• Goldsmiths, University of London Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • New College of the Humanities Featured Masters Courses
  • St Mary’s University, Twickenham Featured Masters Courses
  • Coventry University Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
De Montfort University Featured Masters Courses
Leeds Beckett University Featured Masters Courses
Institute for Advanced Architecture of Catalonia Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
Loughborough University Featured Masters Courses
"digital" AND "forensics"…×
0 miles

Masters Degrees (Digital Forensics)

  • "digital" AND "forensics" ×
  • clear all
Showing 1 to 15 of 57
Order by 
Delivered by the Cranfield Forensic Institute this course focuses on providing the knowledge and skills required to conduct comprehensive forensic examinations of digital devices. Read more
Delivered by the Cranfield Forensic Institute this course focuses on providing the knowledge and skills required to conduct comprehensive forensic examinations of digital devices. Guest lectures are delivered by Digital Forensic practitioners throughout the course, with guest lecturers coming from both law enforcement and private companies.

Please note the MSc is available as a full and part-time option. The PgCert and PgDip are only available as a part-time option.

Course overview

The Digital Forensic MSc is available both full-time and part-time. Students will complete a number of taught modules each with theoretical and practical elements and, for the MSc, an individual research project.

Individual Project -

The individual project will involve academic research in a specific area of digital forensics. The student will produce a substantial dissertation detailing their investigation and findings. Students are pushed to produce high quality, novel research during this period, and research outcomes are often at the cutting edge of the subject.

Assessment -

The assessments on this course are a mixture of written and practical exams, oral presentations, coursework assignments and (MSc only) a thesis.

The coursework assignments vary, but will include conducting digital forensics examinations of disk images for particular scenarios, conducting research into the artefacts left by applications, and further written assignments on digital forensic processes and theory.

Start date, duration and location

Start date: Full-time: September. Part-time: September

Duration: Full-time MSc - one year, Part-time MSc - up to three years, Full-time PgCert - one year, Part-time PgCert - two years, Full-time PgDip - one year, Part-time PgDip - two years

(For MOD status students the duration may vary, subject to annual review.)

Teaching location: Shrivenham

Facilities and resources

Facilities -

There are comprehensive facilities and resources to support study on the Forensic Computing course.

Digital Forensics Laboratories -

The majority of taught modules will be delivered in a dedicated digital forensics teaching computer laboratory regularly reconfigured for different modules, and equipped with all the necessary hardware and software. For example for the “Mac OS X Forensics” module, the PCs are removed and replaced with Apple Macs, for the “Network” module students build their own network and connect to a domain, and for the “Forensic Computing using Linux” module the standard Windows build is replaced with Linux.

There is also a separate digital forensic student laboratory available for general use by students for coursework and research. This is equipped with the latest digital forensics software including Encase 6 and 7, FTK 5, Blacklight, NetAnalysis and WinHex.

In addition a digital forensics research laboratory is used by staff and by students conducting research projects. This contains mobile phone acquisition equipment, reconfigurable networks and customisable hardware.

A network forensics research laboratory is available for research into network protocols and evidence from servers.

A “Crime Scene Room” is used during search and seizure exercises where students will learn how to identify and secure the physical evidence upon which digital evidence resides. The room is equipped with cameras so actions can be recorded and played back in order to analyse and improve strategy and behaviour. It is reconfigured to simulate a variety of crime scenarios.

Learning resources -

Lectures are delivered almost exclusively in the digital forensics teaching laboratory and these along with the practical sessions are supported using Moodle, an open source Virtual Learning Environment ensuring that notes are available electronically. Exercises and exercise data can be downloaded for later study and interactive digital exercises can be used to support the learning of complex subjects.

The Barrington Library provides resources to support the main teaching material where electronic and physical access is available to the latest digital forensics journals including Digital Investigation. Access to the latest textbooks, digital forensics magazines, and past Cranfield digital forensics theses that date back to 2002 are also accessible. Cranfield University subscribes to the latest library databases so digital forensics papers located in non-specialist journals can also be easily located during research and assignments.

Full-time and part-time students will join together during classroom (residential study school) sessions. This is an ideal opportunity for networking.

Entry Requirements

Normally a first or second class Honours degree or equivalent in science, engineering or mathematics. Alternatively, a lesser qualification together with appropriate work experience may be acceptable.

The full-time course is ideally suited to recent graduates in a related subject such as Computer Science who wish to specialise in Forensic Computing. It is also suitable for those who have recently completed a BSc in Computer Forensics, Digital Forensics, Cybercrime Forensics or a related subject, who would wish to deepen their knowledge, improve their skills and increase their employability, in what is a very competitive market.

The part-time course is more suited to those already in full-time employment, such as law enforcement officers, government staff, security consultants, accountancy and banking organisations, corporate security personnel and members of associated agencies in both the UK and overseas. This programme could lead to a new career or promotion with an existing employer. Guidance may be sought by those who do not have the formal qualifications necessary to enrol immediately onto the programme, as to the best study route to take. Please contact us ()

English Language -

Students whose first language is not English must attain an IELTS score of 7

Funding

For more information on funding please contact .

Additional information is available here - https://www.cranfield.ac.uk/Research/Doctoral-Research/Funding

Career opportunities

Our MSc course and it’s individual modules, or equivalent, are regularly cited in job adverts for digital forensics jobs.

This highlights our real-world learning, application to the work place and our relevance to practitioners.

For further information

On this course, please visit our course webpage https://www.cranfield.ac.uk/courses/taught/digital-forensics

Read less
In 2006, UEL was the first university in the UK to offer an MSc programme of this kind. Read more
In 2006, UEL was the first university in the UK to offer an MSc programme of this kind. While this has put us ahead of many other institutions in the region, the digital forensics area is changing rapidly in terms of tools, investigation techniques, and methods available for both investigators and criminals, so the challenge has been to continuously develop and enhance the programme materials and structure to equip our students with the skills and knowledge demanded by the market.

This course is your entry to a career in digital forensics investigation. You will have access to the latest tools available on the market, such as EnCase, FTK, and Mobile Forensics tools such as Oxygen, used extensively by law enforcement agencies across the world. The programme gives you a comprehensive understanding of security in terms of IT law, security management, and hacking techniques.

Key Facts

This MSc enjoys a high exposure with industry; as external specialist lecturers continue to deliver their knowledge through lectures and seminars.

Why Choose Us?

This programme helps students develop a wide range of skills and competencies that will prepare them for a variety of career opportunities. The career outlook for graduates is positive, as there is a shortage of skilled personnel in both the Information Security and digital forensics fields. Graduates of this programme can progress to work in multinational organisations, including cyber-fighting agencies. Furthermore, digital forensics is no longer associated only with law enforcement agencies, as organisations have now started to create digital or computer forensics departments, causing a huge demand in industry for professionals with both digital forensics and security skills.

Read less
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases. Read more
The need to defend the security of the computer systems, but also to retrieve digital evidence when a computer is involved in a criminal activity or security incident, constantly increases.

A number of very specific factors are contributing towards the growth of digital forensics and computer security specialists:

• The popularity of the Internet has an impact to the growth of malicious activity taking place in the Online world demanding a need for research and innovation in the areas.
• The cyber-attack threat levels have increased and there is a requirement for intelligent analysis of information and the investigation of digital devices.
• Digital devices capable of storing corporate and personal data are widely used increasing the need to secure information and provide solutions to complex attacks and their investigation.

Our MSc Digital Forensics and Computer Security has been developed at a time of rapid growth and continued demand in the digital forensics industry. If you’re from a computing, legal or law enforcement background, it is an ideal way to extend your professional interests and profile in an area that is becoming increasingly critical to organisations.

You’ll study fundamental – as well as advanced – research concepts in both computer forensics and security. There is an emphasis on professional research and you’ll be given opportunities throughout the course to get involved with key research areas, including industry-based projects developed through our excellent links with employers.

You’ll study in our computing suite which is equipped to industry standard providing the ideal training environment for your research and study.

You’ll study modules such as:

Studying at Masters Level and Research Methods
Advanced Concepts and Research in Digital Forensics
Advanced Security Protocols
Digital Forensics
Cybercrime Analysis and Investigation
Security: Attacks and Countermeasures
Independent Scholarship

Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
The fascination of forensics combines with the complexity of computing in this stimulating course. Read more
The fascination of forensics combines with the complexity of computing in this stimulating course. A relatively new specialism, electronic security and digital forensics is an area of expertise that’s challenging and rapidly evolving- technology is constantly developing, and therefore so are the problems that go along with it.


Why study Electronic Security and Digital Forensics at Middlesex?

The smooth running of societies and economies is now dependent on the security of computer networks, and cyber crime, from fraud, identity theft and cyber stalking to terrorism and espionage, can affect anyone and is at the forefront of government policy. But many court cases have collapsed because of a lack of experts trained in the meticulous art of tracking down evidence. Our innovative course was created to meet the demand for skills in an area that’s chronically short of well-qualified graduates.

The course has a strong practical focus, with an emphasis on both in-depth technical and legal theory and hands-on project work. You’ll work in our specialist computer forensics laboratory in our award-winning technology centre, using the latest forensic software, including Forensic Toolkit version 5.0, Encase version 7.0 and Micro Systemation XRY Complete. You’ll also have the opportunity to achieve XRY Logical certification during the course.

Course highlights:

We have strong links with industry - we work with companies such as Microsoft and Siemens, and we are a Cisco local academy and a Xilinx university partner.
The course is accredited by the British Computer Society for Chartered IT Professional (CITP) status. This means that on graduation, you’ll have fulfilled the academic requirements for achieving those titles, though you’ll need to complete further professional development.
The course is led by Dr Carlisle George, a former barrister who has co-edited two books on regulatory issues in healthcare information. He is a member of the editorial board of the International Journal of Electronic Security and Digital Forensics and leads the university’s ALERT (Aspects of Law and Ethics Related to Technology) research group.
You’ll also improve your communication, teamwork, time-management, organisational, analytical and critical skills.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
Digital forensics and security are increasingly in the public eye. Read more

About the course

Digital forensics and security are increasingly in the public eye. Whether it is the theft of a laptop containing secret information, high profile hacking incidents, anti-terrorism operations or controversies surrounding lost data, it is impossible to ignore the importance and excitement surrounding digital forensics and security.

Developed and delivered in conjunction with 7Safe, this course provides you with knowledge of the very latest computer forensics and security principles, practices, tools and techniques, taught by a team of experienced and specialist staff in purpose-built computer forensics and security laboratories. If you are interested in a challenging career in one of the most rapidly expanding areas of computing then this is the course for you.

Most students embark on their MSc after successfully completing one or more 7Safe courses. On successful completion of the 7Safe hands-on training course, you are then eligible to apply to DMU for an academic top-up/assessment by distance learning. Taking the course in this way is normally a part-time pathway and you should expect to study for two-three years. However, you can register directly with DMU for the full degree and the university then manages your attendance and progression through the relevant 7Safe modules and academic assessments. Registering with DMU direct can therefore provide a full-time route through the course.

The full MSc course consists of eight modules (at 15 credits each) and an MSc Project/Dissertation (at 60 credits). Seven of the taught modules are delivered and assessed jointly by De Montfort University staff and 7Safe trainers with the eighth being a stand alone distance learning module that DMU is responsible for. The Project/Dissertation is delivered and assessed by DMU alone. Successful completion of the MSc gives students seven industry recognised professional certificates and the MSc.

Multiple start dates are available please contact the Admissions Team on the contact details below.

Read less
*PLEASE NOTE. This course is subject to approval*. Read more
*PLEASE NOTE: This course is subject to approval*

The MSc in Information Security and Digital Forensics seeks to address the increasing demand in information security related domains in both academic and vocational qualifications and projection for an increased shortage of cybersecurity professionals and digital forensics investigators in the industry.

The course is delivered by a dedicated team of cybersecurity experts and active researchers in the area. Using cutting edge and leading teaching and training techniques the course helps the candidates to realise the unique complexity and challenges associated with modern cyberspace in a highly dynamic and constantly evolving threat landscape.

It is a blended programme that amalgamates both management and the hands-on skills required by industry.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/information-security-and-digital-forensics

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs. Read more

About the course

This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs.

Cyber Technology MSc consists of four main themes; Cyber Security, Software Engineering, Digital Forensics, and Management. It can be studied by combining modules from all four themes allowing you to specialise in your chosen area of interest. You have the opportunity to choose mixed pathways, for example the choices of modules could lead to a degree in Cyber Security with Management.

Reasons to study:

• Develop skills required for a rapidly changing sector
gain the latest skills, techniques and knowledge required in one of the most exciting areas of computing

• Developed in conjunction with industry experts
modules are developed with Deloitte PLC, Airbus Group, BT and Rolls-Royce ensuring that you explore issues relevant to industry

• Dedicated Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in digital forensics

• Taught by expert academic staff
taught by expert staff within our Cyber Security Centre and Software Technology Research Laboratory who recognised leaders in the cyber security domain

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Excellent career prospects
graduates are prepared for roles such as consultancy, software houses or project management within organisations that are cyber security specialists within law enforcement, government; in commercial IT departments and security consultancies

Teaching and Assessment

Each module is delivered over the duration of four full days. It targets both concepts and practical skills that are relevant to industry. A multiple choice (MC) test at the end of the course provides attendees feedback on their achievements and must be passed before continuation of the academic assessment through coursework.

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects, multiple choice and laboratory-based assessments.

Contact and learning hours

You will normally attend 3 hours of timetabled taught sessions each week for each module undertaken during term time, for full time study this would be 12 hours per week during term time. You are expected to undertake around 24 further hours of independent study and assignments as required per week. Alternate study modes and entry points may change the timetabled session available, please contact us for details.

Academic Expertise

The programme is managed and delivered through our renowned Cyber Security Centre and Software Technology Research Laboratory.

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex-vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors.

Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:
-EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
-Specialist input from guest lecturers
-Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
-Specialist technicians to ensure you can get the most out of these technologies

Course content

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Modules

The following modules are indicative of what you will study on this course.
-COMPUTER FORENSICS FUNDAMENTALS
-COMPUTER SYSTEM TOOLS
-EVIDENCE AND PROCEDURE
-NETWORK SECURITY
-POSTGRADUATE PROJECT MODULE
-RESEARCH METHODS

Digital Forensics pathway
-DATA RECOVERY AND ANALYSIS
-ADVANCED COMPUTER FORENSICS

Cyber Security pathway
-CYBER SECURITY
-THREATS AND COUNTERMEASURES

Associated careers

Depending on their chosen pathway graduates of the course are expected to find employment as information security/senior security officers and related cyber security roles or more technical roles investigating threats and safeguarding digital assets their life-cycle. Such roles will range from supporting industry, the public sector in general and the police and law enforcement agencies specifically, while some may focus more on researching new security threats and countermeasures. Additional also arrive for a supportive alumni community, including graduates with work experience who use their new skills and qualification to progress their career to more senior posts.

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
This MSc course is ideal for professionals needing knowledge and experience of advanced networking and research methods, and is also an excellent basis for further studies at doctoral level. Read more

MSc in Advanced Networking

This MSc course is ideal for professionals needing knowledge and experience of advanced networking and research methods, and is also an excellent basis for further studies at doctoral level. It consists of four professional vocational modules, which include Cisco Certified Network Professional (CCNP) materials, and either a final research project or a professional project combined with study of digital forensics – drawing together the knowledge and skills you have gained and developing the skills required to address problems systematically.

Key features of the course

•Offers a choice of research or professional routes
•Develops your skill set with the largest Cisco Networking academy in the UK
•Draws on the latest CCNP, CISSP and CCNA-S curriculum
•Provides the knowledge, understanding, and skills needed to install, configure and maintain local and wide area networks
•Includes hands-on experience of using online tools and configuring networks.
This qualification is eligible for a Postgraduate Loan available from Student Finance England.

Modules

To gain this qualification, you need 180 credits as follows:

Stage 1

Advanced routing – CCNP Route (T824) is the foundation module and should normally be studied first. You can study the remaining modules in any order, but if you are taking one module each presentation, we recommend that you study them in the order shown.
Note: you can take the Cisco components of T824 (Route), T828 and T826 (Switch) in any order. You must successfully complete both Route and Switch (or their predecessors BSCI and BCMSN) before taking the Cisco component of T827 (TShoot).

Choose 120 credits from the following compulsory modules:

• Advanced routing – CCNP 1 (T824)
• Network security (T828)
• Multilayer switching – CCNP 3 (T826)
• Optimising networks – CCNP 4 (T827)

Completion of Stage 1 will entitle you to claim the Postgraduate Diploma in Advanced Networking (E51).

Plus

Stage 2

This MSc offers a choice of routes after you have completed Stage 1. The research route involves producing a dissertation to develop your academic research skills; while the professional route is a more discipline-oriented qualification combining study of digital forensics with an investigative project in advanced networking.

Choose 60 credits from either the Research route or the Professional route:

Research route

Compulsory module:

• Research project (T802)

Professional route

Compulsory modules:

• Digital forensics (M812)
• The MSc professional project (T847)

The modules quoted in this description are currently available for study. However, as we review the curriculum on a regular basis, the exact selection may change over time.

Credit transfer

If you have already completed some successful study at postgraduate level at another institution you may be able to transfer credit for this study and count it towards this Open University qualification. If you wish to apply to transfer credit you must do so as soon as possible as it may affect your choice of OU modules. If you are awarded credit for study completed elsewhere, you may find that you need to study fewer OU modules to complete your qualification with us. Visit our Credit Transfer site for more information and details of how to apply for credit transfer.

Read less
This qualification develops a rigorous approach to the study and application of computing, and incorporates transferable skills that are highly applicable to professional development in the field. Read more

MSc in Computing

This qualification develops a rigorous approach to the study and application of computing, and incorporates transferable skills that are highly applicable to professional development in the field. You can choose between the flexible MSc in Computing (offering a wide choice of industry relevant modules), and the more focused MSc in Computing (Software Engineering) or MSc in Computing (Information Security and Forensics), which enable you to develop in-depth specialist knowledge. All three routes finish with a substantial independent project, with either a professional or research orientation. The professional project engages in a research scenario in an employment-related setting of your choice, while the research project enables you to design a research proposal relating to an issue or problem of professional relevance to you or an employer, institution or public body.

Key features of the course

•Brings together theory and practice and draws on your own background and experience
•Enables you to tailor your studies to your specific career needs and professional interests
•Provides an excellent platform for further research studies.

This qualification is eligible for a Postgraduate Loan available from Student Finance England.

Modules

There are three pathways available for this degree:

•MSc in Computing
•MSc in Computing (Software Engineering)
•MSc in Computing (Information Security and Forensics)

We advise you to begin with modules from the first list for each pathway before moving on to the second.

MSc in Computing

To gain this qualification, you need 180 credits as follows:

60 credits from the optional modules in List A:

List A:

• Data management (M816)
• Digital forensics (M812)
• Information security (M811)
• Project management (M815)
• Software development (M813)
• Software engineering (M814)

Plus

A further 60 credits from List A, or from List B:

List B: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus

A further 30 credits from List B, or any 30-credit module at OU Level 3 or above.

MSc in Computing (Software Engineering)

To gain this qualification, you need 180 credits as follows:

60 credits of compulsory modules (starting with M813):

Compulsory modules

• Software development (M813)
• Software engineering (M814)

Plus

60 credits from List C:

List C: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Data management (M816)
• Digital forensics (M812)
• Information security (M811)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Project management (M815)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus a further 30 credits from List C, or any 30-credit module at OU Level 3 or above.

MSc in Computing (Information Security and Forensics)

To gain this qualification, you need 180 credits as follows:

60 credits of compulsory modules (starting with M811):

Compulsory modules

• Information security (M811)
• Digital forensics (M812)

Plus

60 credits from List D:

List D: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Data management (M816)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Project management (M815)
• Software development (M813)
• Software engineering (M814)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus a further 30 credits from List D, or any 30-credit module at OU Level 3 or above.

The modules quoted in this description are currently available for study. However, as we review the curriculum on a regular basis, the exact selection may change over time.

Credit transfer

If you have already completed some successful study at postgraduate level at another institution you may be able to transfer credit for this study and count it towards this Open University qualification. If you wish to apply to transfer credit you must do so as soon as possible as it may affect your choice of OU modules. If you are awarded credit for study completed elsewhere, you may find that you need to study fewer OU modules to complete your qualification with us.

Visit our Credit Transfer site for more information and details of how to apply for credit transfer.

Read less
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security. Read more
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security.

Our course is provisionally certified by GCHQ and taught by experts, and equips you with the theoretical grounding and hands-on experience demanded by the information-security sector.

PROGRAMME OVERVIEW

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Dissertation
-Information and Network Security
-Symmetric Cryptography
-Asymmetric Cryptography
-Information Security Management
-Multimedia Security and Digital Forensics
-Secure Systems and Applications
-Information Security for Business and Government
-Project Management and Business Strategy
-Database Systems
-Cloud Computing

EDUCATIONAL AIMS OF THE PROGRAMME

The programme will:
-Provide students with advanced knowledge and understanding of information security theory and concepts
-Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
-Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
-Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

PROGRAMME LEARNING OUTCOMES

Knowledge and understanding
-Knowledge and understanding of the general information security aims and challenges
-Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
-Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
-Knowledge and understanding of technical concepts and mechanisms for digital forensics
-Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
-The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
-The ability to implement or apply existing information security mechanisms and technologies in practice
-The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
-The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills
-Analyse and solve problems of technical nature under consideration of various risks and constraints
-Make effective and efficient decisions in an environment of conflicting interests
-Think strategically
-Synthesise and critically evaluate the work of others
-Apply fundamental knowledge to investigate new and emerging technologies
-Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills
-Come up with technical solutions to a range of problems
-Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
Implement mechanisms and apply them in a wider context of more complex systems
-Present their opinions and findings and to produce a high-quality report

Key / transferable skills
-The ability to communicate concepts and results in a clear and effective manner
-The time and resource management planning
-The ability to work with available resources, to collect and analyse research-oriented material

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less

Show 10 15 30 per page



Cookie Policy    X