be a future leader in tackling cybercrime.

What opportunities might it lead to?

Existing professional links between the Institute of Criminal Justice Studies and academic researchers will lead to a clear understanding of both the academic research and professional employment prospects for graduates. This includes, for example, the existing relationship with the Hampshire High Tech Crime Unit, as well as the National Crime Agency, and the consequent research collaboration opportunities from both of these organisations.

The applied nature of the course, with engagement from expert practioners and opportunities for research projects and internships, will help you prepare for a role in the public or private sector, potentially investigating hacking, online drug markets, the dark web, sexual exploitation/child protection online and more.

Module Details

Core units:

Cybercrime: Critical Perspectives
Online Governance and Regulation
Research Methods and Research Management
Dissertation
You will take one further optional unit, chosen from:

Dangerous Offenders and Vulnerable Victims (campus based only)
Cybersecurity
Investigation and Psychology
Additional opportunities to gain professional qualifications include:

Accredited Counter Fraud Technician – Foundation Level (ACFTech)
Accredited Counter Fraud Specialist – Foundation Level (ACFS)
Certificate of Knowledge in Policing (CKP)
Please note that the course structure may vary from year to year; course content and learning opportunities will not be diminished by this.

Programme Assessment

Campus teaching will be undertaken by multidisciplinary academic experts in the field of cybercrime research and investigation, with additional specialist guest speakers from industry, police and government. Sessions will range from lectures and seminars covering theoretical material, to interactive workshops applying knowledge and skills.

Forms of assessment are academic and applied including:

Traditional academic essays and presentations
Practitioner reports and risk assessments
Group project work
Literature review and research proposal, and
Research project thesis.

Student Destinations

Our graduates have taken up roles in:

academia
cybersecurity
policing
military
civil Service
government

Read less
Cybercrime is a relatively new and growing area for both civil and criminal investigation. Read more
Cybercrime is a relatively new and growing area for both civil and criminal investigation. This course has been developed by law enforcement practitioners to enhance knowledge and practical skills in the areas of behavioural psychology, criminal investigation and the technical aspects of obtaining computer-based evidence.

Aimed at personal professional development for current investigators in the criminal and private sector and as a natural progression for graduates in Computer Forensics, Psychology or Policing.

Modules include Research Skills, Behavioural Dynamics of Cybercrime, Digital Forensic Technology, Open Source Internet Investigation, Policing of cybercrime and a research project for your dissertation.

LEARNING ENVIRONMENT AND ASSESSMENT

The course is taught as a combination of lectures, practicals and self-directed study to understand criminal behaviour in the area of cybercrime, including the use of computers, mobile devices, networks and open source internet intelligence in a cybercrime investigation. Module assessments are undertaken by means of coursework, workshops, examination and dissertation.

The course is delivered and taught by experienced academics and former law enforcement investigators with specialist knowledge in computing, psychology and criminal investigation.

FACILITIES

-Computer Forensic Laboratory
-Well-developed plans for a Hydra Suite

OPPORTUNITIES

A range of potential careers are available to those studying MSc Cybercrime including working in the fields of Policing,Civil investigation, the military, and National Crime Agency.

Read less
Enhance your knowledge of cyber security and develop the skills to adapt to challenging situations across a global computing infrastructure. Read more
Enhance your knowledge of cyber security and develop the skills to adapt to challenging situations across a global computing infrastructure.

This course is focused on the fast-developing areas of networking and cybersecurity, and allows a full-time employee to graduate with an MSc in 18 months.

The course awards significant credit for the application of course-derived knowledge to your employer’s systems or procedures.

Additionally you study modules designed to enhance your current skills using flexible learning material and practical activities which can be completed online or remotely. Finally, a dissertation project is undertaken which further strengthens your cybersecurity skillset.

See the website http://www.napier.ac.uk/en/Courses/MSc-Advanced-Security-and-Cybercrime-Postgraduate-PartTime

What you'll learn

The Masters degree in Advanced Security and Cybercrime focuses on extending your knowledge into leading-edge issues related to network and computer security technologies and processes, both generally and with a particular focus on the growing threats from cybercrime. The course blends hands-on technical knowledge with theoretical understanding, utilizing a range of remotely accessible resources to allow access to specialised computer configurations.

These remote systems allow you to engage with the practical activities of the course from home or work. We also have well-equipped labs, which you can use if you wish to attend the campus.

This course is designed for professionals already employed in the area of computing who wish to develop their skills into the areas of computer security and cybercrime. It allows employees to gain significant course credits by applying knowledge and skills gained from this course to their own company’s procedures and systems. Your knowledge is further enhanced via a number of taught modules, which are available on a distance-learning basis.

Some credits are derived from your employment activities, so you must be already employed in a company which allows you to demonstrate your developing course knowledge. Please discuss your current employment with the course leader before applying to ensure your role is suitable for the course.

Modules

• Host-Based Forensics
• Network Security
• Security Audit & Compliance

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

Participation in this course will develop your technical and managerial skills and enhance your chances of promotion. It may also open doors to more specialist jobs including:

• security consultant
• forensic investigator
• audit/compliance consultant
• security advisor/auditor
• cybercrime consultant

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

SAAS Funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Read less
As our lives become increasingly digitised the scope and potential impact of cybercrime is becoming ever broader. Read more
As our lives become increasingly digitised the scope and potential impact of cybercrime is becoming ever broader. In both the business and personal worlds, cyber criminals have the ability to cause considerable harm from remote locations, with numerous industry reports1 estimating that the global cost of cybercrime has grown to rival that of the illegal drugs trade. From financial theft to child abuse, cybercrime can take many forms, and the need for skilled professionals capable of tackling these problems will only grow as smart, connected devices increasingly become the norm.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations. Unfortunately applicants who require a Tier 4 visa for study in the UK are not able to apply for the Sandwich degree in the first instance due to visa regulations. We encourage International students, once enrolled, to apply for a placement and if successful apply to extend their visa and transfer to the sandwich award

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

[[Course content
On the computing extended MSc you will spend your first semester studying modules which have been written to provide you with the academic, professional and technical skills that you will need to succeed on your chosen award. All students on the extended MSc study the same modules for one semester and then study specialist modules depending on their degree. This means that whether you have chosen MSc Computer Science, MSc Computer Networks & Security, MSc Web Development or any of our other taught MSc Computing awards, you will study the following modules in your first semester:

Academic English: This module will help you to develop your English Language speaking, listening, reading and writing skills and will introduce you to the conventions of academic writing.

Study skills & Employability: This module will help you to develop the skills and knowledge required to support study at Masters level. It will also help you to develop skills which will aid you in the job market and will look at things such as writing a C.V. and creating a personal development plan.

Computing Fundamentals: This is a double module which has been designed to provide an introduction to fundamental concepts which underpin Computing. The module will enable you to revise and refresh your existing skills to prepare you for study on your specialist awards.

After successfully completing the first semester you will commence your course specific study

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The MSc in Computing, IT Law & Management, will equip you with the theories, methods and tools relevant to applications of IT in legal and administrative practice and a good grounding in computer forensics and cybercrime, IT law and management. Read more
The MSc in Computing, IT Law & Management, will equip you with the theories, methods and tools relevant to applications of IT in legal and administrative practice and a good grounding in computer forensics and cybercrime, IT law and management. Delivered by the Department of Informatics, which has an enviable reputation for research-led teaching and project supervision from leading experts in the field.

Key benefits

- Unrivalled location in the heart of London giving access to major libraries and leading scientific societies, including the BCS Chartered Institute for IT, and the Institution of Engineering and Technology (IET).

- Provides Computer Science and IT graduates with relevant knowledge of law and management and administrative decision support systems.

- Provides interdisciplinary training attractice to many prospective employers, combined with specialisation e.g. computer security, software engineering, legal/administrative applications of knowledge-based systems.

- Offers a grounding in the rapidly developing area of legal informatics, exploring a long tradition of research in artificial intelligence and the law.

Visit the website: http://www.kcl.ac.uk/study/postgraduate/taught-courses/computing-it-law-and-management-msc.aspx

Course detail

- Description -

This programme equips students with a critical understanding of intelligent systems for legal and administrative applications, computer forensics and cybercrime, an appreciation of the aspects of law that are most relevant to the work of IT-professionals, and a grounding in key management techniques.

It is built around taught core modules on intelligent systems for legal and administrative applications, computer forensics and cybercrime, IT law for IT professionals and the principles of management. These modules are complemented by a wide range of optional modules that relate to various aspects of computing and management. The final part of the programme is an individual project that is closely linked to the main themes of the programme, containing a substantial computer science component of either a theoretical or practical nature.

- Course purpose -

For graduates with a background in Computer Science, this MSc will strengthen your understanding of the theories, methods and tools relevant to, for instance, computer forensics and cybercrime, computer security, and legal and administrative applications of knowledge-based systems, whilst allowing you to gain new knowledge of information law and management.

- Course format and assessment -

Lectures; tutorials; seminars; laboratory sessions; optional career planning workshops.

Core modules:

- Individual Project
- Intelligent Systems for Legal and Administrative Applications
- IT Law for IT Professionals
- Principles of Management
- Project Management

Assessed through: coursework; written examinations; final project report.

Career prospects

Via the Department’s Careers Programme, students are able to network with top employers and obtain advice on how to enhance career prospects. Our graduates have gone on to gain employment in software consultancy, specialised software development and project management, where they typically work in analysis roles at the interface between business-side operation and software development / maintenance. Recent employers include CA Technologies, CapGemini, Ernst & Young, JP Morgan and SAS Solutions. Graduates also entered into academic and industrial research in software engineering, algorithms and computer networks.

How to apply: http://www.kcl.ac.uk/study/postgraduate/apply/taught-courses.aspx

About Postgraduate Study at King’s College London:

To study for a postgraduate degree at King’s College London is to study at the city’s most central university and at one of the top 20 universities worldwide (2015/16 QS World Rankings). Graduates will benefit from close connections with the UK’s professional, political, legal, commercial, scientific and cultural life, while the excellent reputation of our MA and MRes programmes ensures our postgraduate alumni are highly sought after by some of the world’s most prestigious employers. We provide graduates with skills that are highly valued in business, government, academia and the professions.

Scholarships & Funding:

All current PGT offer-holders and new PGT applicants are welcome to apply for the scholarships. For more information and to learn how to apply visit: http://www.kcl.ac.uk/study/pg/funding/sources

Free language tuition with the Modern Language Centre:

If you are studying for any postgraduate taught degree at King’s you can take a module from a choice of over 25 languages without any additional cost. Visit: http://www.kcl.ac.uk/mlc

Read less
Develop a different set of skills with this new one year conversion masters course. Read more
Develop a different set of skills with this new one year conversion masters course.

Fascinated by cybercrime and want to learn how to tackle it? As organisations and government departments are becoming increasingly more reliant on computer networks and virtual environments for their business functions, cyber security is now realised to be of critical importance. Southampton Solent University’s essential cyber security engineering conversion masters degree is well suited to students from a wide range of backgrounds, helping you to develop new skills and gain advanced theoretical and practical proficiencies in dealing with computer, network and information security.

‌•Computing students have full access to the University’s state-of-the-art IT and networking facilities.
‌•Students will learn the latest techniques in tackling cybercrime and managing security systems.
‌•To complement studies, students can benefit from enhancement activities, such as industry talks, code jams, and employability support.
‌•Southampton Solent hosts regular lectures given by the British Computer Society (BCS), which computing students are encouraged to attend.
‌•Small group teaching allows for tailored support, helping students to shape the course to their own interests.
‌•The course comes to a close with students conducting their own research projects. This can be an excellent way to specialise knowledge, or act as a springboard for PhD study.

The industry

Recent research conducted by the UK government suggests that the costs of cybercrime to the UK could be in the order of £27 billion per year. To combat this, the Government has invested in a National Cyber Security programme which aims to make the UK one of the most secure places in the world to do business in cyberspace.

The cyber security sector has grown to over £17 billion in the UK, employing over 100,000 people. With the increasing importance for organisations to ensure their computer networks are robust against attempted security breaches, this sector is likely to grow, with high demand for skilled cyber security engineers.

A postgraduate qualification can put you at the forefront of this demand, demonstrating your commitment to the industry and your ability to carry out in-depth computing research.
This is echoed from reports and comments from industry-

“As a small software house, dealing with a group of international corporates, we have a regular need for graduates with strong software engineering and database skills. Given that we design systems that link to e-commerce, a good understanding of cyber security engineering is also key. Over the years we have found the pool of graduates with the required technical skills has seriously diminished so the more technical graduates from Solent University are an important source for us.”
John Noden, Managing Director/Executive Director Technical Design, Zentive

The programme

Southampton Solent’s cyber security engineering master’s conversion degree will help equip students with the essential skills and knowledge to become cyber security specialists, learning how to tackle cybercrime and manage security systems.

As well as gaining a firm grounding in web and software development, students on this course will learn the necessary skills to become ethical hackers, penetrate test networks, and prevent and eradicate malware. Students will also develop their problem-solving skills and explore research methods.

The course curriculum is developed with input from a variety of sources, including an industrial liaison panel, to ensure students are studying the latest technology and working practices employed by industry experts.

To aid study, students have full access to the University’s specialist networking labs equipped with industry-standard networking equipment from Cisco, Fluke and HP, as well as high-fidelity simulation systems, including the market-leading Opnet. Using Alienware computers and CISCO Packet Tracer, students can practice their software development skills and test their web applications.

The course has a strong focus on employability, and hosts regular industry speakers and events by the BCS to help students build their professional network.

Next steps

Think you’ve got what it takes to enter the challenging world of cyber security? Using the latest methods and technology, Southampton Solent’s cyber security engineering master’s conversion degree will help provide you with the skills to tap into this fast-growing industry. Apply today.http://www.solent.ac.uk/courses/2016/postgraduate/cyber-security-engineering-msc/course-details.aspx#tab1

Read less
The importance of communication and information in modern society has grown exponentially in recent times. The LLM in Computer and Communication Law programme allows students the opportunity to gain expertise in the legal regimes governing the supply and use of computer and communications technology. Read more
The importance of communication and information in modern society has grown exponentially in recent times. The LLM in Computer and Communication Law programme allows students the opportunity to gain expertise in the legal regimes governing the supply and use of computer and communications technology. Through the examination of the complex issues concerning national and international law and policy relating to computer and communications technology student will learn to analyse how computer and communications technology has affected the application of traditional legal principles.

We also offer an LLM in Computer and Communications Law by Distance Learning.

Taught modules

To specialise in this area, you must select 90 credits of modules from this list and do your compulsory dissertation in the field of Computer and Communications Law (45 credits). The additional 45 credits of taught modules can be in this area or can be unrelated and therefore selected from the full list of LLM available modules.

All modules are 22.5 credits unless otherwise stated below.

Note: Not all of the modules listed will be available in any one year. Any modules not available in the forthcoming academic session will be marked as soon as this information is confirmed by teaching academics.

Modules:

To specialise in this area, you must select 90 credits of modules from this list and do your compulsory dissertation in the field of Computer and Communications Law (45 credits). The additional 45 credits of taught modules can be in this area or can be unrelated and therefore selected from the full list of LLM available modules.

All modules are 22.5 credits unless otherwise stated below.

Note: Not all of the modules listed will be available in any one year and semesters listed can be subject to change. Any modules not available in the forthcoming academic session will be marked as soon as this information is confirmed by teaching academics.

The updated module list below represents the result of our ongoing modularisation of the LLM, which is intended to offer students greater flexibility and choice of module options.
◦ QLLM025 E-Commerce Law (45 credits)
◦ QLLM076 Media Law (45 credits)
◦ QLLM095 Intellectual Property and the Creative Industries (45 credits)
◦ QLLM128 Telecommunications Law (45 credits)
◦ QLLM314 Transnational Law and Governance (Sem 1)
◦ QLLM315 Transnational Law and Governance in Practice (Sem 2)
◦ QLLM328 Digital Intellectual Property Law (sem 1)
◦ QLLM329 Informational Technology Transactions (sem 2)
◦ QLLM342 Interactive Entertainment and Intellectual Property Law (sem 1)
◦ QLLM343 Interactive Entertainment Law: Contracts and Regulation (sem 2)
◦ QLLM349 Transnational Mooting (sem 1)
◦ QLLM350 Electronic Disclosure in Legal Disputes (sem 1)
◦ QLLM351 Cybercrime: Substantive Offences (sem 1)
◦ QLLM352 Cybercrime: International Co-operation and Digital Investigations (sem 2)
◦ QLLM353 EU Data Protection Law (sem 1)
◦ QLLM354 Information Security and the Law (sem 2)
◦ QLLM358 Cyberspace Law: Internet Jurisdiction and Dispute Resolution (sem 2) (not running 2016-17)
◦ QLLM359 Cyberspace Law: Protecting the Online Persona: Digital Rights in Cyberspace (sem 2) (not running 2016-17)

Read less
The LLM in Public International Law will offer you a unique opportunity to study a wide range of courses on the role and place of law in international affairs. Read more
The LLM in Public International Law will offer you a unique opportunity to study a wide range of courses on the role and place of law in international affairs. Questions of international Law are increasingly an important part of domestic litigation in almost all jurisdictions. The modules are designed to equip you for a career in private legal practice, diplomatic service, or work with non-governmental organisations. All courses are taught by top class academics with extensive experience in the study and application of international law.

Taught Modules

To specialise in this area, you must select 90 credits of modules from this list and do your compulsory dissertation in the field of Public International Law (45 credits). The additional 45 credits of taught modules can be in this area or can be unrelated and therefore selected from the full list of LLM modules.

All modules are 22.5 credits unless otherwise stated.

Note: Not all of the modules listed will be available in any one year and semesters listed can be subject to change. Any modules not available in the forthcoming academic session will be marked as soon as this information is confirmed.

The updated module list below represents the result of our ongoing modularisation of the LLM which is intended to offer students greater flexibility and choice of module options.


◦ QLLM023 Courts in Comparative Perspective (45 credits) (Not running 2016-17)
◦ QLLM047 International and Comparative Social Justice (45 credits)
◦ QLLM053 International Criminal Law (45 credits)
◦ QLLM055 International Environmental Law (45 credits)
◦ QLLM057 International Law of Armed Conflict and the Use of Force (45 credits)
◦ QLLM058 International Law of the Sea (45 credits)
◦ QLLM059 International Law on the Rights of the Child (45 credits)
◦ QLLM062 International Tax Law (45 credits)
◦ QLLM068 Law of Economic Crime (45 credits)
◦ QLLM069 Law of Finance and Foreign Investment in Emerging Economies (45 credits)
◦ QLLM071 Law of Treaties (45 credits)
◦ QLLM096 Climate Change Law and Policy (45 credits) (Not running 2016-17)
◦ QLLM097 International Natural Resources Law (45 credits)
◦ QLLM127 International Human Rights Law (45 credits)
◦ QLLM167 Indigenous Rights: Selected Issues in Practice and Theory (Sem 1) (Not running 2016-17)
◦ QLLM168 International Law and Indigenous Peoples (Sem 2)
◦ QLLM173 Terrorism and Human Rights: Constitutional Perspectives (Sem 1)
◦ QLLM174 Migration, Security and Human Rights (Sem 1)
◦ QLLM176 International Refugee Law (Sem 1)
◦ QLLM177 International Migration Law (Sem 2) (Not running 2016-17)
◦ QLLM187 International Investment Law (Sem 1)
◦ QLLM188 Regulation of International Investment and Public Policy (Sem 2) (Not running 2016-17)
◦ QLLM314 Transnational Law and Governance (Sem 1)
◦ QLLM315 Transnational Law and Governance in Practice (Sem 2)
◦ QLLM323 State Crime (sem 2)
◦ QLLM347 The Law of Geographical Indications (GIs) (sem 2)
◦ QLLM351 Cybercrime: Substantive Offences (sem 1)
◦ QLLM352 Cybercrime: International Co-operation and Digital Investigations (sem 2)
◦ QLLM358 Cyberspace Law: Internet Jurisdiction and Dispute Resolution (sem 2) (not running 2016-17)
◦ QLLM365 Legal Aspects of Financing Development (sem 2) (Not running 2016-17)
◦ QLLM370 WTO Law: Market Access and Non-Discrimination (sem 1)
◦ QLLM371 WTO Law: Trade Remedies and Regulatory Issues (sem 2)
◦ QLLM376 International Economic Law (sem 1)
◦ QLLM377 EU Financial and Monetary Law (sem 1)
◦ QLLM382 Energy Law and Ethics (sem 1)
◦ QLLM383 / QLLG008 International Regulation of Shipping (sem 1)
◦ QLLM384 Law of the Sea, Navigational Freedoms and Practice (sem 2)
◦ QLLM387 International Trade and Investment Law of the EU (sem 1) (Not running 2016-17)
◦ QLLM388 Trade, Climate Change and Energy: EU and International Perspectives (Sem 2)
◦ QLLM397 Investment Treaty Arbitration (sem 1)
◦ QLLM398 Investment Arbitration: Substantive Protection (sem 2)
◦ QLLM400 United States Energy Law, Regulation and Policy (sem 1)

Read less
Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings. Read more

Why take this course?

Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings.

This course will enable you to develop your understanding and application of security issues and cybercrime for the purpose of forensic computing and investigation.

What will I experience?

On this course you can:

Learn how to investigate hacking, fraud and deception using a range of digital forensic tools
Practise identifying intruders' trails and suspected inappropriate use of internet applications in order to compile scientific evidence to prosecute
Manage a real-life computer engineering project using appropriate techniques for writing and reasoning about security policies

What opportunities might it lead to?

Many police investigations or civil disputes involve investigation of computer systems, mobile phones or other information devices, and there are an increasing number of UK companies that undertake investigations as consultants. You can expect to find career opportunities in such companies as well as in law enforcement and other services.

Accredited by BCS, The Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional (CITP). This course also partially meets the academic requirement for registration, either as a Chartered Scientist (CSci) or (on behalf of the Engineering Council) as a Chartered Engineer (CEng)*.

*On condition that the Master's Engineering Project is successfully completed.

Module Details

You will study four key topics which will collaboratively develop your knowledge and ability to carry out forensic IT investigations as well as an introduction on how to build protected specification software for data and other web applications. You will also get to build your own test system as part of your final project.

Here are the units you will study:

Computer Forensic Investigation and Cryptography: This unit covers the practical aspects of conducting a forensic investigation of digital evidence. In order for the students to develop a critical understanding of computer forensics, a holistic approach of the forensics investigation process is adopted, with a full investigation ‘life cycle’ from seizure of evidence through to giving evidence in court as an expert witness. We look at a range of tools, operating systems and devices.

Computer Security: The unit provides an introduction to computer security concepts and their practical application, in both closed and interconnected networks. Students are expected to both understand and be able to critically evaluate different approaches to securing complex computer systems.

Cybercrime Security and Risk Management: This unit provides opportunities for participants to develop skills and knowledge in the understanding of corporate cyber threats. Drawing upon a range of practical examples, students will examine how rapid technological development and expansion in access to the internet has impacted upon crime (e.g. how anonymity and unfounded trust encourage deception), mapping out the terrain of information technology, and identifying the emerging areas of cyber crime. Areas explored will include the crossing of established boundaries into spaces over which control has already been established such as cyber-intrusion and cyber-theft, but also 'new cyber crimes' in the form of virtual trespass, Denial of Service attacks, and the development of opportunities for offending in the context of social networking websites.

Master's Project: You will undertake either an engineering unit or a study project, during the summer period. The project offers students the opportunity to apply the taught material in the solution of a real-world problem directly related to their course. The engineering project usually involves building a piece of software to solve a problem. An example of the sort of thing you might do would be building a tool to address a specific forensics requirement. The study project usually involves undertaking a study of an IT domain relevant to forensics. To prepare for this the project includes a number of preparatory sessions, which contribute to part of your final mark.

Specialist optional units include:

Systems, Security and Data Analysis: The first part of the unit provides an overview of computer organisation, operating systems and network design, with a strong focus on security considerations and aspects relevant to computer and digital forensics. The early part of the unit will provide an introduction to relevant issues in system architecture and file system organisation. Threats to computer systems will be considered. The first half of the unit is concluded with studying in some depth current technologies for securing real computer networks. The second part of the unit deals with the important topic of data analytics.

Advanced Programming Skills for the Web: This unit draws together a number of system development skills, focusing on how they can be applied to the development specifically of web applications. Topics covered include web programming, connecting databases to web applications, software tools, testing and security.

Programme Assessment

You will be taught through a combination of practical exercises, simulations, lectures, guest lectures and formative assessments, and will be expected to use a wide range of on and offline learning tools.

You will encounter a range of assessment styles depending on the content and nature of the unit topic. This can include written assignments, presentations as well as group and individual lab-based assessments. However, the most significant assessment element is the final dissertation, which reports and reflects on your final project.

Student Destinations

On completing this course, you will be equipped to seek employment in the following areas: IT auditing, information security, independent investigation, Computer Emergency Response Teams (CERT) and law enforcement agencies. Some of our previous graduates have been successful in finding employment within high-tech crime units, commercial investigation and national security bodies, while others go on to further research study at PhD level.

This course will also appeal to already practising professionals in related areas such as law enforcement, system administration, corporate security, IS auditing or security analysis and management for the commercial sector.

Read less
The MSc in Computing & Security will provide you with the knowledge and practical expertise to evaluate, design and build computer security systems. Read more
The MSc in Computing & Security will provide you with the knowledge and practical expertise to evaluate, design and build computer security systems. Delivered by of the Department of Informatics, which has an enviable reputation for research-led teaching and project supervision from leading experts in their field.

Key benefits

- Unrivalled location in the heart of London giving access to major libraries and leading scientific societies, including the BCS Chartered Institute for IT, and the Institution of Engineering and Technology (IET).

- Addresses a growing interest in advance security methods by providing theoretical and practical knowledge of a broad range of techniques for developing security solutions.

- Aims to give coverage of the whole field of security and related computing areas, rather than specialising on one area.

- Develops critical awareness and appreciation of the changing role of computing in society, motivating graduates to pursue continuing professional development and further research.

- Access to speakers of international repute through seminars and external lectures, enabling students to keep abreast of emerging knowledge in computing and security and related fields.

Visit the website: http://www.kcl.ac.uk/study/postgraduate/taught-courses/computing-and-security-msc.aspx

Course detail

- Description -

This programme addresses the growth in interest in advanced security methods for solving a huge range of problems, including combating crime and terrorism. It is built around taught core modules such as cryptography and information security, access control and privacy policies and computer forensics and cybercrime. These modules are complemented by a range of optional modules that relate to various aspects of computing. The final part of the programme is an individual project which is closely linked with the Department's research activities.

- Course purpose -

For graduates in computer science, science, or engineering, this MSc will provide specialised training in computing and security. Completing research for your individual project will provide valuable preparation for a career in research or industry.

- Course format and assessment -

Lectures; tutorials; seminars; laboratory sessions; optional career planning workshops. Assessed through: coursework; written examinations; final project report.

Core modules:

- Individual Project
- Computer Forensics & Cybercrime
- Cryptography and Information Security
- Group Project
- Network Security

Career prospects

Via the Department’s Careers Programme, students are able to network with top employers and obtain advice on how to enhance career prospects. Our graduates have gone on to have very successful careers in industry and research. Our graduates are working in general software consultancy companies, specialised software development companies and the IT departments of large institutions (financial, telecommunications and public sector). Recent employers include Hang Seng Bank, Lloyds Banking Group and Merrill Corporation. Other graduates have entered into the field of academic and industrial research in areas such as software engineering, algorithms and computer networks.

How to apply: http://www.kcl.ac.uk/study/postgraduate/apply/taught-courses.aspx

About Postgraduate Study at King’s College London:

To study for a postgraduate degree at King’s College London is to study at the city’s most central university and at one of the top 20 universities worldwide (2015/16 QS World Rankings). Graduates will benefit from close connections with the UK’s professional, political, legal, commercial, scientific and cultural life, while the excellent reputation of our MA and MRes programmes ensures our postgraduate alumni are highly sought after by some of the world’s most prestigious employers. We provide graduates with skills that are highly valued in business, government, academia and the professions.

Scholarships & Funding:

All current PGT offer-holders and new PGT applicants are welcome to apply for the scholarships. For more information and to learn how to apply visit: http://www.kcl.ac.uk/study/pg/funding/sources

Free language tuition with the Modern Language Centre:

If you are studying for any postgraduate taught degree at King’s you can take a module from a choice of over 25 languages without any additional cost. Visit: http://www.kcl.ac.uk/mlc

Read less
The LLM in Criminal Justice programme will allow you to gain an in depth knowledge of criminal justice systems at international, supranational and domestic levels. Read more
The LLM in Criminal Justice programme will allow you to gain an in depth knowledge of criminal justice systems at international, supranational and domestic levels. The programme aims to foster an understanding of the challenges criminal justice is facing at national, EU and international levels and in a comparative context; and to provide a potential route to post-graduate research in the area of criminal justice.

Criminal Justice Centre at Queen Mary University of London

The Criminal Justice Centre (CJC) provides a forum for research and learning in all aspects of criminal justice, with members are drawn from both the legal profession and academia. The centre provides advice and training to the legal profession, governments and judiciaries, author key publications on criminal justice, engage with the media, undertake collaborative research, supervise post-graduate research and regularly host seminars, lectures, workshops and conferences.


To specialise in this area, you must select 90 credits of modules from this list and do your compulsory dissertation in the field of Criminal Justice (45 credits). The additional 45 credits of taught modules can be in this area or can be unrelated and therefore selected from the full list of LLM modules.

All modules are 22.5 credits unless otherwise stated.

Note: Not all of the modules listed will be available in any one year and semesters listed can be subject to change. Any modules not available in the forthcoming academic session will be marked as soon as this information is confirmed by teaching academics.

The updated module list below represents the result of our ongoing modularisation of the LLM which is intended to offer students greater flexibility and choice of module options.

◦ QLLM053 International Criminal Law (45 credits)
◦ QLLM068 Law of Economic Crime (45 credits)
◦ QLLM078 Mental Health Law (45 credits)
◦ QLLM101 EU Criminal Law (Sem 2)
◦ QLLM169 Punishment in England 1750-1950 (Sem 1)
◦ QLLM173 Terrorism and Human Rights: Constitutional Perspectives (Sem 1)
◦ QLLM174 Migration, Security and Human Rights (Sem 1)
◦ QLLM311 Policing in Local and Global Contexts (Sem 1)
◦ QLLM312 Comparative Criminal Justice (Sem 2) (Not running 2016-17)
◦ QLLM313 Criminal Justice and Surveillance Technologies (Sem 2)
◦ QLLM323 State Crime (sem 2)
◦ QLLM351 Cybercrime: Substantive Offences (sem 1)
◦ QLLM352 Cybercrime: International Co-operation and Digital Investigations (sem 2)

Read less
The Master of Information Technology is aimed at IT professionals and recent graduates (domestic and international) wishing to undertake an advanced programme of study in order to prepare for further study or to assist with obtaining a more senior position. Read more

Course Outline

The Master of Information Technology is aimed at IT professionals and recent graduates (domestic and international) wishing to undertake an advanced programme of study in order to prepare for further study or to assist with obtaining a more senior position.

Course Content

Master of Information Technology students will undertake a coherent programme of 180 credits approved by the programme manager and will follow one of two pathways.

Pathway 1

The first pathway is designed for students who want to undertake more course work and consists of four compulsory components:

- IT801 Managing ICT Projects and Systems
The student will develop knowledge and skills in managing ICT projects and systems. The student will also research into established frameworks that are relevant to current industry trends.
- IT802 Researching ICT Issues and Trends
The student will develop knowledge and skills in critiquing and undertaking research, assessing social impacts of ICT and analysing ethical issues in ICT practice.
- IT803 Research Proposal
The student will develop expertise in preparing research proposals, including reviewing relevant literature, selecting a methodology and exploring ethical issues.
-IT901 Research Project
The student will develop expertise in conducting applied research that informs professional ICT practice.

and an approved selection of level 8 papers worth at least 90 credits from the following list:

- IT811 Business Analysis
The student will develop knowledge and skills in analysing the structure and function of organisations in order to improve efficiency and productivity using ICT.
- IT812 Business Intelligence
The student will develop knowledge and skills in analysing the strategic use of data warehousing, data mining and data analysis in order to obtain business intelligence.
- IT813 ICT Infrastructure
The student will develop knowledge about various aspects of ICT infrastructure, including emerging digital technologies.
- IT814 ICT Quality
The student will develop knowledge and skills in the application of methods and techniques used in ICT quality assurance and testing.
- IT815 ICT Security
The student will develop knowledge of the impact of security on an ICT infrastructure, research into the ethical and legal implications of ICT security and cybercrime, and identify appropriate investigation strategies in the light of emerging digital technologies.
- IT816 Mobile Application Development
The student will develop knowledge and skills required to create, market and deploy a mobile application.
- IT817 Web Application Development
The student will develop knowledge and skills required to develop web services and applications.
- IT818 Special Topic
The student will critically examine current developments and emerging issues in a specified topic area.
- IT819 Applied Project
The student will be able to identify and apply appropriate ICT techniques and technologies to solve a non-trivial problem in a business, educational, industrial or similar setting.

Pathway 2

The second pathway is designed for students who want to undertake a more substantial research project and consists of four compulsory components:

- IT801 Managing ICT Projects and Systems
- The student will develop knowledge and skills in managing ICT projects and systems. The student will also research into established frameworks that are relevant to current industry trends.
- IT802 Researching ICT Issues and Trends
The student will develop knowledge and skills in critiquing and undertaking research, assessing social impacts of ICT and analysing ethical issues in ICT practice.
- IT803 Research Proposal
The student will develop expertise in preparing research proposals, including reviewing relevant literature, selecting a methodology and exploring ethical issues.
- IT902 Thesis
The student will develop expertise in conducting publishable research about applied ICT.

and an approved selection of level 8 papers worth at least 45 credits from the following list (each worth 15 credits, except for 819):

- IT811 Business Analysis
The student will develop knowledge and skills in analysing the structure and function of organisations in order to improve efficiency and productivity using ICT.
- IT812 Business Intelligence
The student will develop knowledge and skills in analysing the strategic use of data warehousing, data mining and data analysis in order to obtain business intelligence.
- IT813 ICT Infrastructure
The student will develop knowledge about various aspects of ICT infrastructure, including emerging digital technologies.
- IT814 ICT Quality
The student will develop knowledge and skills in the application of methods and techniques used in ICT quality assurance and testing.
- IT815 ICT Security
The student will develop knowledge of the impact of security on an ICT infrastructure, research into the ethical and legal implications of ICT security and cybercrime, and identify appropriate investigation strategies in the light of emerging digital technologies.
- IT816 Mobile Application Development
The student will develop knowledge and skills required to create, market and deploy a mobile application.
- IT817 Web Application Development
The student will develop knowledge and skills required to develop web services and applications.
- IT818 Special Topic
The student will critically examine current developments and emerging issues in a specified topic area.
- IT819 Applied Project
The student will be able to identify and apply appropriate ICT techniques and technologies to solve a non-trivial problem in a business, educational, industrial or similar setting.

Read less
Our specialised MBA (Cyber Security) degree gives you the opportunity to not only develop your expertise in finance, marketing, leadership and other vital business areas, but also to learn about the growing field of cyber security. Read more
Our specialised MBA (Cyber Security) degree gives you the opportunity to not only develop your expertise in finance, marketing, leadership and other vital business areas, but also to learn about the growing field of cyber security. The modules include Cyber Security, Cybercrime and Cyber Security Management. You’ll study alongside MBA students from a variety of related disciplines and postgraduate students from courses in the computer sciences, providing you with an abundance of networking opportunities. Successfully complete the degree, and you’ll be ready to take on leadership of cyber security departments and organisations around the world.

More about this course

The London Met MBA (Cyber Security) gives you the opportunity to develop your understanding of key business functions as well as focus on cyber security. With increasingly sophisticated cyber attacks on both national governments and international corporations, this is a growing sector.

The modules on this course are related to accounting, marketing, leadership and other vital managerial functions within companies and organisations. They are designed to help you evolve into a successful leader in the business world.

The cyber security modules introduce you to the fundamentals of leadership and risk management within cyber security organisations, as well as specific challenges faced by all organisations, such as identity theft, scams, fraud and attacks on computer systems.

Our teaching staff and visiting academics, who you’ll meet both informally and formally through lectures and social events, are experts in areas including cybersecurity, management and leadership, ensuring you’ll develop the skills you need to steer a business to success.

You’ll collaborate alongside MBA students from a variety of professions and educational disciplines, such as specialist postgraduate computer science students. Your training will be supplemented with regular informal learning activities including the weekly student-led Business Breakfast, a monthly dinner, networking events, meetings with business leaders, entrepreneurs and consultants and lively charity fundraising events in the City.

We’ll provide regular coaching sessions to help improve your career potential, while you can also make use of our Careers and Employability Unit to help you find new roles for life after the MBA.

You’ll be assessed through individual and group work. This is likely to come in a variety of forms including reports, portfolios, presentations, videos, conferences and competitions, enabling you to develop the skills to master a multitude of situations in the world of cyber security.

Modular structure

Core modules:
-Accounting and Finance for Managers
-Leadership and Strategic Management
-People and Organisations: Principles and Practices in Global Contexts
-Marketing, Marketing Communications and Operations

Cyber security modules:
-Cyber Security Management
-Cybercrime and Cyber Security

Research-focused modules:
-Management Learning and Research
-Business Research Project

After the course

Graduates of the MBA may continue in their existing careers or choose to explore new opportunities. Recent graduates of our business related degrees are employed by companies including Oxademy, ALDI, Schwab Versand Hanau, Sapa, UBM plc, Carillion, Hanson Hispania SA, Triometric, BNP Paribas. They work in management roles in the fields of international sales, area management, business development and clients services.

Roles particularly relevant to the evolving field of cybersecurity management include application and security risk manager, security operations manager and information security manager.

Collaborative and international Llnks

The MBA programme has close links with ESoft, Sri Lanka’s largest education network and Islington College Nepal. London Met’s experience in delivering cultural variations of this MBA abroad means you’ll be learning from globally connected teaching staff in London.

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of- the-art facilities, flexible teaching areas and stunning social spaces.

Read less

Show 10 15 30 per page


Share this page:

Cookie Policy    X