• University of Northampton Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • University of Bristol Featured Masters Courses
Cranfield University Featured Masters Courses
EURECOM Featured Masters Courses
University of Warwick Featured Masters Courses
Cranfield University at Shrivenham Featured Masters Courses
Swansea University Featured Masters Courses
"information" AND "assura…×
0 miles

Masters Degrees (Information Assurance)

We have 227 Masters Degrees (Information Assurance)

  • "information" AND "assurance" ×
  • clear all
Showing 1 to 15 of 227
Order by 
This comprehensive, interdisciplinary program will prepare you as an expert in information assurance. You will be equipped with information security technologies and knowledge to support and protect the nation's information infrastructure and conduct advanced research. Read more
This comprehensive, interdisciplinary program will prepare you as an expert in information assurance. You will be equipped with information security technologies and knowledge to support and protect the nation's information infrastructure and conduct advanced research. You will develop skills in both management and technical areas.

Program Highlights

Students eligible to apply for the ​​Scholarship for Service ​scholarship from the National Science Foundation and the Department of Homeland Security, a two-year grant that includes a $64,000 stipend, tuition, books, health insurance and travel to a cybersecurity job fair.
Offered as a five year undergraduate/graduate combined program through the Information Systems Track.
Designed for part-time or full-time students.
Pre-requisite courses are available for those lacking an information systems or computer science background.
Offered through the Department of Information Systems together with the Department of Computer Science and Information Technology.
Five-year track students are eligible to apply for one of 45 National Science Foundation STEM scholarships, a two-year grant that includes a $12,000 stipend.

Program Distinctions

All faculty hold a Ph.D. in their field.
Designated as a National Center of Academic Excellence in Information Assurance/Cybersecurity by the National Security Agency and the Department of Homeland Security.
Designed using the Association for Computing and Machinery Model Curriculum and Guidelines and the National Security Agency Guidelines and Requirements.

Requirements and Details

A baccalaureate degree in information systems, computer science, computer engineering, computer networking, telecommunication or related programs is preferred.

Lack of an information systems or computer science background is usually not a major concern, since prerequisite courses are available if needed.

A background in the sciences and mathematics is essential.

Strong communication skills, verbal and written are needed for coursework demands.

Fully-qualified applicants will have taken courses that cover the following topics:

Database modeling, network structure/architecture
Operating systems, theory
Discrete structures and one year of programming
Statistics

Read less
Designed to develop professionals who can lead in a cyber environment, to effectively exploit the threats and opportunities of cyberspace at the organisational level. Read more

Designed to develop professionals who can lead in a cyber environment, to effectively exploit the threats and opportunities of cyberspace at the organisational level. The course focuses on understanding and articulating the executive-level responses to serious present and emerging threats in the information domain.

Who is it for?

Students will be government, corporate and critical information infrastructure staff who are one or more of the following:

  • Managers or leaders in a cyber environment who need to understand information risk and respond to cyber threats.
  • Procurement staff commissioning critical or sensitive projects.
  • Policy and planning staff interested in computer network and security operations.
  • Those charged with accreditation and assessment of security measures.
  • Those holding the positions of, or aspiring to be, Chief Information Officers (CIO) or Chief Information Security Officers (CISO).

Why this course?

The course will specifically focus on responses to serious, present and emerging threats in the information domain. The course enables the student to gain an organisational view of cyber, the domain, the drivers and constraints. Whilst a technical understanding is of value, the course is designed to ensure that the bigger, contextual, aspects of cyber is understood thereby enabling decision making in relation to cyber to be undertaken within an organisation.

Informed by Industry

The course has an External Advisory Panel, chaired by Sir Edmund Burton, with expert representation from government and industry, including Fujitsu, GSK and the MOD.

Accreditation

The MSc course holds provisional accreditation from the National Cyber Security Centre (NCSC), a part of the UK Government Communications Headquarters (GCHQ).

This course is supported by the UK Government’s Cabinet Office and Office of Cyber Security and Information Security.

Course details

The course is taught through a flexible blend of compulsory residential courses, online Virtual Learning Environment activities and interaction and project-based learning.

It has three components: a taught component comprising of ten, 10 credit modules (PGCert/PGDip/MSc); a 20 credit module; and (MSc only) an 80 credit research project assessed by dissertation.

Dissertation

Students taking the MSc must develop and demonstrate their expertise, independent learning abilities and critical appraisal skills by producing a clear and coherent research-based dissertation.

Assessment

The course is delivered via blended learning, with a mixture of residential and online teaching, and assessment is through coursework, group practicals, presentations and (MSc only) an individual dissertation.

Your career

This qualification will take you on to become one of the next generation of managers who can understand and effectively manage and exploit the threats and opportunities of cyberspace at the organisational level. Crucially, it will also enable graduates to communicate cyber issues to senior management or executive board level.

The course is directly relevant to those wishing to improve their knowledge and skills as, or those aspiring to become, a CIO or CISO.



Read less
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree. Read more
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree.

The department of computer science offers a graduate certificate (consisting of four courses each) in Computer Security (IA).

Students will select four of the following courses:

CSC 525 Operating Systems
CSC 535 Networks and Data Communication
CSC 555 Software Engineering
CSC 583 Topics in Computer Security
CSC 586 Sytem Administration and Security
CSC 588 Wireless Programming and Security
CSC 603 Advanced Seminar in Security
CRJ 555 Topical Seminar in Criminal Justice

Please visit the website for more information about these modules:

http://catalog.wcupa.edu/graduate/sciences-mathematics/computer-science/#coursestext

The Computer Science Information Security Centre

The Computer Science Information Security Center (ISC) recognizes that no computer science graduate should be without information security knowledge. Toward this end, the Computer Science Department has introduced Information Security content such as computer and network security across the undergraduate and graduate curricula.

The curricula set forth by the ISC has been certified by the NSA to meet the National Training Standards for Information Systems Security Professionals (4011) and Systems Administrators (4013).

Career Prospects

Program graduates are employed in the following fields:

• Computer and Information Systems Managers
• Information Security Analysts
• Database Administrators
• Network and Computer Systems Administrators
• Computer Network Architects
• Telecommunications Engineering Specialists
• Computer Network Support Specialists

Read less
Walden’s online master’s in information technology program is designed to help you progressively build a 21st-century IT career—from the foundational skills required to enter the field to the specialized expertise needed for senior-level IT positions. Read more

Walden’s online master’s in information technology program is designed to help you progressively build a 21st-century IT career—from the foundational skills required to enter the field to the specialized expertise needed for senior-level IT positions.

Designed with input from IT industry leaders and employers, the online master’s in IT program offers core courses to help you develop essential programming, networking, and database management and development skills. After completing these core courses, you can then pursue one of five specializations that provide the advanced training required for senior positions in the in-demand fields of health informatics, cyber security, big data analytics, information systems, or software engineering.

Throughout the IT master’s program, virtual labs, hands-on applications, and the use of real-time analytics and business intelligence platforms help you gain the practical, real-world skills demanded by today’s employers.

Recently redesigned to help you gain highly marketable skills more quickly and affordably, the online master’s in information technology program enables you to earn a Graduate Certificate in Information Systems upon completing your first four courses.*

Center of Excellence

 Walden has been recognized as a National Center of Academic Excellence in Cyber Defense Education.

Learning Outcomes

Graduates of this program will be prepared to:

  1. Apply core information technology principles and practices.
  2. Apply best software engineering principles and practices to develop and maintain stable, secure, scalable, and maintainable software.
  3. Work in geographically dispersed teams to produce effective solutions to complex information technology problems.
  4. Recommend appropriate information technology solutions based on organizational needs and an evaluation of alternatives.
  5. Identify and discuss professional, individual, organizational, societal, and regulatory implications of information systems and technology.
  6. Select technologies, policies, and procedures to assure the confidentiality, integrity, and availability of information and IT systems.

*To receive the Graduate Certificate in Information Systems, you must satisfactorily complete ITEC 6111, ITEC 6115, ITEC 6145, and ITEC 6030 and apply for the certificate, which is awarded at no additional cost.

Find detailed information for this program, including possible occupations, completion rate, program costs, and median student loan debt.

MS in Information Technology Degree Specializations

Walden’s MS in Information Technology program offers a variety of specializations to help you meet your personal and professional goals.

Career options

Rapid advancements in technologies, new business opportunities for leveraging technology applications, and the anticipated retirement of many senior-level information technology professionals are factors contributing to the growing demand for technology talent. Employment of computer and system administrators, computer system analysts, and computer information systems managers is expected to grow by 25% from 2008 to 2018, according to the Bureau of Labor Statistics.

The MS in Information Technology can help you prepare for senior-level or leadership positions in big data analytics, engineering, programming, security, and systems architecture, including positions in:

Big data analytics

  • Business analytics specialist
  • Data analyst
  • Data scientist
  • Data visualization developer
  • Information security analyst
  • IT analyst
  • IT manager
  • Network administrator
  • Project manager
  • Software developer
  • System architect
  • Web developer

Computer software engineering

  • Computer software engineer, applications
  • Computer software engineer, systems software
  • Database designer/architect

Information technology security

  • Information technology security analyst
  • Network security analyst
  • Information technology business analyst
  • Technology risk manager

Network/systems administration

  • Computer programmer
  • Database programmer
  • Application programmer
  • Systems programmer

Learn more about the career outlook for graduates with a MS in Information Technology



Read less
This course focuses on the value of information and the principles and practice that underlie secure, effective and efficient business systems that exploit information in order to provide business benefit. Read more

This course focuses on the value of information and the principles and practice that underlie secure, effective and efficient business systems that exploit information in order to provide business benefit.

Who is it for?

Students from Government departments, industry and other organisations within the UK and internationally come together to study and discuss issues and develop skills that will enable solutions now and in the future.

Key goals of the course are to provide students with the knowledge to:

  • Develop in individuals an awareness of the management, user and supplier communities
  • Recognise the stakeholder roles, needs and expectations within these communities
  • Enable effective communication and a shared understanding between these stakeholders in order to meet capability objectives
  • Master the principles and practice that underlie the delivery of effective, efficient and secure systems in various business spaces that exploit information in order to provide strategic benefit.

Why this course?

There is a need to understand the strategic importance of information and develop agile, effective and secure ways to exploit it to its full potential. To do this, effective information capability management must be developed throughout the organisation so that the right information is available to the right people at the right time in an effective, efficient and secure manner. 

The internationally recognised Information Capability Management (ICM) MSc has been developed to address these important issues.Skilled professionals are needed to enable organisations to realise the strategic benefits that successfully exploiting information can provide. Success in business of all types and in all sectors, both public and private, is dependant on:

  • Understanding the value of information as a strategic asset
  • Developing agile, effective and efficient systems that make this information available
  • Countering cyber threats with appropriate cyber security. 

Informed by Industry

The Information Capability Management MSc has an External Advisory Panel that is made up of senior stakeholders from Government, industry, academia and professional bodies that meet to provide input regarding the strategic direction of the course.

Accreditation

This course is accredited by two professional bodies, the British Computer Society (BCS) and the Chartered Institute of Library and Information Professionals (CILIP), completion of the course can lead to chartered professional status.

Course details

MSc students must complete a taught phase consisting of twelve modules followed by an individual dissertation in a relevant topic. 

PgDip students are required to undertake the same taught phase as the MSc, without the individual dissertation. PgCert students must complete the core module (Foundations of Information Systems) together with five other modules.

Individual project

The individual project is the opportunity for a student to utilise and demonstrate their understanding of the taught phase of the course by applying their learning to a real world problem. It is also an opportunity to develop skills and achieve a greater level of understanding in a specific area or areas of relevance to the course. Students are allocated a supervisor and have access to subject matter experts to support them in the project phase.

Assessment

Spread throughout the programme and includes coursework, group presentations and examinations during the taught phase and for the MSc a research based dissertation.

Your career

Takes you on to further senior career opportunities and to become one of the next generation of senior professionals delivering business benefit through exploitation of information with skills in appropriate areas including business analysis, strategy development and implementation, information assurance, cyber security, organisational development and strategic application of information systems.



Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually. Read more
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually.

In addition, surveys from PricewaterhouseCoopers and the Department for Business, Innovation and Skills show a significant shortage of information security professionals and a lack of security awareness, especially in small and medium-sized enterprises (SMEs), indicating an urgent need for student education, the provision of up-to-date educational resources, industry training and the embedding of good practice.

This MSc in Cyber Security addresses these requirements by increasing relevant knowledge and skills in line with the UK Government’s National Cyber Security Strategy, while also addressing the national skills shortage in information security.

You will develop an understanding of current issues in information security and cyber security, as well as gain in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource and for analysing and controlling security risks.

What will I study?

You will study cyber security from the perspectives of technical aspects of network security, penetration testing and computer forensics, while also adopting a systematic approach to information security management.

The programme will cover topics including information security management; information risk management; implementing secure systems; information assurance methodologies and testing; operational security management; incident management; audit, assurance and review; and business continuity management.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars, one-to-one tutorials, and technology-enhanced learning (such as via a virtual learning environment). Classes are highly interactive, with the practical application of concepts being a key factor, as well as case studies drawn from real-life.

How will I be assessed?

We will assess your vocational capability, academic critical thinking and intellectual development throughout the programme. Coursework, case studies, exams and problem-solving exercises may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academic staff who are research-active and fully engaged with the wider business and academic community.

What are my career prospects?

The MSc has been designed to meet the Government Communications Headquarters (GCHQ) certification criteria for Masters degrees, as well as satisfying the professional body knowledge requirements of the Information Systems Audit and Control Association (ISACA) and the Information Systems Security Certification Consortium (ISC)².

The programme also aligns with international standards (ISO27001/2) for information security management systems and is informed by the PAS 555:2013 Cyber Security Risk Governance and Management Specification.

On successful completion of the course, you will be equipped with the necessary skills and expertise to work as a cyber security professional, or information security professional, in roles such as an information security engineer/manager, ISO27001 auditor, computer forensic analyst, cyber security specialist or security engineer.

Read less
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree. Read more
The Professional Development Certificates are intended for those who would like to obtain certification in the certain specific areas without having to undertake the preparatory work for a Master's degree.

The department of computer science offers a graduate certificate (consisting of four courses each) in Information Systems.

Students will select three or four of the following courses:

STA 511 Intro Stat Computing & Data Management
CSC 545 Database Systems Concepts
CSC 555 Software Engineering
CSC 582 Topics in Information Systems
CSC 586 Sytem Administration and Security

If only three courses are selected, one additional course will need to be selected from the list below:

CSC 520 Foundations of Computer Science
CSC 525 Operating Systems
CSC 530 Data Structures
CSC 535 Networks and Data Communication
CSC 540 Programming Languages
CSC 560 Analysis of Algorithms
CSC 565 Compiler Design
CSC 575 Artificial Intelligence
CSC 581 Topics in Computer Science
CSC 583 Topics in Computer Security
CSC 584 Topics in Web Technology
CSC 585 User Interface In Java
CSC 587 Web Services using XML and SOAP
CSC 588 Wireless Programming and Security
CSC 600 Advanced Seminar
CSC 603 Advanced Seminar in Security
CSC 604 Advanced Seminar Web Technology

Please visit the website for more information about these modules:

http://catalog.wcupa.edu/graduate/sciences-mathematics/computer-science/#coursestext

The Computer Science Information Security Centre

The Computer Science Information Security Center (ISC) recognizes that no computer science graduate should be without information security knowledge. Toward this end, the Computer Science Department has introduced Information Security content such as computer and network security across the undergraduate and graduate curricula.

The curricula set forth by the ISC has been certified by the NSA to meet the National Training Standards for Information Systems Security Professionals (4011) and Systems Administrators (4013).

Career Prospects

Program graduates are employed in the following fields:

• Computer and Information Systems Managers
• Computer and Information Research Scientists
• Software Developers, Systems Software
• Software Quality Assurance Engineers and Testers
• Web Administrators
• Computer Science Teachers, Postsecondary

Read less
Today’s employers increasingly seek information technology (IT) professionals with both the management and advanced technology skills required to help their organizations grow and thrive. Read more

Today’s employers increasingly seek information technology (IT) professionals with both the management and advanced technology skills required to help their organizations grow and thrive.

Walden University’s online Master of Information Systems Management program integrates core business and management principles with the advanced technology training you need to compete for in-demand careers in this field.

Designed with input from IT industry leaders and employers, this program will prepare you to evaluate and allocate IT resources effectively; design and manage systems to meet key organizational objectives; and lead IT initiatives and teams across functional areas in diverse organizations.

Recently redesigned to help you gain highly marketable skills more quickly and affordably, the Master of Information Systems Management program enables you to earn a Graduate Certificate in Information Systems after completing your first four courses.

Learning Outcomes

Graduates of Walden’s MISM program will be prepared to:

  1. Design appropriate software system structures in response to application needs, organizational environment, and technical ecology.
  2. Make appropriate design choices based on system, service, and business process needs.
  3. Analyze social, legal, ethical, and professional issues in business and technical decision making.
  4. Employ best communication practices with business partners, users, customers, and third-party providers.
  5. Use sound evaluation practices to select appropriately among competing technologies and technical approaches.
  6. Manage business processes through analysis, design, and optimization in response to organizational needs.

National Center of Academic Excellence in Cyber Defense Education

 Walden has been recognized as a National Center of Academic Excellence in Cyber Defense Education.

Find detailed information for this program, including possible occupations, completion rate, program costs, and median student loan debt.

A Range of Career Options

The Master of Information Systems Management program can help prepare you for management or senior-level positions in these areas:

  • Information systems strategy
  • Applications development
  • Business consulting
  • Data administration
  • Quality assurance
  • Internet and e-commerce
  • Networking
  • Operations
  • Security
  • Software development
  • Technical services


Read less
This course has been developed in consultation with industry practitioners. The School of Maths and Computing has strong links with senior policy developers in Government and industry and is a national leader and innovator in the field of cybersecurity information sharing and threat intelligence. Read more

This course has been developed in consultation with industry practitioners. The School of Maths and Computing has strong links with senior policy developers in Government and industry and is a national leader and innovator in the field of cybersecurity information sharing and threat intelligence.

This Master’s course is highly valuable to a variety of participants with an interest in Cybersecurity;

· It will prepare a student well for achieving success in gaining employment; the demand for cybersecurity professionals currently outstrips the supply of talent. Employment opportunities include (but are not limited to); Cybersecurity Consultant,

Cybersecurity Analyst, IT Security Manager, Security Architect and Compliance roles.

· For anyone thinking of undertaking further study in cybersecurity e.g. Research Degree or Professional Certifications.

· Those already in the sector who wish to enhance / widen their knowledge and gain an advanced degree qualification

· Those from a generalist IT or Governance background who wish to develop a depth of understanding in managing, developing and implementing secure computer and information systems within organisations.

· It may be appropriate for anyone with a strong interest wishing to gain an advanced level of knowledge of cybersecurity or graduates from other disciplines (depending on experience).

This course is available for full or part-time study.

What happens on the course?

You will learn, understand and be able to apply international standards and tools and techniques available to issues related to cybersecurity, information assurance and compliance. Through course material, interactive discussion, practical exercises and small group based work, you will learn, understand, and evaluate security problems, The focus is on risks and you will develop an advanced knowledge of the threats and vulnerabilities that all organisations need to mitigate in order to avoid serious data breaches.

You will be able to address critical security issues and demonstrate the ability to apply a variety of methods to secure data. You will benefit from interactive classes designed for the experience and professional practice of Cybersecurity. Typical practical activities include; addressing web-based security issues and configuring servers and network equipment for secure operation. Students will learn, understand, articulate and engage in the practical application of a wide range of security methods, tools and techniques which are available for the management and application of Cybersecurity. Students will enhance their understanding through research, analysis, synthesis and the production of a specialist dissertation relating to cybersecurity. Opportunities will be provided during the course to engage with cybersecurity professionals.

Career path

There is an increasing demand for qualified people in all aspects of CyberSecurity and Forensics.The opportunities include but are not limited to:

• Security Consultant

• CyberSecurity Consultant

• CyberSecurityAnalyst

• IT Security Manager

• Risk Officer

• Security Architect

This MSc contributes substantially to the career development of IT professionals by enabling high level practitioners to work in an IT security management capacity. If you are from an ITor general management background, the depth of understanding you will gain from this course will contribute to your ability as a manager to develop and implement secure computer and information systems and manage their governance for organisations. While the academic level is masters,there is a strong practical application and professional orientation to the curriculum.

What skills will you gain?

At the end of this course you, the student, will be able to:

Develop robust security policies, justify the selection of suitable mechanisms for enforcement of such policies and be confident in the practices pertaining to systems security;

Analyse, categorise and evaluate security problems, and demonstrate a detailed knowledge and understanding of the most critical aspects;

Recommend and apply appropriate methods for the secure transmission and storage of data;

Demonstrate expertise in the construction and implementation of a functional security design for a network system;

Display mastery of the necessary knowledge required to manage the security of computer systems within an organisation;

Conduct research into advanced areas of Computer Systems Security through analysis and synthesis, deal professionally with complex issues, make sound judgements in the absence of complete data and communicate conclusions clearly through appropriate media.

Who accredits this course?

Accreditation will be applied for from the British Computer Society and the Institute for the Management of Information Systems.



Read less
The MSc Information Security and Privacy addresses the key security issues that are faced by global communications and information systems. Read more
The MSc Information Security and Privacy addresses the key security issues that are faced by global communications and information systems.

The programme provides a mix of business context with core security, trust and privacy issues that challenge the IT sector. The course builds on previous skills in computer science, to strengthen understanding of this emerging area.

As well as studying themes such as trust and identity and forensic investigation, security techniques and information, network and cyber security, you will gain an understanding of the e-Commerce and business environment. This combined business/security approach provides valuable training for interacting with organisations, and understanding their business functions in a deeper context.

Using case based analysis, you will have the opportunity to learn about forensic approaches to investigation across multiple platforms.

Distinctive features:

• Practitioner-led modules integrate the latest research ideas with current best practice

• Students will have access to our Cybersecurity and Forensics Laboratory. The 40 PCs are able to host virtual machines and can be used to carry out a number of forensic investigations. They are connected to an isolated, local network which can be configured to better explore the security challenges facing today's professionals.

• Professionally accredited by the BCS, the Chartered Institute for IT.

Structure

Full-time students study four compulsory modules each semester including a 60 credit dissertation in their final year. Part-time students study two compulsory modules each semester.

Core modules:

Information, Network & Cyber Security
Security Techniques
Distributed and Cloud Computing
Digital Forensics
Business and IT Management
Secure Applications, Identity and Trust
Dissertation

Teaching

The School of Computer Science and Informatics has a strong and active research culture which informs and directs our teaching. We are committed to providing teaching of the highest standard and received an excellent report in the most recent Quality Assurance Agency (QAA) review.

This particular course builds on our research strengths in cybersecurity. Many of the case studies used in the course build on our existing research and our work with industry (and other organisations in law enforcement).

Modules are delivered through a series of either full- or half-day contact sessions, which include lectures, seminars, workshops, tutorials and laboratory classes.

Most of your taught modules will have further information for you to study and you will be expected to work through this in your own time according to the guidance provided by the lecturer for that module.

Support

At the start of your course you will be allocated a Personal Tutor who is an academic member of staff in the School and serves as a point of contact to advise on both academic and personal matters in an informal and confidential manner.

Your Personal Tutor will monitor your academic progress and supply references in support of any job applications that you make.

Your Personal Tutor will monitor your progress throughout your time at university and will support you in your Personal Development Planning. You will see your Personal Tutor at least once each semester.

Outside of scheduled tutor sessions, our Senior Personal Tutor runs an open door policy, being on hand to advise and respond to any personal matters as they arise.

Feedback:

Feedback on coursework may be provided via written comments on work submitted, by provision of ‘model’ answers and/or through discussion in contact sessions.

Assessment

Modules will be assessed either by coursework, examination, or a combination of both.

Career prospects

Graduates are well-prepared for a career in industrial, commercial, or governmental organisations with particular responsibility for information and process security.

Career destinations include: information security manager, risk manager, technical security roles in computer forensics, identity management roles, secure systems developer, and industrial and university research.

Read less
Designed for. CSE is designed for Computer Science, Informatics, IT or other STEM graduates, looking to become a cyber security professional, or take a leading technical role in an organisation critically dependent upon data and information communication. Read more

Designed for

CSE is designed for Computer Science, Informatics, IT or other STEM graduates, looking to become a cyber security professional, or take a leading technical role in an organisation critically dependent upon data and information communication.

What will this course provide?

Cyber security is not simply about protecting the internet. As our world becomes ever more dependent upon digital systems, our vehicles, infrastructure, industrial controls, finances, and medical devices all exist within the cyber domain.

Studying Cyber Security with us will deepen your cyberspace knowledge, so you’ll understand the nature of this evolving cyber environment, and how to protect and enhance the human experience within it.

This MSc focuses on the technical aspects of cyber security and how these may be implemented in a multidisciplinary way. Throughout the course the practical applications of topics are emphasised, as well as developing your abstract and analytical skills.

Through studying Cyber Security at Warwick, you will gain unparalleled exposure to industry. All taught modules contain valuable input from industry experts who, through case studies and guest lectures, contribute to the design and delivery of material and make for a very rich learning environment.

GCHQ Certification

GCHQ, the UK government's National Technical Authority for Information Assurance, identified the shortage of cyber professionals as a concern that needed to be addressed. Part of their strategy was to identify cyber security master's courses that would "... help prospective students make better informed decisions when looking for a highly valued cyber security qualification".

At the University of Warwick, we specifically designed MSc Cyber Security Engineering to meet GCHQ's demanding requirements. MSc Cyber Security Engineering received provisional certification by GCHQ in 2015.

If you are an EU or international student, you should value GCHQ certification, just as much as any UK student. The content of the course is internationally applicable.

Course modules

CSE currently comprises eight compulsory 15-credit taught modules and a 60-credit dissertation. For 2018 entry, additional modules may be added.

  • Security Architectures and Network Defence Cyber Intelligence and Operations 
  • Cryptosystems and Data Protection Cyber-Physical Systems 
  • Information Risk Management and Governance Enterprise Cyber Security 
  • Industrial Espionage and Counterfeiting 
  • Digital Forensics 

The curriculum is divided in eight taught modules and the project. Each module is taught in a one week blocks. Typically these are spaced approximately three weeks apart. It is during this time between modules that you will complete assessed assignments.

The individual project commences in February. By June it will fully occupy your study time with taught modules typically finished in May.

The number of taught modules and the weighting of the project in MSc Cyber Security Engineering is different from most other programmes in the WMG taught Master's portfolio.

Teaching style

Tutors adopt their own distinctive style within their taught weeks. Most modules are taught by more than one tutor, which, together with the wide range of guest speakers, gives real breadth of insight into any topic. The external input is especially evident in the Enterprise Cyber Security module where colleagues from IBM make a substantial contribution to the week's activities.

After you graduate

Graduates can expect rapid career progression in within a wide range of organisations relating to cyber security in a range of roles. 



Read less
This course is ideally suited to you if you have limited, or no experience of IS/IT management or if you are an existing IS/IT practitioner seeking to enhance your IS/IT management skills. Read more

This course is ideally suited to you if you have limited, or no experience of IS/IT management or if you are an existing IS/IT practitioner seeking to enhance your IS/IT management skills. On this course you will develop both a depth of knowledge and understanding of the management of information systems (IS) and information technology (IT) and skills to reflect a high level of professional competency and leadership. These will enable you to apply what you have learnt to a business context in all types of organisation. In addition, you will be able to integrate advanced theoretical concepts with contemporary and relevant applications within appropriate frameworks.

On this course you will develop both academic and professional skills that will help you effectively manage research and problem-solving. You will be able to demonstrate critical reflective analysis through continuous evaluation, analysis and synthesis of concepts and contexts, key skills for a successful IS/IT manager.

What happens on the course?

Typical modules may include:

  • Research Methods and Study Skills
  • Project and Programme Management
  • Systems Acquisition Management
  • Business Analysis and Consultancy Skills or e-Business Design Management

Why Wolverhampton?

This course will appeal to anyone who is looking to advance in Information System Management. The topics are practical, with an emphasis on the application of the knowledge gained and applied to many learning situations, including the use of case studies, live round-table debate, team-working exercises, applied coursework, blended learning environments, and independent study. You will be encouraged to gain knowledge in your field through extensive reading, and to apply this research in a more formal way. The completion of a dissertation demonstrates the range of academic and professional skills gained at the University of Wolverhampton. Students will have support within classroom time and dedicated workshops, small working groups, and personal tutors to develop the student to help gain a higher level of achievement. 

You will also have the benefit of relevant experience of staff in disciplines.

Career path

The opportunities for the graduate of IT Management courses include but are not limited to:

  • Business analyst
  • IT manager
  • E-business manager
  • Technical business advisor
  • Sustainability coordinator

The IT Industry needs management professionals who can leverage the IT system in such a way as to make it not a “back-office” expense, but rather a “front-office”, financially viable way of competing and adding value to the organisation. There is a great need for such skills in the current marketplace.

What skills will you gain?

At the end of this course you, the student, will be able to:

1. Evaluate and learn to apply appropriate theories, tools and techniques to a range of IT Management situations; develop and apply IT Management strategies through case studies or practical business contexts. Students will learn to see the IT system from both an IT and organisational perspective. 

2. Critically evaluate the complex issues related to Data governance, the structure of data management, and the frameworks for managing data successfully.

3. Coordinate and apply both project management and quality assurance techniques to complex project situations; professionally evaluate benefits gained and lessons learnt through practical application.

4. Make informed decisions on the management of modern information systems architectures, justifying choices for given situations

5. Appraise, critique and evaluate the most appropriate methods for the Acquisition, Development and Implementation of Information Technology and Systems within a variety of contexts.

6. Conduct research into advanced areas of IT Management, deal professionally with complex issues (by understanding and addressing a range of ethical, social and legal issues as they occur), make sound judgements in the absence of complete data and communicate conclusions clearly through appropriate media.

Who accredits this course?

Application is being made for graduates of this award to be accredited as members of the Institute for the Management of Information Systems (IMIS). The application will be processed at the time of validation.



Read less
Healthcare professionals wishing to extend their understanding of issues relating to quality, information and safety are encouraged to apply for this specialised pathway. Read more
Healthcare professionals wishing to extend their understanding of issues relating to quality, information and safety are encouraged to apply for this specialised pathway. Teaching is delivered by specialists in their field and a student advisor supports students in selecting modules and in reviewing their personal development plan and career goals.

Degree information

Students explore various facets of healthcare quality with an emphasis on the role of information evidence, regulation and safe practice. They develop insights into the challenges of managing high-quality service delivery change, and confidence to tackle the complex job of improving patient care. Implicit in the selection of modules is the acquisition of skills and knowledge relevant to a student’s day-to-day professional life.

Students undertake modules to the value of 60 credits.

The programme consists of one core module (15 credits), and three optional modules (45 credits).

Core modules
-Healthcare Quality and Evidence Based Practice

Optional modules - choose three from the following:
-Healthcare Associated Infection Prevention, Control and Organisational Aspects
-Information Law and Governance
-Leadership and Professional Development
-Legal and Regulatory Aspects of Healthcare Associated Infection Control
-Litigation, Complaints and Concerns: Raising Clinical Standards
-Patient Safety and Clinical Risk
-Quality Improvement in Healthcare
-Research Methods in Healthcare

Teaching and learning
Some modules are taught by full distance learnnig. Other modules are delivered through blended learning, combining formal contact time with academic staff, research fellows and guest speakers, and interactive online study using the virtual learning environment. The amount and timing of campous attendance varies between modules - see module library for details. Assessment varies according to the modules selected but is primarily via coursework.

Careers

The programme offers practitioners a focused education and training, which chimes with the NHS's commitment to incorporate elements of clinical governance, quality assurance, health informatics, and change management into continuing professional development curricula for both clinicians and managers.

Employability
Increasingly employers are advertising posts with job titles which include the terms 'patient safety', 'risk', 'quality' and 'clinical governance'. This award is aimed at clinical professionals who have taken on a new role in their organisation with a remit for safety and quality or who are seeking to shift their career in this direction. The skills and knowledge acquired from this certificate will assist students in furthering their career in this expanding field.

Why study this degree at UCL?

This new specialised Health and Medical Sciences pathway focuses on key topics relating to quality, information and safety, and equips students with the professional skills needed in modern healthcare settings.

The programme offers the opportunity to study at a time and place convenient to your own circumstances making it feasible to combine study and full-time work.

It provides access to a range of modules relating to quality, governance, information and safety, as well as opportunities to interact with a range of senior academics and professional experts drawn from across UCL and beyond.

Read less
Disaster Management is an inter disciplinary subject that draws upon a wide range of disciplines from ‘hard’ to ‘soft’ sciences. It is focused around complex political, social and economic activity and reflects the very heart of governance in a country. Read more
Disaster Management is an inter disciplinary subject that draws upon a wide range of disciplines from ‘hard’ to ‘soft’ sciences. It is focused around complex political, social and economic activity and reflects the very heart of governance in a country. Organisations of all sizes are required to assess ‘risk’ in both the physical (real world) and virtual (cyberspace) and to examine how socio-technical systems are made vulnerable by human factors interfacing with technology.

This qualification is designed to be delivered to an organisation's requirements. Dates, times and a venue can be mutually agreed. Participants have the option to take each unit as a separate CPD course and can choose whether to be assessed to accumulate academic credits leading to the award of Master of Science (MSc). Please contact the course administrator, Lauren Jarrad, for more information.

On the course, we cover best practice in crisis and disaster management, cyber security, information assurance and incident management planning, allowing you to reflect on your own work-based security events and incidents. Participants will develop practical policies and plans which can be applied and integrated within a sustainable economic framework.

Read less

Show 10 15 30 per page



Cookie Policy    X