• University of Derby Online Learning Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • Coventry University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • St Mary’s University, Twickenham Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • New College of the Humanities Featured Masters Courses
De Montfort University Featured Masters Courses
Barcelona Executive Business School Featured Masters Courses
Imperial College London Featured Masters Courses
FindA University Ltd Featured Masters Courses
Northumbria University Featured Masters Courses
"encryption"×
0 miles

Masters Degrees (Encryption)

  • "encryption" ×
  • clear all
Showing 1 to 11 of 11
Order by 
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Currently working in the legal profession? Hoping to specialise in international trade? On this specialist course you’ll gain the skills and knowledge that are particularly sought after in both the legal profession and wider legal practice, with a focus on international trade and business. Read more

Overview

Currently working in the legal profession? Hoping to specialise in international trade? On this specialist course you’ll gain the skills and knowledge that are particularly sought after in both the legal profession and wider legal practice, with a focus on international trade and business.

- Students are taught by an expert team of lecturers with extensive professional experience.
- The course covers key areas in international business, including corporate social responsibility, international commercial disputes, the global digital environment and specifics of international trade.
- The School of Business and Law has its own dedicated campus which includes modern teaching spaces and IT suites equipped with the latest business analytics software.
- The course has strong industry links both locally and internationally.
- Students have the opportunity to build hands-on experience through a work-based project.
- Past students have benefitted from access to a range of guest speakers.

The industry -

Southampton Solent’s international trade regulation course has been developed in conjunction with a wide range of legal professionals including solicitors, barristers, company secretaries, legal consultants and compliance officers.

Within the legal profession, a postgraduate specialisation on top of a law degree could offer a significant career advantage. This course offers students the opportunity to gain specialised skills and knowledge that can enhance suitability for roles in business, public sector or governmental organisations.

The programme -

Focusing on international legal business structures, this master’s course aims to provide students with an in-depth understanding of international business agreements and dispute resolution mechanisms.

Students study a broad range of contemporary topics including legal regulation, mechanisms of obtaining redress in international commercial disputes, issues relating to the protection of creative endeavour in the digital environment, and the specifics of international trade.

Delving into these subjects teaches students about corporate social responsibility; the Law of Corporations; shareholder rights and the duties of directors; ‘private international law’; ‘conflict of laws’; arbitration agreements; intellectual property rights; domain names; licensing; digital rights management and encryption; data protection and information privacy.

During the course, students will also study standard trade terms, major international trade conventions, the sale, transport and regulation of goods, customs regulations, services and capital in the EU and beyond, e-commerce, electronic contracts, and computer crime.

Practice-based case studies give students the opportunity to apply newly acquired skills to the real world. A work-based project, either with a current employer or under placement, also provides first-hand experience of the field of international trade. The University can help finding placements, which could mean working with employers such as Medicom Healthcare, Lawdit Solicitors and other similar organisations.

Previous students have benefitted from a programme of guest lectures from speakers including commercial solicitors, managing partners, police officers, trading standards officers, barristers and members of the judiciary.

Course Content

LLM International Trade Regulation comprises five core units, including a work-based project which accounts for a third of the course.

Law and Regulation of International Business Organisations: This unit focuses on the functioning and types of business organisations typical across the world, and their legal regulation. Subjects include corporate social responsibility, the Law of Corporations, shareholder rights and the duties of directors.

International Commercial Enforcement and Dispute Resolution: This unit is primarily concerned with mechanisms of obtaining redress in international commercial disputes. It focuses on what is traditionally called ‘private international law’ or ‘conflict of laws’ but it develops further to cover areas such as arbitration and arbitration agreements.

Creativity and Regulation in the Global Digital Environment: This unit focuses on issues relating to the protection of creative endeavour in the digital environment, covering intellectual property rights, domain names, licensing, digital rights management and encryption, data protection and information privacy. You will also have a chance to build practical skills in the valuation of intellectual property and due diligence processes.

The International Market in Goods and Services: This unit focuses on the specifics of international trade, covering standard trade terms, major international trade conventions, the sale, transport and regulation of goods, and customs regulations. You will also study services and capital in the EU, e-commerce, electronic contracts and computer crime.

Work-Based Project: The work-based project provides an exciting opportunity to put your newly-learned knowledge to a practical purpose for either a current employer or as part of a short-term placement. Example projects include a study of intellectual property protection or data protection compliance in the company, a review of trade regulation and export opportunities in the EU, or various other possibilities.

Programme specification document - http://mycourse.solent.ac.uk/course/view.php?id=6152

Teaching, learning and assessment -

The course is primarily classroom-based, with a practical work-based project.

Work experience -

The work-based project is a great opportunity to apply your learning to the real world. The University has a wide range of contacts with employers within the sector and you will be supported in finding and securing a suitable placement though ultimately it is the student’s responsibility to do so.

If you are already in employment and studying with us part-time, you may undertake the placement with your existing employer. In the unlikely event of a student not being able to secure a placement, a written project will be submitted instead.

Assessment -

Coursework, plus a work-based project that accounts for a third of your final mark.

Web-based learning -

The University’s virtual learning environment is an integral part of master’s study. It provides you with access to course content, case studies and additional study resources, as well as interaction with peers and tutors.

Why Solent?

What do we offer?

From a vibrant city centre campus to our first class facilities, this is where you can find out why you should choose Solent.

Facilities - http://www.solent.ac.uk/about/facilities/facilities.aspx

City living - http://www.solent.ac.uk/studying/southampton/living-in-southampton.aspx

Accommodation - http://www.solent.ac.uk/studying/accommodation/accommodation.aspx

Career Potential

Within the legal profession, a postgraduate specialisation on top of your law degree could offer a significant career advantage. On this course, you’ll gain specialised skills and knowledge that will enhance your suitability for roles in business, public-sector or governmental organisations.

Suitable roles for graduates of this course are:

- In-house lawyer
- Legal executive
- Paralegal
- Trademark and patent attorney
- Company secretary

Links with industry -

The course was developed in conjunction with an extensive variety of legal professionals including solicitors, barristers, company secretaries and legal consultants and compliance officers.

You will also benefit from Solent’s programme of professional guest speakers such as commercial solicitors, managing partners, police, trading standards officers, barristers and members of the judiciary.

Transferable skills -

High-level research and planning skills, due diligence presenting written and oral material, working independently and in groups.

Tuition fees

The tuition fees for the 2016/2017 academic year are:

UK and EU full-time fees: £4,635

International full-time fees: £11,260

UK and EU part-time fees: £2,320 per year

International part-time fees: £5,630 per year

Graduation costs -

Graduation is the ceremony to celebrate the achievements of your studies. For graduates in 2015, there is no charge to attend graduation, but you will be required to pay for the rental of your academic gown (approximately £42 per graduate, depending on your award). You may also wish to purchase official photography packages, which range in price from £15 to £200+. Graduation is not compulsory, so if you prefer to have your award sent to you, there is no cost.
For more details, please visit: http://www.solent.ac.uk/studying/graduation/home.aspx

Next steps

Want to gain a competitive edge in your legal career? Southampton Solent’s specialised international trade regulation master’s degree can enhance your existing law qualifications and provide you with the skills and knowledge required to further your career.

Read less
The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. Read more
The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. This title also includes the basic, key elements of forensic computing: forensics and the legal and ethical issues involved in any digital investigation.

Students will gain a broad understanding of the different levels of computer and network security together with the basic phases of a forensic investigation and of computing in general. They will examine wireless communication systems; networks; operating systems and interfacing socket programming; servers and their security implications; and the planning and implementation of network security management, including security, risk analysis and disaster recovery planning.

Non means-tested loans of up to a maximum of £10,000 will be available to postgraduate master’s students.

Features and benefits of the course

-The School has an extensive range of equipment in our own specialist laboratories which is supported by a dedicated team of technical staff.
-Research in the School was rated 'internationally excellent' with some rated 'world-leading' in the 2014 Research Excellence Framework (REF).
-Our online virtual learning platform Moodle, provides access to lectures, course materials and assessment information.
-Classes are concentrated on certain days of the week to facilitate part-time students’ attendance and allow full-time students to undertake part-time employment if necessary.
-The School of Computing, Mathematics and Digital Technology is a member of the Oracle Academy.
-We are an academic partner of the Institute of Information Security Professionals (IISP). This partner status recognises our expertise in the field of information and cyber security.
-We are also an Academy of the Computer Technology Industry Association (CompTIA) and deliver their partner programme which provides a pathway for students towards a rewarding, high-growth IT career.

About the Course

You will study advanced topics in computer networks and operating systems, focusing on principles, architectures and protocols used in modern large scale networked systems.

Cryptography and encryption studies cover classical cryptography, key encryption algorithms, how to code algorithms and their variants in a modern programming language and implement cryptosystems over a computer network.

You will develop skills to design and implement advanced security mechanisms in a network environment, considering in depth wired and wireless network security and the best practice in the field.

All course units combine with a flexible approach, which allows students to undertake practical project work while attending work placements. With one-third of the course project-based, it may be possible to undertake yours in collaboration with an external organisation or within the School.

The Masters project will involve practical system creation or experimentation work. Where appropriate, the implementation or experimentation may be work-based.

Assessment details

Assessment will be through coursework, examination and dissertation.

Read less
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. Read more
This highly focused MSc explores some of the mathematics behind modern secure information and communications systems, specialising in mathematics relevant for public key cryptography, coding theory and information theory. During the course critical awareness of problems in information transmission, data compression and cryptography is raised, and the mathematical techniques which are commonly used to solve these problems are explored.

The Mathematics Department at Royal Holloway is well known for its expertise in information security and cryptography and our academic staff include several leading researchers in these areas. Students on the programme have the opportunity to carry out their dissertation projects in cutting-edge research areas and to be supervised by experts.

The transferable skills gained during the MSc will open up a range of career options as well as provide a solid foundation for advanced research at PhD level.

See the website https://www.royalholloway.ac.uk/mathematics/coursefinder/mscmathematicsofcryptographyandcommunications(msc).aspx

Why choose this course?

- You will be provided with a solid mathematical foundation and a knowledge and understanding of the subjects of cryptography and communications preparing you for research or professional employment in this area.

- The mathematical foundations needed for applications in communication theory and cryptography are covered including Algebra, Combinatorics Complexity Theory/Algorithms and Number Theory.

- You will have the opportunity to carry out your dissertation project in a cutting-edge research area; our dissertation supervisors are experts in their fields who publish regularly in internationally competitive journals and there are several joint projects with industrial partners and Royal Holloway staff.

- After completing the course former students have a good foundation for the next step of their career both inside and outside academia.

Department research and industry highlights

The members of the Mathematics Department cover a range of research areas. There are particularly strong groups in information security, number theory, quantum theory, group theory and combinatorics. The Information Security Group has particularly strong links to industry.

Course content and structure

You will study eight courses as well as complete a main project under the supervision of a member of staff.

Core courses:
Advanced Cipher Systems
Mathematical and security properties of both symmetric key cipher systems and public key cryptography are discussed as well as methods for obtaining confidentiality and authentication.

Channels
In this unit, you will investigate the problems of data compression and information transmission in both noiseless and noisy environments.

Theory of Error-Correcting Codes
The aim of this unit is to provide you with an introduction to the theory of error-correcting codes employing the methods of elementary enumeration, linear algebra and finite fields.

Public Key Cryptography
This course introduces some of the mathematical ideas essential for an understanding of public key cryptography, such as discrete logarithms, lattices and elliptic curves. Several important public key cryptosystems are studied, such as RSA, Rabin, ElGamal Encryption, Schnorr signatures; and modern notions of security and attack models for public key cryptosystems are discussed.

Main project
The main project (dissertation) accounts for 25% of the assessment of the course and you will conduct this under the supervision of a member of academic staff.

Additional courses:
Applications of Field Theory
You will be introduced to some of the basic theory of field extensions, with special emphasis on applications in the context of finite fields.

Quantum Information Theory
‘Anybody who is not shocked by quantum theory has not understood it' (Niels Bohr). The aim of this unit is to provide you with a sufficient understanding of quantum theory in the spirit of the above quote. Many applications of the novel field of quantum information theory can be studied using undergraduate mathematics.

Network Algorithms
In this unit you will be introduced to the formal idea of an algorithm, when it is a good algorithm and techniques for constructing algorithms and checking that they work; explore connectivity and colourings of graphs, from an algorithmic perspective; and study how algebraic methods such as path algebras and cycle spaces may be used to solve network problems.

Advanced Financial Mathematics
In this unit you will investigate the validity of various linear and non-linear time series occurring in finance and extend the use of stochastic calculus to interest rate movements and credit rating;

Combinatorics
The aim of this unit is to introduce some standard techniques and concepts of combinatorics, including: methods of counting including the principle of inclusion and exclusion; generating functions; probabilistic methods; and permutations, Ramsey theory.

Computational Number Theory
You will be provided with an introduction to many major methods currently used for testing/proving primality and for the factorisation of composite integers. The course will develop the mathematical theory that underlies these methods, as well as describing the methods themselves.

Complexity Theory
Several classes of computational complexity are introduced. You will discuss how to recognise when different problems have different computational hardness, and be able to deduce cryptographic properties of related algorithms and protocols.

On completion of the course graduates will have:
- a suitable mathematical foundation for undertaking research or professional employment in cryptography and/or communications

- the appropriate background in information theory and coding theory enabling them to understand and be able to apply the theory of communication through noisy channels

- the appropriate background in algebra and number theory to develop an understanding of modern public key cryptosystems

- a critical awareness of problems in information transmission and data compression, and the mathematical techniques which are commonly used to solve these problems

- a critical awareness of problems in cryptography and the mathematical techniques which are commonly used to provide solutions to these problems

- a range of transferable skills including familiarity with a computer algebra package, experience with independent research and managing the writing of a dissertation.

Assessment

Assessment is carried out by a variety of methods including coursework, examinations and a dissertation. The examinations in May/June count for 75% of the final average and the dissertation, which has to be submitted in September, counts for the remaining 25%.

Employability & career opportunities

Our students have gone on to successful careers in a variety of industries, such as information security, IT consultancy, banking and finance, higher education and telecommunication. In recent years our graduates have entered into roles including Principal Information Security Consultant at Abbey National PLC; Senior Manager at Enterprise Risk Services, Deloitte & Touche; Global IT Security Director at Reuters; and Information Security manager at London Underground.

How to apply

Applications for entry to all our full-time postgraduate degrees can be made online https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology. Read more

Designed for

The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology.

It is suitable for those from a computer science or information technology education background. The programme is also able to cater for those with no formal studies in computer science but where significant interest in cyber security can instead be demonstrated.

The Course Provides:

1. Cyber Security in the UK has become a ‘tier 1’ priority alongside international terrorism and major national incidents. The serious threats emerging from the cyber-sphere are a recognised phenomenon worldwide and as such studies in cyber security are strategically important on a global scale.

2. Our goal for the MSc programme is to give focus to the strategic deployment and implementation of Cyber Security within an organization. We want to develop strategic thinkers who understand the Cyber threat to an organization and its resources and are able to build and support secure systems that support the strategic growth of a business.

3. The course covers all aspects of Cyber Security including network security, computer security and information security. You will learn the most important technical concepts of security—such as encryption, intrusion detection, penetration testing, access control, digital forensics and investigation, risk management, security governance and network security.

4. Alongside this, the course focuses on the business context so that students can progress their careers more rapidly through organisations and aim very particularly at management positions.

When you study the MSc Cyber Security and Management at Warwick, you will gain an unparalleded exposure to industry. All taught modules contain considerable input from industry experts who, through case studies and guest lectures, contribute to the design and delivery of material making for a vey rich learning environment.

An example of some of the companies involved in the CSM programme since it was launched in 2012 include HP, Amethyst Consulting, Deep Secure Ltd, Siskin Technology, SOCA (Serious Organised Crime Agency), CSC, VMware, OCSIA, Nottingham Police, Mozilla, Metropolitan Police, Kaspersky, Berwin Leighton Paisner, Telefonica, IBM, Blackstage Forensics, Derbyshire NHS Trust and Nettitude.

You will have additional opportunity to engage with industry through industry visits, conferences, and mentoring or advice from industry experts at key stages of your work.

Course Content

Students study nine taught modules as part of the programme of study.
Core Modules:
1. Security Architectures and Network Defence
2. Cryptosystems and Data Protection
3. Information Risk Management and Governance
4. Industrial Espionage and Counterfeiting
5. Digital Forensics

Elective Modules (3 from this list):
1. Cyber Intelligence and Operations
2. Cyber-Physical Systems
3. Enterprise Cyber Security
4. Globalisation and Outsourcing
5. Financial Analysis and Control Systems
6. Organisations, People and Performance
7. Leadership

A ninth module to be selected from the full list of WMG elective modules.

Learning Style

The taught component of the course is highly interactive and varied with a mixture of lectures, syndicate or group work, practical and lab based work, and technology enabled learning.
Class sizes are kept to a maximum of 30 students per class.
Module leaders are experts in their fields and are supported by external speakers working in organisations at the forefront of their fields.
Assessment is through Post Module Assignment based on the learning objectives of each respective module.
50% of the Masters credit is achieved through your individual project or dissertation, for which you will have close 1-1 supervision
Each module will usually be delivered in intensive one-week blocks so you are fully immersed in the subject area for that period. These one-week sessions are scheduled at intervals from October through to June.

After Your Graduate

Graduates can expect to go on to work within corporate information - security and technology teams, consultancies, government information-security departments, management tracks in information critical organisations and cyber security related research.

Read less
This course runs in Germany. This course covers a range of essential topics related to distributed computing systems. Yet these modules are not isolated; each one takes its place in the field in relation to others. Read more

About the course

This course runs in Germany.

This course covers a range of essential topics related to distributed computing systems. Yet these modules are not isolated; each one takes its place in the field in relation to others.

The emphasis in the course is to build the connections between topics, enabling software engineers to achieve co-operation between distinct autonomous systems under constraints of cost and performance requirements.

The course is suitable for:

Recent graduates in Electrical or Electronic Engineering or Computer Science, who wish to develop their skills in the field of distributed computing systems.
Practicing engineers and computer professionals who wish to develop their knowledge in this area.
People with suitable mathematical, scientific or other engineering qualifications, usually with some relevant experience, who wish to enter this field.

Aims

The past few years have witnessed that Grid computing is evolving as a promising large-scale distributed computing infrastructure for scientists and engineers around the world to share various resources on the Internet including computers, software, data, instruments.

Many countries around the world have invested heavily on the development of the Grid computing infrastructure. Many IT companies have been actively involved in Grid development. Grid computing has been applied in a variety of areas such as particle physics, bio-informatics, finance, social science and manufacturing. The IT industry has seen the Grid computing infrastructure as the next generation of the Internet.

The aim of the programme is to equip high quality and ambitious graduates with the necessary advanced technical and professional skills for an enhanced career either in industry or leading edge research in the area of distributed computing systems.

Specifically, the main objectives of the programme are:

To critically appraise advanced technologies for developing distributed systems;
To practically examine the development of large scale distributed systems;
To critically investigate the problems and pitfalls of distributed systems in business, commerce, and industry.

Course Content

Compulsory Modules:

Computer Networks
Network Security and Encryption
Distributed Systems Architecture
Project and Personal Management
High Performance Computing and Big Data
Software Engineering
Embedded Systems Engineering
Intelligent Systems
Dissertation

Special Features

Electronic and Computer Engineering is one of the largest disciplines in the University, with a portfolio of research contracts totalling £7.5 million, and has strong links with industry.

The laboratories are well equipped with an excellent range of facilities to support the research work and courses. We have comprehensive computing resources in addition to those offered centrally by the University. The discipline is particularly fortunate in having extensive gifts of software and hardware to enable it to undertake far-reaching design projects.

We have a wide range of research groups, each with a complement of academics and research staff and students. The groups are:

Media Communications
Wireless Networks and Communications
Power Systems
Electronic Systems
Sensors and Instrumentation.

Women in Engineering and Computing Programme

Brunel’s Women in Engineering and Computing mentoring scheme provides our female students with invaluable help and support from their industry mentors.

Accreditation

Distributed Computing Systems Engineering is accredited by the Institution of Engineering and Technology (IET).

Read less
This course can help you fast-track your career in cyber security. It is designed for computer professionals who have an interest in finding and fixing vulnerabilities, encryption, intrusion detection and managing cyber risks and network security. Read more
This course can help you fast-track your career in cyber security. It is designed for computer professionals who have an interest in finding and fixing vulnerabilities, encryption, intrusion detection and managing cyber risks and network security.

Depending on your choice of units, you may study evidence collection, counterintelligence, internet crime, business continuity, network security policies, network firewalls, authentication and web server security.

This course is for graduates with a computing background. It provides a detailed coverage of the key concepts and challenges in data and resource protection and computer software security, with a focus on both high-level concepts and low-level practical aspects of information security.

Graduates may find employment as computer security experts in many different organisations due to the pervasive nature of modern computing, but particular demand will come from the areas of web-based services, banking, information retrieval and national security.

2016 Curtin International Scholarships: Merit Scholarship

Curtin University is an inspiring, vibrant, international organisation, committed to making tomorrow better. It is a beacon for innovation, driving advances in technology through high-impact research and offering more than 100 practical, industry-aligned courses connecting to workplaces of tomorrow.

Ranked in the top two per cent of universities worldwide in the Academic Ranking of World Universities 2015, the University is also ranked 25th in the world for universities under the age of 50 in the QS World University Rankings 2015 Curtin also received an overall five-star excellence rating in the QS stars rating.

Curtin University strives to give high achieving international students the opportunity to gain an internationally recognised education through offering the Merit Scholarship. The Merit Scholarship will give you up to 25 per cent of your first year tuition fees and if you enrol in an ELB program at Curtin English before studying at Curtin, you will also receive a 10 per cent discount on your Curtin English fees.

For full details and terms and conditions of this scholarship, please visit: curtin.edu/int-scholarships and click on Merit.

Read less
The rigorous training on our MSc Financial Computing focuses on software engineering for large, dynamic and automated financial systems and finance models. Read more
The rigorous training on our MSc Financial Computing focuses on software engineering for large, dynamic and automated financial systems and finance models. This, alongside work on software design in a number of real-world financial systems, will enable you to become a leader in this field.

This course should interest you if you have a good first degree in computer science or engineering, or a BSc degree that provided a high level of programming expertise such as C++ and/or .NET. You receive training on the structure, instruments and institutional aspects of financial markets, banking, payment and settlement systems.

You will attain a high level of competence in software development, in the area of financial computing, for implementation in an electronic market environment, as we introduce you to information and communication technology and automation that underpins financial systems, including:
-Design issues relating to parallel and distributed networks
-Encryption, security and real-time constraints
-Straight Through Processing (STP)
-Quantitative finance
-Financial software architecture

Our Centre for Computational Finance and Economic Agents is an innovative and laboratory-based teaching and research centre, with an international reputation for leading-edge, interdisciplinary work combining economic and financial modelling with computational implementation.

Our research is geared towards real-world, practical applications, and many of our academic staff have experience of applying their findings in industry and in advising the UK government.

This course is also available on a part-time basis.

Professional accreditation

This degree is accredited by the Institution of Engineering and Technology (IET).This accreditation is increasingly sought by employers, and provides the first stage towards eventual professional registration as a Chartered Engineer (CEng).

Our expert staff

This course is taught by experts with both academic and industrial expertise in the financial and IT sectors. We bring together leading academics in the field from our Department of Economics, School of Computer Science and Electronic Engineering, and Essex Business School.

Our staff are currently researching the development of real-time trading platforms, new financial econometric models for real-time data, the use of artificially intelligent agents in the study of risk and market-based institutions, operational aspects of financial markets, financial engineering, portfolio and risk management.

Specialist facilities

We are one of the largest and best resourced computer science and electronic engineering schools in the UK. Our work is supported by extensive networked computer facilities and software aids, together with a wide range of test and instrumentation equipment.
-We have six laboratories that are exclusively for computer science and electronic engineering students. Three are open 24/7, and you have free access to the labs except when there is a scheduled practical class in progress
-All computers run either Windows 7 or are dual boot with Linux
-Software includes Java, Prolog, C++, Perl, Mysql, Matlab, DB2, Microsoft Office, Visual Studio, and Project
-Students have access to CAD tools and simulators for chip design (Xilinx) and computer networks (OPNET)
-We also have specialist facilities for research into areas including non-invasive brain-computer interfaces, intelligent environments, robotics, optoelectronics, video, RF and MW, printed circuit milling, and semiconductors

Your future

We have an extensive network of industrial contacts through our City Associates Board and our alumni, while our expert seminar series gives you the opportunity to work with leading figures from industry.

Our recent graduates have gone on to become quantitative analysts, portfolio managers and software engineers at various institutions, including:
-HSBC
-Mitsubishi UFJ Securities
-Old Mutual
-Bank of England

We also work with the university’s Employability and Careers Centre to help you find out about further work experience, internships, placements, and voluntary opportunities.

Example structure

-CCFEA MSc Dissertation
-Big-Data for Computational Finance
-Cloud Technologies and Systems
-High Performance Computing
-Introduction to Financial Market Analysis
-Professional Practice and Research Methodology
-Quantitative Methods in Finance and Trading
-Computer Security (optional)
-Constraint Satisfaction for Decision Making (optional)
-Creating and Growing a New Business Venture (optional)
-Digital Signal Processing (optional)
-E-Commerce Programming (optional)
-Financial Engineering and Risk Management (optional)
-High Frequency Finance and Empirical Market Microstructure (optional)
-IP Networking and Applications (optional)
-Learning and Computational Intelligence in Economics and Finance (optional)
-Mathematical Research Techniques Using Matlab (optional)
-Mobile & Social Application Programming (optional)
-Programming in Python (optional)
-Industry Expert Lectures in Finance (optional)

Read less
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. Read more
On this GCHQ provisionally accredited programme you will learn the essential skills to support cyber security within commercial and government organisations. This includes the technical side of encryption, authentication, biometrics, network security, etc as well as information security management and cyber security risk.

This MSc is aimed at computing graduates with strong programming skills seeking careers as cyber security professionals or careers that need a systematic and deep understanding of the subject. It would also be an excellent starting point for those wishing to carry out further research in cyber security.

Visit the website https://www.kent.ac.uk/courses/postgraduate/1225/cyber-security

About the School of Computing

Our world-leading researchers, in key areas such as systems security, programming languages, communications, computational intelligence and memory management, and in interdisciplinary work with biosciences and psychology, earned us an outstanding result in the most recent national research assessment.

The School hosts the University's GCHQ/EPSRC accredited Academic Centre of Excellence in Cyber Security Research, one of only 13 in the country.

In addition, two of our staff have been honoured as Distinguished Scientists by the ACM and we have also held Royal Society Industrial Fellowships.

As an internationally recognised Centre of Excellence for programming education, the School of Computing is a leader in computer science teaching. Two of our staff have received the ACM SIGCSE Award for Outstanding Contribution to Computer Science Education. We are also home to two National Teaching Fellows, to authors of widely used textbooks and to award-winning teaching systems such as BlueJ.

Modules

The following modules are indicative of those offered on this programme. This list is based on the current curriculum and may change year to year in response to new curriculum developments and innovation. Most programmes will require you to study a combination of compulsory and optional modules. You may also have the option to take modules from other programmes so that you may customise your programme and explore other subject areas that interest you.

Assessment

Assessment is through a combination of unseen written examinations, written and practical coursework, student presentations, individual and group projects.

The substantial research or development project undertaken for other programmes is assessed by dissertation.

Programme aims

This programme aims to:

- enhance the career prospects of graduates seeking employment in the computing/IT sector

- prepare you for research and/or professional practice at the forefront of the discipline

- develop an integrated and critically aware understanding of one or more areas of computing/IT and their applications (according to your degree title)

- develop a variety of advanced intellectual and transferable skills

- equip you with the lifelong learning skills necessary to keep abreast of future developments in the field.

Study support

We provide an extensive support framework for our research students and encourage involvement in the international research community.

We have strong links with industry including Cisco, IBM, Microsoft and Oracle.

Postgraduate resources

The School of Computing has a large range of equipment providing both UNIX (TM) and PCbased systems and a cluster facility consisting of 30 Linux-based PCs for parallel computation. New resources include a multi-core enterprise server with 128 hardware threads and a virtual machine server that supports computer security experiments.

All students benefit from a well-stocked library, giving access to e-books and online journals as well as books, and a high bandwidth internet gateway. The School and its research groups hold a series of regular seminars presented by staff as well as by visiting speakers and our students are welcome to attend.

The School of Computing has a makerspace on the Canterbury campus, which offers exciting new teaching and collaboration opportunities. Among other equipment, it contains milling machines, a 3D printer, laser cutter and extensive space for building and making digital artefacts. The School also owns speciallist equipment for Internet of Things and media steganography.

Our taught postgraduate students enjoy a high level of access to academic staff and have their own dedicated laboratory and study room. Students whose course includes an industrial placement are supported by a dedicated team which helps them gain a suitable position and provides support throughout the placement.

Links with industry

Strong links with industry underpin all our work, notably with Cisco, Microsoft, Oracle, IBM, Agilent Technologies, Erlang Solutions, Hewlett Packard Laboratories, Ericsson, Nvidia and Nexor.

Global Skills Award

All students registered for a taught Master's programme are eligible to apply for a place on our Global Skills Award Programme (http://www.kent.ac.uk/graduateschool/skills/programmes/gsa.html). The programme is designed to broaden your understanding of global issues and current affairs as well as to develop personal skills which will enhance your employability.

Careers

Our graduates go on to work for leading companies including Cisco, GlaxoSmithKline, IBM, Intel, Lilly, Microsoft, Morgan Stanley, Thomson Reuters and T-Mobile. Many have gone on to develop their careers as project leaders and managers.

Find out how to apply here - https://www.kent.ac.uk/courses/postgraduate/apply/

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less

  • 1
Show 10 15 30 per page



Cookie Policy    X