• Imperial College London Featured Masters Courses
  • Swansea University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Regent’s University London Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of York Featured Masters Courses
London Metropolitan University Featured Masters Courses
University of Hertfordshire Featured Masters Courses
Queen Margaret University, Edinburgh Featured Masters Courses
University of Birmingham Featured Masters Courses
Coventry University Featured Masters Courses
"encryption"×
0 miles

Masters Degrees (Encryption)

  • "encryption" ×
  • clear all
Showing 1 to 13 of 13
Order by 
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Currently working in the legal profession? Hoping to specialise in international trade? On this specialist course you’ll gain the skills and knowledge that are particularly sought after in both the legal profession and wider legal practice, with a focus on international trade and business. Read more

Overview

Currently working in the legal profession? Hoping to specialise in international trade? On this specialist course you’ll gain the skills and knowledge that are particularly sought after in both the legal profession and wider legal practice, with a focus on international trade and business.

- Students are taught by an expert team of lecturers with extensive professional experience.
- The course covers key areas in international business, including corporate social responsibility, international commercial disputes, the global digital environment and specifics of international trade.
- The School of Business and Law has its own dedicated campus which includes modern teaching spaces and IT suites equipped with the latest business analytics software.
- The course has strong industry links both locally and internationally.
- Students have the opportunity to build hands-on experience through a work-based project.
- Past students have benefitted from access to a range of guest speakers.

The industry -

Southampton Solent’s international trade regulation course has been developed in conjunction with a wide range of legal professionals including solicitors, barristers, company secretaries, legal consultants and compliance officers.

Within the legal profession, a postgraduate specialisation on top of a law degree could offer a significant career advantage. This course offers students the opportunity to gain specialised skills and knowledge that can enhance suitability for roles in business, public sector or governmental organisations.

The programme -

Focusing on international legal business structures, this master’s course aims to provide students with an in-depth understanding of international business agreements and dispute resolution mechanisms.

Students study a broad range of contemporary topics including legal regulation, mechanisms of obtaining redress in international commercial disputes, issues relating to the protection of creative endeavour in the digital environment, and the specifics of international trade.

Delving into these subjects teaches students about corporate social responsibility; the Law of Corporations; shareholder rights and the duties of directors; ‘private international law’; ‘conflict of laws’; arbitration agreements; intellectual property rights; domain names; licensing; digital rights management and encryption; data protection and information privacy.

During the course, students will also study standard trade terms, major international trade conventions, the sale, transport and regulation of goods, customs regulations, services and capital in the EU and beyond, e-commerce, electronic contracts, and computer crime.

Practice-based case studies give students the opportunity to apply newly acquired skills to the real world. A work-based project, either with a current employer or under placement, also provides first-hand experience of the field of international trade. The University can help finding placements, which could mean working with employers such as Medicom Healthcare, Lawdit Solicitors and other similar organisations.

Previous students have benefitted from a programme of guest lectures from speakers including commercial solicitors, managing partners, police officers, trading standards officers, barristers and members of the judiciary.

Course Content

LLM International Trade Regulation comprises five core units, including a work-based project which accounts for a third of the course.

Law and Regulation of International Business Organisations: This unit focuses on the functioning and types of business organisations typical across the world, and their legal regulation. Subjects include corporate social responsibility, the Law of Corporations, shareholder rights and the duties of directors.

International Commercial Enforcement and Dispute Resolution: This unit is primarily concerned with mechanisms of obtaining redress in international commercial disputes. It focuses on what is traditionally called ‘private international law’ or ‘conflict of laws’ but it develops further to cover areas such as arbitration and arbitration agreements.

Creativity and Regulation in the Global Digital Environment: This unit focuses on issues relating to the protection of creative endeavour in the digital environment, covering intellectual property rights, domain names, licensing, digital rights management and encryption, data protection and information privacy. You will also have a chance to build practical skills in the valuation of intellectual property and due diligence processes.

The International Market in Goods and Services: This unit focuses on the specifics of international trade, covering standard trade terms, major international trade conventions, the sale, transport and regulation of goods, and customs regulations. You will also study services and capital in the EU, e-commerce, electronic contracts and computer crime.

Work-Based Project: The work-based project provides an exciting opportunity to put your newly-learned knowledge to a practical purpose for either a current employer or as part of a short-term placement. Example projects include a study of intellectual property protection or data protection compliance in the company, a review of trade regulation and export opportunities in the EU, or various other possibilities.

Programme specification document - http://mycourse.solent.ac.uk/course/view.php?id=6152

Teaching, learning and assessment -

The course is primarily classroom-based, with a practical work-based project.

Work experience -

The work-based project is a great opportunity to apply your learning to the real world. The University has a wide range of contacts with employers within the sector and you will be supported in finding and securing a suitable placement though ultimately it is the student’s responsibility to do so.

If you are already in employment and studying with us part-time, you may undertake the placement with your existing employer. In the unlikely event of a student not being able to secure a placement, a written project will be submitted instead.

Assessment -

Coursework, plus a work-based project that accounts for a third of your final mark.

Web-based learning -

The University’s virtual learning environment is an integral part of master’s study. It provides you with access to course content, case studies and additional study resources, as well as interaction with peers and tutors.

Why Solent?

What do we offer?

From a vibrant city centre campus to our first class facilities, this is where you can find out why you should choose Solent.

Facilities - http://www.solent.ac.uk/about/facilities/facilities.aspx

City living - http://www.solent.ac.uk/studying/southampton/living-in-southampton.aspx

Accommodation - http://www.solent.ac.uk/studying/accommodation/accommodation.aspx

Career Potential

Within the legal profession, a postgraduate specialisation on top of your law degree could offer a significant career advantage. On this course, you’ll gain specialised skills and knowledge that will enhance your suitability for roles in business, public-sector or governmental organisations.

Suitable roles for graduates of this course are:

- In-house lawyer
- Legal executive
- Paralegal
- Trademark and patent attorney
- Company secretary

Links with industry -

The course was developed in conjunction with an extensive variety of legal professionals including solicitors, barristers, company secretaries and legal consultants and compliance officers.

You will also benefit from Solent’s programme of professional guest speakers such as commercial solicitors, managing partners, police, trading standards officers, barristers and members of the judiciary.

Transferable skills -

High-level research and planning skills, due diligence presenting written and oral material, working independently and in groups.

Tuition fees

The tuition fees for the 2016/2017 academic year are:

UK and EU full-time fees: £4,635

International full-time fees: £11,260

UK and EU part-time fees: £2,320 per year

International part-time fees: £5,630 per year

Graduation costs -

Graduation is the ceremony to celebrate the achievements of your studies. For graduates in 2015, there is no charge to attend graduation, but you will be required to pay for the rental of your academic gown (approximately £42 per graduate, depending on your award). You may also wish to purchase official photography packages, which range in price from £15 to £200+. Graduation is not compulsory, so if you prefer to have your award sent to you, there is no cost.
For more details, please visit: http://www.solent.ac.uk/studying/graduation/home.aspx

Next steps

Want to gain a competitive edge in your legal career? Southampton Solent’s specialised international trade regulation master’s degree can enhance your existing law qualifications and provide you with the skills and knowledge required to further your career.

Read less
Who is this course for?. Recent graduates in Electrical or Electronic Engineering or Computer Science, who wish to develop their skills in the field of distributed computing systems. Read more
Who is this course for?
Recent graduates in Electrical or Electronic Engineering or Computer Science, who wish to develop their skills in the field of distributed computing systems.
Practicing engineers and computer professionals who wish to develop their knowledge in this area.
People with suitable mathematical, scientific or other engineering qualifications, usually with some relevant experience, who wish to enter this field.

Modules

Computer Networks, which aims to advance knowledge on computer networks. Topics to be covered in this module include OSI reference model, Physical and Data Link Layer Protocols, TCP/IP Networking, IPv6, Routing Protocols, Asynchronous Transfer Mode (ATM) Networks, Packet Delay and Queuing Analysis, IP Quality of Services (Integrated Service Model and Differentiated Service Model), Resource Reservation Protocol (RSVP), Multi-Protocol Label Switching (MPLS), IP Multicasting, Network Application Layer Protocols such as HTTP, DNS, SNMP.

Network Computing, which focuses on principles and techniques for network computing. Topics to be covered in this module include Object-Oriented Software Engineering, Object-Oriented Programming with Java, Network Computing Models such as Client/Server Model and Peer-to-Peer Model, Socket Programming, Remote Procedure Call (RPC), Java Remote Method Invocation (RMI), Common Object Request Broker Architecture (CORBA), Web Computing Technologies (Java Servlet, Java Server Pages), Message Exchanging with XML, Service Oriented Architecture (SOA), XML based Web Services (WSDL, SOAP, UDDI).

Network Security and Encryption, which introduces the fundamental theory that enables what is achievable through the use of Security Engineering to be determined, and presents the practical techniques and algorithms that are currently important for the efficient and secure use of distributed /Grid computing systems. Topics to be covered in this module include Introduction to Security Engineering, Classical Cryptography (Monoalphabetic and Polyalphabetic Ciphers, Transposition, Substitution, Linear Transformation), Computational Fundamentals of Cryptosystems (Computational Complexity and Intractability, Modular Arithmetic and Elementary Number Theory), Modern Symmetric Key Cryptography (Feistel Ciphers, DES, Triple-DES and AES),Public Key Cryptography (The Diffie-Hellman Key Exchange Algorithm, Public Key Infrastructures, X.509 Certificates, PK Systems such as RSA and Elliptic Curves), Multilevel Security (the Bell-LaPadula Security Policy Model, the Biba Model, the NRL Pump), Multilateral Security (Compartmentation and the Lattice Model, the Chinese Wall, the BMA Model), Protecting e-Commerce Systems.

Distributed Systems Architecture, which presents a comprehensive evaluation of the design philosophies, fundamental constructs, performance issues and operational principles of distributed systems architectures, covering applications, algorithms and software architecture, engineering issues and implementation technology. Topics to be covered in this module include System Architecture (Bus Systems, High Performance I/O, Memory Hierarchies, Memory Coherence and File Coherence), Distributed Database, Processor Architecture, File Services, Inter-Process Communication, Naming Services, Resource Allocation and Scheduling, Distributed System Case Studies.

Grid Middleware Technologies, which introduces the principle, concepts and practice of Grid middleware technologies, and provides a practical knowledge on developing Grid applications. Topics to be covered in this module include Parallel Computing Paradigms, Parallel Programming with MPI/PVM, Cluster Computing Principles (Condor, Sun Grid Engine), Grid Computing Middleware Components (Job Submission, Resource Management and Job Scheduling, Information Service, Grid Portal, Grid Security Infrastructure), Grid Standards (OGSA/WSRF), Grid Middleware Case Study with Globus.

Grid System Analysis and Design, which aims to analyse representative production Grid systems and gain knowledge on how to design and optimise large-scale Grid systems. Topics to be covered in this module include System Analysis Methodologies with UML, Model Construction (Process Modelling, Static Class Modelling, Dynamic Modelling, Interface Modelling), Management of Large-Scale Grid System (Portal, Concurrent Version System (CVS)/Wiki), Grid System Analysis Case Study (GridPP, LCG/EGEE), Grid System Design (Performance Consideration, Open Standards, Design Patterns, Usability Analysis), Grid System Programming Models, Testing (Unit Testing, Integration Testing, Regression Testing), Debugging, Risk Analysis, System Maintenance.

Project Management, which introduces a range of formal methods and skills necessary to equip the student to function effectively at the higher levels of project management. Covers the need for the development of project management skills in achieving practical business objectives.

Workshop involves practical work, which is an important component of the course and gives students experience with relevant techniques and tools. Assignments are of practical nature and involve laboratory work with relevant equipment, hardware and software systems, conducted in a hands-on workshop environment. Typical assignments are:
TCP/IP Network Layered Protocol Analysis
Object-Oriented Programming, Java Socket Programming
Network Security and Encryption
Java RMI Programming for Distributed Systems
Grid Programming with Globus Toolkit 4 (GT4)
Grid System Analysis/Simulation

Dissertation, which is a stimulating and challenging part of the MSc programme. It provides the opportunity to apply the knowledge learnt in the taught part of the programme and to specialise in one aspect, developing students’ deep understanding and expertise in Distributed Systems related area of their choice. Students may carry out their projects wholly within the University, but industrial based projects are encouraged.

Read less
This course can help you fast-track your career in cyber security. It is designed for computer professionals who have an interest in finding and fixing vulnerabilities, encryption, intrusion detection and managing cyber risks and network security. Read more
This course can help you fast-track your career in cyber security. It is designed for computer professionals who have an interest in finding and fixing vulnerabilities, encryption, intrusion detection and managing cyber risks and network security.

Depending on your choice of units, you may study evidence collection, counterintelligence, internet crime, business continuity, network security policies, network firewalls, authentication and web server security.

This course is for graduates with a computing background. It provides a detailed coverage of the key concepts and challenges in data and resource protection and computer software security, with a focus on both high-level concepts and low-level practical aspects of information security.

Graduates may find employment as computer security experts in many different organisations due to the pervasive nature of modern computing, but particular demand will come from the areas of web-based services, banking, information retrieval and national security.

2016 Curtin International Scholarships: Merit Scholarship

Curtin University is an inspiring, vibrant, international organisation, committed to making tomorrow better. It is a beacon for innovation, driving advances in technology through high-impact research and offering more than 100 practical, industry-aligned courses connecting to workplaces of tomorrow.

Ranked in the top two per cent of universities worldwide in the Academic Ranking of World Universities 2015, the University is also ranked 25th in the world for universities under the age of 50 in the QS World University Rankings 2015 Curtin also received an overall five-star excellence rating in the QS stars rating.

Curtin University strives to give high achieving international students the opportunity to gain an internationally recognised education through offering the Merit Scholarship. The Merit Scholarship will give you up to 25 per cent of your first year tuition fees and if you enrol in an ELB program at Curtin English before studying at Curtin, you will also receive a 10 per cent discount on your Curtin English fees.

For full details and terms and conditions of this scholarship, please visit: curtin.edu/int-scholarships and click on Merit.

Read less
The rigorous training on our MSc Financial Computing focuses on software engineering for large, dynamic and automated financial systems and finance models. Read more
The rigorous training on our MSc Financial Computing focuses on software engineering for large, dynamic and automated financial systems and finance models. This, alongside work on software design in a number of real-world financial systems, will enable you to become a leader in this field.

This course should interest you if you have a good first degree in computer science or engineering, or a BSc degree that provided a high level of programming expertise such as C++ and/or .NET. You receive training on the structure, instruments and institutional aspects of financial markets, banking, payment and settlement systems.

You will attain a high level of competence in software development, in the area of financial computing, for implementation in an electronic market environment, as we introduce you to information and communication technology and automation that underpins financial systems, including:
-Design issues relating to parallel and distributed networks
-Encryption, security and real-time constraints
-Straight Through Processing (STP)
-Quantitative finance
-Financial software architecture

Our Centre for Computational Finance and Economic Agents is an innovative and laboratory-based teaching and research centre, with an international reputation for leading-edge, interdisciplinary work combining economic and financial modelling with computational implementation.

Our research is geared towards real-world, practical applications, and many of our academic staff have experience of applying their findings in industry and in advising the UK government.

This course is also available on a part-time basis.

Professional accreditation

This degree is accredited by the Institution of Engineering and Technology (IET).This accreditation is increasingly sought by employers, and provides the first stage towards eventual professional registration as a Chartered Engineer (CEng).

Our expert staff

This course is taught by experts with both academic and industrial expertise in the financial and IT sectors. We bring together leading academics in the field from our Department of Economics, School of Computer Science and Electronic Engineering, and Essex Business School.

Our staff are currently researching the development of real-time trading platforms, new financial econometric models for real-time data, the use of artificially intelligent agents in the study of risk and market-based institutions, operational aspects of financial markets, financial engineering, portfolio and risk management.

Specialist facilities

We are one of the largest and best resourced computer science and electronic engineering schools in the UK. Our work is supported by extensive networked computer facilities and software aids, together with a wide range of test and instrumentation equipment.
-We have six laboratories that are exclusively for computer science and electronic engineering students. Three are open 24/7, and you have free access to the labs except when there is a scheduled practical class in progress
-All computers run either Windows 7 or are dual boot with Linux
-Software includes Java, Prolog, C++, Perl, Mysql, Matlab, DB2, Microsoft Office, Visual Studio, and Project
-Students have access to CAD tools and simulators for chip design (Xilinx) and computer networks (OPNET)
-We also have specialist facilities for research into areas including non-invasive brain-computer interfaces, intelligent environments, robotics, optoelectronics, video, RF and MW, printed circuit milling, and semiconductors

Your future

We have an extensive network of industrial contacts through our City Associates Board and our alumni, while our expert seminar series gives you the opportunity to work with leading figures from industry.

Our recent graduates have gone on to become quantitative analysts, portfolio managers and software engineers at various institutions, including:
-HSBC
-Mitsubishi UFJ Securities
-Old Mutual
-Bank of England

We also work with the university’s Employability and Careers Centre to help you find out about further work experience, internships, placements, and voluntary opportunities.

Example structure

-CCFEA MSc Dissertation
-Big-Data for Computational Finance
-Cloud Technologies and Systems
-High Performance Computing
-Introduction to Financial Market Analysis
-Professional Practice and Research Methodology
-Quantitative Methods in Finance and Trading
-Computer Security (optional)
-Constraint Satisfaction for Decision Making (optional)
-Creating and Growing a New Business Venture (optional)
-Digital Signal Processing (optional)
-E-Commerce Programming (optional)
-Financial Engineering and Risk Management (optional)
-High Frequency Finance and Empirical Market Microstructure (optional)
-IP Networking and Applications (optional)
-Learning and Computational Intelligence in Economics and Finance (optional)
-Mathematical Research Techniques Using Matlab (optional)
-Mobile & Social Application Programming (optional)
-Programming in Python (optional)
-Industry Expert Lectures in Finance (optional)

Read less
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. Read more
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. This includes the technical side of encryption, authentication, biometrics, network security, etc as well as information security management and cyber security risk.

This MSc is aimed at computing graduates with strong programming skills seeking careers as cyber security professionals or careers that need a systematic and deep understanding of the subject. It would also be an excellent starting point for those wishing to carry out further research in cyber security.

Visit the website https://www.kent.ac.uk/courses/postgraduate/1225/cyber-security

About the School of Computing

Our world-leading researchers, in key areas such as systems security, programming languages, communications, computational intelligence and memory management, and in interdisciplinary work with biosciences and psychology, earned us an outstanding result in the most recent national research assessment.

The School hosts the University's GCHQ/EPSRC accredited Academic Centre of Excellence in Cyber Security Research, one of only 13 in the country.

In addition, two of our staff have been honoured as Distinguished Scientists by the ACM and we have also held Royal Society Industrial Fellowships.

As an internationally recognised Centre of Excellence for programming education, the School of Computing is a leader in computer science teaching. Two of our staff have received the ACM SIGCSE Award for Outstanding Contribution to Computer Science Education. We are also home to two National Teaching Fellows, to authors of widely used textbooks and to award-winning teaching systems such as BlueJ.

Modules

The following modules are indicative of those offered on this programme. This list is based on the current curriculum and may change year to year in response to new curriculum developments and innovation. Most programmes will require you to study a combination of compulsory and optional modules. You may also have the option to take modules from other programmes so that you may customise your programme and explore other subject areas that interest you.

Assessment

Assessment is through a combination of unseen written examinations, written and practical coursework, student presentations, individual and group projects.

The substantial research or development project undertaken for other programmes is assessed by dissertation.

Programme aims

This programme aims to:

- enhance the career prospects of graduates seeking employment in the computing/IT sector

- prepare you for research and/or professional practice at the forefront of the discipline

- develop an integrated and critically aware understanding of one or more areas of computing/IT and their applications (according to your degree title)

- develop a variety of advanced intellectual and transferable skills

- equip you with the lifelong learning skills necessary to keep abreast of future developments in the field.

Study support

We provide an extensive support framework for our research students and encourage involvement in the international research community.

We have strong links with industry including Cisco, IBM, Microsoft and Oracle.

Postgraduate resources

The School of Computing has a large range of equipment providing both UNIX (TM) and PCbased systems and a cluster facility consisting of 30 Linux-based PCs for parallel computation. New resources include a multi-core enterprise server with 128 hardware threads and a virtual machine server that supports computer security experiments.

All students benefit from a well-stocked library, giving access to e-books and online journals as well as books, and a high bandwidth internet gateway. The School and its research groups hold a series of regular seminars presented by staff as well as by visiting speakers and our students are welcome to attend.

The School of Computing has a makerspace on the Canterbury campus, which offers exciting new teaching and collaboration opportunities. Among other equipment, it contains milling machines, a 3D printer, laser cutter and extensive space for building and making digital artefacts. The School also owns speciallist equipment for Internet of Things and media steganography.

Our taught postgraduate students enjoy a high level of access to academic staff and have their own dedicated laboratory and study room. Students whose course includes an industrial placement are supported by a dedicated team which helps them gain a suitable position and provides support throughout the placement.

Links with industry

Strong links with industry underpin all our work, notably with Cisco, Microsoft, Oracle, IBM, Agilent Technologies, Erlang Solutions, Hewlett Packard Laboratories, Ericsson, Nvidia and Nexor.

Global Skills Award

All students registered for a taught Master's programme are eligible to apply for a place on our Global Skills Award Programme (http://www.kent.ac.uk/graduateschool/skills/programmes/gsa.html). The programme is designed to broaden your understanding of global issues and current affairs as well as to develop personal skills which will enhance your employability.

Careers

Our graduates go on to work for leading companies including Cisco, GlaxoSmithKline, IBM, Intel, Lilly, Microsoft, Morgan Stanley, Thomson Reuters and T-Mobile. Many have gone on to develop their careers as project leaders and managers.

Find out how to apply here - https://www.kent.ac.uk/courses/postgraduate/apply/

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

Read less
The rigorous training on our MSc Financial Computing focuses on software engineering for large, dynamic and automated financial systems and finance models. Read more
The rigorous training on our MSc Financial Computing focuses on software engineering for large, dynamic and automated financial systems and finance models. This, alongside work on software design in a number of real-world financial systems, will enable you to become a leader in this field.

This course should interest you if you have a good first degree in computer science or engineering, or a BSc degree that provided a high level of programming expertise such as C++ and/or .NET. You receive training on the structure, instruments and institutional aspects of financial markets, banking, payment and settlement systems.

You will attain a high level of competence in software development, in the area of financial computing, for implementation in an electronic market environment, as we introduce you to information and communication technology and automation that underpins financial systems, including:

- Design issues relating to parallel and distributed networks
- Encryption, security and real-time constraints
- Straight Through Processing (STP)
- Quantitative finance
- Financial software architecture

Our Centre for Computational Finance and Economic Agents is an innovative and laboratory-based teaching and research centre, with an international reputation for leading-edge, interdisciplinary work combining economic and financial modelling with computational implementation.

Our research is geared towards real-world, practical applications, and many of our academic staff have experience of applying their findings in industry and in advising the UK government.

Read less
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. Read more
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. During the course critical awareness of problems in information transmission, data compression and cryptography is raised, and the mathematical techniques which are commonly used to solve these problems are explored.

The Mathematics Department at Royal Holloway is well known for its expertise in information security and cryptography and our academic staff include several leading researchers in these areas. Students on the programme have the opportunity to carry out their dissertation projects in cutting-edge research areas and to be supervised by experts.

The transferable skills gained during the MSc will open up a range of career options as well as provide a solid foundation for advanced research at PhD level.

See the website https://www.royalholloway.ac.uk/mathematics/coursefinder/mscmathematicsofcryptographyandcommunications(msc).aspx

Why choose this course?

- You will be provided with a solid mathematical foundation and a knowledge and understanding of the subjects of cryptography and communications preparing you for research or professional employment in this area.

- The mathematical foundations needed for applications in communication theory and cryptography are covered including Algebra, Combinatorics Complexity Theory/Algorithms and Number Theory.

- You will have the opportunity to carry out your dissertation project in a cutting-edge research area; our dissertation supervisors are experts in their fields who publish regularly in internationally competitive journals and there are several joint projects with industrial partners and Royal Holloway staff.

- After completing the course former students have a good foundation for the next step of their career both inside and outside academia.

Department research and industry highlights

The members of the Mathematics Department cover a range of research areas. There are particularly strong groups in information security, number theory, quantum theory, group theory and combinatorics. The Information Security Group has particularly strong links to industry.

Course content and structure

You will study eight courses as well as complete a main project under the supervision of a member of staff.

Core courses:
Advanced Cipher Systems
Mathematical and security properties of both symmetric key cipher systems and public key cryptography are discussed as well as methods for obtaining confidentiality and authentication.

Channels
In this unit, you will investigate the problems of data compression and information transmission in both noiseless and noisy environments.

Theory of Error-Correcting Codes
The aim of this unit is to provide you with an introduction to the theory of error-correcting codes employing the methods of elementary enumeration, linear algebra and finite fields.

Public Key Cryptography
This course introduces some of the mathematical ideas essential for an understanding of public key cryptography, such as discrete logarithms, lattices and elliptic curves. Several important public key cryptosystems are studied, such as RSA, Rabin, ElGamal Encryption, Schnorr signatures; and modern notions of security and attack models for public key cryptosystems are discussed.

Main project
The main project (dissertation) accounts for 25% of the assessment of the course and you will conduct this under the supervision of a member of academic staff.

Additional courses:
Applications of Field Theory
You will be introduced to some of the basic theory of field extensions, with special emphasis on applications in the context of finite fields.

Quantum Information Theory
‘Anybody who is not shocked by quantum theory has not understood it' (Niels Bohr). The aim of this unit is to provide you with a sufficient understanding of quantum theory in the spirit of the above quote. Many applications of the novel field of quantum information theory can be studied using undergraduate mathematics.

Network Algorithms
In this unit you will be introduced to the formal idea of an algorithm, when it is a good algorithm and techniques for constructing algorithms and checking that they work; explore connectivity and colourings of graphs, from an algorithmic perspective; and study how algebraic methods such as path algebras and cycle spaces may be used to solve network problems.

Advanced Financial Mathematics
In this unit you will investigate the validity of various linear and non-linear time series occurring in finance and extend the use of stochastic calculus to interest rate movements and credit rating;

Combinatorics
The aim of this unit is to introduce some standard techniques and concepts of combinatorics, including: methods of counting including the principle of inclusion and exclusion; generating functions; probabilistic methods; and permutations, Ramsey theory.

Computational Number Theory
You will be provided with an introduction to many major methods currently used for testing/proving primality and for the factorisation of composite integers. The course will develop the mathematical theory that underlies these methods, as well as describing the methods themselves.

Complexity Theory
Several classes of computational complexity are introduced. You will discuss how to recognise when different problems have different computational hardness, and be able to deduce cryptographic properties of related algorithms and protocols.

On completion of the course graduates will have:
- a suitable mathematical foundation for undertaking research or professional employment in cryptography and/or communications

- the appropriate background in information theory and coding theory enabling them to understand and be able to apply the theory of communication through noisy channels

- the appropriate background in algebra and number theory to develop an understanding of modern public key cryptosystems

- a critical awareness of problems in information transmission and data compression, and the mathematical techniques which are commonly used to solve these problems

- a critical awareness of problems in cryptography and the mathematical techniques which are commonly used to provide solutions to these problems

- a range of transferable skills including familiarity with a computer algebra package, experience with independent research and managing the writing of a dissertation.

Assessment

Assessment is carried out by a variety of methods including coursework, examinations and a dissertation. The examinations in May/June count for 75% of the final average and the dissertation, which has to be submitted in September, counts for the remaining 25%.

Employability & career opportunities

Our students have gone on to successful careers in a variety of industries, such as information security, IT consultancy, banking and finance, higher education and telecommunication. In recent years our graduates have entered into roles including Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security manager at London Underground.

How to apply

Applications for entry to all our full-time postgraduate degrees can be made online https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology. Read more

Designed for

The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology.

It is suitable for those from a computer science or information technology education background. The programme is also able to cater for those with no formal studies in computer science but where significant interest in cyber security can instead be demonstrated.

The Course Provides:

1. Cyber Security in the UK has become a ‘tier 1’ priority alongside international terrorism and major national incidents. The serious threats emerging from the cyber-sphere are a recognised phenomenon worldwide and as such studies in cyber security are strategically important on a global scale.

2. Our goal for the MSc programme is to give focus to the strategic deployment and implementation of Cyber Security within an organization. We want to develop strategic thinkers who understand the Cyber threat to an organization and its resources and are able to build and support secure systems that support the strategic growth of a business.

3. The course covers all aspects of Cyber Security including network security, computer security and information security. You will learn the most important technical concepts of security—such as encryption, intrusion detection, penetration testing, access control, digital forensics and investigation, risk management, security governance and network security.

4. Alongside this, the course focuses on the business context so that students can progress their careers more rapidly through organisations and aim very particularly at management positions.

When you study the MSc Cyber Security and Management at Warwick, you will gain an unparalleded exposure to industry. All taught modules contain considerable input from industry experts who, through case studies and guest lectures, contribute to the design and delivery of material making for a vey rich learning environment.

An example of some of the companies involved in the CSM programme since it was launched in 2012 include HP, Amethyst Consulting, Deep Secure Ltd, Siskin Technology, SOCA (Serious Organised Crime Agency), CSC, VMware, OCSIA, Nottingham Police, Mozilla, Metropolitan Police, Kaspersky, Berwin Leighton Paisner, Telefonica, IBM, Blackstage Forensics, Derbyshire NHS Trust and Nettitude.

You will have additional opportunity to engage with industry through industry visits, conferences, and mentoring or advice from industry experts at key stages of your work.

Course Content

Students study nine taught modules as part of the programme of study.
Core Modules:
1. Security Architectures and Network Defence
2. Cryptosystems and Data Protection
3. Information Risk Management and Governance
4. Industrial Espionage and Counterfeiting
5. Digital Forensics

Elective Modules (3 from this list):
1. Cyber Intelligence and Operations
2. Cyber-Physical Systems
3. Enterprise Cyber Security
4. Globalisation and Outsourcing
5. Financial Analysis and Control Systems
6. Organisations, People and Performance
7. Leadership

A ninth module to be selected from the full list of WMG elective modules.

Learning Style

The taught component of the course is highly interactive and varied with a mixture of lectures, syndicate or group work, practical and lab based work, and technology enabled learning.
Class sizes are kept to a maximum of 30 students per class.
Module leaders are experts in their fields and are supported by external speakers working in organisations at the forefront of their fields.
Assessment is through Post Module Assignment based on the learning objectives of each respective module.
50% of the Masters credit is achieved through your individual project or dissertation, for which you will have close 1-1 supervision
Each module will usually be delivered in intensive one-week blocks so you are fully immersed in the subject area for that period. These one-week sessions are scheduled at intervals from October through to June.

After Your Graduate

Graduates can expect to go on to work within corporate information - security and technology teams, consultancies, government information-security departments, management tracks in information critical organisations and cyber security related research.

Read less
This course is aimed at Computing graduates who wish to specialise further in Computer Science improving their knowledge, understanding, skills and capabilities. Read more

Description

This course is aimed at Computing graduates who wish to specialise further in Computer Science improving their knowledge, understanding, skills and capabilities. Our postgraduate courses are concerned with vocational education, and it is anticipated that the majority of MSc graduates will either enter employment (or continue) as IT/Computing professionals, or progress to doctoral work with a probable view to pursuing academic or research careers.

You will study four specialist, advanced units including High Performance Computing and Big Data and Advanced Computer Networks and Operating Systems. A wide-range of optional units allow you to tailor your course to specialise in areas of your choice. A third of your MSc will consist of a solo project with individual supervision. This is supported by a series of seminars/workshops, but the emphasis is on student-centred learning and recognises expectations about student autonomy, typical of postgraduate level and also is part of the strategy to enhance your employability through the development of confidence, self-awareness and self-sufficiency.

We are a member of the Oracle Academy and highly rated in terms of research. Our supervision and facilities are also excellent.

Core units

- High Performance Computing and Big Data
- Advanced Computer Networks and Operating Systems
- Masters Project

Option units

- Introduction to Data Science
- Enterprise Programming
- Cryptography and Encryption
- Mobile and Ubiquitous Computing
- Data Management and Machine Learning

Career prospects

This course will equip you for a range of IT positions in the private and public sectors and is also a good foundation for further study. Our MSc graduates have entered a wide range of industries or gone onto PhDs, including in the School of Computing, Mathematics and Digital Technology.

Careers support is available from the moment you join us, throughout your time here, and for up to three years after the completion of your course. We have a range of services available through the School of Computing, Mathematics and Digital Technology and the University Careers Service including dedicated careers and employability advisors.

Read less
The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. Read more

Description

The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. This title also includes the basic, key elements of forensic computing: forensics and the legal and ethical issues involved in any digital investigation. Students will gain a broad understanding of the different levels of computer and network security together with the basic phases of a forensic investigation and of computing in general. They will examine wireless communication systems; networks; operating systems and interfacing socket programming; servers and their security implications; and the planning and implementation of network security management, including security, risk analysis and disaster recovery planning.

Units

- Advanced Computer Networks and Operating Systems
- Introduction to Computer Forensics and Security
- Advanced Network Security
- Cryptography and Encryption
- Masters Project

All course units combine with a flexible approach, which allows students to undertake practical project work while attending work placements. With one-third of the course project based, it may be possible to undertake yours in collaboration with an external organisation or within the School. The part-time route is especially suitable if you have industrial experience and wish to update your knowledge. Especially useful in the case of missed classes, the online virtual learning environment, Moodle, provides extensive access to lectures, course materials and assessment information. Assessment will be through coursework, examination and dissertation.

Career prospects

This course will equip you for a range of IT positions in the private and public sectors and is also a good foundation for further study. Our MSc graduates have entered a wide range of industries or gone onto PhDs, including in the School of Computing, Mathematics and Digital Technology.

Careers support is available from the moment you join us, throughout your time here, and for up to three years after the completion of your course. We have a range of services available through the School of Computing, Mathematics and Digital Technology and the University Careers Service including dedicated careers and employability advisors.

Professional Accreditation

The School is an educational affiliate of the British Computing Society – the Chartered Institute for IT in the UK (BCS), a member of the Oracle Academy and an Academy for the Computer Technology Industry Association (CompTIA). Many of the School’s degree programmes are accredited by BCS.

The School is also an academic partner of the Institute of Information Security Professionals who recognise our expertise in the field of information and cyber security. Mathematics degree courses are approved by the Institute of Mathematics and its Applications.

Read less

  • 1
Show 10 15 30 per page


Share this page:

Cookie Policy    X