• Swansea University Featured Masters Courses
  • University of Southampton Featured Masters Courses
  • Ross University School of Veterinary Medicine Featured Masters Courses
  • Anglia Ruskin University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
Cranfield University Featured Masters Courses
Imperial College London Featured Masters Courses
Vlerick Business School Featured Masters Courses
Nottingham Trent University Featured Masters Courses
Swansea University Featured Masters Courses
"hacking"×
0 miles

Masters Degrees (Hacking)

We have 35 Masters Degrees (Hacking)

  • "hacking" ×
  • clear all
Showing 1 to 15 of 35
Order by 
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system. Read more
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system.

Postgraduate funding (tuition fee and living cost loan) may be available from the Student Awards Agency for Scotland for those who meet the eligibility criteria.

Why choose this course?

-Abertay is the only university in the UK that offers a Masters programme in Ethical Hacking.
-It provides the core skills to allow you to take positions in a variety of companies where computer security is a major issue.
-Graduates will be at the forefront of new developments in security.
-Benefit from an active teaching group with a growing reputation based on industry links and Knowledge Transfer projects.
-It is delivered in a project based, entrepreneurial and enterprise culture.

Our students are passionate about their subject area and developing their knowledge. Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns.

We aim to change the way you think. We encourage lively debates about pertinent ethical and security issues. Students develop the hacker mindset, determined to ‘do their bit’ to improve security in the world of Computing.

Join our Graduate School

Our Graduate School is a dedicated facility providing support, training and professional development opportunities to our vibrant postgraduate community. Specially designed to promote integration and inculcation of interdisciplinary working in our next generation of researchers, postgraduates study and learn together at Abertay - from Environmental Management to Law, Psychology, Bioscience, Economics and Business, Cybersecurity and Computer Games Development.

When you join us as a postgraduate student or researcher, you’ll be joining a community of creative like-minded scholars and will automatically be provided with access to our dedicated study and social spaces – a forum in which you can meet, work and learn with other researchers and postgraduates from across the University. You’ll benefit from training and professional development opportunities as well as support with funding applications, placement opportunities, teaching support, public engagement and outreach activity.

What you study

From forensic computing to network security, the course covers a wide range of subjects. Within these, you will learn about web hacking, password cracking, malware analysis, port scanning, buffer overflows and much more.

You also learn how to evaluate the impact of security problems and recommend improvements to a network’s security within a legal and ethical framework. You will also conduct a masters project within an area of cybersecurity that will allow you to build on your existing skills.

How you learn

Teaching is focused on lectures and practical sessions in dedicated classrooms. Lectures are used to present the key concepts, while practicals increase your understanding of the subject and allow you to develop your competence in technological and theoretical work. The course is taught using a problem-based learning approach. You will spend about 12 hours per week attending classes and about 30 hours a week of private study.

How you are assessed

The taught course will be assessed using a combination of written coursework, presentations and seminars, with a written dissertation at MSc level.

Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The University of Bradford Cyber Security MSc is a taught postgraduate programme, offering one-year full-time or two-year part-time study options. Read more

The University of Bradford Cyber Security MSc is a taught postgraduate programme, offering one-year full-time or two-year part-time study options.

Students complete a range of core modules before carrying out an independent research project and dissertation. The course awards a full Master of Science qualification.

The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. The focus within this programme on the principles, technologies and practices of cyber security helps you to gain the appropriate skills for future PhD studies and research careers as well as to become competent practitioners. The programme comprises particular developments in security with a firm base in academic research and also offers the opportunity for you to study selected topics in advanced computer science.

Included in the programme is the opportunity to enhance industry relevant skills with study in ISO27001 Lead Implementer and Ethical Hacking. These skill areas were highlighted by past alumni and industry practitioners for inclusion in the programme. Therefore, you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking.

This programme meets a continued growing demand for specialists in this area by offering a way for individuals in current employment with relevant industry experience as well as recent graduates to study and enhance and develop their skills. The MSc Cyber Security programme will therefore draw graduates wishing to enhance their undergraduate studies in computing with advanced study of security to equip them for senior positions with responsibility for the IT technical and management based security of an organisation. In addition, the programme encourages those with relevant industry skills to specialise in cyber security or refine and develop their existing expertise.

For more information on the part time version of this course, please view this web-page: http://www.brad.ac.uk/study/courses/info/cyber-security-msc-part-time

Professional Accreditation

This course is accredited by the British Computer Society.

Why Bradford?

-Within this programme you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking

-Meets commercial needs for employees who are able to understand and think strategically about future developments in this area

-Provide a high academic quality of service to you, covering both theoretical and practical aspects of computing, networking and cyber security

-Enable you to equip yourself with knowledge, skills and understanding, at an advanced level within the chosen field of study

-MSc Cyber Security draws upon the successful research expertise of the School of Electrical Engineering and Computer Science in addition to that within the Interdisciplinary Research Centre (IRC) in Cyber Security. This base of expertise and research is a fantastic resource for the continued development of the programme in cyber security

Modules

-Business Systems Security

-Networks and Protocols

-Foundations of Cryptography (PG)

-Internet Security and Protocols

-ISO27000 Framework (ISMS)

-Ethical Hacking

-Dissertation

Career support and prospects

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.

The course is designed to equip graduates for senior positions with responsibility for the IT-based security of an organisation.

Application process

The easiest way to apply is online.

This will help us process your application more quickly and allow you to submit your supporting documents electronically.

If you are unable to apply online, please email  to request a paper application form.

We will also need the following supporting documents, along with any other information specified on the course page:

  • Degree certificates/transcripts
  • Research proposal (if required)
  • Two references (including one academic reference)
  • Evidence of English language level (if required)
  • A copy of your passport

International students

If you applying from outside the UK and require additional support you may apply through your country representative.

They can help you at every stage and communicate with the University on your behalf. They often provide additional services to ensure your smooth arrival to the UK such as visa application support and assistance with your travel arrangements.

Funding

The following postgraduate funding may be available to study the Cyber Security MSc at the University of Bradford.

UK postgraduate loans:

Erasmus funding:

Funding from FindAMasters:

Fees

UK / EU: £7,750

International: £17,600



Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. Read more

IMF Business School and Deloitte, in collaboration with Camilo José Cela University, have developed the Executive Master in Cybersecurity in face-to-face mode, whose main objective is for the student to acquire a broad knowledge in computer security, cyber intelligence, audits, malware and hacking. .. to be able to mitigate the possible cyber attacks to their organizations.

This master's degree, aimed mainly at professionals with experience in systems engineering or in the world of programming, who seek to turn their career and specialize in the world of cybersecurity.

This program has 136 hours of face-to-face training in Madrid, which will work with a theoretical-practical methodology through real cases, conferences with professionals of the sector and seminars, enhancing Networking.

Students who successfully complete this program will obtain a Dual Degree from the Universidad Camilo José Cela and a Master's Degree from the IMF Business School. They will also get a Deloitte CyberSOC Degree and 3 Deloitte Associate level certifications for Safe Development, Ethical Hacking and Forensic Analysis. They will have at their disposal all the advantages of MFI:

  • Program Scholarships and Study Grants
  • Recruiters with over 12,000 vacancies posted in the last year
  • Unlimited tutoring
  • Financing up to 12 months without interest or bank intervention
  • Virtual library with over 30,000 references
  • Virtual library with access to any master classes
  • Access to the VIP Club with discounts on leisure, travel, restaurants ...

TEMARY:

  • MODULE I - Cyber ​​intelligence
  • MODULE II - Safe Development
  • MODULE III - Monitoring and Correlation of Security Events (SIEM)
  • MODULE IV - Ethical Hacking
  • MODULE V - Forensic Analysis
  • MODULE VI - Reverse Engineering
  • MODULE VII - Security in Mobile Environments
  • MODULE VIII - Final Master's Work


Read less
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies. Read more
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies.

This will be achieved by industry-led, research-informed, practice-based teaching and learning. Using industry-standard resources, you will apply the skills and knowledge gained to real-life project scenarios across industry, commerce and public sector.

The programme of study will include areas such as requirements capture, network design, evaluation, securing and optimisation, ranging from hardware configuration to protocol analysis and software definition. The programme will include research and scholarly activity in order to incorporate the latest thinking into the proposed solution.

What's covered in the course?

On this course, you will learn to:
-Critically evaluate and apply knowledge of advanced routing principles.
-Evaluate and apply advanced routing protocols for specific networking solutions.
-Evaluate a variety of routing techniques for a given network environment.
-Critically evaluate routing policy requirements for a network.
-Design and implement ethernet-based LANs. Ensuring security within the given environment.
-Apply mathematical analysis to use VLSM efficiently.
-Apply security considerations to the design and management of networks.
-Design/plan and implement LAN/WAN solutions which require switched hybrid.
-Critically assess SDN solutions in both the industry and research domains.
-Design an SDN-based network for a given system, identifying appropriate components and network structure.
-Implement an appropriate SDN controller to manage device configuration, and any other relevant network policies within an SDN network.
-Select, plan and implement an appropriate testing strategy to validate security requirements against a threat model.
-Critically evaluate the requirements for penetration testing, ethical hacking and effectively communicate security audit results to a variety of audiences.
-Design and conduct security assessment experiments to expose security vulnerabilities and to interpret, analyse and critically evaluate the resulting data to recommend remedial actions.
-Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within the organisation.

Why choose us?

-The Centre for Cloud Computing houses the Cisco Networking Academy, which has an international reputation for delivering high-quality teaching, training and support acrossEurope, the Middle East and Africa.
-In six purpose-built rooms, the Centre also houses £500,000 of computer networking and communications equipment, together with more than £200,000 of web-based equipment and bookable resources.
-The course provides opportunities for you to engage in advanced studies using problem-based learning and flipped curricula strategies. You will work in groups and on your own to deliver solutions to industry-related problems and scenarios.
-The unique combination of employer-led, research-informed technical knowledge and practical experience on industry-standard resources makes our graduates more employable and sought after.
-The course encourages critical thinking and problem solving, giving you the opportunities for research.

Course in depth

All the modules are practice-based and learning is carried out in the labs. Each 20-credit module will have two hours contact, and you are expected to undertake approximately six additional hours of learning, research and assessment preparation for each module.

Assessment is carried out through presentations (both group and individual), timed tests and exams, written reports, research activity and publication of findings, and practical-based time assessments.

At the start of the course, there will be a three-week, full-time induction tool kit, comprising of a review of CCNA and associated technologies.

The course also provides the base knowledge for students to undertake the CCNA certification, and with an additional boot camp to undertake the individual CCNP certification exams.

Modules
-Information Security 20 credits
-Software Defined Network Engineering 20 credits
-Advanced Networking Systems 20 credits
-Network Management 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods 20 credits
-Project and placement 60 credits

Enhancing your employability skills

The University is eager to recognise students have made the effort to gain industry experience and stand out from the typical graduate. Thus, we offer a range of options for you to get extra awards and recognition for your work in industry.

We also have our Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.

Read less
Programme description. Design Informatics combines Data Science with Design Thinking in a context of critical enquiry and speculation. Read more

Programme description

Design Informatics combines Data Science with Design Thinking in a context of critical enquiry and speculation. We build a value-aware, reflective practice at the interface between data and society by combining theory and research with an open-ended process of making and hacking.

Human activity is being constantly shaped by the flow of data and the intelligences that process it, moving towards an algorithmically mediated society. Design Informatics asks how we can create products and services within this world, that learn and evolve, that are contextualised and humane. Beyond that, it asks questions about what things we should create, speculating about the different futures we might be building and the values behind them.

The central premise is that data is a medium for design: by shaping data, we shape the world around us. Data Science provides the groundwork for this, with Design Thinking underpinning reflective research through design. You will use this in working with the internet of things and physical computing, machine learning, speech and language technology, usable privacy and security, data ethics, blockchain technologies. You will connect technology with society, health, architecture, fashion, bio-design, craft, finance, tourism, and a host of other real world contexts, through case studies, individual, and collaborative projects. You will understand user experience in the wider socio-cultural context, through an agile programme of hacking, making and materialising new products and services.

Programme structure

Please be aware that the structure of the programme may change.

Throughout the programme, you will be working both individually and in teams of designers and computer scientists. Everyone will have to write code during the course, and everyone will have to make physical objects. Several courses, including the dissertation, will involve presenting the artefact, product, service, or interactive experience that you have created to the general public in a show.

In the first year, you will study:

  • Design Informatics: Histories and Futures
  • Data Science for Design (compulsory for MA/MFA, strongly recommended for MSc/ Advanced MSc)
  • Case Studies in Design Informatics 1
  • Design with Data
  • Design Informatics Project
  • 20 credits of elective courses

In Design with Data and Design Informatics Project, you are likely to work with an external partner, such as the Royal Bank of Scotland, Amazon, Edinburgh City Council, Royal Botanic Garden Edinburgh or the National Museum of Scotland.

MSc and MA students then undertake a dissertation in the summer before graduation.

MFA and Advanced MSc students take a summer placement with a relevant digital organisation then return for a second year of study, comprising:

  • Case Studies in Design Informatics 2
  • 60 credits of elective courses
  • A dissertation

Elective courses are drawn from the Masters Programmes of the School of Informatics, Edinburgh College of Art, and Philosophy, Psychology, and Language Sciences. Courses are typically 10 or 20 credits.

Career opportunities

This degree will put you at the cutting edge of the intersection between data science, design, and information technology, opening a host of opportunities in working with companies, charities, and the public sector. We encourage entrepreneurship. For those who wish to stay in academia, the course provides a solid foundation for a PhD in related areas.



Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
In 2006, UEL was the first university in the UK to offer an MSc programme of this kind. Read more
In 2006, UEL was the first university in the UK to offer an MSc programme of this kind. While this has put us ahead of many other institutions in the region, the digital forensics area is changing rapidly in terms of tools, investigation techniques, and methods available for both investigators and criminals, so the challenge has been to continuously develop and enhance the programme materials and structure to equip our students with the skills and knowledge demanded by the market.

This course is your entry to a career in digital forensics investigation. You will have access to the latest tools available on the market, such as EnCase, FTK, and Mobile Forensics tools such as Oxygen, used extensively by law enforcement agencies across the world. The programme gives you a comprehensive understanding of security in terms of IT law, security management, and hacking techniques.

Key Facts

This MSc enjoys a high exposure with industry; as external specialist lecturers continue to deliver their knowledge through lectures and seminars.

Why Choose Us?

This programme helps students develop a wide range of skills and competencies that will prepare them for a variety of career opportunities. The career outlook for graduates is positive, as there is a shortage of skilled personnel in both the Information Security and digital forensics fields. Graduates of this programme can progress to work in multinational organisations, including cyber-fighting agencies. Furthermore, digital forensics is no longer associated only with law enforcement agencies, as organisations have now started to create digital or computer forensics departments, causing a huge demand in industry for professionals with both digital forensics and security skills.

Read less
Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings. Read more

Why take this course?

Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings.

This course will enable you to develop your understanding and application of security issues and cybercrime for the purpose of forensic computing and investigation.

What will I experience?

On this course you can:

Learn how to investigate hacking, fraud and deception using a range of digital forensic tools
Practise identifying intruders' trails and suspected inappropriate use of internet applications in order to compile scientific evidence to prosecute
Manage a real-life computer engineering project using appropriate techniques for writing and reasoning about security policies

What opportunities might it lead to?

Many police investigations or civil disputes involve investigation of computer systems, mobile phones or other information devices, and there are an increasing number of UK companies that undertake investigations as consultants. You can expect to find career opportunities in such companies as well as in law enforcement and other services.

Accredited by BCS, The Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional (CITP). This course also partially meets the academic requirement for registration, either as a Chartered Scientist (CSci) or (on behalf of the Engineering Council) as a Chartered Engineer (CEng)*.

*On condition that the Master's Engineering Project is successfully completed.

Module Details

You will study four key topics which will collaboratively develop your knowledge and ability to carry out forensic IT investigations as well as an introduction on how to build protected specification software for data and other web applications. You will also get to build your own test system as part of your final project.

Here are the units you will study:

Computer Forensic Investigation and Cryptography: This unit covers the practical aspects of conducting a forensic investigation of digital evidence. In order for the students to develop a critical understanding of computer forensics, a holistic approach of the forensics investigation process is adopted, with a full investigation ‘life cycle’ from seizure of evidence through to giving evidence in court as an expert witness. We look at a range of tools, operating systems and devices.

Computer Security: The unit provides an introduction to computer security concepts and their practical application, in both closed and interconnected networks. Students are expected to both understand and be able to critically evaluate different approaches to securing complex computer systems.

Cybercrime Security and Risk Management: This unit provides opportunities for participants to develop skills and knowledge in the understanding of corporate cyber threats. Drawing upon a range of practical examples, students will examine how rapid technological development and expansion in access to the internet has impacted upon crime (e.g. how anonymity and unfounded trust encourage deception), mapping out the terrain of information technology, and identifying the emerging areas of cyber crime. Areas explored will include the crossing of established boundaries into spaces over which control has already been established such as cyber-intrusion and cyber-theft, but also 'new cyber crimes' in the form of virtual trespass, Denial of Service attacks, and the development of opportunities for offending in the context of social networking websites.

Master's Project: You will undertake either an engineering unit or a study project, during the summer period. The project offers students the opportunity to apply the taught material in the solution of a real-world problem directly related to their course. The engineering project usually involves building a piece of software to solve a problem. An example of the sort of thing you might do would be building a tool to address a specific forensics requirement. The study project usually involves undertaking a study of an IT domain relevant to forensics. To prepare for this the project includes a number of preparatory sessions, which contribute to part of your final mark.

Specialist optional units include:

Systems, Security and Data Analysis: The first part of the unit provides an overview of computer organisation, operating systems and network design, with a strong focus on security considerations and aspects relevant to computer and digital forensics. The early part of the unit will provide an introduction to relevant issues in system architecture and file system organisation. Threats to computer systems will be considered. The first half of the unit is concluded with studying in some depth current technologies for securing real computer networks. The second part of the unit deals with the important topic of data analytics.

Advanced Programming Skills for the Web: This unit draws together a number of system development skills, focusing on how they can be applied to the development specifically of web applications. Topics covered include web programming, connecting databases to web applications, software tools, testing and security.

Programme Assessment

You will be taught through a combination of practical exercises, simulations, lectures, guest lectures and formative assessments, and will be expected to use a wide range of on and offline learning tools.

You will encounter a range of assessment styles depending on the content and nature of the unit topic. This can include written assignments, presentations as well as group and individual lab-based assessments. However, the most significant assessment element is the final dissertation, which reports and reflects on your final project.

Student Destinations

On completing this course, you will be equipped to seek employment in the following areas: IT auditing, information security, independent investigation, Computer Emergency Response Teams (CERT) and law enforcement agencies. Some of our previous graduates have been successful in finding employment within high-tech crime units, commercial investigation and national security bodies, while others go on to further research study at PhD level.

This course will also appeal to already practising professionals in related areas such as law enforcement, system administration, corporate security, IS auditing or security analysis and management for the commercial sector.

Read less
Our Digital Media Arts MA is taught both at the University of Brighton and at Lighthouse. The Lighthouse is a digital culture agency where a key part of its work is education and professional development (PPD). Read more
Our Digital Media Arts MA is taught both at the University of Brighton and at Lighthouse. The Lighthouse is a digital culture agency where a key part of its work is education and professional development (PPD). Through short technology labs and courses they help empower the digital artists and creative engineers of tomorrow.

We have developed the course in the context of Brighton’s status as one of the main centres of the media economy, adopting an interdisciplinary approach that allows you to use and develop your existing skills in an environment that encourages both innovation and high-quality production.

The course provides excellent training for artists, designers and arts professionals wishing to seek a career in the creative industries, offering expert education in the areas of interaction design, social media, programming, digital film, installation, public art and interactive art. You will learn core digital media production skills, explore a broad range of creative digital practices, and access the most up-to-date developments and critical debates in the discipline.

While our professional studio environment enables you to explore the full creative potential of digital media arts practices, we also encourage live project work so that you gain direct experience and develop valuable links to the digital media and wider cultural industries.

The course offers a suitable route and an appropriate academic grounding for PhD study, as has been evidenced by recent student progression on to PhD programs at the University of Sussex, Goldsmiths, Plymouth University and The University of Auckland in New Zealand.

Areas of study

The course is designed to support your individual development and creativity as an artist and producer and is based around an essential core of practice-based learning, underpinned by a programme of theoretical lecture series, artist talks, seminars, workshops, tutorials and independent study.

You will learn core digital media production skills. Specialist workshops have included processing, motion graphics and sound art.

The course supports an interdisciplinary approach that enables you to develop existing skills and experiences in an environment that encourages both innovation and high quality production. Live project work in modules throughout the course will help you gain direct experience and develop valuable links in the digital media industries and wider cultural industries.

Modules will be relevant and up-to-date in this fast changing and evolving digital climate, allowing for flexibility to expand into new areas of development. Examples of theses areas include screen based web design, social media and interactive installations and also including using data analytics, coding, programming and hacking.

You will be taught by a diverse and experienced lecturing team, all of whom are creative practitioners.

The course offers a flexible mode of study for students, either as a part-time route (two years) or full time (one year).

Modules:

Cultures of Media Authoring and Web Design
Virtual Culture and Network Practices
Practice based Research Methods
Beyond the Screen: Interactive Installations
Presenting a Body of Work
Critical Theory: Media Concepts Research Paper

There will be an increasing emphasis on engaging with script and code, which is particularly pertinent to practical modules as they include the building blocks of developments for creative design, and web applications. These include the following languages - CSS, Flash, Processing, Pure Data, ActionScript 2.0 and 3.0, Wordpress, PHP, HTML5, Javascript, jQuery. MFC, C, OpenGL, Java and Lingo.

We encourage students to create work through the use of open source data and engaging with hacker ethics, which are concerned primarily with sharing, openness and collaboration, rather than using commercial software.

Student work

The Digital Media Arts MA at Brighton develops your production skills and unique artistic approach. Over the course, you will build a substantial body of digital artwork that will help you get ahead in the fast-moving and competitive new media industries.

You will create your art and design work using a range of digital technologies, producing screen-based work, interactive installations, social media interventions and soundscapes. All students produce work for the assessment show towards the end of the course.

Careers and employability

The Digital Media Arts MA is a practical course that teaches a range of skills in digital development and design that you can apply outside of university. The course aims to empower digital artists and critical engineers of tomorrow, in exploring the creative thinking that is critical to working effectively with technology.

Read less

Show 10 15 30 per page



Cookie Policy    X