• University of Glasgow Featured Masters Courses
  • St Mary’s University, Twickenham Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • Coventry University Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • New College of the Humanities Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
De Montfort University Featured Masters Courses
Queen Mary University of London Featured Masters Courses
Barcelona Executive Business School Featured Masters Courses
Cass Business School Featured Masters Courses
Loughborough University Featured Masters Courses
"information" AND "securi…×
0 miles

Masters Degrees (Information Security And Cryptography)

  • "information" AND "security" AND "cryptography" ×
  • clear all
Showing 1 to 15 of 47
Order by 
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security. Read more
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security.

Our course is provisionally certified by GCHQ and taught by experts, and equips you with the theoretical grounding and hands-on experience demanded by the information-security sector.

PROGRAMME OVERVIEW

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Dissertation
-Information and Network Security
-Symmetric Cryptography
-Asymmetric Cryptography
-Information Security Management
-Multimedia Security and Digital Forensics
-Secure Systems and Applications
-Information Security for Business and Government
-Project Management and Business Strategy
-Database Systems
-Cloud Computing

EDUCATIONAL AIMS OF THE PROGRAMME

The programme will:
-Provide students with advanced knowledge and understanding of information security theory and concepts
-Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
-Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
-Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

PROGRAMME LEARNING OUTCOMES

Knowledge and understanding
-Knowledge and understanding of the general information security aims and challenges
-Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
-Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
-Knowledge and understanding of technical concepts and mechanisms for digital forensics
-Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
-The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
-The ability to implement or apply existing information security mechanisms and technologies in practice
-The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
-The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills
-Analyse and solve problems of technical nature under consideration of various risks and constraints
-Make effective and efficient decisions in an environment of conflicting interests
-Think strategically
-Synthesise and critically evaluate the work of others
-Apply fundamental knowledge to investigate new and emerging technologies
-Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills
-Come up with technical solutions to a range of problems
-Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
Implement mechanisms and apply them in a wider context of more complex systems
-Present their opinions and findings and to produce a high-quality report

Key / transferable skills
-The ability to communicate concepts and results in a clear and effective manner
-The time and resource management planning
-The ability to work with available resources, to collect and analyse research-oriented material

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

Degree information

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits. The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules
-Computer Security I
-Computer Security II
-Introduction to Cryptography
-Research in Information Security

Optional modules - students choose four of the following:
-Distributed Systems and Security
-People and Security
-Applied Cryptography
-Information Security Management
-Language Based Security
-Philosophy, Politics and Economics of Security and Privacy
-Malware
-Cryptanalysis
-Cybercrime
-Privacy Enhancing Technologies
-Relevant options from other MSc degree programmes

Dissertation/report
All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning
The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Careers

UCL graduates are keenly sought by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Top career destinations for this degree:
-Risk IT RTB Support Administrator, Lloyds Banking Group
-Technical Analyst, The Royal Bank of Scotland (RBS)
-IT Lead Developer, MOVE Guides
-Software Developer, Oracle
-Cisco Certified Network Associate (CCNA) Routing and Switching, Cisco

Employability
Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts occur through the ACE-CS guest lecture series integrated into the course.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research, and was one of the top-rated departments in the UK government's recent Research Excellence Framework.

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. Students from the degree won the first UK Cyber Security Challenge in code cracking in 2013.

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
A world renowned programme; the first of its kind in the world, this Information Security course looks at both technical and management aspects of cyber security and teaches you about technologies including cryptography, computer security, fraud detection, and digital forensics. Read more

Gain a prestigious MSc in Information Security

by distance learning

A world renowned programme; the first of its kind in the world, this Information Security course looks at both technical and management aspects of cyber security and teaches you about technologies including cryptography, computer security, fraud detection, and digital forensics.

- You will gain cyber security skills for senior level careers by focusing on principles and issues, and you will learn how information security can best be managed.

- You will benefit from Royal Holloway’s wealth of research, expertise and practical consulting experience, which ensures that the degree is up to date and commercially relevant.

- You can study most modules on a stand alone basis and earn CPE credits. Students come from a variety of backgrounds, ranging from new graduates through to senior security managers in blue chip enterprises seeking a formal qualification in Information Security.

Hear from a graduate

“Achieving the Masters has significantly benefited my career in Information Security; previously, I provided specific technical advice to customers, but now, with the breadth and depth of knowledge gained during the MSc, I also deliver security strategy consulting to senior executives.” Paul Schwarzenberger, MSc Information Security

Prestige

The programme has been developed by academics within the Information Security Group (ISG) [external link] at Royal Holloway, University of London, one of the foremost academic security groups in the world.

ISG awarded Centre of Excellence status - Royal Holloway, University of London has been recognised for its world class research in the field of cyber security by UK intelligence agencies GCHQ.

The ISG is at the cutting edge of research into the design and evaluation of smart cards, electronic commerce, security management, mobile telecommunications security, and the integration of security techniques into specific applications. The ISG was awarded a Queen's Anniversary Prize in 1998 in recognition of it providing "a unique national resource for the training of information security specialists".

"A pioneering course that continues to provide students with the essential knowledge and understanding of information security, with many graduates going on to fill senior roles." Malcolm Marshall, Partner, KPMG.

Career progression

Graduates of the programme can be found in many organisations, ranging from large financial institutions to technology and research- oriented organisations, as well as security specialists. The MSc is also a foundation for further postgraduate research.

Continuing Professional Education (CPE)

You can study any of the compulsory core modules, plus the optional module 'Digital forensics', on a stand-alone basis and earn CPE credits. On successful completion of each module you will receive a University of London certificate.

Your time commitment

This programme is offered online, enabling you to fit your studies around work and family commitments. To complete in the minimum study period you will need to study 24 hours per week during the academic session (September-April). To complete the degree in four years, which is normal for those in full time employment, you will need to study about 12 hours per week over the academic session.

Excellent support

Fully supported by a Virtual Learning Environment, you will take part in online tutor-supported seminars and discussions; a virtual student cafe allows you to interact and network with other students.

Contact us

If you have any questions, please contact our Student Advice Centre:
http://www.londoninternational.ac.uk/contact-us

Read less
Computer and information security is a vital issue in today’s IT environment. This programme will provide you with the necessary skills to understand and apply specialised security knowledge in the identification and resolution of IT security threats facing modern organisations. Read more
Computer and information security is a vital issue in today’s IT environment. This programme will provide you with the necessary skills to understand and apply specialised security knowledge in the identification and resolution of IT security threats facing modern organisations. Develop a rounded view of key security domain topics such as security management and computer forensics, and gain the hands-on skills to confidently implement, configure and manage the tools you’ll face in practice.

Key features

-Be confident studying a degree accredited by BCS, The Chartered Institute for IT. The University has been awarded Academic Partner status by the Institute of Information Security Professionals (IISP), in recognition of the significant base of security-related expertise within the institution. This link encourages and enables a dialogue between academia and the wider community of security practitioners.
-Learn from research-active staff at the forefront of knowledge, conducting research within the Centre for Security, Communications and Network Research.
-Put your skills into practice in our high specification security, networking and digital forensic laboratories.
-Technology supported learning with free iPad mini and eBooks.
-Active Computer and Information Security Society (CISS) provide opportunities for networking, problem solving, speakers from industry as well as a valuable source of contacts.
-Build on the foundation which this course offers and take the opportunity to progress onto a research degree at MPhil or PhD level.
-Explore the option of completing the programme over two years with an integral work placement year.
-Benefit from the courses extensive links with major professional bodies and societies such as the BCS, ISACA, IFIP Technical Committee 11 and the Institute for Information Security Professionals (IISP).
-Take the opportunity to make career inroads through strong industrial links with major organisations such as Kaspersky Labs, Symantec, Orange, France-Telecom, and various UK government departments.
-Engage with the BCS South West branch programme, who hold many of their sessions at Plymouth University. The branch has a rich programme of events that contributes to broadening the knowledge and experience of the students.
-Continually under review to ensure all content is relevant and timely the programme has recently begun to offer AccessData Certification as a part of the cybercrime and investigation module, enabling you to achieve professional recognition as well as academic credit.

Course details

During your year of study you will gain an understanding of key topics such as security management, cryptography, network and system security, computer forensics, and protection in application scenarios. You'll also benefit from being taught a wide variety of hands-on skills, which enable you to implement, configure and manage many of the typical controls you will encounter in practice - including firewalls, intrusion detection systems, authentication and access mechanisms, and forensic case management tools. The project will enable you to explore and develop in-depth knowledge on a particular area of security. You'll become a subject expert and push the boundaries of the current understanding.

Core modules
-SEC501 Information Security Management and Governance
-SEC503 Intrusion Analysis and Incident Management
-BPIE500 Masters Stage 1 Placement Preparation
-PROJ513 MSc Project (September)
-SEC502 Network Security and Penetration Testing
-SEC505 Digital Forensic Investigation
-SEC504 Secure Systems Architectures and Mechanisms
-FTGS507 Professional and Research Skills with Entrepreneurship

Optional placement year
-BPIE501 Computing Masters Industrial Placement

Every postgraduate taught course has a detailed programme specification document describing the programme aims, the programme structure, the teaching and learning methods, the learning outcomes and the rules of assessment.

Read less
Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. Read more

Aim

Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the MSc is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges.

This taught programme provides a strong foundational education in the core areas of cyber security and offers practical training in key software tools and programs. Applied practical skills will be developed further in specialised projects exploring leading edge issues in cyber security research.

The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen's University Belfast's Centre for Secure Information Technologies (CSIT).

CSIT is a GCHQ accredited Academic Centre of Excellence in Cyber Security Research and is the UK's largest university research lab in this field. CSIT is fast developing a reputation as a global innovation hub for cyber security and is influenced throughout by its strong history of commercial engagement with world leading companies including Infosys, Cisco, IBM, Thales, BAE Systems, McAfee, Roke, and Altera.

Programme Content

The MSc in Cyber Security is available in two options, lasting either 1 or 2 years:

The 1-year MSc consists of six taught modules (120 CATS points) and a 4-5 months practical project of a research nature/work placement (60 CATS points).

The 2-year MSc consists of six taught modules (120 CATS points) and a 12 months practical project of a research nature/work placement (60 CATS points).

One compulsory module and a choice of five from seven other modules as listed below:
• Applied Cryptography
• Computer Forensics
• Network Security and Monitoring
• Software Assurance
• Malware
• Media Security
• Intelligent Information Systems
• Ethical & Legal Issues in Cyber Security (Compulsory)

In any given year further specialist topics may be available for selection or listed topics may not be offered.

Assessment

Comprises written examination and coursework/lab work in six modules; and a dissertation on your research project (180 CATS points total).

Opportunities for Careers

Strong Industry Engagement
A key differentiator of our MSc programme will be the opportunity to closely engage with CSIT industry partners. The programme offers an enhanced education experience, including the facilitation of industrial internships and work placements with leading security professionals, as well as other commercially specified projects. Our Scholarships and Work Placements programme offers a significant opportunity for students to enhance career prospects by directly engaging with potential employers.

Opportunities for placements are being provided by the following companies: Austrian Institute of Technology (AIT), Facebook, IBM, McAfee, PwC, RepKnight, Roke, Thales, and United Technologies Research CEntre (UTRC).

Professional Skills Training
Students will be offered a range of personal development and transferable skills training to improve their professional skills and increase their employability. Courses will cover: project management, presentation skills, communication strategies, networking skills, public engagement and entrepreneurship. Invited seminars and special guest lectures from industrial and academic leaders offer students a chance to engage with leaders in the cyber security profession.

Careers
Our graduates have found that holding a prestigious MSc qualification from Queen's (one of the UK's top engineering schools) has significantly enhanced their job opportunities and employment prospects. With demand for cyber security experts growing at 12 times the rate of the overall job market, students can expect their career prospects to be enhanced significantly after graduation.

Our MSc in Cyber Security will prepare graduates for successful careers in secure systems development, security architecture development, network security, data analytics, and right up to board level positions such as Chief Information Security Officer (CISO). Prospects for research and academic career paths in cyber security will also be enhanced by the MSc.

Special Features

Work Placements and Scholarships Programme
A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security degree programme. These opportunities are being provided on a competitive basis by CSIT's industrial partners and others affiliated with the Work Placements and Scholarships Programme. Once accepted for this masters degree you will be eligible to apply for opportunities made available via the programme.

Funding

A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security course via our Work Placements and Scholarships Programme.

Scholarship Opportunities:
CSIT Scholarships (x2) – UK/EU
- Open to UK/EU applicants to the 1-year MSc in Cyber Security
- Only students who are graduating in 2014 with an Undergraduate course in relevant discipline areas are eligible to apply
- Scholarships cover fees and a paid summer internship at CSIT
- How to Apply: Eligible students who apply for the 1-year MSc in Cyber Security will automatically be considered for these scholarships.

GREAT Queen’s University Belfast Scholarships (x2) – India
- Open to India students
- Scholarship value: £1500
- For further information and how to apply see:
http://www.qub.ac.uk/home/StudyatQueens/InternationalStudents/InternationalScholarships/GREATQueensUniversityBelfastScholarships-India/

Full details and further announcements about our Scholarships and Work Placements programme are available at http://www.csit.qub.ac.uk/msc

Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. Read more
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features
-This course is accredited by BCS, The Chartered Institute for IT.
-The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
-You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Work placement scheme

Kingston University has set up a scheme that allows postgraduate students in the Faculty of Science, Engineering and Computing to include a work placement element in their course starting from September 2017. The placement scheme is available for both international and home/EU students.

-The work placement, up to 12 months; is optional.
-The work placement takes place after postgraduate students have successfully completed the taught portion of their degree.
-The responsibility for finding the placement is with the student. We cannot guarantee the placement, just the opportunity to undertake it.
-As the work placement is an assessed part of the course for international students, this is covered by a student's tier 4 visa.

Details on how to apply will be confirmed shortly.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security MSc modules
-Cryptography and Applications
-Network and Information Security
-Data Communications
-Project Dissertation
-One option module

Read less
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. Read more
Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies. You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

Key features
-This course is accredited by BCS, The Chartered Institute for IT.
-The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
-You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study?

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

The Management Studies route will set your technical knowledge in a management context.

Assessment

Industrial report and technical article coursework, examinations, verbal presentations, project dissertation.

Work placement scheme

Kingston University has set up a scheme that allows postgraduate students in the Faculty of Science, Engineering and Computing to include a work placement element in their course starting from September 2017. The placement scheme is available for both international and home/EU students.

-The work placement, up to 12 months; is optional.
-The work placement takes place after postgraduate students have successfully completed the taught portion of their degree.
-The responsibility for finding the placement is with the student. We cannot guarantee the placement, just the opportunity to undertake it.
-As the work placement is an assessed part of the course for international students, this is covered by a student's tier 4 visa.

Details on how to apply will be confirmed shortly.

Course structure

The full MSc course consists of an induction programme, four taught modules, and project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

Network and Information Security with Management Studies MSc modules
-Cryptography and Applications
-Network and Information Security
-Data Communications
-Business in Practice
-Project Dissertation

Read less
The University of Bradford Cyber Security MSc is a taught postgraduate programme, offering one-year full-time or two-year part-time study options. Read more

The University of Bradford Cyber Security MSc is a taught postgraduate programme, offering one-year full-time or two-year part-time study options.

Students complete a range of core modules before carrying out an independent research project and dissertation. The course awards a full Master of Science qualification.

The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. The focus within this programme on the principles, technologies and practices of cyber security helps you to gain the appropriate skills for future PhD studies and research careers as well as to become competent practitioners. The programme comprises particular developments in security with a firm base in academic research and also offers the opportunity for you to study selected topics in advanced computer science.

Included in the programme is the opportunity to enhance industry relevant skills with study in ISO27001 Lead Implementer and Ethical Hacking. These skill areas were highlighted by past alumni and industry practitioners for inclusion in the programme. Therefore, you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking.

This programme meets a continued growing demand for specialists in this area by offering a way for individuals in current employment with relevant industry experience as well as recent graduates to study and enhance and develop their skills. The MSc Cyber Security programme will therefore draw graduates wishing to enhance their undergraduate studies in computing with advanced study of security to equip them for senior positions with responsibility for the IT technical and management based security of an organisation. In addition, the programme encourages those with relevant industry skills to specialise in cyber security or refine and develop their existing expertise.

For more information on the part time version of this course, please view this web-page: http://www.brad.ac.uk/study/courses/info/cyber-security-msc-part-time

Professional Accreditation

This course is accredited by the British Computer Society.

Why Bradford?

-Within this programme you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking

-Meets commercial needs for employees who are able to understand and think strategically about future developments in this area

-Provide a high academic quality of service to you, covering both theoretical and practical aspects of computing, networking and cyber security

-Enable you to equip yourself with knowledge, skills and understanding, at an advanced level within the chosen field of study

-MSc Cyber Security draws upon the successful research expertise of the School of Electrical Engineering and Computer Science in addition to that within the Interdisciplinary Research Centre (IRC) in Cyber Security. This base of expertise and research is a fantastic resource for the continued development of the programme in cyber security

Modules

-Business Systems Security

-Networks and Protocols

-Foundations of Cryptography (PG)

-Internet Security and Protocols

-ISO27000 Framework (ISMS)

-Ethical Hacking

-Dissertation

Career support and prospects

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.

The course is designed to equip graduates for senior positions with responsibility for the IT-based security of an organisation.

Application process

The easiest way to apply is online.

This will help us process your application more quickly and allow you to submit your supporting documents electronically.

If you are unable to apply online, please email  to request a paper application form.

We will also need the following supporting documents, along with any other information specified on the course page:

  • Degree certificates/transcripts
  • Research proposal (if required)
  • Two references (including one academic reference)
  • Evidence of English language level (if required)
  • A copy of your passport

International students

If you applying from outside the UK and require additional support you may apply through your country representative.

They can help you at every stage and communicate with the University on your behalf. They often provide additional services to ensure your smooth arrival to the UK such as visa application support and assistance with your travel arrangements.

Funding

The following postgraduate funding may be available to study the Cyber Security MSc at the University of Bradford.

UK postgraduate loans:

Erasmus funding:

Funding from FindAMasters:

Fees

UK / EU: £7,750

International: £17,600



Read less
This course is available full-time over one year, or part-time over three years. It is made up of 8 assessed modules taught in week-long blocks and an individual project module. Read more
This course is available full-time over one year, or part-time over three years.

It is made up of 8 assessed modules taught in week-long blocks and an individual project module.

This course is suitable for those with a Computer Science related degree and is for those students who already possess a strong computer science, software engineering or information technology background.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face.

Our new MSc in Cyber Security is a forward-looking course that gives you the skills and knowledge you need in the core areas of cyber security. It emphasises the important technical material that will help you make effective cyber security decisions, and addresses issues such as:
-Identity
-Trust and reputation
-Cryptography
-Network security
-Malware and intrusion detection
-Risk management
-Development of high assurance systems

If you are looking to follow a career in industry or government, this course will provide you with a broad education in cyber security, that allows you to make technically informed principled decisions. This course will also prepare you if you are seeking a research career in cyber security - a research skills module is a mandatory part of the course.

It has been designed for students who already possess a strong computer science, software engineering or information technology background who want to broaden their knowledge about the specific challenges in cyber security and of possible solutions to those challenges.

Course structure
The MSc in Cyber Security is offered as a one-year full-time course, or can be taken part-time over three years.

The first half of the course is taken up by taught modules. Each module comprises a mix of lectures, problem classes and practical classes, plus a personal study time. In the second half of the course, students undertake an individual research project under the supervision of a member of staff.

Course aims
-To educate students in the theories, principles, practices and technologies of cyber security.
-To provide the knowledge and understanding of the principles underpinning effective approaches to cyberdefence.

Learning outcomes
When you graduate from the MSc in Cyber Security, you will have developed a detailed understanding of the fundamental aspects of cyber security. The course emphasises the important technical material that must be understood in order to make effective cyber security decision making.

You will understand extant threats to current and emerging system types, and understand and be familiar with a range of technologies that can be brought to bear to reduce risks.

This course will equip you for a career in industry or government, particularly in strategic cyber security decision making, or if you are seeking a research career in this area.

Project

The dissertation project undertaken by students over the summer is carried out individually, supervised by a member of academic staff. It may involve working with an external organisation. Students are also encouraged to work with academic staff to create projects of interest to them.

All projects are vetted to ensure suitability for the MSc. Provided academic criteria are met, there is considerable flexibility in the choice of cyber security topics for the project. Though many projects may follow naturally from the taught material, projects may also investigate suitably challenging topics outside that material.

The outputs from this module are a project dissertation together with a conference paper length summary of the work.

Projects are worth 5/9 of the total mark for the MSc.

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

There are six entry points through the year. This allows you to start when it is most suitable. The entry points are:

• September
• November
• January
• March
• June
• July

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics-12-months

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

This course gives you skills that are valuable for a career within Computer Security and Forensics but it is also relevant for a much wider range of applications.

The unit ‘Research Methodologies and Project Management’ in particular requires you to work in a team to apply current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers. Read more
The MSc in Computer Security and Forensics is ideal for a graduate of Computer Science. Graduates of this course are well-prepared for careers in computer or network security and forensic investigation – with skills in demand by UK employers.

The mixture of hands-on experience and theoretical background will enable you to understand network security, scripting, cryptographic protocols and forensic data analysis using the latest commercial tools (Encase and Forensic Toolkit).

You will also discover legal frameworks and legislation relating to computer crime, and be able to present evidence to a court of law.
Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

This course is offered via block delivery. There are two entry points (October and November). This allows you to start when it is most suitable.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/computer-security-and-forensics#entry

Course detail

• Study in a specialist vocational area identified by UK employers as having a shortage of qualified practitioners – with career opportunities in security analysis, consulting or cybercrime protection/prevention in the public sector (eg government and police forces) as well as a multitude of medium to large private sector organisations
• Explore areas including computer security; forensics data acquisition and analysis; emerging technologies, professional project management; advanced security countermeasures; networking administration and management; advanced digital forensics and cryptography and cryptanalysis
• Develop practical skills using state-of-the-art computer security and forensics tools and facilities supported by dedicated technologists
• Gain in-depth skills in terms of security auditing, development, planning and managing security techniques, tools and methodologies
• Benefit from developing expertise and understanding of professional codes of conduct equipping you for a career as a security associate, security consultant, penetration tester, network security analyst, systems administrators or in further study on an MSc by Research, MPhil or PhD.

Modules

• Network Systems and Administration
• Systems and Network Security
• Research Methodologies and Project Management
• Digital Forensics and Incident Response
• MSc Project - Computer Security and Forensics

Assessment

Your work will be assessed using a balance of written reports, formal invigilated examinations, practical (coursework) assignments and computer-based assessment

You will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by tutors for each of the tasks allocated.

Careers

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less

Show 10 15 30 per page



Cookie Policy    X