• Northumbria University Featured Masters Courses
  • Aberystwyth University Featured Masters Courses
  • Swansea University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • University of Bristol Featured Masters Courses
King’s College London Featured Masters Courses
University College London Featured Masters Courses
University College London Featured Masters Courses
Birmingham City University Featured Masters Courses
University of Hertfordshire Featured Masters Courses
"ethical" AND "hacking"×
0 miles

Masters Degrees (Ethical Hacking)

We have 25 Masters Degrees (Ethical Hacking)

  • "ethical" AND "hacking" ×
  • clear all
Showing 1 to 15 of 25
Order by 
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system. Read more
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system.

Postgraduate funding (tuition fee and living cost loan) may be available from the Student Awards Agency for Scotland for those who meet the eligibility criteria.

Why choose this course?

-Abertay is the only university in the UK that offers a Masters programme in Ethical Hacking.
-It provides the core skills to allow you to take positions in a variety of companies where computer security is a major issue.
-Graduates will be at the forefront of new developments in security.
-Benefit from an active teaching group with a growing reputation based on industry links and Knowledge Transfer projects.
-It is delivered in a project based, entrepreneurial and enterprise culture.

Our students are passionate about their subject area and developing their knowledge. Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns.

We aim to change the way you think. We encourage lively debates about pertinent ethical and security issues. Students develop the hacker mindset, determined to ‘do their bit’ to improve security in the world of Computing.

Join our Graduate School

Our Graduate School is a dedicated facility providing support, training and professional development opportunities to our vibrant postgraduate community. Specially designed to promote integration and inculcation of interdisciplinary working in our next generation of researchers, postgraduates study and learn together at Abertay - from Environmental Management to Law, Psychology, Bioscience, Economics and Business, Cybersecurity and Computer Games Development.

When you join us as a postgraduate student or researcher, you’ll be joining a community of creative like-minded scholars and will automatically be provided with access to our dedicated study and social spaces – a forum in which you can meet, work and learn with other researchers and postgraduates from across the University. You’ll benefit from training and professional development opportunities as well as support with funding applications, placement opportunities, teaching support, public engagement and outreach activity.

What you study

From forensic computing to network security, the course covers a wide range of subjects. Within these, you will learn about web hacking, password cracking, malware analysis, port scanning, buffer overflows and much more.

You also learn how to evaluate the impact of security problems and recommend improvements to a network’s security within a legal and ethical framework. You will also conduct a masters project within an area of cybersecurity that will allow you to build on your existing skills.

How you learn

Teaching is focused on lectures and practical sessions in dedicated classrooms. Lectures are used to present the key concepts, while practicals increase your understanding of the subject and allow you to develop your competence in technological and theoretical work. The course is taught using a problem-based learning approach. You will spend about 12 hours per week attending classes and about 30 hours a week of private study.

How you are assessed

The taught course will be assessed using a combination of written coursework, presentations and seminars, with a written dissertation at MSc level.

Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. Read more

IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. .. to be able to mitigate the possible cyber attacks to their organizations.

This master's degree, aimed mainly at professionals with experience in systems engineering or in the world of programming, who seek to turn their career and specialize in the world of cybersecurity.

This program has 136 hours of face-to-face training in Madrid, which will work with a theoretical-practical methodology through real cases, conferences with professionals of the sector and seminars, enhancing Networking.

Students who successfully complete this program will obtain a Dual Degree from the Universidad Camilo José Cela and a Master's Degree from the IMF Business School. They will also get a Deloitte CyberSOC Degree and 3 Deloitte Associate level certifications for Safe Development, Ethical Hacking and Forensic Analysis. They will have at their disposal all the advantages of MFI:

  • Program Scholarships and Study Grants
  • Recruiters with over 12,000 vacancies posted in the last year
  • Unlimited tutoring
  • Financing up to 12 months without interest or bank intervention
  • Virtual library with over 30,000 references
  • Virtual library with access to any master classes
  • Access to the VIP Club with discounts on leisure, travel, restaurants ...

TEMARY:

  • MODULE I - Cyber ​​intelligence
  • MODULE II - Safe Development
  • MODULE III - Monitoring and Correlation of Security Events (SIEM)
  • MODULE IV - Ethical Hacking
  • MODULE V - Forensic Analysis
  • MODULE VI - Reverse Engineering
  • MODULE VII - Security in Mobile Environments
  • MODULE VIII - Final Master's Work


Read less
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies. Read more
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies.

This will be achieved by industry-led, research-informed, practice-based teaching and learning. Using industry-standard resources, you will apply the skills and knowledge gained to real-life project scenarios across industry, commerce and public sector.

The programme of study will include areas such as requirements capture, network design, evaluation, securing and optimisation, ranging from hardware configuration to protocol analysis and software definition. The programme will include research and scholarly activity in order to incorporate the latest thinking into the proposed solution.

What's covered in the course?

On this course, you will learn to:
-Critically evaluate and apply knowledge of advanced routing principles.
-Evaluate and apply advanced routing protocols for specific networking solutions.
-Evaluate a variety of routing techniques for a given network environment.
-Critically evaluate routing policy requirements for a network.
-Design and implement ethernet-based LANs. Ensuring security within the given environment.
-Apply mathematical analysis to use VLSM efficiently.
-Apply security considerations to the design and management of networks.
-Design/plan and implement LAN/WAN solutions which require switched hybrid.
-Critically assess SDN solutions in both the industry and research domains.
-Design an SDN-based network for a given system, identifying appropriate components and network structure.
-Implement an appropriate SDN controller to manage device configuration, and any other relevant network policies within an SDN network.
-Select, plan and implement an appropriate testing strategy to validate security requirements against a threat model.
-Critically evaluate the requirements for penetration testing, ethical hacking and effectively communicate security audit results to a variety of audiences.
-Design and conduct security assessment experiments to expose security vulnerabilities and to interpret, analyse and critically evaluate the resulting data to recommend remedial actions.
-Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within the organisation.

Why choose us?

-The Centre for Cloud Computing houses the Cisco Networking Academy, which has an international reputation for delivering high-quality teaching, training and support acrossEurope, the Middle East and Africa.
-In six purpose-built rooms, the Centre also houses £500,000 of computer networking and communications equipment, together with more than £200,000 of web-based equipment and bookable resources.
-The course provides opportunities for you to engage in advanced studies using problem-based learning and flipped curricula strategies. You will work in groups and on your own to deliver solutions to industry-related problems and scenarios.
-The unique combination of employer-led, research-informed technical knowledge and practical experience on industry-standard resources makes our graduates more employable and sought after.
-The course encourages critical thinking and problem solving, giving you the opportunities for research.

Course in depth

All the modules are practice-based and learning is carried out in the labs. Each 20-credit module will have two hours contact, and you are expected to undertake approximately six additional hours of learning, research and assessment preparation for each module.

Assessment is carried out through presentations (both group and individual), timed tests and exams, written reports, research activity and publication of findings, and practical-based time assessments.

At the start of the course, there will be a three-week, full-time induction tool kit, comprising of a review of CCNA and associated technologies.

The course also provides the base knowledge for students to undertake the CCNA certification, and with an additional boot camp to undertake the individual CCNP certification exams.

Modules
-Information Security 20 credits
-Software Defined Network Engineering 20 credits
-Advanced Networking Systems 20 credits
-Network Management 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods 20 credits
-Project and placement 60 credits

Enhancing your employability skills

The University is eager to recognise students have made the effort to gain industry experience and stand out from the typical graduate. Thus, we offer a range of options for you to get extra awards and recognition for your work in industry.

We also have our Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less
In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. Read more

In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. And in 2015 cybersecurity has been identified at the World Economic Forum as one of the major risks in the world economy.

Therefore, given the growing demand for skilled professionals, IMF Business School, Deloitte and the University Camilo Jose Cela, have developed this Master in Cybersecurity, who manages to accommodate the needs of stakeholders, opting for an online high-level training with the ease of do it from anywhere. It is the only fully online master market 60 ECTS and supported by a University Moreover, the best students will be selected by Deloitte to perform CyberSOC internship at Deloitte, with high rates of joining Deloitte after completion.

This Master enables you to:

  • Acquire the skills to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • Develop techniques and use tools to fully exploit your skills and knowledge to perform penetration testing to systems and networks.
  • Get a general and introductory vision to the world of cybersecurity, explaining the most important attacks and how to mitigate them.
  • Knowing the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • Assimilate enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Knowing the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • Perform developments in secure programming and improve your skills in security audit in the analysis and evaluation of the application source code.

Objectives

Get a comprehensive and thorough knowledge in disciplines such as Cyber ​​Intelligence, malware analysis, technical audits of systems and networks (ethical hacking), forensic analysis and management of security incidents, secure web application development and monitoring and correlation of security events (SIEM through technologies).

Students:

  • You get a general and introductory vision to the world of cybersecurity, knowing the most important attacks and how to mitigate them.
  • It will acquire the necessary steps to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • It will develop technical skills and learn to use tools to fully exploit their skills and knowledge to perform penetration testing to systems and networks.
  • You know the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • He assimilated enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Learn the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • He will qualify as a developer in secure programming skills and improve security auditors in the analysis and evaluation of the application source code.

Methodology and Evaluation

Methodology

MFI offers a flexible methodology adapted to your needs, whatever your geographical location or time availability. This master can be studied under:

  • Online Methodology: All the agenda will be on hand from our virtual campus 24 hours a day, 7 days a week.
  • Distance methodology: have course material in book form.

All contents are fully updated and have great technical, easily understandable and with a clear practical vocation rigor. In addition, IMF offers you:

  • e-face tutoring staff (via forums, chat, phone, email).
  • Webinars.
  • Debates and discussion groups through forums and chats.
  • Self-assessment test.
  • Readings, case studies and documentation.

Evaluation

Continuous assessment as advances in the study of the Master.

Each module will be assessed by combining online and development of case examination; overcoming will free each subject.

Likewise, obtaining the titles of Master of IMF and Masters from the University Camilo Jose Cela, subject to overcoming the trials of each module (continuous assessment) without final examination, and conducting a Final Project Master.

Career prospects

Booming Sector

According to a recent report by the European Union, it is expected to create one million jobs in the area Cybersecurity 2020.

At the end of our master you will be ready to serve as:

  • Security Analyst
  • Malware analyst
  • forensic analyst
  • ethical hacker
  • Cyber ​​Intelligence expert and ciberfraude
  • Developers and analysts source
  • Cybersecurity consultant

Guaranteed internships in companies

IMF Business School, through its website and Employment Practices ensures students of the Masters in Cybersecurity, practices in companies. Query conditions.



Read less
To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing. Read more
To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing.

The course covers a range of skills that are essential for the retrieval of computer-based information for criminal investigations.

WHY CHOOSE THIS COURSE?

Guest lecturers from industry will provide information about state-of-the-art developments and case studies.

Your masters project can be conducted either as a placement in an external organisation or working with one of the University research groups.

On successful completion of this course you could be presented as an expert witness, or help solve crimes.

WHAT WILL I LEARN?

This course will provide you with a sound understanding of essential hardware and software systems, formats, protocols and standards. There is coverage of essential legislation relating to all aspects of computer-based information.

The central focus of the programme will be an in-depth coverage of the available tools and techniques investigating different types of computer-based information sources.

This course has two parts: the Taught Modules and Master Project. Successful completion of the taught modules, which involves eight single modules of study, leads to the award of postgraduate diploma and, if the appropriate performance is achieved, allows progression onto the masters project.

Taught Modules
-Forensic Computing Methods (double)
-Network and Mobile Forensics (double)
-Internet and Information Security (double)
-Ethical Hacking
-Individual Research Project

In addition to a sound understanding of essential hardware and software systems, formats, protocols and standards, there is coverage of essential legislation relating to all aspects of computer-based information.

Where possible guest lectures will be provided from industry contacts about state-of-the-art developments and case studies.

The final stage of this course requires the completion of a masters project, which must relate directly to the subject being studied. To complete this successfully students will develop a sound capability to carry out research. The project can be conducted either as a placement in an external organisation or working with one of the University research groups.

The MSc project serves to integrate, apply and further develop the different aspects within the taught part of the programme.

HOW WILL THIS COURSE ENHANCE MY CAREER PROSPECTS?

There are a number of potential roles for those with expertise in computer forensics. One of the most high profile positions would be to provide support for civil and criminal investigations that involve the retrieval of computer-based information, typically to be provided as an expert witness or to aid in solving crimes.

There is also a demand for similar skills in the area of disaster management and recovery of computer-based information.

GLOBAL LEADERS PROGRAMME

To prepare students for the challenges of the global employment market and to strengthen and develop their broader personal and professional skills Coventry University has developed a unique Global Leaders Programme.

The objectives of the programme, in which postgraduate and eligible undergraduate students can participate, is to provide practical career workshops and enable participants to experience different business cultures.

Read less
The speed with which the internet and information sharing have developed has exceeded the pace of secure infrastructure development. Read more
The speed with which the internet and information sharing have developed has exceeded the pace of secure infrastructure development. As a result, individuals with proven information security knowledge are now in high demand.

This course bridges the gap and helps to meet the growing need for suitably qualified IT security professionals. You’ll develop your knowledge and understanding so that you can create a secure and effective information infrastructure for any organisation.

As well as covering established techniques, you’ll explore new and innovative practices underpinned by the very latest research. You’ll learn about both the managerial and technical elements of information security and enterprise level security, including risk management and compliance, and you’ll concentrate on issues such as securing networks and system penetration testing.

In addition to acquiring technical skills that can be applied to protect against specific system breaches, you’ll become adept at making managerial decisions related to protecting an organisation’s security holistically. You’ll also learn how to perform ethical hacking. This is vital training; through being taught many of the techniques used by malicious hackers, you will develop the skills you need to mitigate risks and thwart potential attacks.

This MSc is designed and delivered by our team of information security experts who have a blend of industry experience and strong academic credentials. We have also worked closely with industry to ensure you have the workplace-ready attributes employers are looking for.

Increasing your employability further still, the course will prepare you for the BSI ISO 27001 lead auditor certification. You’ll study in our computing suite, which is equipped to industry standards.

You’ll study modules such as:

Advanced Security Protocols
Enterprise Security Management
Securing Networks
Security: Attacks and Countermeasures
Studying at Masters Level and Research Methods
Independent Scholarship

Read less
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments. Read more
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments.

It offers a broad overview of information management and security, as well as technical knowledge of networking and security.

It is ideal for those keen on a governance/compliance role, or for roles requiring you to take charge of data management.

Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/information-management-and-security#about

Course detail

• Study areas including: computer security, data modelling and management, emerging technologies, advanced security countermeasures, professional project management, networking administration and management, information security management and data governance and compliance
• Explore the career opportunities presented by the growth area of information security
• Develop your technical and managerial skills, with valuable experience of managing systems security strategy
• Gain valuable experience and industry links by working on projects for real businesses through our Academic into Business Computing (ABC) centre
• Benefit from a course which qualifies you roles including Information Architect, Data Modeller, Information Business Consultant, in Information Security and Network Management or go on to further study on an MSc by Research, MPhil or PhD.

Why choose this course?

The course is designed for those who want a broad overview of information management and security as well as technical knowledge of networking and security. The course is ideal for those who are looking to take up a governance/compliance role within an organisation, or for those who are looking to take charge of data management.

During the course you will gain skills in programming, computer security, data governance and compliance.

Modules

• Emerging Technologies
• Data Modelling and Management
• Professional Project Management
• Managing Information Systems Strategy and Security Risks
• Networking Administration and Management
• Data Governance and Compliance
• Computer and Network Security
• Ethical Hacking Tools and Techniques
• MSc project – Information Management and Security

Assessment

Throughout your course you will be exposed to a wide variety of assessment techniques including: written examinations, case studies, practical coursework assignments, problem worksheets, presentations and viva- voce (voice) examinations.

This will allow you to apply the knowledge and understanding you have gained during the learning phase, to a variety of challenging and complex practical situations.

Careers

You will gain valuable skills for a career within Information Management and Security as well as those relevant for the wider world of IT and business.

The unit ‘Professional Project Management’ requires you to work in a team to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

The final project fosters independent and autonomous study. You learn to take up the responsibility of conducting your project, typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
On our highly regarded MSc Cyber Security, you will work with internationally renowned experts from our Centre for Cyber Security. Read more
On our highly regarded MSc Cyber Security, you will work with internationally renowned experts from our Centre for Cyber Security.

What's covered in the course?

This course provides a broad foundation for Cyber Security concepts while delivering advanced knowledge and skills in key technical areas. Designed to meet the growing demand from global business and industry for robust cyber security systems, this course underpins the principles and practical professional skills you’ll need to meet the future challenges faced by organisations, particularly when it comes to strategic security planning.

This course provides future Cyber Security professionals with the knowledge and skills needed by the employers. Our strong links with industry enable us to teach the most demanding topics. You will develop state of the art technical knowledge, intellectual know-how, management capabilities and hands-on practical skills to succeed in meeting the Cyber Security challenges faced by modern organisations.

Our academic staff members are actively engaged with government and industry to help solve their complex problems. These strong links provide you with plenty of professional opportunities that will help you to acquire valuable exposure to the real life challenges of Cyber Security.

Why choose us?

-Our Centre for Cyber Security is at the forefront of advancing information security.
-We provide research-led, practice-driven teaching underpinned by our research projects and strong industrial links.
-Our teaching staff have rich professional experience and are engaged with government and industry, helping to solve complex problems.
-You will have access to state-of-the-art, industry-standard equipment and laboratories with forensic software, network security software for penetration testing, and Cloud software.
-We are home to a Cisco Systems, Oracle academy, and the Microsoft Academy Centre. We are one of Microsoft’s top UK university-based academies and we are a member of the Microsoft Developer Network Academic Alliance. We are also a Cisco ASC (Academy Support Centre) and Cisco Instructor Training Centre (ITC) – one of only 10 such instructor training centres in the UK.

Course in depth

The MSc is normally studied over one year full-time or two years part-time.

The course is divided into taught modules of 20 credits and a Master’s project of 60 credits. Students complete 60 credits for Postgraduate Certificate, 120 credits for Postgraduate Diploma and 180 credits for the full MSc. Each credit represents 10 notional hours of student learning and assessment.

A range of assessment methods are employed, assessment criteria being published in each assignment brief. Knowledge and skills are assessed, formatively and summatively, by a number of methods: coursework, examinations (seen and unseen, open and closed-book), presentations, practical assignments, vivas, online forums, podcasts and project work.

Modules
-Information Security Management 20 credits
-Industrial Control Systems Security 20 credits
-Digital Forensics 20 credits
-Software Security and Cloud Security 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods and Project Management 20 credits
-Individual Project 60 credits

Enhancing your employability skills

This course is designed to ensure that you are a very sought-after graduate with the necessary first-hand, practical expertise of cyber security issues as well as a rigorous academic understanding of the sector.

Globally there is a shortage of experts who can work in cyber security at this very high level, so you will focus on the important technical material you will need for effective decision-making in a highly demanding career.

You will be equipped for a range of careers requiring advanced skills, such as:
-Security architect
-Security analyst
-Security administrator
-Security manager
-Incident response manager
-Risk and compliance analyst.

You will have the opportunity to get support for obtaining industry recognised Professional Certifications.

Read less
The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry. Read more
The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry.

The programme is delivered by a dedicated team of cybersecurity experts and active researchers in the area and gives also the opportunity to acquire certain units from the programme as dedicated credit-based short courses outside the normal MSc route.

Using cutting edge and leading teaching and training techniques the course helps the candidates to realise the unique complexity and challenges associated with cybersecurity in a highly dynamic and constantly evolving threat landscape in a blended programme that amalgamates both management and hands-on skills required by cybersecurity professionals.

The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills.

The systematic application of teaching and learning methods with the GIS goals and clear references made to the University’s employability framework should further help students to develop their career prospects throughout the programme.

Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/cyber-security#entry

Course detail

Areas of study include:
• Cyber threat intelligence
• Ethical Hacking
• Network Security
• Information Governance and Compliance
• Research methodologies and project management
• Tactical and strategic cybersecurity management
• MSc thesis in cybersecurity

Modules

• Cyber Defence (Ptbm) (CIS098-6) Compulsory
• Information Governance And Compliance (Ptbm) (CIS102-6) Compulsory
• Msc Project - Cyber Security (CIS106-6) Compulsory
• Research Methodologies And Project Management (Ptbm) (CIS099-6) Compulsory
• Tactical And Strategic Cybersecurity Management (Ptbm) (CIS097-6) Compulsory

Assessment

The assessment strategy used is predominantly written assessments with only two (2) formal invigilated examinations throughout the course. The method used will depend on the nature of the subject matter being taught in each of the units, where the most appropriate method is chosen and analysed (See UIFs). Students will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by their tutors for each of the tasks allocated.

The assessment strategy for this course is designed around a holistic evaluation on knowledge and skills acquired with strong emphasis on the requirements for this mode of delivery and diverse skills, background and expectations of the target audience. All assessments used in the course are in perfect alignment with University requirements, regulations and policies. Coursework assignments typically incorporate formative feedback so that students can gain an insight into whether their work is meeting the necessary thresholds and focus on meaningful remarks to improve both their performance and understanding in the subject matter. The assessment strategy has been designed with strong influence by the requirements and needs of the audience in PT mode of delivery for this course.

Careers

The Careers Service is there to support you throughout the duration of your study and beyond. The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills. The systematic application of teaching and learning methods with the GIS goals and clear references made to the Universitys employability framework should further help students to develop their career prospects throughout the programme. Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

The unit `Research Methodologies and Project Management in particular requires you to work in a team so as to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control; you will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

In addition and somewhat complementary the final project fosters independent and autonomous study: typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor. That gives the ability to initiate discussion and project ideas that enrich the academic context in your studies and provide the foundations for a solid, relevant and strong project delivered at the end of your course.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
With the dramatic increase in high-profile cyber security incidents reported in the media, the demand for highly skilled security professionals is growing significantly as businesses across the globe seek to protect their networks and data. Read more

With the dramatic increase in high-profile cyber security incidents reported in the media, the demand for highly skilled security professionals is growing significantly as businesses across the globe seek to protect their networks and data. Our MSc Cyber Security provides you with a critical understanding of information governance and assurance, combined with technology risk management practices.

In addition to developing the key skills for handling security incidents, you will learn how to identify new and existing threats and the methods by which to reduce them.

This course begins in September and January 2019.

Key facts

-Develop key skills which are highly in demand by employers

-Enhance your ability to handle and minimise security threats and incidents

-Understand information governance and assurance

-Upon completion of your programme, you will be eligible for our Professional Pathway programmes which will enable you to further develop your skills, delivered by QA, one of the UK’s largest providers of IT and project management training

-Also available as a part-time programme

What will I study?

This full-time course is taught at our London Campus where you will be taught by our experienced academics, guiding you as you analyse and evaluate the theories, principles and applications associated with the field. They will encourage you to question current approaches and processes in the fields of information and cyber security.

You will be introduced to key theoretical and practical aspects using real world scenarios and case studies and will be expected to investigate new approaches, processes and solutions in this fast-moving environment.

You will learn how to professionally, systematically and critically understand information governance and assurance along with technology risk management practices. The course will develop and enhance your ability to handle security incidents as well as identifying new and existing threats and determining methods to minimise them.

How will I be taught and assessed?

Throughout the course, you will be able to trial new approaches and processes in a safe environment, working on real-life scenarios and case studies.

You will be assessed using a mix of coursework and exams.

Careers and further study

Upon successfully completing your course, you may undertake further professional development and training through Professional Pathways programmes. This additional training is offered to our graduates for free, from our partner QA, and provides you with an excellent opportunity to undertake professional training at the end of your Masters from one of the UK’s leading corporate training providers, further enhancing your professional development and employability skills. Find out more about Professional Pathways and your eligibility. Find out more about the Pathways available and your eligibility - http://london.northumbria.ac.uk/why-northumbria/careers-and-employability/

Modules

You will study a range of key programmes, concepts and issues in cyber security through an engaging and intellectually stimulating module programme. With up-to-date industry informed content, you can expect modules such as Information Governance and Security, Ethical Hacking for Cyber Security and Network Security. You will also complete a substantial academic Computer Science and Digital Technologies Project, giving you the opportunity to investigate an area of particular interest to you. 

Please visit the course page for more information on module content. 



Read less

Show 10 15 30 per page



Cookie Policy    X