• University of Bristol Featured Masters Courses
  • Aberystwyth University Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • Swansea University Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
Cranfield University Featured Masters Courses
University of Dundee Featured Masters Courses
Nottingham Trent University Featured Masters Courses
University of Birmingham Featured Masters Courses
Swansea University Featured Masters Courses
"hacking"×
0 miles

Masters Degrees (Hacking)

We have 40 Masters Degrees (Hacking)

  • "hacking" ×
  • clear all
Showing 1 to 15 of 40
Order by 
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system. Read more
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system.

Postgraduate funding (tuition fee and living cost loan) may be available from the Student Awards Agency for Scotland for those who meet the eligibility criteria.

Why choose this course?

-Abertay is the only university in the UK that offers a Masters programme in Ethical Hacking.
-It provides the core skills to allow you to take positions in a variety of companies where computer security is a major issue.
-Graduates will be at the forefront of new developments in security.
-Benefit from an active teaching group with a growing reputation based on industry links and Knowledge Transfer projects.
-It is delivered in a project based, entrepreneurial and enterprise culture.

Our students are passionate about their subject area and developing their knowledge. Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns.

We aim to change the way you think. We encourage lively debates about pertinent ethical and security issues. Students develop the hacker mindset, determined to ‘do their bit’ to improve security in the world of Computing.

Join our Graduate School

Our Graduate School is a dedicated facility providing support, training and professional development opportunities to our vibrant postgraduate community. Specially designed to promote integration and inculcation of interdisciplinary working in our next generation of researchers, postgraduates study and learn together at Abertay - from Environmental Management to Law, Psychology, Bioscience, Economics and Business, Cybersecurity and Computer Games Development.

When you join us as a postgraduate student or researcher, you’ll be joining a community of creative like-minded scholars and will automatically be provided with access to our dedicated study and social spaces – a forum in which you can meet, work and learn with other researchers and postgraduates from across the University. You’ll benefit from training and professional development opportunities as well as support with funding applications, placement opportunities, teaching support, public engagement and outreach activity.

What you study

From forensic computing to network security, the course covers a wide range of subjects. Within these, you will learn about web hacking, password cracking, malware analysis, port scanning, buffer overflows and much more.

You also learn how to evaluate the impact of security problems and recommend improvements to a network’s security within a legal and ethical framework. You will also conduct a masters project within an area of cybersecurity that will allow you to build on your existing skills.

How you learn

Teaching is focused on lectures and practical sessions in dedicated classrooms. Lectures are used to present the key concepts, while practicals increase your understanding of the subject and allow you to develop your competence in technological and theoretical work. The course is taught using a problem-based learning approach. You will spend about 12 hours per week attending classes and about 30 hours a week of private study.

How you are assessed

The taught course will be assessed using a combination of written coursework, presentations and seminars, with a written dissertation at MSc level.

Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. Read more

IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. .. to be able to mitigate the possible cyber attacks to their organizations.

This master's degree, aimed mainly at professionals with experience in systems engineering or in the world of programming, who seek to turn their career and specialize in the world of cybersecurity.

This program has 136 hours of face-to-face training in Madrid, which will work with a theoretical-practical methodology through real cases, conferences with professionals of the sector and seminars, enhancing Networking.

Students who successfully complete this program will obtain a Dual Degree from the Universidad Camilo José Cela and a Master's Degree from the IMF Business School. They will also get a Deloitte CyberSOC Degree and 3 Deloitte Associate level certifications for Safe Development, Ethical Hacking and Forensic Analysis. They will have at their disposal all the advantages of MFI:

  • Program Scholarships and Study Grants
  • Recruiters with over 12,000 vacancies posted in the last year
  • Unlimited tutoring
  • Financing up to 12 months without interest or bank intervention
  • Virtual library with over 30,000 references
  • Virtual library with access to any master classes
  • Access to the VIP Club with discounts on leisure, travel, restaurants ...

TEMARY:

  • MODULE I - Cyber ​​intelligence
  • MODULE II - Safe Development
  • MODULE III - Monitoring and Correlation of Security Events (SIEM)
  • MODULE IV - Ethical Hacking
  • MODULE V - Forensic Analysis
  • MODULE VI - Reverse Engineering
  • MODULE VII - Security in Mobile Environments
  • MODULE VIII - Final Master's Work


Read less
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies. Read more
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies.

This will be achieved by industry-led, research-informed, practice-based teaching and learning. Using industry-standard resources, you will apply the skills and knowledge gained to real-life project scenarios across industry, commerce and public sector.

The programme of study will include areas such as requirements capture, network design, evaluation, securing and optimisation, ranging from hardware configuration to protocol analysis and software definition. The programme will include research and scholarly activity in order to incorporate the latest thinking into the proposed solution.

What's covered in the course?

On this course, you will learn to:
-Critically evaluate and apply knowledge of advanced routing principles.
-Evaluate and apply advanced routing protocols for specific networking solutions.
-Evaluate a variety of routing techniques for a given network environment.
-Critically evaluate routing policy requirements for a network.
-Design and implement ethernet-based LANs. Ensuring security within the given environment.
-Apply mathematical analysis to use VLSM efficiently.
-Apply security considerations to the design and management of networks.
-Design/plan and implement LAN/WAN solutions which require switched hybrid.
-Critically assess SDN solutions in both the industry and research domains.
-Design an SDN-based network for a given system, identifying appropriate components and network structure.
-Implement an appropriate SDN controller to manage device configuration, and any other relevant network policies within an SDN network.
-Select, plan and implement an appropriate testing strategy to validate security requirements against a threat model.
-Critically evaluate the requirements for penetration testing, ethical hacking and effectively communicate security audit results to a variety of audiences.
-Design and conduct security assessment experiments to expose security vulnerabilities and to interpret, analyse and critically evaluate the resulting data to recommend remedial actions.
-Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within the organisation.

Why choose us?

-The Centre for Cloud Computing houses the Cisco Networking Academy, which has an international reputation for delivering high-quality teaching, training and support acrossEurope, the Middle East and Africa.
-In six purpose-built rooms, the Centre also houses £500,000 of computer networking and communications equipment, together with more than £200,000 of web-based equipment and bookable resources.
-The course provides opportunities for you to engage in advanced studies using problem-based learning and flipped curricula strategies. You will work in groups and on your own to deliver solutions to industry-related problems and scenarios.
-The unique combination of employer-led, research-informed technical knowledge and practical experience on industry-standard resources makes our graduates more employable and sought after.
-The course encourages critical thinking and problem solving, giving you the opportunities for research.

Course in depth

All the modules are practice-based and learning is carried out in the labs. Each 20-credit module will have two hours contact, and you are expected to undertake approximately six additional hours of learning, research and assessment preparation for each module.

Assessment is carried out through presentations (both group and individual), timed tests and exams, written reports, research activity and publication of findings, and practical-based time assessments.

At the start of the course, there will be a three-week, full-time induction tool kit, comprising of a review of CCNA and associated technologies.

The course also provides the base knowledge for students to undertake the CCNA certification, and with an additional boot camp to undertake the individual CCNP certification exams.

Modules
-Information Security 20 credits
-Software Defined Network Engineering 20 credits
-Advanced Networking Systems 20 credits
-Network Management 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods 20 credits
-Project and placement 60 credits

Enhancing your employability skills

The University is eager to recognise students have made the effort to gain industry experience and stand out from the typical graduate. Thus, we offer a range of options for you to get extra awards and recognition for your work in industry.

We also have our Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.

Read less
Programme description. Design Informatics combines Data Science with Design Thinking in a context of critical enquiry and speculation. Read more

Programme description

Design Informatics combines Data Science with Design Thinking in a context of critical enquiry and speculation. We build a value-aware, reflective practice at the interface between data and society by combining theory and research with an open-ended process of making and hacking.

Human activity is being constantly shaped by the flow of data and the intelligences that process it, moving towards an algorithmically mediated society. Design Informatics asks how we can create products and services within this world, that learn and evolve, that are contextualised and humane. Beyond that, it asks questions about what things we should create, speculating about the different futures we might be building and the values behind them.

The central premise is that data is a medium for design: by shaping data, we shape the world around us. Data Science provides the groundwork for this, with Design Thinking underpinning reflective research through design. You will use this in working with the internet of things and physical computing, machine learning, speech and language technology, usable privacy and security, data ethics, blockchain technologies. You will connect technology with society, health, architecture, fashion, bio-design, craft, finance, tourism, and a host of other real world contexts, through case studies, individual, and collaborative projects. You will understand user experience in the wider socio-cultural context, through an agile programme of hacking, making and materialising new products and services.

Programme structure

Please be aware that the structure of the programme may change.

Throughout the programme, you will be working both individually and in teams of designers and computer scientists. Everyone will have to write code during the course, and everyone will have to make physical objects. Several courses, including the dissertation, will involve presenting the artefact, product, service, or interactive experience that you have created to the general public in a show.

In the first year, you will study:

  • Design Informatics: Histories and Futures
  • Data Science for Design (compulsory for MA/MFA, strongly recommended for MSc/ Advanced MSc)
  • Case Studies in Design Informatics 1
  • Design with Data
  • Design Informatics Project
  • 20 credits of elective courses

In Design with Data and Design Informatics Project, you are likely to work with an external partner, such as the Royal Bank of Scotland, Amazon, Edinburgh City Council, Royal Botanic Garden Edinburgh or the National Museum of Scotland.

MSc and MA students then undertake a dissertation in the summer before graduation.

MFA and Advanced MSc students take a summer placement with a relevant digital organisation then return for a second year of study, comprising:

  • Case Studies in Design Informatics 2
  • 60 credits of elective courses
  • A dissertation

Elective courses are drawn from the Masters Programmes of the School of Informatics, Edinburgh College of Art, and Philosophy, Psychology, and Language Sciences. Courses are typically 10 or 20 credits.

Career opportunities

This programme will put you at the cutting edge of the intersection between data science, design, and information technology, opening a host of opportunities in working with companies, charities, and the public sector. We encourage entrepreneurship. For those who wish to stay in academia, the course provides a solid foundation for a PhD in related areas.



Read less
Design Informatics combines Data Science with Design Thinking in a context of critical enquiry and speculation. We build a value-aware, reflective practice at the interface between data and society by combining theory and research with an open-ended process of making and hacking. Read more

Design Informatics combines Data Science with Design Thinking in a context of critical enquiry and speculation. We build a value-aware, reflective practice at the interface between data and society by combining theory and research with an open-ended process of making and hacking.

The central premise is that data is a medium for design: by shaping data, we shape the world around us. Data Science provides the groundwork for this, with Design Thinking underpinning reflective research through design. You will use this in working with the internet of things and physical computing, machine learning, speech and language technology, usable privacy and security, data ethics, blockchain technologies.

You will connect technology with society, health, architecture, fashion, bio-design, craft, finance, tourism, and a host of other real world contexts, through case studies, individual, and collaborative projects. You will understand user experience in the wider socio-cultural context, through an agile programme of hacking, making and materialising new products and services.

Programme structure

Please be aware that the structure of the programme may change.

Throughout the programme, you will be working both individually and in teams of designers and computer scientists. Everyone will have to write code during the course, and everyone will have to make physical objects. Several courses, including the dissertation, will involve presenting the artefact, product, service, or interactive experience that you have created to the general public in a show.

Compulsory Courses:

  • Design Informatics: Histories and Futures
  • Data Science for Design (not compulsory yet, but strongly recommended for MSc/ Advanced MSc)
  • Case Studies in Design Informatics 1
  • Design with Data
  • Design Informatics Project
  • Dissertation In Design with Data and Design Informatics Project, you are likely to work with an external partner, such as the Royal Bank of Scotland, Edinburgh City Council, or the National Museum of Scotland.

Elective Courses:

In addition to the compulsory courses, you can choose 1-4 elective courses from the Masters Programmes of the School of Informatics, Edinburgh College of Art, and Philosophy, Psychology, and Language Sciences.

Career opportunities

This degree will put you at the cutting edge of the intersection between data science, design, and information technology, opening a host of opportunities in working with companies, charities, and the public sector. We encourage entrepreneurship. For those who wish to deepen their research practice, the course provides a solid foundation for a PhD in related areas.



Read less
Design Informatics combines Data Science with Design Thinking in a context of critical enquiry and speculation. We build a value-aware, reflective practice at the interface between data and society by combining theory and research with an open-ended process of making and hacking. Read more

Design Informatics combines Data Science with Design Thinking in a context of critical enquiry and speculation. We build a value-aware, reflective practice at the interface between data and society by combining theory and research with an open-ended process of making and hacking.

The central premise is that data is a medium for design: by shaping data, we shape the world around us. Data Science provides the groundwork for this, with Design Thinking underpinning reflective research through design. You will use this in working with the internet of things and physical computing, machine learning, speech and language technology, usable privacy and security, data ethics, blockchain technologies. You will connect technology with society, health, architecture, fashion, bio-design, craft, finance, tourism, and a host of other real world contexts, through case studies, individual, and collaborative projects. You will understand user experience in the wider socio-cultural context, through an agile programme of hacking, making and materialising new products and services.

The Advanced MSc programme offers students a unique opportunity to deepen their learning through an additional 6-10 week internship, followed by an additional two semesters at Design Informatics where students can develop further as reflective practitioners, makers, and innovators.

Programme structure

Please be aware that the structure of the programme may change.

Throughout the programme, you will be working both individually and in teams of designers and computer scientists. Everyone will have to write code during the course, and everyone will have to make physical objects. Several courses, including the dissertation, will involve presenting the artefact, product, service, or interactive experience that you have created to the general public in a show.

Year 1:

Compulsory Courses:

  • Design Informatics: Histories and Futures
  • Data Science for Design (not compulsory yet, but strongly recommended for MSc/ Advanced MSc)
  • Case Studies in Design Informatics 1
  • Design with Data
  • Design Informatics Project

In Design with Data and Design Informatics Project, you are likely to work with an external partner, such as the Royal Bank of Scotland, Edinburgh City Council, or the National Museum of Scotland.

Elective Courses:

In addition to the compulsory courses, you can choose 1-4 elective courses from the Masters Programmes of the School of Informatics, Edinburgh College of Art, and Philosophy, Psychology, and Language Sciences.

Students in the Advanced MSc programme will complete a 6-10 week internship with a company, charity, government, or third sector organisation over the summer.

Year 2:

Compulsory Courses:

  • Case Studies in Design Informatics 1
  • Dissertation

Elective Courses:

In addition to the compulsory courses, you can choose 2-4 elective courses from the Masters Programmes of the School of Informatics, Edinburgh College of Art, and Philosophy, Psychology, and Language Sciences.

Career opportunities

This degree will put you at the cutting edge of the intersection between data science, design, and information technology, opening a host of opportunities in working with companies, charities, and the public sector. We encourage entrepreneurship. For those who wish to deepen their research practice, the course provides a solid foundation for a PhD in related areas.



Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less
The threat of cyber security attacks is increasingly apparent to individuals and organisations across the globe. From hacking to phishing, scamming to grooming, and botnets to cyber-terrorism, the variety and ingenuity of exploits appear to expand constantly. Read more

The threat of cyber security attacks is increasingly apparent to individuals and organisations across the globe.

From hacking to phishing, scamming to grooming, and botnets to cyber-terrorism, the variety and ingenuity of exploits appear to expand constantly.

In this context, this programme addresses system vulnerabilities and the preventative measures that may counter cyber-attacks, including steps to repair systems weaknesses, prevent repeat occurrences, and collecting and examining digital evidence using a variety of digital and mobile forensics tools such as FTK and Cellbrite.

You will also develop a detailed understanding of comprehensive cyber risk management practices for ensuring overall security.

This course is also available as a two year masters with an industrial placement year.

The embedded industrial placement offers a unique opportunity to apply the skills learnt on real-life projects. This, in turn, prepares graduates of the programme for successful careers in both the Information Security & Digital Forensics professions. 



Read less
Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings. Read more

Why take this course?

Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings.

This course will enable you to develop your understanding and application of security issues and cybercrime for the purpose of forensic computing and investigation.

What will I experience?

On this course you can:

Learn how to investigate hacking, fraud and deception using a range of digital forensic tools
Practise identifying intruders' trails and suspected inappropriate use of internet applications in order to compile scientific evidence to prosecute
Manage a real-life computer engineering project using appropriate techniques for writing and reasoning about security policies

What opportunities might it lead to?

Many police investigations or civil disputes involve investigation of computer systems, mobile phones or other information devices, and there are an increasing number of UK companies that undertake investigations as consultants. You can expect to find career opportunities in such companies as well as in law enforcement and other services.

Accredited by BCS, The Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional (CITP). This course also partially meets the academic requirement for registration, either as a Chartered Scientist (CSci) or (on behalf of the Engineering Council) as a Chartered Engineer (CEng)*.

*On condition that the Master's Engineering Project is successfully completed.

Module Details

You will study four key topics which will collaboratively develop your knowledge and ability to carry out forensic IT investigations as well as an introduction on how to build protected specification software for data and other web applications. You will also get to build your own test system as part of your final project.

Here are the units you will study:

Computer Forensic Investigation and Cryptography: This unit covers the practical aspects of conducting a forensic investigation of digital evidence. In order for the students to develop a critical understanding of computer forensics, a holistic approach of the forensics investigation process is adopted, with a full investigation ‘life cycle’ from seizure of evidence through to giving evidence in court as an expert witness. We look at a range of tools, operating systems and devices.

Computer Security: The unit provides an introduction to computer security concepts and their practical application, in both closed and interconnected networks. Students are expected to both understand and be able to critically evaluate different approaches to securing complex computer systems.

Cybercrime Security and Risk Management: This unit provides opportunities for participants to develop skills and knowledge in the understanding of corporate cyber threats. Drawing upon a range of practical examples, students will examine how rapid technological development and expansion in access to the internet has impacted upon crime (e.g. how anonymity and unfounded trust encourage deception), mapping out the terrain of information technology, and identifying the emerging areas of cyber crime. Areas explored will include the crossing of established boundaries into spaces over which control has already been established such as cyber-intrusion and cyber-theft, but also 'new cyber crimes' in the form of virtual trespass, Denial of Service attacks, and the development of opportunities for offending in the context of social networking websites.

Master's Project: You will undertake either an engineering unit or a study project, during the summer period. The project offers students the opportunity to apply the taught material in the solution of a real-world problem directly related to their course. The engineering project usually involves building a piece of software to solve a problem. An example of the sort of thing you might do would be building a tool to address a specific forensics requirement. The study project usually involves undertaking a study of an IT domain relevant to forensics. To prepare for this the project includes a number of preparatory sessions, which contribute to part of your final mark.

Specialist optional units include:

Systems, Security and Data Analysis: The first part of the unit provides an overview of computer organisation, operating systems and network design, with a strong focus on security considerations and aspects relevant to computer and digital forensics. The early part of the unit will provide an introduction to relevant issues in system architecture and file system organisation. Threats to computer systems will be considered. The first half of the unit is concluded with studying in some depth current technologies for securing real computer networks. The second part of the unit deals with the important topic of data analytics.

Advanced Programming Skills for the Web: This unit draws together a number of system development skills, focusing on how they can be applied to the development specifically of web applications. Topics covered include web programming, connecting databases to web applications, software tools, testing and security.

Programme Assessment

You will be taught through a combination of practical exercises, simulations, lectures, guest lectures and formative assessments, and will be expected to use a wide range of on and offline learning tools.

You will encounter a range of assessment styles depending on the content and nature of the unit topic. This can include written assignments, presentations as well as group and individual lab-based assessments. However, the most significant assessment element is the final dissertation, which reports and reflects on your final project.

Student Destinations

On completing this course, you will be equipped to seek employment in the following areas: IT auditing, information security, independent investigation, Computer Emergency Response Teams (CERT) and law enforcement agencies. Some of our previous graduates have been successful in finding employment within high-tech crime units, commercial investigation and national security bodies, while others go on to further research study at PhD level.

This course will also appeal to already practising professionals in related areas such as law enforcement, system administration, corporate security, IS auditing or security analysis and management for the commercial sector.

Read less
Our Digital Media Arts MA is taught both at the University of Brighton and at Lighthouse. The Lighthouse is a digital culture agency where a key part of its work is education and professional development (PPD). Read more

Our Digital Media Arts MA is taught both at the University of Brighton and at Lighthouse. The Lighthouse is a digital culture agency where a key part of its work is education and professional development (PPD). Through short technology labs and courses they help empower the digital artists and creative engineers of tomorrow. 

We have developed the course in the context of Brighton’s status as one of the main centres of the media economy, adopting an interdisciplinary approach that allows you to use and develop your existing skills in an environment that encourages both innovation and high-quality production.

The course provides excellent training for artists, designers and arts professionals wishing to seek a career in the creative industries, offering expert education in the areas of interaction design, social media, programming, digital film, installation, public art and interactive art. You will learn core digital media production skills, explore a broad range of creative digital practices, and access the most up-to-date developments and critical debates in the discipline.

While our professional studio environment enables you to explore the full creative potential of digital media arts practices, we also encourage live project work so that you gain direct experience and develop valuable links to the digital media and wider cultural industries.

The course offers a suitable route and an appropriate academic grounding for PhD study, as has been evidenced by recent student progression on to PhD programs at the University of Sussex, Goldsmiths, Plymouth University and The University of Auckland in New Zealand.

Areas of study

The course is designed to support your individual development and creativity as an artist and producer and is based around an essential core of practice-based learning, underpinned by a programme of theoretical lecture series, artist talks, seminars, workshops, tutorials and independent study.

You will learn core digital media production skills. Specialist workshops have included processing, motion graphics and sound art.

The course supports an interdisciplinary approach that enables you to develop existing skills and experiences in an environment that encourages both innovation and high quality production. Live project work in modules throughout the course will help you gain direct experience and develop valuable links in the digital media industries and wider cultural industries.

Modules will be relevant and up-to-date in this fast changing and evolving digital climate, allowing for flexibility to expand into new areas of development. Examples of theses areas include screen based web design, social media and interactive installations and also including using data analytics, coding, programming and hacking.

You will be taught by a diverse and experienced lecturing team, all of whom are creative practitioners. 

The course offers a flexible mode of study for students, either as a part-time route (two years) or full time (one year). 

Modules

  • Cultures of Media Authoring and Web Design
  • Virtual Culture and Network Practices
  • Practice based Research Methods
  • Beyond the Screen: Interactive Installations
  • Presenting a Body of Work
  • Critical Theory: Media Concepts Research Paper

There will be an increasing emphasis on engaging with script and code, which is particularly pertinent to practical modules as they include the building blocks of developments for creative design, and web applications. These include the following languages - CSS, Flash, Processing, Pure Data, ActionScript 2.0 and 3.0, Wordpress, PHP, HTML5, Javascript, jQuery. MFC, C, OpenGL, Java and Lingo. 

We encourage students to create work through the use of open source data and engaging with hacker ethics, which are concerned primarily with sharing, openness and collaboration, rather than using commercial software. 

Making sure that what you learn with us is relevant, up to date and what employers are looking for is our priority, so courses are reviewed and enhanced on an ongoing basis. When you have applied to us, you’ll be told about any new developments through our applicant portal.

Student work

The Digital Media Arts MA at Brighton develops your production skills and unique artistic approach. Over the course, you will build a substantial body of digital artwork that will help you get ahead in the fast-moving and competitive new media industries.

You will create your art and design work using a range of digital technologies, producing screen-based work, interactive installations, social media interventions and soundscapes. All students produce work for the assessment show towards the end of the course.

Careers and employability

The Digital Media Arts MA is a practical course that teaches a range of skills in digital development and design that you can apply outside of university. The course aims to empower digital artists and critical engineers of tomorrow, in exploring the creative thinking that is critical to working effectively with technology.



Read less
Computer security remains a hot topic in the media and there is strong demand for graduates with technical skills in this area. The programme addresses computer and information security holistically because vulnerability in any one component can compromise an entire system. Read more
Computer security remains a hot topic in the media and there is strong demand for graduates with technical skills in this area. The programme addresses computer and information security holistically because vulnerability in any one component can compromise an entire system.

This includes computer architectures, operating systems, network technologies, data storage and software development processes. A wide range of threats and other security issues (for example, denial-of-service attacks, hacking, viruses and worms) are covered along with defences and countermeasures.

The programme is aimed at computing graduates who are seeking careers as computer security professionals or who are interested in research. All taught Master’s programmes at Canterbury are available with an optional industrial placement.

Visit the website https://www.kent.ac.uk/courses/postgraduate/254/computer-security

About the School of Computing

Our world-leading researchers, in key areas such as systems security, programming languages, communications, computational intelligence and memory management, and in interdisciplinary work with biosciences and psychology, earned us an outstanding result in the most recent national research assessment.

In addition, two of our staff have been honoured as Distinguished Scientists by the ACM and we have also held Royal Society Industrial Fellowships.

As an internationally recognised Centre of Excellence for programming education, the School of Computing is a leader in computer science teaching. Two of our staff have received the ACM SIGCSE Award for Outstanding Contribution to Computer Science Education. We are also home to two National Teaching Fellows, to authors of widely used textbooks and to award-winning teaching systems such as BlueJ.

Modules

The following modules are indicative of those offered on this programme. This list is based on the current curriculum and may change year to year in response to new curriculum developments and innovation. Most programmes will require you to study a combination of compulsory and optional modules. You may also have the option to take modules from other programmes so that you may customise your programme and explore other subject areas that interest you.

CO834 - Trust, Security and Privacy Management (15 credits)
CO874 - Networks and Network Security (15 credits)
CO876 - Computer Security (15 credits)
CO880 - Project and Dissertation (60 credits)
CO885 - Project Research (15 credits)
CO899 - System Security (15 credits)
CO894 - Development Frameworks (15 credits)
CO889 - C++ Programming (15 credits)
CO846 - Cloud Computing (15 credits)
CO882 - Advanced Object-Oriented Programming (15 credits)
CO883 - Systems Architecture (15 credits)
CO836 - Cognitive Neural Networks (15 credits)
CO837 - Natural Computation (15 credits)
CO838 - Internet of Things and Mobile Devices (15 credits)
CO841 - Computing Law, Contracts and Professional Responsibility (15 credits)
CO528 - Introduction to Intelligent Systems (15 credits)
CO545 - Functional and Concurrent Programming (15 credits)
CO645 - IT Consultancy Practice 2 (15 credits)
CO832 - Data Mining and Knowledge Discovery (15 credits)
CO847 - Green Computing (15 credits)
CO890 - Concurrency and Parallelism (15 credits)
CO892 - Advanced Network Security (15 credits)
EL846 - Industrial Context of Biometrics (15 credits)
CO871 - Advanced Java for Programmers (15 credits)
CO881 - Object-Oriented Programming (15 credits)

Assessment

Assessment is through a mixture of written examinations and coursework, the relative weights of which vary according to the nature of the module. The final project is assessed by a dissertation.

Programme aims

This programme aims to:

- enhance the career prospects of graduates seeking employment in the computing/IT sector

- prepare you for research and/or professional practice at the forefront of the discipline

- develop an integrated and critically aware understanding of one or more areas of computing/IT and their applications (according to your degree title)

- develop a variety of advanced intellectual and transferable skills

- equip you with the lifelong learning skills necessary to keep abreast of future developments in the field.

Careers

Students can gain practical work experience as part of their degree through our industrial placements scheme and KITC (see above). Both of these opportunities consolidate academic skills with real world experience, giving our graduates a significant advantage in the jobs market. Our graduates go on to work for leading companies including Cisco, GlaxoSmithKline, IBM, Intel, Lilly, Microsoft, Morgan Stanley, Thomson Reuters and T-Mobile. Many have gone on to develop their careers as project leaders and managers.

Find out how to apply here - https://www.kent.ac.uk/courses/postgraduate/apply/

Read less

Show 10 15 30 per page



Cookie Policy    X