• Cardiff University Featured Masters Courses
  • University of Northampton Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Birmingham City University Featured Masters Courses
De Montfort University Featured Masters Courses
Staffordshire University Featured Masters Courses
University College London Featured Masters Courses
Cranfield University Featured Masters Courses
University of Bath Featured Masters Courses
"digital" AND "forensics"…×
0 miles

Masters Degrees (Digital Forensics)

We have 78 Masters Degrees (Digital Forensics)

  • "digital" AND "forensics" ×
  • clear all
Showing 1 to 15 of 78
Order by 
Delivered by the Forensic Institute this course focuses on providing the knowledge and skills required to conduct comprehensive forensic examinations of digital devices. Read more

Delivered by the Forensic Institute this course focuses on providing the knowledge and skills required to conduct comprehensive forensic examinations of digital devices. Lectures are delivered by Digital Forensic practitioners and academics throughout the course, with guest lecturers coming from both law enforcement and private companies.

Who is it for?

This course is highly practical and technical in both delivery and assessment. It is designed to enable participants to conduct comprehensive forensic computing examinations and cutting-edge digital forensic research.

The full-time course is ideally suited to recent graduates in a related subject such as Computer Science or Forensic Science who wish to specialise in Digital Forensics. It is also suitable for those who have recently completed a BSc in Computer Forensics, Digital Forensics, Cybercrime Forensics or a related subject, who wish to deepen their knowledge, improve their skills and increase their employability in a very competitive market. 

The part-time course is more suited to those already in full-time employment, such as law enforcement officers, government staff, security consultants, accountancy and banking organisations, corporate security personnel and members of associated agencies in both the UK and overseas. This programme could lead to a new career or promotion with an existing employer.

Why this course?

Cranfield University has become the first university in the UK to receive full certification from the UK Government Communications Headquarters, GCHQ, for the MSc Digital Forensics course.

This MSc is specifically designed to provide you with the practical skills, knowledge base and research skills to work as a digital forensics practitioner.

This course is highly practical and technical in both delivery and assessment. It is designed to enable participants to conduct comprehensive forensic computing examinations and cutting-edge digital forensic research.

Accreditation

Cranfield University has become the first university for digital forensics in the UK to receive full certification from the UKGovernment Communications Headquarters, GCHQ, for the MSc Digital Forensics course.

Course details

Students will complete a number of taught modules each with theoretical and practical elements and, for the MSc, an individual research project.

Individual project

The individual project will involve academic research in a specific area of digital forensics. The student will produce a substantial dissertation detailing their investigation and findings. Students are pushed to produce high quality, novel research during this period, and research outcomes are often at the cutting edge of the subject.

Assessment

The assessments on this course are a mixture of written and practical exams, oral presentations, coursework assignments and (MSc only) a thesis.

Your career

Our MSc course and its individual modules, or equivalent, are regularly cited in job adverts for digital forensics jobs. This highlights our real-world learning, application to the work place and our relevance to practitioners.

If you would like to request a visit to Cranfield Defence & Security where you will be able to meet one or more members of the course team and see some of the facilities, please let me know and we will arrange for a member of the course team to contact you to make arrangements - Professor Andrew Shortland - Head of Centre for Cranfield Forensic Institute 



Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases. Read more
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases.

A number of very specific factors are contributing towards the growth of digital forensics and computer security specialists:

• The popularity of the Internet has an impact to the growth of malicious activity taking place in the Online world demanding a need for research and innovation in the areas.
• The cyber-attack threat levels have increased and there is a requirement for intelligent analysis of information and the investigation of digital devices.
• Digital devices capable of storing corporate and personal data are widely used increasing the need to secure information and provide solutions to complex attacks and their investigation.

Our MSc Digital Forensics and Computer Security has been developed at a time of rapid growth and continued demand in the digital forensics industry. If you’re from a computing, legal or law enforcement background, it is an ideal way to extend your professional interests and profile in an area that is becoming increasingly critical to organisations.

You’ll study fundamental – as well as advanced – research concepts in both computer forensics and security. There is an emphasis on professional research and you’ll be given opportunities throughout the course to get involved with key research areas, including industry-based projects developed through our excellent links with employers.

You’ll study in our computing suite which is equipped to industry standard providing the ideal training environment for your research and study.

You’ll study modules such as:

Studying at Masters Level and Research Methods
Advanced Concepts and Research in Digital Forensics
Advanced Security Protocols
Digital Forensics
Cybercrime Analysis and Investigation
Security: Attacks and Countermeasures
Independent Scholarship

Read less
The fascination of forensics combines with the complexity of computing in this stimulating course. Read more
The fascination of forensics combines with the complexity of computing in this stimulating course. A relatively new specialism, electronic security and digital forensics is an area of expertise that’s challenging and rapidly evolving- technology is constantly developing, and therefore so are the problems that go along with it.


Why study Electronic Security and Digital Forensics at Middlesex?

The smooth running of societies and economies is now dependent on the security of computer networks, and cyber crime, from fraud, identity theft and cyber stalking to terrorism and espionage, can affect anyone and is at the forefront of government policy. But many court cases have collapsed because of a lack of experts trained in the meticulous art of tracking down evidence. Our innovative course was created to meet the demand for skills in an area that’s chronically short of well-qualified graduates.

The course has a strong practical focus, with an emphasis on both in-depth technical and legal theory and hands-on project work. You’ll work in our specialist computer forensics laboratory in our award-winning technology centre, using the latest forensic software, including Forensic Toolkit version 5.0, Encase version 7.0 and Micro Systemation XRY Complete. You’ll also have the opportunity to achieve XRY Logical certification during the course.

Course highlights:

We have strong links with industry - we work with companies such as Microsoft and Siemens, and we are a Cisco local academy and a Xilinx university partner.
The course is accredited by the British Computer Society for Chartered IT Professional (CITP) status. This means that on graduation, you’ll have fulfilled the academic requirements for achieving those titles, though you’ll need to complete further professional development.
The course is led by Dr Carlisle George, a former barrister who has co-edited two books on regulatory issues in healthcare information. He is a member of the editorial board of the International Journal of Electronic Security and Digital Forensics and leads the university’s ALERT (Aspects of Law and Ethics Related to Technology) research group.
You’ll also improve your communication, teamwork, time-management, organisational, analytical and critical skills.

Read less
Digital forensics and security are increasingly in the public eye. Read more

About the course

Digital forensics and security are increasingly in the public eye. Whether it is the theft of a laptop containing secret information, high profile hacking incidents, anti-terrorism operations or controversies surrounding lost data, it is impossible to ignore the importance and excitement surrounding digital forensics and security.

Developed and delivered in conjunction with 7Safe, this course provides you with knowledge of the very latest computer forensics and security principles, practices, tools and techniques, taught by a team of experienced and specialist staff in purpose-built computer forensics and security laboratories. If you are interested in a challenging career in one of the most rapidly expanding areas of computing then this is the course for you.

Most students embark on their MSc after successfully completing one or more 7Safe courses. On successful completion of the 7Safe hands-on training course, you are then eligible to apply to DMU for an academic top-up/assessment by distance learning. Taking the course in this way is normally a part-time pathway and you should expect to study for two-three years. However, you can register directly with DMU for the full degree and the university then manages your attendance and progression through the relevant 7Safe modules and academic assessments. Registering with DMU direct can therefore provide a full-time route through the course.

The full MSc course consists of eight modules (at 15 credits each) and an MSc Project/Dissertation (at 60 credits). Seven of the taught modules are delivered and assessed jointly by De Montfort University staff and 7Safe trainers with the eighth being a stand alone distance learning module that DMU is responsible for. The Project/Dissertation is delivered and assessed by DMU alone. Successful completion of the MSc gives students seven industry recognised professional certificates and the MSc.

Multiple start dates are available please contact the Admissions Team on the contact details below.

Read less
*PLEASE NOTE. This course is subject to approval*. Read more
*PLEASE NOTE: This course is subject to approval*

The MSc in Information Security and Digital Forensics seeks to address the increasing demand in information security related domains in both academic and vocational qualifications and projection for an increased shortage of cybersecurity professionals and digital forensics investigators in the industry.

The course is delivered by a dedicated team of cybersecurity experts and active researchers in the area. Using cutting edge and leading teaching and training techniques the course helps the candidates to realise the unique complexity and challenges associated with modern cyberspace in a highly dynamic and constantly evolving threat landscape.

It is a blended programme that amalgamates both management and the hands-on skills required by industry.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/information-security-and-digital-forensics

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The threat of cyber security attacks is increasingly apparent to individuals and organisations across the globe. From hacking to phishing, scamming to grooming, and botnets to cyber-terrorism, the variety and ingenuity of exploits appear to expand constantly. Read more

The threat of cyber security attacks is increasingly apparent to individuals and organisations across the globe.

From hacking to phishing, scamming to grooming, and botnets to cyber-terrorism, the variety and ingenuity of exploits appear to expand constantly.

In this context, this programme addresses system vulnerabilities and the preventative measures that may counter cyber-attacks, including steps to repair systems weaknesses, prevent repeat occurrences, and collecting and examining digital evidence using a variety of digital and mobile forensics tools such as FTK and Cellbrite.

You will also develop a detailed understanding of comprehensive cyber risk management practices for ensuring overall security.

This course is also available as a two year masters with an industrial placement year.

The embedded industrial placement offers a unique opportunity to apply the skills learnt on real-life projects. This, in turn, prepares graduates of the programme for successful careers in both the Information Security & Digital Forensics professions. 



Read less
This course has been developed in consultation with industry practitioners. The School of Maths and Computing has strong links with senior policy developers in Government and industry and is a national leader and innovator in the field of cybersecurity information sharing and threat intelligence. Read more

This course has been developed in consultation with industry practitioners. The School of Maths and Computing has strong links with senior policy developers in Government and industry and is a national leader and innovator in the field of cybersecurity information sharing and threat intelligence.

This Master’s course is highly valuable to a variety of participants with an interest in Cybersecurity;

· It will prepare a student well for achieving success in gaining employment; the demand for cybersecurity professionals currently outstrips the supply of talent. Employment opportunities include (but are not limited to); Cybersecurity Consultant,

Cybersecurity Analyst, IT Security Manager, Security Architect and Compliance roles.

· For anyone thinking of undertaking further study in cybersecurity e.g. Research Degree or Professional Certifications.

· Those already in the sector who wish to enhance / widen their knowledge and gain an advanced degree qualification

· Those from a generalist IT or Governance background who wish to develop a depth of understanding in managing, developing and implementing secure computer and information systems within organisations.

· It may be appropriate for anyone with a strong interest wishing to gain an advanced level of knowledge of cybersecurity or graduates from other disciplines (depending on experience).

This course is available for full or part-time study.

What happens on the course?

You will learn, understand and be able to apply international standards and tools and techniques available to issues related to cybersecurity, information assurance and compliance. Through course material, interactive discussion, practical exercises and small group based work, you will learn, understand, and evaluate security problems, The focus is on risks and you will develop an advanced knowledge of the threats and vulnerabilities that all organisations need to mitigate in order to avoid serious data breaches.

You will be able to address critical security issues and demonstrate the ability to apply a variety of methods to secure data. You will benefit from interactive classes designed for the experience and professional practice of Cybersecurity. Typical practical activities include; addressing web-based security issues and configuring servers and network equipment for secure operation. Students will learn, understand, articulate and engage in the practical application of a wide range of security methods, tools and techniques which are available for the management and application of Cybersecurity. Students will enhance their understanding through research, analysis, synthesis and the production of a specialist dissertation relating to cybersecurity. Opportunities will be provided during the course to engage with cybersecurity professionals.

Career path

There is an increasing demand for qualified people in all aspects of CyberSecurity and Forensics.The opportunities include but are not limited to:

• Security Consultant

• CyberSecurity Consultant

• CyberSecurityAnalyst

• IT Security Manager

• Risk Officer

• Security Architect

This MSc contributes substantially to the career development of IT professionals by enabling high level practitioners to work in an IT security management capacity. If you are from an ITor general management background, the depth of understanding you will gain from this course will contribute to your ability as a manager to develop and implement secure computer and information systems and manage their governance for organisations. While the academic level is masters,there is a strong practical application and professional orientation to the curriculum.

What skills will you gain?

At the end of this course you, the student, will be able to:

Develop robust security policies, justify the selection of suitable mechanisms for enforcement of such policies and be confident in the practices pertaining to systems security;

Analyse, categorise and evaluate security problems, and demonstrate a detailed knowledge and understanding of the most critical aspects;

Recommend and apply appropriate methods for the secure transmission and storage of data;

Demonstrate expertise in the construction and implementation of a functional security design for a network system;

Display mastery of the necessary knowledge required to manage the security of computer systems within an organisation;

Conduct research into advanced areas of Computer Systems Security through analysis and synthesis, deal professionally with complex issues, make sound judgements in the absence of complete data and communicate conclusions clearly through appropriate media.

Who accredits this course?

Accreditation will be applied for from the British Computer Society and the Institute for the Management of Information Systems.



Read less
About the course. Developed in conjunction with our Industrial Advisory Group which includes Airbus, BT, Deloitte UK and Rolls-Royce, Cyber Technology MSc provides you the opportunity to choose from four main pathways. Read more

About the course

Developed in conjunction with our Industrial Advisory Group which includes Airbus, BT, Deloitte UK and Rolls-Royce, Cyber Technology MSc provides you the opportunity to choose from four main pathways: Cyber Security, Digital Forensics, Software Engineering and Management. You have the opportunity to choose a pure pathway, for example Software Engineering, or mixed pathways, for example the choices of modules could lead to a degree in Cyber Security with Management. In addition to industry support, the Cyber Security pathway is provisionally certified by GCHQ.

Reasons to study:

• Develop skills required for a rapidly changing sector

gain the latest skills, techniques and knowledge required in one of the most exciting areas of computing

• Developed in conjunction with industry experts

modules are developed with Deloitte PLC, Airbus Group, BT and Rolls-Royce ensuring that you explore issues relevant to industry

• Dedicated Cyber Security Centre

access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in digital forensics

• Taught by expert academic staff

taught by expert staff within our Cyber Security Centre and Software Technology Research Laboratory who recognised leaders in the cyber security domain

• Specialise your learning to your area of interest

combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Excellent career prospects

graduates are prepared for roles such as consultancy, software houses or project management within organisations that are cyber security specialists within law enforcement, government; in commercial IT departments and security consultancies

Course Structure

Modules

  • Legal, Ethical and Professional Practice and Research Methods
  • Project/Dissertation

Specialist areas of study

  • Cyber Security
  • Software Engineering
  • Digital Forensics
  • Management

Teaching and Assessment

Each module is delivered over the duration of four full days. It targets both concepts and practical skills that are relevant to industry. A multiple choice (MC) test at the end of the course provides attendees feedback on their achievements and must be passed before continuation of the academic assessment through coursework.

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects, multiple choice and laboratory-based assessments.

Contact and learning hours

You will normally attend 3 hours of timetabled taught sessions each week for each module undertaken during term time, for full time study this would be 12 hours per week during term time. You are expected to undertake around 24 further hours of independent study and assignments as required per week. Alternate study modes and entry points may change the timetabled session available, please contact us for details.

Academic Expertise

The programme is managed and delivered through our renowned Cyber Security Centre and Software Technology Research Laboratory.

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex-vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors.

Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.

The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:

Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:

http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:

http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx



Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:

  • EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
  • Specialist input from guest lecturers
  • Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
  • Specialist technicians to ensure you can get the most out of these technologies.

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the full course document.

Core modules

Digital Forensics pathway

Cyber Security Pathway

Professional accreditation

This programme is accredited by BCS, The Chartered Institute for IT, for fully meeting the further learning educational requirement for Chartered IT Professional (CITP) status and for partially satisfying the underpinning knowledge requirements set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC) and the Science Council for Chartered or Incorporated Engineer (CEng or IEng) status. Note that there are additional requirements, including work experience, to achieve full CITP, CEng, or IEng status. Graduates of this accredited degree will also be eligible for professional membership of BCS (MBCS).

The BCS accreditation is an indicator of the programme’s quality to students and employers; it is also an important benchmark of the programme’s standard in providing high quality computing education, and commitment to developing future IT professionals that have the potential to achieve Chartered status. The programme is also likely to be recognised by other countries that are signatories to international accords.

Career path

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;


Read less
About the course. Developed in conjunction with Deloitte UK, our Cyber Security MSc provides you with knowledge of the very latest cyber security principles, practices, tools and techniques. Read more

About the course

Developed in conjunction with Deloitte UK, our Cyber Security MSc provides you with knowledge of the very latest cyber security principles, practices, tools and techniques. The programme is provisionally certified by GCHQ, taught by a team of specialist staff in purpose-built cyber security computer laboratories. The involvement of the Industrial Advisory Group (Airbus, BT, Deloitte UK and Rolls-Royce) in designing the course and supporting its delivery and development ensures the teaching remains current and supportive of the real challenges cyber security specialists face in the rapidly changing cyber domain. You will gain a holistic perspective of cyber security, including the underpinning technology of the cyber domain and the role of linguistics, psychology and sociology in dealing with new cyber challenges. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts

developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre

access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest

combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity

you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects

employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

• Foundations of Cyber Security

• Cyber Threat Intelligence

• Host and Network Security

• Penetration Testing and Incident Response

• Cyber Engineering

• Digital Forensics Principles and Practice

• Malware Analysis

• Legal, Ethical and Professional Practice

• Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.

The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:

Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:

http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:

http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx



Read less
The international Master's programme with three main specialties - . Cyber Security. , . Digital Forensics.  and . Read more

The international Master's programme with three main specialties - Cyber SecurityDigital Forensics and Cryptography - provides students with core skills in wide aspects of the security of information systems and specialized skills in the chosen specialization. Students get a unique chance to study under high-level cyber security practitioners from Estonian banks, telecoms, law enforcement, CERT and the NATO Cooperative Cyber Defence Centre of Excellence.

The programme is taught jointly by the two largest public universities in Estonia. The Cyber Security and Digital Forensics studies are concentrated in Tallinn, while Cryptography specialization is concentrated in Tartu. Upon successful completion of the programme students will receive a joint degree signed by both universities - Tallinn University of Technology and University of Tartu.

Key features:

  • A programme that is unique in Europe and offered in a country that has national experience of cyber-attacks
  • Teaching staff with the latest high-level experience and know-how
  • International guest lecturers from related industries and institutions (banks, CERT, law enforcement, NATO Cooperative Cyber Defence Centre of Excellence, et al.)
  • An internationally recognised qualification

Main specialties:

Cyber Security

The public focus on the field of cyber security is growing around the world. Estonia is well known for its eagerness to put innovative IT solutions into everyday use. It is a pioneer in electronic identities and electronic voting and enthusiastically adopts mobile technology, online banking and electronic government services. However, with so many e-solutions and such extensive use of the internet, attention also needs to be turned to the security issue.

Read more

Digital Forensics

Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The area is becoming critical for both data security and law enforcement and is involved in a complicated interplay between surveillance and counter-surveillance issues.



Read less
This qualification develops a rigorous approach to the study and application of computing, and incorporates transferable skills that are highly applicable to professional development in the field. Read more

MSc in Computing

This qualification develops a rigorous approach to the study and application of computing, and incorporates transferable skills that are highly applicable to professional development in the field. You can choose between the flexible MSc in Computing (offering a wide choice of industry relevant modules), and the more focused MSc in Computing (Software Engineering) or MSc in Computing (Information Security and Forensics), which enable you to develop in-depth specialist knowledge. All three routes finish with a substantial independent project, with either a professional or research orientation. The professional project engages in a research scenario in an employment-related setting of your choice, while the research project enables you to design a research proposal relating to an issue or problem of professional relevance to you or an employer, institution or public body.

Key features of the course

•Brings together theory and practice and draws on your own background and experience
•Enables you to tailor your studies to your specific career needs and professional interests
•Provides an excellent platform for further research studies.

This qualification is eligible for a Postgraduate Loan available from Student Finance England.

Modules

There are three pathways available for this degree:

•MSc in Computing
•MSc in Computing (Software Engineering)
•MSc in Computing (Information Security and Forensics)

We advise you to begin with modules from the first list for each pathway before moving on to the second.

MSc in Computing

To gain this qualification, you need 180 credits as follows:

60 credits from the optional modules in List A:

List A:

• Data management (M816)
• Digital forensics (M812)
• Information security (M811)
• Project management (M815)
• Software development (M813)
• Software engineering (M814)

Plus

A further 60 credits from List A, or from List B:

List B: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus

A further 30 credits from List B, or any 30-credit module at OU Level 3 or above.

MSc in Computing (Software Engineering)

To gain this qualification, you need 180 credits as follows:

60 credits of compulsory modules (starting with M813):

Compulsory modules

• Software development (M813)
• Software engineering (M814)

Plus

60 credits from List C:

List C: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Data management (M816)
• Digital forensics (M812)
• Information security (M811)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Project management (M815)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus a further 30 credits from List C, or any 30-credit module at OU Level 3 or above.

MSc in Computing (Information Security and Forensics)

To gain this qualification, you need 180 credits as follows:

60 credits of compulsory modules (starting with M811):

Compulsory modules

• Information security (M811)
• Digital forensics (M812)

Plus

60 credits from List D:

List D: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Data management (M816)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Project management (M815)
• Software development (M813)
• Software engineering (M814)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus a further 30 credits from List D, or any 30-credit module at OU Level 3 or above.

The modules quoted in this description are currently available for study. However, as we review the curriculum on a regular basis, the exact selection may change over time.

Credit transfer

If you have already completed some successful study at postgraduate level at another institution you may be able to transfer credit for this study and count it towards this Open University qualification. If you wish to apply to transfer credit you must do so as soon as possible as it may affect your choice of OU modules. If you are awarded credit for study completed elsewhere, you may find that you need to study fewer OU modules to complete your qualification with us.

Visit our Credit Transfer site for more information and details of how to apply for credit transfer.

Read less
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society. Read more

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The programme will:

  • Provide students with advanced knowledge and understanding of information security theory and concepts
  • Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
  • Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
  • Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

Programme learning outcomes

Knowledge and understanding

Students will gain:

  • Knowledge and understanding of the general information security aims and challenges
  • Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
  • Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
  • Knowledge and understanding of technical concepts and mechanisms for digital forensics
  • Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
  • The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
  • The ability to implement or apply existing information security mechanisms and technologies in practice
  • The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
  • The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills

Students will leave the programme with the ability to:

  • Analyse and solve problems of technical nature under consideration of various risks and constraints
  • Make effective and efficient decisions in an environment of conflicting interests
  • Think strategically 
  • Synthesise and critically evaluate the work of others
  • Apply fundamental knowledge to investigate new and emerging technologies
  • Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills

Students will gain the ability to:

  • Come up with technical solutions to a range of problems
  • Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
  • Implement mechanisms and apply them in a wider context of more complex systems
  • Present their opinions and findings and to produce a high-quality report

Key / transferable skills

Students will have:

  • The ability to communicate concepts and results in a clear and effective manner
  • The time and resource management planning
  • The ability to work with available resources, to collect and analyse research-oriented material

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less

Show 10 15 30 per page



Cookie Policy    X