• Swansea University Featured Masters Courses
  • Regent’s University London Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • Imperial College London Featured Masters Courses
  • University of York Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
University of Lincoln Featured Masters Courses
University of St Andrews Featured Masters Courses
University of Leeds Featured Masters Courses
Southampton Solent University Featured Masters Courses
Newcastle University Featured Masters Courses
"ethical" AND "hacking"×
0 miles

Masters Degrees (Ethical Hacking)

  • "ethical" AND "hacking" ×
  • clear all
Showing 1 to 15 of 22
Order by 
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. The course has four main focuses:
-Information security management
-Ethical hacking
-System hardening
-Computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you:
-Develop the knowledge, understanding and skills to work as a computing security professional.
-Learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
-Develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
-Develop the effective and appropriate communication skills you need to be a security professional.

For more information, see the website: https://www.shu.ac.uk/study-here/find-a-course/msc-information-systems-security

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Registered Tester syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

-ISO27001 Lead Auditor
BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

Full time –12-18 months.
Part time – typically 2 years.
Starts September.

Course design
We developed this course along two main lines. The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks. The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester One modules
-Information security concepts and principles
-Network security
-Systems and application security
-Web applications and e-commerce security

Semester Two modules
-BSI ISO27001 lead auditor
-Group-based case study with capture the flag

Semester Two options
-Computer forensics and incident response
-Information security management
-Incident handling and hacking techniques (ethical hacking)

Semester Three modules
You study research methods and do a substantial research project leading to a dissertation.

Assessment: group and individual coursework. You also do a range of: problem solving assignments; workshops; practical projects; research activities.

Other admission requirements

You can apply for prior certificated credit or prior experiential credit for the course if it is appropriate. We consider any professional certification of a suitable level and other criteria related to your application. In some cases we may ask you to take an entrance exam. Overseas applicants from countries whose first language is not English must normally produce evidence of competence in English. An IELTS score of 6.0 with 5.5 in all skills (or equivalent) is the standard for non-native speakers of English. If your English language skill is currently below an IELTS score of 6.0 with a minimum of 5.5 in all skills we recommend you consider a Sheffield Hallam University Pre-sessional English course which will enable you to achieve an equivalent English level.

Read less
The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. Read more
The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. The focus within this programme on the principles, technologies and practices of cyber security helps you to gain the appropriate skills for future PhD studies and research careers as well as to become competent practitioners. The programme comprises particular developments in security with a firm base in academic research and also offers the opportunity for you to study selected topics in advanced computer science.

Included in the programme is the opportunity to enhance industry relevant skills with study in ISO27001 Lead Implementer and Ethical Hacking. These skill areas were highlighted by past alumni and industry practitioners for inclusion in the programme. Therefore, you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking.

This programme meets a continued growing demand for specialists in this area by offering a way for individuals in current employment with relevant industry experience as well as recent graduates to study and enhance and develop their skills. The MSc Cyber Security programme will therefore draw graduates wishing to enhance their undergraduate studies in computing with advanced study of security to equip them for senior positions with responsibility for the IT technical and management based security of an organisation. In addition, the programme encourages those with relevant industry skills to specialise in cyber security or refine and develop their existing expertise.

For more information on the part time version of this course, please view this web-page: http://www.brad.ac.uk/study/courses/info/cyber-security-msc-part-time

Professional Accreditation

This course is accredited by the British Computer Society.

Why Bradford?

-Within this programme you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking
-Meets commercial needs for employees who are able to understand and think strategically about future developments in this area
-Provide a high academic quality of service to you, covering both theoretical and practical aspects of computing, networking and cyber security
-Enable you to equip yourself with knowledge, skills and understanding, at an advanced level within the chosen field of study
-MSc Cyber Security draws upon the successful research expertise of the School of Electrical Engineering and Computer Science in addition to that within the Interdisciplinary Research Centre (IRC) in Cyber Security. This base of expertise and research is a fantastic resource for the continued development of the programme in cyber security

Modules

-Business Systems Security
-Networks and Protocols
-Foundations of Cryptography (PG)
-Internet Security and Protocols
-ISO27000 Framework (ISMS)
-Ethical Hacking
-Dissertation

Career support and prospects

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.

The course is designed to equip graduates for senior positions with responsibility for the IT-based security of an organisation.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations. International (none UK / EU) students who require the Tier 4 visa for a full time study in the UK are not able to apply for the Sandwich degree initially due to Immigration regulations.
However, we do encourage International students on a Tier 4 visa , once enrolled, to apply for a placement. Students who are successful with finding a placement will be provided with help and advice with their visa extension application (subject to the University deadlines and Immigration requirements).

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

On the computing extended MSc you will spend your first semester studying modules which have been written to provide you with the academic, professional and technical skills that you will need to succeed on your chosen award.

All students on the extended MSc study the same modules for one semester and then study specialist modules depending on their degree. This means that whether you have chosen MSc Computer Science, MSc Cyber Security, MSc Web Development or any of our other taught MSc Computing awards, you will study the following modules in your first semester:

Academic English: This module will help you to develop your English Language speaking, listening, reading and writing skills and will introduce you to the conventions of academic writing. Study Skills & Employability: This module will help you to develop the skills and knowledge required to support study at Masters level. It will also help you to develop skills which will aid you in the job market and will look at things such as writing a C.V. and creating a personal development plan.

Computing Fundamentals: This is a double module which has been designed to provide an introduction to fundamental concepts which underpin Computing. The module will enable you to revise and refresh your existing skills to prepare you for study on your specialist awards.

Throughout the Cyber Security course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies. Read more
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies.

This will be achieved by industry-led, research-informed, practice-based teaching and learning. Using industry-standard resources, you will apply the skills and knowledge gained to real-life project scenarios across industry, commerce and public sector.

The programme of study will include areas such as requirements capture, network design, evaluation, securing and optimisation, ranging from hardware configuration to protocol analysis and software definition. The programme will include research and scholarly activity in order to incorporate the latest thinking into the proposed solution.

What's covered in the course?

On this course, you will learn to:
-Critically evaluate and apply knowledge of advanced routing principles.
-Evaluate and apply advanced routing protocols for specific networking solutions.
-Evaluate a variety of routing techniques for a given network environment.
-Critically evaluate routing policy requirements for a network.
-Design and implement ethernet-based LANs. Ensuring security within the given environment.
-Apply mathematical analysis to use VLSM efficiently.
-Apply security considerations to the design and management of networks.
-Design/plan and implement LAN/WAN solutions which require switched hybrid.
-Critically assess SDN solutions in both the industry and research domains.
-Design an SDN-based network for a given system, identifying appropriate components and network structure.
-Implement an appropriate SDN controller to manage device configuration, and any other relevant network policies within an SDN network.
-Select, plan and implement an appropriate testing strategy to validate security requirements against a threat model.
-Critically evaluate the requirements for penetration testing, ethical hacking and effectively communicate security audit results to a variety of audiences.
-Design and conduct security assessment experiments to expose security vulnerabilities and to interpret, analyse and critically evaluate the resulting data to recommend remedial actions.
-Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within the organisation.

Why choose us?

-The Centre for Cloud Computing houses the Cisco Networking Academy, which has an international reputation for delivering high-quality teaching, training and support acrossEurope, the Middle East and Africa.
-In six purpose-built rooms, the Centre also houses £500,000 of computer networking and communications equipment, together with more than £200,000 of web-based equipment and bookable resources.
-The course provides opportunities for you to engage in advanced studies using problem-based learning and flipped curricula strategies. You will work in groups and on your own to deliver solutions to industry-related problems and scenarios.
-The unique combination of employer-led, research-informed technical knowledge and practical experience on industry-standard resources makes our graduates more employable and sought after.
-The course encourages critical thinking and problem solving, giving you the opportunities for research.

Course in depth

All the modules are practice-based and learning is carried out in the labs. Each 20-credit module will have two hours contact, and you are expected to undertake approximately six additional hours of learning, research and assessment preparation for each module.

Assessment is carried out through presentations (both group and individual), timed tests and exams, written reports, research activity and publication of findings, and practical-based time assessments.

At the start of the course, there will be a three-week, full-time induction tool kit, comprising of a review of CCNA and associated technologies.

The course also provides the base knowledge for students to undertake the CCNA certification, and with an additional boot camp to undertake the individual CCNP certification exams.

Modules
-Information Security 20 credits
-Software Defined Network Engineering 20 credits
-Advanced Networking Systems 20 credits
-Network Management 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods 20 credits
-Project and placement 60 credits

Enhancing your employability skills

The University is eager to recognise students have made the effort to gain industry experience and stand out from the typical graduate. Thus, we offer a range of options for you to get extra awards and recognition for your work in industry.

We also have our Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations. Unfortunately applicants who require a Tier 4 visa for study in the UK are not able to apply for the Sandwich degree in the first instance due to visa regulations. We encourage International students, once enrolled, to apply for a placement and if successful apply to extend their visa and transfer to the sandwich award

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

[[Course content
On the computing extended MSc you will spend your first semester studying modules which have been written to provide you with the academic, professional and technical skills that you will need to succeed on your chosen award. All students on the extended MSc study the same modules for one semester and then study specialist modules depending on their degree. This means that whether you have chosen MSc Computer Science, MSc Computer Networks & Security, MSc Web Development or any of our other taught MSc Computing awards, you will study the following modules in your first semester:

Academic English: This module will help you to develop your English Language speaking, listening, reading and writing skills and will introduce you to the conventions of academic writing.

Study skills & Employability: This module will help you to develop the skills and knowledge required to support study at Masters level. It will also help you to develop skills which will aid you in the job market and will look at things such as writing a C.V. and creating a personal development plan.

Computing Fundamentals: This is a double module which has been designed to provide an introduction to fundamental concepts which underpin Computing. The module will enable you to revise and refresh your existing skills to prepare you for study on your specialist awards.

After successfully completing the first semester you will commence your course specific study

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing. Read more
To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing.

The course covers a range of skills that are essential for the retrieval of computer-based information for criminal investigations.

WHY CHOOSE THIS COURSE?

Guest lecturers from industry will provide information about state-of-the-art developments and case studies.

Your masters project can be conducted either as a placement in an external organisation or working with one of the University research groups.

On successful completion of this course you could be presented as an expert witness, or help solve crimes.

WHAT WILL I LEARN?

This course will provide you with a sound understanding of essential hardware and software systems, formats, protocols and standards. There is coverage of essential legislation relating to all aspects of computer-based information.

The central focus of the programme will be an in-depth coverage of the available tools and techniques investigating different types of computer-based information sources.

This course has two parts: the Taught Modules and Master Project. Successful completion of the taught modules, which involves eight single modules of study, leads to the award of postgraduate diploma and, if the appropriate performance is achieved, allows progression onto the masters project.

Taught Modules
-Forensic Computing Methods (double)
-Network and Mobile Forensics (double)
-Internet and Information Security (double)
-Ethical Hacking
-Individual Research Project

In addition to a sound understanding of essential hardware and software systems, formats, protocols and standards, there is coverage of essential legislation relating to all aspects of computer-based information.

Where possible guest lectures will be provided from industry contacts about state-of-the-art developments and case studies.

The final stage of this course requires the completion of a masters project, which must relate directly to the subject being studied. To complete this successfully students will develop a sound capability to carry out research. The project can be conducted either as a placement in an external organisation or working with one of the University research groups.

The MSc project serves to integrate, apply and further develop the different aspects within the taught part of the programme.

HOW WILL THIS COURSE ENHANCE MY CAREER PROSPECTS?

There are a number of potential roles for those with expertise in computer forensics. One of the most high profile positions would be to provide support for civil and criminal investigations that involve the retrieval of computer-based information, typically to be provided as an expert witness or to aid in solving crimes.

There is also a demand for similar skills in the area of disaster management and recovery of computer-based information.

GLOBAL LEADERS PROGRAMME

To prepare students for the challenges of the global employment market and to strengthen and develop their broader personal and professional skills Coventry University has developed a unique Global Leaders Programme.

The objectives of the programme, in which postgraduate and eligible undergraduate students can participate, is to provide practical career workshops and enable participants to experience different business cultures.

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
The speed with which the internet and information sharing have developed has exceeded the pace of secure infrastructure development. Read more
The speed with which the internet and information sharing have developed has exceeded the pace of secure infrastructure development. As a result, individuals with proven information security knowledge are now in high demand.

This course bridges the gap and helps to meet the growing need for suitably qualified IT security professionals. You’ll develop your knowledge and understanding so that you can create a secure and effective information infrastructure for any organisation.

As well as covering established techniques, you’ll explore new and innovative practices underpinned by the very latest research. You’ll learn about both the managerial and technical elements of information security and enterprise level security, including risk management and compliance, and you’ll concentrate on issues such as securing networks and system penetration testing.

In addition to acquiring technical skills that can be applied to protect against specific system breaches, you’ll become adept at making managerial decisions related to protecting an organisation’s security holistically. You’ll also learn how to perform ethical hacking. This is vital training; through being taught many of the techniques used by malicious hackers, you will develop the skills you need to mitigate risks and thwart potential attacks.

This MSc is designed and delivered by our team of information security experts who have a blend of industry experience and strong academic credentials. We have also worked closely with industry to ensure you have the workplace-ready attributes employers are looking for.

Increasing your employability further still, the course will prepare you for the BSI ISO 27001 lead auditor certification. You’ll study in our computing suite, which is equipped to industry standards.

You’ll study modules such as:

Advanced Security Protocols
Enterprise Security Management
Securing Networks
Security: Attacks and Countermeasures
Studying at Masters Level and Research Methods
Independent Scholarship

Read less
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments. Read more
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments.

It offers a broad overview of information management and security, as well as technical knowledge of networking and security.

It is ideal for those keen on a governance/compliance role, or for roles requiring you to take charge of data management.

Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/information-management-and-security#about

Course detail

• Study areas including: computer security, data modelling and management, emerging technologies, advanced security countermeasures, professional project management, networking administration and management, information security management and data governance and compliance
• Explore the career opportunities presented by the growth area of information security
• Develop your technical and managerial skills, with valuable experience of managing systems security strategy
• Gain valuable experience and industry links by working on projects for real businesses through our Academic into Business Computing (ABC) centre
• Benefit from a course which qualifies you roles including Information Architect, Data Modeller, Information Business Consultant, in Information Security and Network Management or go on to further study on an MSc by Research, MPhil or PhD.

Why choose this course?

The course is designed for those who want a broad overview of information management and security as well as technical knowledge of networking and security. The course is ideal for those who are looking to take up a governance/compliance role within an organisation, or for those who are looking to take charge of data management.

During the course you will gain skills in programming, computer security, data governance and compliance.

Modules

• Emerging Technologies
• Data Modelling and Management
• Professional Project Management
• Managing Information Systems Strategy and Security Risks
• Networking Administration and Management
• Data Governance and Compliance
• Computer and Network Security
• Ethical Hacking Tools and Techniques
• MSc project – Information Management and Security

Assessment

Throughout your course you will be exposed to a wide variety of assessment techniques including: written examinations, case studies, practical coursework assignments, problem worksheets, presentations and viva- voce (voice) examinations.

This will allow you to apply the knowledge and understanding you have gained during the learning phase, to a variety of challenging and complex practical situations.

Careers

You will gain valuable skills for a career within Information Management and Security as well as those relevant for the wider world of IT and business.

The unit ‘Professional Project Management’ requires you to work in a team to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

The final project fosters independent and autonomous study. You learn to take up the responsibility of conducting your project, typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
On our highly regarded MSc Cyber Security, you will work with internationally renowned experts from our Centre for Cyber Security. Read more
On our highly regarded MSc Cyber Security, you will work with internationally renowned experts from our Centre for Cyber Security.

What's covered in the course?

This course provides a broad foundation for Cyber Security concepts while delivering advanced knowledge and skills in key technical areas. Designed to meet the growing demand from global business and industry for robust cyber security systems, this course underpins the principles and practical professional skills you’ll need to meet the future challenges faced by organisations, particularly when it comes to strategic security planning.

This course provides future Cyber Security professionals with the knowledge and skills needed by the employers. Our strong links with industry enable us to teach the most demanding topics. You will develop state of the art technical knowledge, intellectual know-how, management capabilities and hands-on practical skills to succeed in meeting the Cyber Security challenges faced by modern organisations.

Our academic staff members are actively engaged with government and industry to help solve their complex problems. These strong links provide you with plenty of professional opportunities that will help you to acquire valuable exposure to the real life challenges of Cyber Security.

Why choose us?

-Our Centre for Cyber Security is at the forefront of advancing information security.
-We provide research-led, practice-driven teaching underpinned by our research projects and strong industrial links.
-Our teaching staff have rich professional experience and are engaged with government and industry, helping to solve complex problems.
-You will have access to state-of-the-art, industry-standard equipment and laboratories with forensic software, network security software for penetration testing, and Cloud software.
-We are home to a Cisco Systems, Oracle academy, and the Microsoft Academy Centre. We are one of Microsoft’s top UK university-based academies and we are a member of the Microsoft Developer Network Academic Alliance. We are also a Cisco ASC (Academy Support Centre) and Cisco Instructor Training Centre (ITC) – one of only 10 such instructor training centres in the UK.

Course in depth

The MSc is normally studied over one year full-time or two years part-time.

The course is divided into taught modules of 20 credits and a Master’s project of 60 credits. Students complete 60 credits for Postgraduate Certificate, 120 credits for Postgraduate Diploma and 180 credits for the full MSc. Each credit represents 10 notional hours of student learning and assessment.

A range of assessment methods are employed, assessment criteria being published in each assignment brief. Knowledge and skills are assessed, formatively and summatively, by a number of methods: coursework, examinations (seen and unseen, open and closed-book), presentations, practical assignments, vivas, online forums, podcasts and project work.

Modules
-Information Security Management 20 credits
-Industrial Control Systems Security 20 credits
-Digital Forensics 20 credits
-Software Security and Cloud Security 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods and Project Management 20 credits
-Individual Project 60 credits

Enhancing your employability skills

This course is designed to ensure that you are a very sought-after graduate with the necessary first-hand, practical expertise of cyber security issues as well as a rigorous academic understanding of the sector.

Globally there is a shortage of experts who can work in cyber security at this very high level, so you will focus on the important technical material you will need for effective decision-making in a highly demanding career.

You will be equipped for a range of careers requiring advanced skills, such as:
-Security architect
-Security analyst
-Security administrator
-Security manager
-Incident response manager
-Risk and compliance analyst.

You will have the opportunity to get support for obtaining industry recognised Professional Certifications.

Read less
The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry. Read more
The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry.

The programme is delivered by a dedicated team of cybersecurity experts and active researchers in the area and gives also the opportunity to acquire certain units from the programme as dedicated credit-based short courses outside the normal MSc route.

Using cutting edge and leading teaching and training techniques the course helps the candidates to realise the unique complexity and challenges associated with cybersecurity in a highly dynamic and constantly evolving threat landscape in a blended programme that amalgamates both management and hands-on skills required by cybersecurity professionals.

The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills.

The systematic application of teaching and learning methods with the GIS goals and clear references made to the University’s employability framework should further help students to develop their career prospects throughout the programme.

Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/cyber-security#entry

Course detail

Areas of study include:
• Cyber threat intelligence
• Ethical Hacking
• Network Security
• Information Governance and Compliance
• Research methodologies and project management
• Tactical and strategic cybersecurity management
• MSc thesis in cybersecurity

Modules

• Cyber Defence (Ptbm) (CIS098-6) Compulsory
• Information Governance And Compliance (Ptbm) (CIS102-6) Compulsory
• Msc Project - Cyber Security (CIS106-6) Compulsory
• Research Methodologies And Project Management (Ptbm) (CIS099-6) Compulsory
• Tactical And Strategic Cybersecurity Management (Ptbm) (CIS097-6) Compulsory

Assessment

The assessment strategy used is predominantly written assessments with only two (2) formal invigilated examinations throughout the course. The method used will depend on the nature of the subject matter being taught in each of the units, where the most appropriate method is chosen and analysed (See UIFs). Students will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by their tutors for each of the tasks allocated.

The assessment strategy for this course is designed around a holistic evaluation on knowledge and skills acquired with strong emphasis on the requirements for this mode of delivery and diverse skills, background and expectations of the target audience. All assessments used in the course are in perfect alignment with University requirements, regulations and policies. Coursework assignments typically incorporate formative feedback so that students can gain an insight into whether their work is meeting the necessary thresholds and focus on meaningful remarks to improve both their performance and understanding in the subject matter. The assessment strategy has been designed with strong influence by the requirements and needs of the audience in PT mode of delivery for this course.

Careers

The Careers Service is there to support you throughout the duration of your study and beyond. The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills. The systematic application of teaching and learning methods with the GIS goals and clear references made to the Universitys employability framework should further help students to develop their career prospects throughout the programme. Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

The unit `Research Methodologies and Project Management in particular requires you to work in a team so as to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control; you will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

In addition and somewhat complementary the final project fosters independent and autonomous study: typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor. That gives the ability to initiate discussion and project ideas that enrich the academic context in your studies and provide the foundations for a solid, relevant and strong project delivered at the end of your course.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

Read less

Show 10 15 30 per page


Share this page:

Cookie Policy    X