• University of Surrey Featured Masters Courses
  • Ulster University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
King’s College London Featured Masters Courses
Nottingham Trent University Featured Masters Courses
Buckinghamshire New University Featured Masters Courses
Birmingham City University Featured Masters Courses
University of Portsmouth Featured Masters Courses
"ethical" AND "hacking"×
0 miles

Masters Degrees (Ethical Hacking)

We have 27 Masters Degrees (Ethical Hacking)

  • "ethical" AND "hacking" ×
  • clear all
Showing 1 to 15 of 27
Order by 
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system. Read more
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system.

Postgraduate funding (tuition fee and living cost loan) may be available from the Student Awards Agency for Scotland for those who meet the eligibility criteria.

Why choose this course?

-Abertay is the only university in the UK that offers a Masters programme in Ethical Hacking.
-It provides the core skills to allow you to take positions in a variety of companies where computer security is a major issue.
-Graduates will be at the forefront of new developments in security.
-Benefit from an active teaching group with a growing reputation based on industry links and Knowledge Transfer projects.
-It is delivered in a project based, entrepreneurial and enterprise culture.

Our students are passionate about their subject area and developing their knowledge. Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns.

We aim to change the way you think. We encourage lively debates about pertinent ethical and security issues. Students develop the hacker mindset, determined to ‘do their bit’ to improve security in the world of Computing.

Join our Graduate School

Our Graduate School is a dedicated facility providing support, training and professional development opportunities to our vibrant postgraduate community. Specially designed to promote integration and inculcation of interdisciplinary working in our next generation of researchers, postgraduates study and learn together at Abertay - from Environmental Management to Law, Psychology, Bioscience, Economics and Business, Cybersecurity and Computer Games Development.

When you join us as a postgraduate student or researcher, you’ll be joining a community of creative like-minded scholars and will automatically be provided with access to our dedicated study and social spaces – a forum in which you can meet, work and learn with other researchers and postgraduates from across the University. You’ll benefit from training and professional development opportunities as well as support with funding applications, placement opportunities, teaching support, public engagement and outreach activity.

What you study

From forensic computing to network security, the course covers a wide range of subjects. Within these, you will learn about web hacking, password cracking, malware analysis, port scanning, buffer overflows and much more.

You also learn how to evaluate the impact of security problems and recommend improvements to a network’s security within a legal and ethical framework. You will also conduct a masters project within an area of cybersecurity that will allow you to build on your existing skills.

How you learn

Teaching is focused on lectures and practical sessions in dedicated classrooms. Lectures are used to present the key concepts, while practicals increase your understanding of the subject and allow you to develop your competence in technological and theoretical work. The course is taught using a problem-based learning approach. You will spend about 12 hours per week attending classes and about 30 hours a week of private study.

How you are assessed

The taught course will be assessed using a combination of written coursework, presentations and seminars, with a written dissertation at MSc level.

Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. Read more

The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. The focus within this programme on the principles, technologies and practices of cyber security helps you to gain the appropriate skills for future PhD studies and research careers as well as to become competent practitioners. The programme comprises particular developments in security with a firm base in academic research and also offers the opportunity for you to study selected topics in advanced computer science.

Included in the programme is the opportunity to enhance industry relevant skills with study in ISO27001 Lead Implementer and Ethical Hacking. These skill areas were highlighted by past alumni and industry practitioners for inclusion in the programme. Therefore, you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking.

This programme meets a continued growing demand for specialists in this area by offering a way for individuals in current employment with relevant industry experience as well as recent graduates to study and enhance and develop their skills. The MSc Cyber Security programme will therefore draw graduates wishing to enhance their undergraduate studies in computing with advanced study of security to equip them for senior positions with responsibility for the IT technical and management based security of an organisation. In addition, the programme encourages those with relevant industry skills to specialise in cyber security or refine and develop their existing expertise. 

Professional accreditation

This course is accredited by the British Computer Society.

It is also provisionally certified by GCHQ.

Our ISO 27001 Lead Auditor Training is Certified by the Professional Evaluation and Certification Board (PECB).

What you will study

The MSc programme in Cyber Security is intended to respond to current academic challenges provided by increasing reliance on computers and networks for core business activity and to meet commercial needs for employees who are able.

Core Modules

Learning and assessment

The programme includes innovative and active learning methods. Throughout your programme, we make use of case studies so that you can apply your theoretical understanding to real-world issues. In this way, abstract concepts are brought to life through practical activities. We also use methods associated with the “flipped classroom” where content is outside the classroom leaving more time and space for activities and active learning within tutorial and lecture sessions.

Career prospects

The course is designed to equip graduates for senior positions with responsibility for the IT-based security of an organisation.

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.



Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. Read more

IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. .. to be able to mitigate the possible cyber attacks to their organizations.

This master's degree, aimed mainly at professionals with experience in systems engineering or in the world of programming, who seek to turn their career and specialize in the world of cybersecurity.

This program has 136 hours of face-to-face training in Madrid, which will work with a theoretical-practical methodology through real cases, conferences with professionals of the sector and seminars, enhancing Networking.

Students who successfully complete this program will obtain a Dual Degree from the Universidad Camilo José Cela and a Master's Degree from the IMF Business School. They will also get a Deloitte CyberSOC Degree and 3 Deloitte Associate level certifications for Safe Development, Ethical Hacking and Forensic Analysis. They will have at their disposal all the advantages of MFI:

  • Program Scholarships and Study Grants
  • Recruiters with over 12,000 vacancies posted in the last year
  • Unlimited tutoring
  • Financing up to 12 months without interest or bank intervention
  • Virtual library with over 30,000 references
  • Virtual library with access to any master classes
  • Access to the VIP Club with discounts on leisure, travel, restaurants ...

TEMARY:

  • MODULE I - Cyber ​​intelligence
  • MODULE II - Safe Development
  • MODULE III - Monitoring and Correlation of Security Events (SIEM)
  • MODULE IV - Ethical Hacking
  • MODULE V - Forensic Analysis
  • MODULE VI - Reverse Engineering
  • MODULE VII - Security in Mobile Environments
  • MODULE VIII - Final Master's Work


Read less
It is envisaged that by 2020 more than 50 billion devices, or. things. , around the globe will be connected to the Internet - making Internet of Things (IoT) a mainstream technology. Read more

It is envisaged that by 2020 more than 50 billion devices, or things, around the globe will be connected to the Internet - making Internet of Things (IoT) a mainstream technology.

Smart Cities, Industrial Internet of Things (IIoT), Self-Driving cars, Smart Grids, Smart Homes and Buildings, Smart Infrastructure, Smart Agriculture, Smart Health, Smart Mobility are some of the application areas driving the phenomenal growth of IoT.

Businesses are already exploring how to adopt IoT for their operations, but they lack IoT skills and knowledge among employees and management. 

This unique full-time Master's programme is designed by experts in the field with wealth of research and development experience in IoT to address this shortage of professionally qualified specialists.

This MSc offers a unique advantage to its graduates in an increasingly competitive job market with highly-sought expertise.

The teaching on the course is research-led, and you will have opportunity to learn from the real-world, cutting-edge live projects.

You’ll have the opportunity to carry out a dissertation project with real-world clients, in our new Internet of Things Innovation Lab and our Computing Enterprise Centre.

What you will study

Core Modules

Option Modules

Learning and assessment

The programme utilises a range of learning methods to offer a personalised, research-led, and digitally rooted learning experience with a holistic, international focus.

At the centre of this strategy is the focus on problem-solving through the use of creative, analytical, logical and innovative thinking, and through networking and communicating effectively with peers.

The teaching delivery team includes internationally-renowned researchers and practitioners from all the relevant IoT areas, including sensors, communication, data engineering, data storage, big data analytics, cyber security and visualisation. We have secured multi-million-pound funding in IoT related projects, ensuring you’ll be exposed to cutting-edge knowledge and case studies. Our teaching is research-led, and you will have opportunity to learn from these real-world, cutting-edge live projects.

Formal lectures will facilitate your acquisition of knowledge and understanding, discipline specific skills, and apply this learning to industry practices. Laboratory sessions, using three state-of-the-art, purpose-built laboratories run in conjunction with the theoretical components, give you the opportunity to enhance your understanding of particular topics. These will also help to develop discipline-specific skills and personal transferable skills.

The unique teaching content and delivery on the course is extremely well supported with state-of-the-art, special purpose labs including IoT Innovation lab, Ethical Hacking lab and Computer Enterprise Centre.

In addition, the research and development carried out in these labs and the case studies from the publicly-funded high profile projects, ensures that the content is fresh and cutting-edge. This ensures you’ll be exposed to the very latest and future developments.

In addition to the standard technology-enhanced learning approaches, we embed technologies to deliver key concepts in an interactive environment that enhances your experience in developing IoT products. For example; extensive use of simulation for product design and use of cloud and big data testbeds to support hands-on learning.

Facilities

Students have access to state-of-the-art, special purpose labs including IoT Innovation lab, Ethical Hacking lab, Cyber Security Interdisciplinary Centre and Computer Enterprise Centre.

We also provide a range of online facilities to support independent learning, including our Virtual Learning Environment which gives you access to learning materials and collaborative learning tools 24/7, anywhere in the world.

We also provide virtual server technology using in house hardware to allow students to use our operating systems remotely.

Career prospects

A lack of IoT skills and knowledge among employees and management is viewed by the businesses as the biggest obstacle to using the IoT more extensively (Economist Intelligence Unit).

This programme will give you the skills you need to launch a career in this exciting, fast-growing international sector.

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies.

Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.



Read less
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies. Read more
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies.

This will be achieved by industry-led, research-informed, practice-based teaching and learning. Using industry-standard resources, you will apply the skills and knowledge gained to real-life project scenarios across industry, commerce and public sector.

The programme of study will include areas such as requirements capture, network design, evaluation, securing and optimisation, ranging from hardware configuration to protocol analysis and software definition. The programme will include research and scholarly activity in order to incorporate the latest thinking into the proposed solution.

What's covered in the course?

On this course, you will learn to:
-Critically evaluate and apply knowledge of advanced routing principles.
-Evaluate and apply advanced routing protocols for specific networking solutions.
-Evaluate a variety of routing techniques for a given network environment.
-Critically evaluate routing policy requirements for a network.
-Design and implement ethernet-based LANs. Ensuring security within the given environment.
-Apply mathematical analysis to use VLSM efficiently.
-Apply security considerations to the design and management of networks.
-Design/plan and implement LAN/WAN solutions which require switched hybrid.
-Critically assess SDN solutions in both the industry and research domains.
-Design an SDN-based network for a given system, identifying appropriate components and network structure.
-Implement an appropriate SDN controller to manage device configuration, and any other relevant network policies within an SDN network.
-Select, plan and implement an appropriate testing strategy to validate security requirements against a threat model.
-Critically evaluate the requirements for penetration testing, ethical hacking and effectively communicate security audit results to a variety of audiences.
-Design and conduct security assessment experiments to expose security vulnerabilities and to interpret, analyse and critically evaluate the resulting data to recommend remedial actions.
-Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within the organisation.

Why choose us?

-The Centre for Cloud Computing houses the Cisco Networking Academy, which has an international reputation for delivering high-quality teaching, training and support acrossEurope, the Middle East and Africa.
-In six purpose-built rooms, the Centre also houses £500,000 of computer networking and communications equipment, together with more than £200,000 of web-based equipment and bookable resources.
-The course provides opportunities for you to engage in advanced studies using problem-based learning and flipped curricula strategies. You will work in groups and on your own to deliver solutions to industry-related problems and scenarios.
-The unique combination of employer-led, research-informed technical knowledge and practical experience on industry-standard resources makes our graduates more employable and sought after.
-The course encourages critical thinking and problem solving, giving you the opportunities for research.

Course in depth

All the modules are practice-based and learning is carried out in the labs. Each 20-credit module will have two hours contact, and you are expected to undertake approximately six additional hours of learning, research and assessment preparation for each module.

Assessment is carried out through presentations (both group and individual), timed tests and exams, written reports, research activity and publication of findings, and practical-based time assessments.

At the start of the course, there will be a three-week, full-time induction tool kit, comprising of a review of CCNA and associated technologies.

The course also provides the base knowledge for students to undertake the CCNA certification, and with an additional boot camp to undertake the individual CCNP certification exams.

Modules
-Information Security 20 credits
-Software Defined Network Engineering 20 credits
-Advanced Networking Systems 20 credits
-Network Management 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods 20 credits
-Project and placement 60 credits

Enhancing your employability skills

The University is eager to recognise students have made the effort to gain industry experience and stand out from the typical graduate. Thus, we offer a range of options for you to get extra awards and recognition for your work in industry.

We also have our Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less
In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. Read more

In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. And in 2015 cybersecurity has been identified at the World Economic Forum as one of the major risks in the world economy.

Therefore, given the growing demand for skilled professionals, IMF Business School, Deloitte and the University Camilo Jose Cela, have developed this Master in Cybersecurity, who manages to accommodate the needs of stakeholders, opting for an online high-level training with the ease of do it from anywhere. It is the only fully online master market 60 ECTS and supported by a University Moreover, the best students will be selected by Deloitte to perform CyberSOC internship at Deloitte, with high rates of joining Deloitte after completion.

This Master enables you to:

  • Acquire the skills to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • Develop techniques and use tools to fully exploit your skills and knowledge to perform penetration testing to systems and networks.
  • Get a general and introductory vision to the world of cybersecurity, explaining the most important attacks and how to mitigate them.
  • Knowing the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • Assimilate enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Knowing the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • Perform developments in secure programming and improve your skills in security audit in the analysis and evaluation of the application source code.

Objectives

Get a comprehensive and thorough knowledge in disciplines such as Cyber ​​Intelligence, malware analysis, technical audits of systems and networks (ethical hacking), forensic analysis and management of security incidents, secure web application development and monitoring and correlation of security events (SIEM through technologies).

Students:

  • You get a general and introductory vision to the world of cybersecurity, knowing the most important attacks and how to mitigate them.
  • It will acquire the necessary steps to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • It will develop technical skills and learn to use tools to fully exploit their skills and knowledge to perform penetration testing to systems and networks.
  • You know the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • He assimilated enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Learn the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • He will qualify as a developer in secure programming skills and improve security auditors in the analysis and evaluation of the application source code.

Methodology and Evaluation

Methodology

MFI offers a flexible methodology adapted to your needs, whatever your geographical location or time availability. This master can be studied under:

  • Online Methodology: All the agenda will be on hand from our virtual campus 24 hours a day, 7 days a week.
  • Distance methodology: have course material in book form.

All contents are fully updated and have great technical, easily understandable and with a clear practical vocation rigor. In addition, IMF offers you:

  • e-face tutoring staff (via forums, chat, phone, email).
  • Webinars.
  • Debates and discussion groups through forums and chats.
  • Self-assessment test.
  • Readings, case studies and documentation.

Evaluation

Continuous assessment as advances in the study of the Master.

Each module will be assessed by combining online and development of case examination; overcoming will free each subject.

Likewise, obtaining the titles of Master of IMF and Masters from the University Camilo Jose Cela, subject to overcoming the trials of each module (continuous assessment) without final examination, and conducting a Final Project Master.

Career prospects

Booming Sector

According to a recent report by the European Union, it is expected to create one million jobs in the area Cybersecurity 2020.

At the end of our master you will be ready to serve as:

  • Security Analyst
  • Malware analyst
  • forensic analyst
  • ethical hacker
  • Cyber ​​Intelligence expert and ciberfraude
  • Developers and analysts source
  • Cybersecurity consultant

Guaranteed internships in companies

IMF Business School, through its website and Employment Practices ensures students of the Masters in Cybersecurity, practices in companies. Query conditions.



Read less
Develop the skills you need for a career in this fast emerging field of data science. This programme will deepen your understanding of advanced software development, systems for big data analytics, statistical data analysis, data mining, data privacy and security, data visualisation and exploration. Read more

Develop the skills you need for a career in this fast emerging field of data science.

This programme will deepen your understanding of advanced software development, systems for big data analytics, statistical data analysis, data mining, data privacy and security, data visualisation and exploration.

It is an interdisciplinary programme, designed for students with a first degree in subjects such as:

  • Computer Science
  • Electrical Engineering
  • Mathematics
  • Physics
  • Economics

Our teaching is strongly linked to research within the Faculty of Engineering and Informatics, which includes aspects of applied computing, theoretical computer science, and communications and networks. Statistical analysis of data across various disciplines is a central theme of our research.

You can tailor your studies to particular areas of interest or career aspirations through our range of optional modules, and in the final dissertation (which is a significant piece of project work).

On graduation you’ll be ready and able to develop solutions to challenges in big data analytics and big data systems.

What you will study

The programme is intended to equip graduates with the cutting-edge knowledge and skills to work in the industry as a Data Scientist, Big Data Architect, or Big Data Analyst.

Core Modules

Option Modules

Learning and assessment

You'll learn through a mixture of formal lectures, practical lab sessions, tutorials and seminars.

Some modules involve supervised group work, usually with an assigned academic staff member for each group.

Most modules are related to research in the school.

All modules require students to undertake independent study, supported through distance learning technologies such as our Virtual Learning Environment. Reading lists and suggested resources for independent study provide further direction for students to undertake this work, and regular contact hours and informal feedback throughout the courses provide opportunities for further guidance for learners.

Assessments for modules mostly take the form of practical coursework, lab tests and written exams, with all forms being well represented across all modules.

Facilities

Our facilities are impressive, with several laboratories filled with dual-screen, dual boot (Windows and Linux) systems packed with industry-standard software.

Our specialised labs, such as the Ethical Hacking lab and the Internet of Things lab, allow students to build their skills within these key areas of growth, in a structured way through taught modules.

We provide a range of online facilities to support independent learning, including our Virtual Learning Environment which gives you access to learning materials and collaborative learning tools 24/7, anywhere in the world. We also provide virtual server technology using in house hardware to allow students to use our operating systems remotely.

Career prospects

Big data is a major area for future growth and investment. As the global big data industry continues to grow year after year we continue to grow our programme, and continue to produce future leaders in an exciting and rewarding field.

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.

Study support

We have a commitment to strong pastoral care for all of our students, which includes a Personal Tutor for all students, regular contact hours for tutor groups and our supportive student service teams who are always ready to help with any questions and provide the advice that you need.

In addition to standard study support through taught sessions, our Virtual Learning Environment allows students to access resources, participate in group work and submit work from anywhere in the world 24/7.

University central services are rich with support teams to assist students with every aspect of their journey through our degree programmes. From our Career and Employability Service, through our strong Students' Union, to our professional and efficient Student Finance team, there are always friendly faces ready to support you and provide you with the answers that you need.

Research

There is much research taking place at the Faculty of Engineering and Informatics related to this Master's programme. This includes aspects of applied computing, theoretical computer science, and communications and networks. Statistical analysis of data across various disciplines is a central theme of our research.

Teaching informed by research is at the core of this programme. Graduates leave us well prepared to pursue academic research, or industry based research and development positions.



Read less
To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing. Read more
To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing.

The course covers a range of skills that are essential for the retrieval of computer-based information for criminal investigations.

WHY CHOOSE THIS COURSE?

Guest lecturers from industry will provide information about state-of-the-art developments and case studies.

Your masters project can be conducted either as a placement in an external organisation or working with one of the University research groups.

On successful completion of this course you could be presented as an expert witness, or help solve crimes.

WHAT WILL I LEARN?

This course will provide you with a sound understanding of essential hardware and software systems, formats, protocols and standards. There is coverage of essential legislation relating to all aspects of computer-based information.

The central focus of the programme will be an in-depth coverage of the available tools and techniques investigating different types of computer-based information sources.

This course has two parts: the Taught Modules and Master Project. Successful completion of the taught modules, which involves eight single modules of study, leads to the award of postgraduate diploma and, if the appropriate performance is achieved, allows progression onto the masters project.

Taught Modules
-Forensic Computing Methods (double)
-Network and Mobile Forensics (double)
-Internet and Information Security (double)
-Ethical Hacking
-Individual Research Project

In addition to a sound understanding of essential hardware and software systems, formats, protocols and standards, there is coverage of essential legislation relating to all aspects of computer-based information.

Where possible guest lectures will be provided from industry contacts about state-of-the-art developments and case studies.

The final stage of this course requires the completion of a masters project, which must relate directly to the subject being studied. To complete this successfully students will develop a sound capability to carry out research. The project can be conducted either as a placement in an external organisation or working with one of the University research groups.

The MSc project serves to integrate, apply and further develop the different aspects within the taught part of the programme.

HOW WILL THIS COURSE ENHANCE MY CAREER PROSPECTS?

There are a number of potential roles for those with expertise in computer forensics. One of the most high profile positions would be to provide support for civil and criminal investigations that involve the retrieval of computer-based information, typically to be provided as an expert witness or to aid in solving crimes.

There is also a demand for similar skills in the area of disaster management and recovery of computer-based information.

GLOBAL LEADERS PROGRAMME

To prepare students for the challenges of the global employment market and to strengthen and develop their broader personal and professional skills Coventry University has developed a unique Global Leaders Programme.

The objectives of the programme, in which postgraduate and eligible undergraduate students can participate, is to provide practical career workshops and enable participants to experience different business cultures.

Read less
The speed with which the internet and information sharing have developed has exceeded the pace of secure infrastructure development. Read more
The speed with which the internet and information sharing have developed has exceeded the pace of secure infrastructure development. As a result, individuals with proven information security knowledge are now in high demand.

This course bridges the gap and helps to meet the growing need for suitably qualified IT security professionals. You’ll develop your knowledge and understanding so that you can create a secure and effective information infrastructure for any organisation.

As well as covering established techniques, you’ll explore new and innovative practices underpinned by the very latest research. You’ll learn about both the managerial and technical elements of information security and enterprise level security, including risk management and compliance, and you’ll concentrate on issues such as securing networks and system penetration testing.

In addition to acquiring technical skills that can be applied to protect against specific system breaches, you’ll become adept at making managerial decisions related to protecting an organisation’s security holistically. You’ll also learn how to perform ethical hacking. This is vital training; through being taught many of the techniques used by malicious hackers, you will develop the skills you need to mitigate risks and thwart potential attacks.

This MSc is designed and delivered by our team of information security experts who have a blend of industry experience and strong academic credentials. We have also worked closely with industry to ensure you have the workplace-ready attributes employers are looking for.

Increasing your employability further still, the course will prepare you for the BSI ISO 27001 lead auditor certification. You’ll study in our computing suite, which is equipped to industry standards.

You’ll study modules such as:

Advanced Security Protocols
Enterprise Security Management
Securing Networks
Security: Attacks and Countermeasures
Studying at Masters Level and Research Methods
Independent Scholarship

Read less
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments. Read more
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments.

It offers a broad overview of information management and security, as well as technical knowledge of networking and security.

It is ideal for those keen on a governance/compliance role, or for roles requiring you to take charge of data management.

Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/information-management-and-security#about

Course detail

• Study areas including: computer security, data modelling and management, emerging technologies, advanced security countermeasures, professional project management, networking administration and management, information security management and data governance and compliance
• Explore the career opportunities presented by the growth area of information security
• Develop your technical and managerial skills, with valuable experience of managing systems security strategy
• Gain valuable experience and industry links by working on projects for real businesses through our Academic into Business Computing (ABC) centre
• Benefit from a course which qualifies you roles including Information Architect, Data Modeller, Information Business Consultant, in Information Security and Network Management or go on to further study on an MSc by Research, MPhil or PhD.

Why choose this course?

The course is designed for those who want a broad overview of information management and security as well as technical knowledge of networking and security. The course is ideal for those who are looking to take up a governance/compliance role within an organisation, or for those who are looking to take charge of data management.

During the course you will gain skills in programming, computer security, data governance and compliance.

Modules

• Emerging Technologies
• Data Modelling and Management
• Professional Project Management
• Managing Information Systems Strategy and Security Risks
• Networking Administration and Management
• Data Governance and Compliance
• Computer and Network Security
• Ethical Hacking Tools and Techniques
• MSc project – Information Management and Security

Assessment

Throughout your course you will be exposed to a wide variety of assessment techniques including: written examinations, case studies, practical coursework assignments, problem worksheets, presentations and viva- voce (voice) examinations.

This will allow you to apply the knowledge and understanding you have gained during the learning phase, to a variety of challenging and complex practical situations.

Careers

You will gain valuable skills for a career within Information Management and Security as well as those relevant for the wider world of IT and business.

The unit ‘Professional Project Management’ requires you to work in a team to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

The final project fosters independent and autonomous study. You learn to take up the responsibility of conducting your project, typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less

Show 10 15 30 per page



Cookie Policy    X