• University of Edinburgh Featured Masters Courses
  • Regent’s University London Featured Masters Courses
  • Imperial College London Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • University of York Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
University of Birmingham Featured Masters Courses
University of Kent Featured Masters Courses
Cass Business School Featured Masters Courses
University of Leeds Featured Masters Courses
University of London International Programmes Featured Masters Courses
"hacker"×
0 miles

Masters Degrees (Hacker)

  • "hacker" ×
  • clear all
Showing 1 to 9 of 9
Order by 
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
In recent years, issues of terrorism and organised crime have gained an unprecedented profile, provoked significant social concern, and dominated both law-and-order and many wider social policy agendas. Read more
In recent years, issues of terrorism and organised crime have gained an unprecedented profile, provoked significant social concern, and dominated both law-and-order and many wider social policy agendas. We draw on state-of-the-art research to address key critical issues surrounding organised criminality and terrorism in contemporary society.

We involve multi-level analyses of organised crime as a concept, alongside the impacts of urbanisation, migration and globalisation upon both the practice of crime and the ways in which we understand them. You address cutting-edge critical, conceptual and theoretical analyses of terrorism and counter-terrorism.

The course provides you with a strong grounding in the key theories, understandings and issues relating to organised crime and terrorism. You explore topics including:
-The analysis, politics and prevention of terrorism
-Globalisation and organised crime
-Security and the state
-The hacker ethic
-Human rights

Our Department of Sociology was rated top 10 in the UK for research quality (REF 2014), and we consistently receive strong student satisfaction scores, including 96% overall student satisfaction in 2015.

Our expert staff

We are a large and friendly department, offering a diverse range of research interests and with staff members who are committed to teaching, research and publication that covers a broad geographical spectrum.

Many have worked at the local level with local authorities, justice councils, community partnerships and charities. Others have worked at a national and international level with bodies like the United Nations, the European Commission’s Expert Group on Public Understanding of Science, Amnesty International, The Royal College of Paediatrics and Child Health, the Home Office and national non-governmental organisations.

Specialist facilities

-Dedicated postgraduate support facilities
-Our renowned off-campus Graduate Conference takes place every February
-A unique Student Resource Centre where you can get help with your studies, access examples of previous students’ work, and attend workshops on research skills
-The Sociology common room is open all day Monday-Friday, is stocked with daily newspapers, magazines and journals, and has free drinks available
-Links with the Institute of Social and Economic Research, which conducts large-scale survey projects and has its own library, and the -UK Data Archive, which stores national research data like the British Crime Survey
-Our students’ Sociology Society, a forum for the exchange of ideas, arranging talks by visiting speakers, introducing you to various career pathways, and organising debates

Your future

This course provides excellent preparation for further academic study, and many of our postgraduates go on to successful academic careers, both in the UK and overseas.

Employment opportunities for graduates of this course include careers in security, policing, research, intelligence and justice professions.

Others have established careers in non-governmental organisations, local authorities, specialist think tanks, government departments, charities, media production, and market intelligence.

We work with the university’s Employability and Careers Centre to help you find out about further work experience, internships, placements, and voluntary opportunities.

Read less
The overall aim of this MSc is to equip you with the knowledge and skills necessary to work within the IT security profession. Read more
The overall aim of this MSc is to equip you with the knowledge and skills necessary to work within the IT security profession. It takes advantage of Lancaster having recently been awarded the highly prestigious status of an EPSRC-GCHQ Academic Centre of Excellence in Cyber Security Research, and combines advanced technical skills with disciplines such as Economics, Risk Management, Psychology and Social Science. Its strength and uniqueness lies in its multidisciplinary nature, merging expertise from across Lancaster’s faculties to educate the next generation of security specialists.

The technical modules within the degree offer the skills and knowledge required to enable students to obtain the industrially recognised professional qualifications of CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker) and CHFI (Computer Hacking Forensic Investigator).

Modules
• A Research or Industrially Focused Dissertation
• Cybercrime
• Information System Forensic Investigation
• Information System Penetration and Countermeasures
• Information System Risk Management
• Information System Security Management
• Introduction to Law for Cyber Security Specialists
• Network and System Security
• Security and Conflict in the Digital Age

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
The Digital Age is dependent on software systems that support the full spectrum of human activity, from real-time banking transactions to the operation of critical infrastructures such as transportation, power and telecommunications. Read more

Course in brief

The Digital Age is dependent on software systems that support the full spectrum of human activity, from real-time banking transactions to the operation of critical infrastructures such as transportation, power and telecommunications.

Securing these systems is of strategic importance to industry and government, increasing the demand for graduates who have the knowledge and skills to support their engineering and maintenance.

The course is developed in consultation with individuals from the Information Risk Management and Assurance Group of BCS and various commercial organisations.

Taught modules are mostly delivered by researchers, who contribute to international research literature, ensuring that the course is relevant and up-to-date. Underpinned by a strong foundation in research, you will benefit from learning the technical skills and knowledge needed to practice on real-world problems throughout the course, equipping you with the expertise needed in systems engineering and network security.

You will have the opportunity to engage with research activities and projects that are relevant to the latest industry challenges. You will also have the chance to attend professional networking events, take part in hacker sessions and meetings of the Secure and Dependable Software Systems (SenSe) group, which feature talks from leading researchers, government agencies, local businesses and relevant societies.

Your learning will also be supported by access to facilities including computer and research laboratories, which include industry-standard software developed by our researchers at Brighton.

Course structure

Teaching methods include lectures, tutorials, workshops and guided independent study. You will build your understanding of the foundations of information security through a series of seminal books, and keep up to date with the latest developments through leading journals in the field.

The course consists of six taught modules – five core, one optional – and an independent project. The PGDip comprises the taught modules only, while the PGCert comprises three taught modules, two of which must be compulsory.

Core modules

Security and Dependability
Secure Information Systems Engineering
System and Network Security
Information Security Management
Research Methods

Optional modules

Software Architecture
Distributed System Principles
Data Mining and Knowledge Discovery in Data

Read less
Learn how to identify new and existing cyber threats and determine methods and processes to minimise attacks. Gain skills in a real-life business context, by cracking passwords and wireless networks and testing web applications for vulnerabilities and security breaches. Read more
Learn how to identify new and existing cyber threats and determine methods and processes to minimise attacks. Gain skills in a real-life business context, by cracking passwords and wireless networks and testing web applications for vulnerabilities and security breaches.

Cyber security is a priority for governments and organisations throughout the world. We’ll work together to explore how organisations and individuals can take action to protect themselves online from cyber-attacks.

We’ll begin by understanding networks and operating systems, how they work and the strengths and weaknesses of them. You’ll then think like a hacker, working from the inside out, as you recognise the threats to an organisation and its resources, and learn to implement and test secure systems.

Focusing on the strategic deployment and implementation of cyber security within an organisation, you’ll cover all aspects of cyber security including network security, computer security and information security.

You’ll apply your knowledge and skills hands-on in a real-life context, in our specialised lab, which is already equipped with tools such as Kali LInux, Wireshark, Nmap and Burp Suite. You’ll write your own Metasploit modules, automate social-engineering attacks, bypass antivirus software and turn access to one machine as you take total control of the enterprise.

You’ll gain skills in communicating information to higher levels of the corporation’s managers, giving you confidence to present your invaluable problem solving solutions and strategic security planning in any organisation.

We know there’s a worldwide shortage of skills graduates in cyber security, so you’ll be ahead of the game as you further your career and make a real impact on a society that is increasingly dependent on the internet and IT technology.

See the website http://www.anglia.ac.uk/study/postgraduate/cyber-security

Careers

The 2015 Global Information Security Workforce Study predicts that the global cyber security workforce shortage will reach 1.5 million by 2020, as demand outstrips supply. This means that there hasn't been a better time to join the cyber security sector.

Computer security is a fast developing area and your skills in computer, network and information security could see you working closely with lawyers, government, commercial organisations, the education sector and investigation agencies, as well as the finance and e-commerce sectors and national security organisations.

You’re also in the perfect position to continue your academic career and move up to our research degree Computer Science PhD.

Modules & assessment

Computer Networks
Operating Systems and Virtualisation
Secure Systems
Research Methods
Advanced Network Security Principles
Penetration Testing
Major Project

Assessment

We’ll asses your knowledge and understanding through a case study in which you’ll design, implement and test the security strategy of an organisation. You’ll also complete in-class tests, written assignments, software projects and presentations as part of the course.

Your faculty

The Faculty of Science & Technology is one of the largest of five faculties at Anglia Ruskin University. Whether you choose to study with us full- or part-time, on campus or at a distance, there’s an option whatever your level – from a foundation degree, to a BSc, MSc, PhD or professional doctorate.

Whichever course you pick, you’ll gain the theory and practical skills needed to progress with confidence. Join us and you could find yourself learning in the very latest laboratories or on field trips or work placements with well-known and respected companies. You may even have the opportunity to study abroad.

Everything we do in the faculty has a singular purpose: to provide a world-class environment to create, share and advance knowledge in science and technology fields. This is key to all of our futures.

Read less
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. Read more
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. This MSc can lead to a career such as a network system administrator, security analyst, ethical hacker or a security consultant.

Why choose this course?

The MSc Cyber Security consists of two major parts: taught modules and an MSc project. Each taught module has an assigned number of credits (either 15 or 30). In order to obtain an MSc degree you must study and pass 120 credits of compulsory taught modules plus the project i.e. 180 credits in total.

[[Careers
Our masters programme is designed to give Computer Science graduates the specialist, up-to-date skills and knowledge sought after by employers, whether in business, industry, government or research. This particular course will prepare you for a career such as a software engineer, developer or project manager.

Teaching methods

Classes consist of lectures, small group seminars, and practical work in our well-equipped laboratories. We use modern, industry-standard software wherever possible. There are specialist facilities for networking and multimedia and a project laboratory especially for masters students. In addition to scheduled classes, you will be expected a significant amount of time in self-study, taking advantage of the extensive and up-to-date facilities. These include the Learning Resource Centres, open 24x7, with 1,500 computer workstations and wifi access, Studynet our versatile online study environment usable on and off campus, and open access to our labs.

Work Placement

This MSc is available with an optional one year industry placement. The 'with placement' programmes give you additional industrial experience by applying the skills you have learned throughout your studies.

This offers you the opportunity to work for one year in a highly professional and stimulating environment. You will be a full time employee in a company earning a salary and will learn new skills that can't be taught at University. During the placement, you will be able to gain further insight into industrial practice that you can take forward into your individual project.

We will provide excellent academic and personal support during both your academic and placement periods together with comprehensive careers guidance from our very experienced dedicated Careers and Placements Service.

Although the responsibility for finding a placement is with you, our Careers and Placements Service maintains a wide variety of employers who offer placement opportunities and organise special training sessions to help you secure a placement, from job application to the interview. Optional one-to-one consultations are also available.

In order to qualify for the placement period you must maintain an overall average pass mark of not less than 60% across all modules studied in semester ‘A’.

Structure

Core Modules
-Advanced Computer Science Masters Project
-Programming Paradigms

Optional
-Advanced Databases
-Artificial Life with Robotics
-Data Mining
-Digital Forensics
-Distributed Systems Security
-Human Computer Interaction: Principles and Practice
-Information Security, Management and Compliance
-Investigative Methods for Computer Science
-Measures and Models for Software Engineering
-Mobile Standards, Interfaces and Applications
-Multicast and Multimedia Networking
-Network System Administration
-Neural Networks and Machine Learning
-Penetration Testing
-Professional Issues
-Programming for Software Engineers
-Secure Systems Programming
-Software Engineering Practice and Experience
-Theory and Practice of Artificial Intelligence
-Wireless, Mobile and Ad-hoc Networking

Read less

  • 1
Show 10 15 30 per page


Share this page:

Cookie Policy    X