• Cardiff University Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • Aberystwyth University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
Cranfield University Featured Masters Courses
Xi’an Jiaotong-Liverpool University Featured Masters Courses
University of Cambridge Featured Masters Courses
University of Cambridge Featured Masters Courses
Swansea University Featured Masters Courses
"encryption"×
0 miles

Masters Degrees (Encryption)

We have 11 Masters Degrees (Encryption)

  • "encryption" ×
  • clear all
Showing 1 to 11 of 11
Order by 
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. Read more
The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. This title also includes the basic, key elements of forensic computing: forensics and the legal and ethical issues involved in any digital investigation.

Students will gain a broad understanding of the different levels of computer and network security together with the basic phases of a forensic investigation and of computing in general. They will examine wireless communication systems; networks; operating systems and interfacing socket programming; servers and their security implications; and the planning and implementation of network security management, including security, risk analysis and disaster recovery planning.

Non means-tested loans of up to a maximum of £10,000 will be available to postgraduate master’s students.

Features and benefits of the course

-The School has an extensive range of equipment in our own specialist laboratories which is supported by a dedicated team of technical staff.
-Research in the School was rated 'internationally excellent' with some rated 'world-leading' in the 2014 Research Excellence Framework (REF).
-Our online virtual learning platform Moodle, provides access to lectures, course materials and assessment information.
-Classes are concentrated on certain days of the week to facilitate part-time students’ attendance and allow full-time students to undertake part-time employment if necessary.
-The School of Computing, Mathematics and Digital Technology is a member of the Oracle Academy.
-We are an academic partner of the Institute of Information Security Professionals (IISP). This partner status recognises our expertise in the field of information and cyber security.
-We are also an Academy of the Computer Technology Industry Association (CompTIA) and deliver their partner programme which provides a pathway for students towards a rewarding, high-growth IT career.

About the Course

You will study advanced topics in computer networks and operating systems, focusing on principles, architectures and protocols used in modern large scale networked systems.

Cryptography and encryption studies cover classical cryptography, key encryption algorithms, how to code algorithms and their variants in a modern programming language and implement cryptosystems over a computer network.

You will develop skills to design and implement advanced security mechanisms in a network environment, considering in depth wired and wireless network security and the best practice in the field.

All course units combine with a flexible approach, which allows students to undertake practical project work while attending work placements. With one-third of the course project-based, it may be possible to undertake yours in collaboration with an external organisation or within the School.

The Masters project will involve practical system creation or experimentation work. Where appropriate, the implementation or experimentation may be work-based.

Assessment details

Assessment will be through coursework, examination and dissertation.

Read less
Who is it for?. Whether you are an engineering student or engineering professional, this course will equip you with the skills and knowledge you need to pursue or enhance your career in the IoT industry. Read more

Who is it for?

Whether you are an engineering student or engineering professional, this course will equip you with the skills and knowledge you need to pursue or enhance your career in the IoT industry. The course will also appeal to aspiring entrepreneurs that are keen on starting their own IoT ventures.

This MSc will help you explore a range of technical fields, such as computing, electronics, telecommunications, computer networks, informatics, data analytics, cyber security, and software engineering.

Objectives

The City, University of London Internet of Things with Entrepreneurship MSc will help you:

  • Cover the theory and practice that will be valuable for a career in the emergent IoT industry or starting your own IoT venture.
  • Develop the deep expertise in the underlying technologies of electronics, sensing and communications that will enable you to exploit the demand and opportunities for engineers with both technical skills and an awareness of the business implications of IoT.
  • Learn to apply your knowledge to create new inventions and ideas, and bring them to reality.
  • Develop an entrepreneurial perspective that is essential for designing innovative products ­with modules from the Sir John Cass Business School, renowned as one of the UK’s leading business schools.

The UK Government allocated £40 million in IoT research in the 2015 budget, calling it "the next stage of the information revolution, connecting up everything from urban transport to medical devices to household appliances.”*

* Source: https://www.gov.uk/government/news/budget-2015-some-of-the-things-weve-

Placements

You may apply for competitive three- to six-month placements offered by the informal industry advisory group, at the discretion of the companies involved. These currently include a wide range of IoT companies, including LG Electronics, CGI, Tivital.

Teaching and learning

Academic staff from City’s Department of Electrical & Electronic Engineering will deliver modules on this MSc. The Entrepreneurship module will be delivered by the Cass Business School.

The taught modules consist of lectures, tutorials, and laboratory coursework. Lectures will provide you with a solid theoretical understanding of relevant technical and business fields. Tutorials and labs give you opportunities for practical training and experience in each subject.

The programme focuses on a group and individual design project given by the informal industry advisory board or based on your own idea. A project fair at the beginning of the programme will disseminate project ideas and allow you to network with other students and industry advisors.

A Starter Weekend offered by Cass Business School will acquaint you with business plans and inspire new ventures. At the end of the programme, selected individual projects will compete as new ventures, which will be judged but not marked.

Various technical and business seminars will be held throughout the programme, approximately monthly. These seminars will be given mostly by industry professionals to reinforce knowledge in support of the group and individual design projects.

The design project/dissertation aims to provide you with the opportunity to deal with problems in areas where new subject knowledge is required. This involves literature search, assessment of the relevance of previous work, the development of the design task, self-directed research, and the presentation of results.

Assessment

Assessment of the programme modules comprises written examinations and laboratory coursework. Each individual module coursework is combined with the written module examination to provide an overall module mark.

The Group Design Project will be assessed through an interim group report and a final group report, viva, and poster session.

The Individual Project is assessed primarily through a dissertation, but with contributions from an interim report, work carried out during the project period and oral examination.

Assessment criteria and grade-related criteria will be made available to you via programme handbooks, module specifications, on the virtual learning environment or attached to a specific assessment task.

In order to pass the course, you should complete successfully or be exempted from the relevant modules and assessments and acquire the required number of credits. You will also need to pass each part of the programme in order to progress to the following part.

The pass mark for each module is 50% for both coursework and examination combined.

Modules

This MSc is uniquely oriented around practical design projects, guided by an informal industry advisory group of IoT companies, including LG Electronics, CGI and Tivital.

The programme is made up of four core modules, two elective modules, and a final individual project. One of the core modules is a group design project, which will feed into the final individual project of your choice. Also, unique to this programme, another core module on entrepreneurship will be delivered by the Cass Business School on new product development and ventures.

The programme follows a normal 12-month pattern with two terms of taught modules followed by a four-month individual design project/dissertation. The electives are studied in the second term. The third term is reserved for the final individual project. Electronic equipment and labs will be made available for projects.

Course content

IoT is about the interconnection of smart "things", combining sensing, processing, communications, and data analysis for a broad range of everyday applications. The course covers the study, design, and development of "things" based on these technologies:

  • Electronics
  • Embedded computing
  • Sensors
  • Software engineering
  • Cyber security
  • Communications and networks
  • Data analytics

You will learn and apply technologies to design and create your own product that will contribute to the growing IoT industry. By engaging with representatives from industrial partners during the programme, you can develop your knowledge and skills for real-world applications.

Career prospects

Information and Communication Technology (ICT) is the major technology influencing all aspects of our life, health, entertainments and society.  As a graduate of this course, your skills and knowledge will open up opportunities in a range electronic communications fields that include the Internet, covering:

  • Fundamental technologies
  • Electronics
  • Informatics
  • Wireless communications
  • Optical communications
  • Mobile communications
  • Satellite communications
  • Communication protocols
  • Networks
  • Encryption
  • E-commerce
  • Digital security

After your MSc studies, this course will also provide you with opportunities for further study, leading to a PhD.



Read less
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. Read more
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. During the course critical awareness of problems in information transmission, data compression and cryptography is raised, and the mathematical techniques which are commonly used to solve these problems are explored.

The Mathematics Department at Royal Holloway is well known for its expertise in information security and cryptography and our academic staff include several leading researchers in these areas. Students on the programme have the opportunity to carry out their dissertation projects in cutting-edge research areas and to be supervised by experts.

The transferable skills gained during the MSc will open up a range of career options as well as provide a solid foundation for advanced research at PhD level.

See the website https://www.royalholloway.ac.uk/mathematics/coursefinder/mscmathematicsofcryptographyandcommunications(msc).aspx

Why choose this course?

- You will be provided with a solid mathematical foundation and a knowledge and understanding of the subjects of cryptography and communications preparing you for research or professional employment in this area.

- The mathematical foundations needed for applications in communication theory and cryptography are covered including Algebra, Combinatorics Complexity Theory/Algorithms and Number Theory.

- You will have the opportunity to carry out your dissertation project in a cutting-edge research area; our dissertation supervisors are experts in their fields who publish regularly in internationally competitive journals and there are several joint projects with industrial partners and Royal Holloway staff.

- After completing the course former students have a good foundation for the next step of their career both inside and outside academia.

Department research and industry highlights

The members of the Mathematics Department cover a range of research areas. There are particularly strong groups in information security, number theory, quantum theory, group theory and combinatorics. The Information Security Group has particularly strong links to industry.

Course content and structure

You will study eight courses as well as complete a main project under the supervision of a member of staff.

Core courses:
Advanced Cipher Systems
Mathematical and security properties of both symmetric key cipher systems and public key cryptography are discussed as well as methods for obtaining confidentiality and authentication.

Channels
In this unit, you will investigate the problems of data compression and information transmission in both noiseless and noisy environments.

Theory of Error-Correcting Codes
The aim of this unit is to provide you with an introduction to the theory of error-correcting codes employing the methods of elementary enumeration, linear algebra and finite fields.

Public Key Cryptography
This course introduces some of the mathematical ideas essential for an understanding of public key cryptography, such as discrete logarithms, lattices and elliptic curves. Several important public key cryptosystems are studied, such as RSA, Rabin, ElGamal Encryption, Schnorr signatures; and modern notions of security and attack models for public key cryptosystems are discussed.

Main project
The main project (dissertation) accounts for 25% of the assessment of the course and you will conduct this under the supervision of a member of academic staff.

Additional courses:
Applications of Field Theory
You will be introduced to some of the basic theory of field extensions, with special emphasis on applications in the context of finite fields.

Quantum Information Theory
‘Anybody who is not shocked by quantum theory has not understood it' (Niels Bohr). The aim of this unit is to provide you with a sufficient understanding of quantum theory in the spirit of the above quote. Many applications of the novel field of quantum information theory can be studied using undergraduate mathematics.

Network Algorithms
In this unit you will be introduced to the formal idea of an algorithm, when it is a good algorithm and techniques for constructing algorithms and checking that they work; explore connectivity and colourings of graphs, from an algorithmic perspective; and study how algebraic methods such as path algebras and cycle spaces may be used to solve network problems.

Advanced Financial Mathematics
In this unit you will investigate the validity of various linear and non-linear time series occurring in finance and extend the use of stochastic calculus to interest rate movements and credit rating;

Combinatorics
The aim of this unit is to introduce some standard techniques and concepts of combinatorics, including: methods of counting including the principle of inclusion and exclusion; generating functions; probabilistic methods; and permutations, Ramsey theory.

Computational Number Theory
You will be provided with an introduction to many major methods currently used for testing/proving primality and for the factorisation of composite integers. The course will develop the mathematical theory that underlies these methods, as well as describing the methods themselves.

Complexity Theory
Several classes of computational complexity are introduced. You will discuss how to recognise when different problems have different computational hardness, and be able to deduce cryptographic properties of related algorithms and protocols.

On completion of the course graduates will have:
- a suitable mathematical foundation for undertaking research or professional employment in cryptography and/or communications

- the appropriate background in information theory and coding theory enabling them to understand and be able to apply the theory of communication through noisy channels

- the appropriate background in algebra and number theory to develop an understanding of modern public key cryptosystems

- a critical awareness of problems in information transmission and data compression, and the mathematical techniques which are commonly used to solve these problems

- a critical awareness of problems in cryptography and the mathematical techniques which are commonly used to provide solutions to these problems

- a range of transferable skills including familiarity with a computer algebra package, experience with independent research and managing the writing of a dissertation.

Assessment

Assessment is carried out by a variety of methods including coursework, examinations and a dissertation. The examinations in May/June count for 75% of the final average and the dissertation, which has to be submitted in September, counts for the remaining 25%.

Employability & career opportunities

Our students have gone on to successful careers in a variety of industries, such as information security, IT consultancy, banking and finance, higher education and telecommunication. In recent years our graduates have entered into roles including Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security manager at London Underground.

How to apply

Applications for entry to all our full-time postgraduate degrees can be made online https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
This course runs in Germany. This course covers a range of essential topics related to distributed computing systems. Yet these modules are not isolated; each one takes its place in the field in relation to others. Read more

About the course

This course runs in Germany.

This course covers a range of essential topics related to distributed computing systems. Yet these modules are not isolated; each one takes its place in the field in relation to others.

The emphasis in the course is to build the connections between topics, enabling software engineers to achieve co-operation between distinct autonomous systems under constraints of cost and performance requirements.

The course is suitable for:

Recent graduates in Electrical or Electronic Engineering or Computer Science, who wish to develop their skills in the field of distributed computing systems.
Practicing engineers and computer professionals who wish to develop their knowledge in this area.
People with suitable mathematical, scientific or other engineering qualifications, usually with some relevant experience, who wish to enter this field.

Aims

The past few years have witnessed that Grid computing is evolving as a promising large-scale distributed computing infrastructure for scientists and engineers around the world to share various resources on the Internet including computers, software, data, instruments.

Many countries around the world have invested heavily on the development of the Grid computing infrastructure. Many IT companies have been actively involved in Grid development. Grid computing has been applied in a variety of areas such as particle physics, bio-informatics, finance, social science and manufacturing. The IT industry has seen the Grid computing infrastructure as the next generation of the Internet.

The aim of the programme is to equip high quality and ambitious graduates with the necessary advanced technical and professional skills for an enhanced career either in industry or leading edge research in the area of distributed computing systems.

Specifically, the main objectives of the programme are:

To critically appraise advanced technologies for developing distributed systems;
To practically examine the development of large scale distributed systems;
To critically investigate the problems and pitfalls of distributed systems in business, commerce, and industry.

Course Content

Compulsory Modules:

Computer Networks
Network Security and Encryption
Distributed Systems Architecture
Project and Personal Management
High Performance Computing and Big Data
Software Engineering
Embedded Systems Engineering
Intelligent Systems
Dissertation

Special Features

Electronic and Computer Engineering is one of the largest disciplines in the University, with a portfolio of research contracts totalling £7.5 million, and has strong links with industry.

The laboratories are well equipped with an excellent range of facilities to support the research work and courses. We have comprehensive computing resources in addition to those offered centrally by the University. The discipline is particularly fortunate in having extensive gifts of software and hardware to enable it to undertake far-reaching design projects.

We have a wide range of research groups, each with a complement of academics and research staff and students. The groups are:

Media Communications
Wireless Networks and Communications
Power Systems
Electronic Systems
Sensors and Instrumentation.

Women in Engineering and Computing Programme

Brunel’s Women in Engineering and Computing mentoring scheme provides our female students with invaluable help and support from their industry mentors.

Accreditation

Distributed Computing Systems Engineering is accredited by the Institution of Engineering and Technology (IET).

Read less
The rigorous training on our MSc Financial Computing focuses on software engineering for large, dynamic and automated financial systems and finance models. Read more
The rigorous training on our MSc Financial Computing focuses on software engineering for large, dynamic and automated financial systems and finance models. This, alongside work on software design in a number of real-world financial systems, will enable you to become a leader in this field.

This course should interest you if you have a good first degree in computer science or engineering, or a BSc degree that provided a high level of programming expertise such as C++ and/or .NET. You receive training on the structure, instruments and institutional aspects of financial markets, banking, payment and settlement systems.

You will attain a high level of competence in software development, in the area of financial computing, for implementation in an electronic market environment, as we introduce you to information and communication technology and automation that underpins financial systems, including:
-Design issues relating to parallel and distributed networks
-Encryption, security and real-time constraints
-Straight Through Processing (STP)
-Quantitative finance
-Financial software architecture

Our Centre for Computational Finance and Economic Agents is an innovative and laboratory-based teaching and research centre, with an international reputation for leading-edge, interdisciplinary work combining economic and financial modelling with computational implementation.

Our research is geared towards real-world, practical applications, and many of our academic staff have experience of applying their findings in industry and in advising the UK government.

This course is also available on a part-time basis.

Professional accreditation

This degree is accredited by the Institution of Engineering and Technology (IET).This accreditation is increasingly sought by employers, and provides the first stage towards eventual professional registration as a Chartered Engineer (CEng).

Our expert staff

This course is taught by experts with both academic and industrial expertise in the financial and IT sectors. We bring together leading academics in the field from our Department of Economics, School of Computer Science and Electronic Engineering, and Essex Business School.

Our staff are currently researching the development of real-time trading platforms, new financial econometric models for real-time data, the use of artificially intelligent agents in the study of risk and market-based institutions, operational aspects of financial markets, financial engineering, portfolio and risk management.

Specialist facilities

We are one of the largest and best resourced computer science and electronic engineering schools in the UK. Our work is supported by extensive networked computer facilities and software aids, together with a wide range of test and instrumentation equipment.
-We have six laboratories that are exclusively for computer science and electronic engineering students. Three are open 24/7, and you have free access to the labs except when there is a scheduled practical class in progress
-All computers run either Windows 7 or are dual boot with Linux
-Software includes Java, Prolog, C++, Perl, Mysql, Matlab, DB2, Microsoft Office, Visual Studio, and Project
-Students have access to CAD tools and simulators for chip design (Xilinx) and computer networks (OPNET)
-We also have specialist facilities for research into areas including non-invasive brain-computer interfaces, intelligent environments, robotics, optoelectronics, video, RF and MW, printed circuit milling, and semiconductors

Your future

We have an extensive network of industrial contacts through our City Associates Board and our alumni, while our expert seminar series gives you the opportunity to work with leading figures from industry.

Our recent graduates have gone on to become quantitative analysts, portfolio managers and software engineers at various institutions, including:
-HSBC
-Mitsubishi UFJ Securities
-Old Mutual
-Bank of England

We also work with the university’s Employability and Careers Centre to help you find out about further work experience, internships, placements, and voluntary opportunities.

Example structure

-CCFEA MSc Dissertation
-Big-Data for Computational Finance
-Cloud Technologies and Systems
-High Performance Computing
-Introduction to Financial Market Analysis
-Professional Practice and Research Methodology
-Quantitative Methods in Finance and Trading
-Computer Security (optional)
-Constraint Satisfaction for Decision Making (optional)
-Creating and Growing a New Business Venture (optional)
-Digital Signal Processing (optional)
-E-Commerce Programming (optional)
-Financial Engineering and Risk Management (optional)
-High Frequency Finance and Empirical Market Microstructure (optional)
-IP Networking and Applications (optional)
-Learning and Computational Intelligence in Economics and Finance (optional)
-Mathematical Research Techniques Using Matlab (optional)
-Mobile & Social Application Programming (optional)
-Programming in Python (optional)
-Industry Expert Lectures in Finance (optional)

Read less
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. Read more
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. This includes the technical side of encryption, authentication, biometrics, network security, etc as well as information security management and cyber security risk.

This MSc is aimed at computing graduates with strong programming skills seeking careers as cyber security professionals or careers that need a systematic and deep understanding of the subject. It would also be an excellent starting point for those wishing to carry out further research in cyber security.

Visit the website https://www.kent.ac.uk/courses/postgraduate/1225/cyber-security

About the School of Computing

Our world-leading researchers, in key areas such as systems security, programming languages, communications, computational intelligence and memory management, and in interdisciplinary work with biosciences and psychology, earned us an outstanding result in the most recent national research assessment.

The School hosts the University's GCHQ/EPSRC accredited Academic Centre of Excellence in Cyber Security Research, one of only 13 in the country.

In addition, two of our staff have been honoured as Distinguished Scientists by the ACM and we have also held Royal Society Industrial Fellowships.

As an internationally recognised Centre of Excellence for programming education, the School of Computing is a leader in computer science teaching. Two of our staff have received the ACM SIGCSE Award for Outstanding Contribution to Computer Science Education. We are also home to two National Teaching Fellows, to authors of widely used textbooks and to award-winning teaching systems such as BlueJ.

Modules

The following modules are indicative of those offered on this programme. This list is based on the current curriculum and may change year to year in response to new curriculum developments and innovation. Most programmes will require you to study a combination of compulsory and optional modules. You may also have the option to take modules from other programmes so that you may customise your programme and explore other subject areas that interest you.

Assessment

Assessment is through a combination of unseen written examinations, written and practical coursework, student presentations, individual and group projects.

The substantial research or development project undertaken for other programmes is assessed by dissertation.

Programme aims

This programme aims to:

- enhance the career prospects of graduates seeking employment in the computing/IT sector

- prepare you for research and/or professional practice at the forefront of the discipline

- develop an integrated and critically aware understanding of one or more areas of computing/IT and their applications (according to your degree title)

- develop a variety of advanced intellectual and transferable skills

- equip you with the lifelong learning skills necessary to keep abreast of future developments in the field.

Study support

We provide an extensive support framework for our research students and encourage involvement in the international research community.

We have strong links with industry including Cisco, IBM, Microsoft and Oracle.

Postgraduate resources

The School of Computing has a large range of equipment providing both UNIX (TM) and PCbased systems and a cluster facility consisting of 30 Linux-based PCs for parallel computation. New resources include a multi-core enterprise server with 128 hardware threads and a virtual machine server that supports computer security experiments.

All students benefit from a well-stocked library, giving access to e-books and online journals as well as books, and a high bandwidth internet gateway. The School and its research groups hold a series of regular seminars presented by staff as well as by visiting speakers and our students are welcome to attend.

The School of Computing has a makerspace on the Canterbury campus, which offers exciting new teaching and collaboration opportunities. Among other equipment, it contains milling machines, a 3D printer, laser cutter and extensive space for building and making digital artefacts. The School also owns speciallist equipment for Internet of Things and media steganography.

Our taught postgraduate students enjoy a high level of access to academic staff and have their own dedicated laboratory and study room. Students whose course includes an industrial placement are supported by a dedicated team which helps them gain a suitable position and provides support throughout the placement.

Links with industry

Strong links with industry underpin all our work, notably with Cisco, Microsoft, Oracle, IBM, Agilent Technologies, Erlang Solutions, Hewlett Packard Laboratories, Ericsson, Nvidia and Nexor.

Global Skills Award

All students registered for a taught Master's programme are eligible to apply for a place on our Global Skills Award Programme (http://www.kent.ac.uk/graduateschool/skills/programmes/gsa.html). The programme is designed to broaden your understanding of global issues and current affairs as well as to develop personal skills which will enhance your employability.

Careers

Our graduates go on to work for leading companies including Cisco, GlaxoSmithKline, IBM, Intel, Lilly, Microsoft, Morgan Stanley, Thomson Reuters and T-Mobile. Many have gone on to develop their careers as project leaders and managers.

Find out how to apply here - https://www.kent.ac.uk/courses/postgraduate/apply/

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less

  • 1
Show 10 15 30 per page



Cookie Policy    X