• University of Derby Online Learning Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • Aberystwyth University Featured Masters Courses
Nottingham Trent University Featured Masters Courses
University of the West of England, Bristol Featured Masters Courses
University of Hertfordshire Featured Masters Courses
Cranfield University Featured Masters Courses
University of Bath Featured Masters Courses
"information" AND "securi…×
0 miles

Masters Degrees (Information Security Management)

We have 549 Masters Degrees (Information Security Management)

  • "information" AND "security" AND "management" ×
  • clear all
Showing 1 to 15 of 549
Order by 
The number of information security incidents, as well as the financial losses relating to such incidents, is increasing. Thus, it is not surprising that information security management, aimed at safeguarding an organisation's information assets, has become a key strategic issue for many organisations. Read more

The number of information security incidents, as well as the financial losses relating to such incidents, is increasing. Thus, it is not surprising that information security management, aimed at safeguarding an organisation's information assets, has become a key strategic issue for many organisations.

In today's complex environments, safeguarding an organisation's information assets is difficult and requires more than solely technical skills. In order to facilitate a broad understanding of the field, our programme includes courses considering organisational, social and technical aspects of information security.

During the first year, students will gain a broad understanding of information security and develop advanced knowledge and skills within information security management. The second year aims to develop advanced knowledge and skills in research and investigation. Students will learn how to develop and communicate knowledge within the field of study as well as increase their degree of reflection on research and practice within the field. Teaching is based on case-based learning and flipped classroom pedagogy. These pedagogical methods encourage students to active learning and to develop their problem-solving skills which are necessary to address the complexity of information security management in organisations. By working with cases developed in collaboration with our industry partners, the students gain a deeper understanding and practical field experience.



Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The Networked Systems Security major subject gives its students profound and substantial education and expertise in the networked systems security and field of technology. Read more

The Networked Systems Security major subject gives its students profound and substantial education and expertise in the networked systems security and field of technology. The focus in this major subject is on secure network and communication systems and secure computing systems. Studies also include the fundamentals of information security management and the mathematical foundations of cryptography.

Programme structure

  1. Advanced-level studies in the major subject 50 ECTS credits
  2. Language, intermediate level and optional studies 40 ECTS credits
  3. Thesis for the Master of Science or Master of Science in Technology degree 30 ECTS credits

Academic excellence and experience

The Master’s Degree Programme in Information Security and Cryptography is a two-year programme. The Networked Systems Security major subject within this Master’s Programme focuses on information security technologies for networked systems and applications of the communication-intensive future. The covered topics include:

  • system and network security
  • security of communication systems and applications
  • security in system design

You will gain profound and substantial education and expertise in the field of networked systems security. The topic is approached in a multi-disciplinary fashion. You will also have compulsory studies both in the cryptographic and the management aspects of information security. All topical studies in the major subject are offered by departments and faculty members that are involved in on-going research in each of the respective covered disciplines.

System and network security research concentrates on studying information security technologies for networked systems and applications of the communication-intensive future. These are studied from the perspective of engineering as well as from the users’ point of view.

The goal of the research is to apply scientific and technological development in building the secure information society. The basic elements of people’s well-being are considered as the most fundamental drivers for pursuing this strategic goal. The aim is to make the technology-driven and human-driven directions of development meet. This is pursued with an interdisciplinary approach, where new innovations create active interaction between traditional fields of science.

The Master’s Programme in Information Security and Cryptography joins the EIT Digital Master School in Cyber Security starting fall 2018. The EIT Digital Master School is a two-year Master’s programme jointly run by 20 European top universities, renowned researchers and leading businesses. The programme leads to a double degree and an EIT labeled Certificate. The Master’s Degree Programme in Information Security and Cryptography acts as both an entry site and an exit site for the EIT Master School. The students start their cyber security studies in one of the universities offering the entry year studies, and move to another university in another country for the exit (specialization) year. In the field of cyber security, the Master’s Degree Programme in Information Security and Cryptography at UTU is the only degree programme in Finland to participate in the EIT Digital Master School. For more information please see https://masterschool.eitdigital.eu/programmes/cse/

Master's thesis and topics

In the Master’s thesis, you must prove your ability to conduct scientific research. You need to master the management of research methods, knowledge of the research field and skill of scientific writing.

The goal of the Master’s thesis is to

  • train students in independent problem solving for demanding research questions
  • train students in presentation and argumentation skills, both oral and written
  • train students in search and critical evaluation of information
  • develop an ability to engage in a constructive dialogue with related disciplines
  • gain insight into actual research and development work as well as the possibilities and constraints of information security methods in the application domain and in the society at large.

Examples of thesis topics:

  • Internal Anomaly Detection System for Enhancing Security of IPv6-enabled Wireless Sensor Networks
  • Mitigating modern organization-wide network threats and data leakages
  • Usability and Security in Medication Administration Applications
  • Enhancing Security of Linux OS Against Administrators
  • Threat modeling a factory environment using Microsoft Security Development Lifecycle methodology
  • Evaluation of Machine Learning Classifiers for Mobile Network Intrusion Detection Systems
  • Software Based Malware Analysis and Mitigation in Virtual Machines
  • Frequent Attack Dictionary Decision Tree Method for Advanced Signature-Based Intrusion Detection

Job options

In both Europe and Finland, the information intensive industry has become the most important business sector. Moreover, information has become one of the most relevant products in the information society. Securing this business sector and its products is vital in the modern era.

The degrees from this Programme cover the different areas of information security. Based on the personally planned expertise profiles, successful careers as information and cyber security experts in the IT sector are achievable in Finland and abroad. The education also benefits from co-operation with regional companies, especially in terms of optional Capstone projects.

A personal study plan made for each student creates an individual information security expertise profile. Possible job titles are:

  • cryptography engineer
  • network security engineer
  • information security manager
  • chief information officer

Career in research

This Master’s degree provides eligibility for scientific postgraduate degree studies. Postgraduate degrees are doctoral and licentiate degrees.

Graduates from this Programme are eligible to apply for a position in the University of Turku Graduate School, UTUGS. The Graduate School consists of 16 doctoral programmes which cover all disciplines and doctoral candidates of the university.

Together with the doctoral programmes, the Graduate School provides systematic and high quality doctoral training. UTUGS aims to train highly qualified experts with the skills required for both professional career in research and other positions of expertise.



Read less
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually. Read more
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually.

In addition, surveys from PricewaterhouseCoopers and the Department for Business, Innovation and Skills show a significant shortage of information security professionals and a lack of security awareness, especially in small and medium-sized enterprises (SMEs), indicating an urgent need for student education, the provision of up-to-date educational resources, industry training and the embedding of good practice.

This MSc in Cyber Security addresses these requirements by increasing relevant knowledge and skills in line with the UK Government’s National Cyber Security Strategy, while also addressing the national skills shortage in information security.

You will develop an understanding of current issues in information security and cyber security, as well as gain in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource and for analysing and controlling security risks.

What will I study?

You will study cyber security from the perspectives of technical aspects of network security, penetration testing and computer forensics, while also adopting a systematic approach to information security management.

The programme will cover topics including information security management; information risk management; implementing secure systems; information assurance methodologies and testing; operational security management; incident management; audit, assurance and review; and business continuity management.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars, one-to-one tutorials, and technology-enhanced learning (such as via a virtual learning environment). Classes are highly interactive, with the practical application of concepts being a key factor, as well as case studies drawn from real-life.

How will I be assessed?

We will assess your vocational capability, academic critical thinking and intellectual development throughout the programme. Coursework, case studies, exams and problem-solving exercises may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academic staff who are research-active and fully engaged with the wider business and academic community.

What are my career prospects?

The MSc has been designed to meet the Government Communications Headquarters (GCHQ) certification criteria for Masters degrees, as well as satisfying the professional body knowledge requirements of the Information Systems Audit and Control Association (ISACA) and the Information Systems Security Certification Consortium (ISC)².

The programme also aligns with international standards (ISO27001/2) for information security management systems and is informed by the PAS 555:2013 Cyber Security Risk Governance and Management Specification.

On successful completion of the course, you will be equipped with the necessary skills and expertise to work as a cyber security professional, or information security professional, in roles such as an information security engineer/manager, ISO27001 auditor, computer forensic analyst, cyber security specialist or security engineer.

Read less
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments. Read more
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments.

It offers a broad overview of information management and security, as well as technical knowledge of networking and security.

It is ideal for those keen on a governance/compliance role, or for roles requiring you to take charge of data management.

Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/information-management-and-security#about

Course detail

• Study areas including: computer security, data modelling and management, emerging technologies, advanced security countermeasures, professional project management, networking administration and management, information security management and data governance and compliance
• Explore the career opportunities presented by the growth area of information security
• Develop your technical and managerial skills, with valuable experience of managing systems security strategy
• Gain valuable experience and industry links by working on projects for real businesses through our Academic into Business Computing (ABC) centre
• Benefit from a course which qualifies you roles including Information Architect, Data Modeller, Information Business Consultant, in Information Security and Network Management or go on to further study on an MSc by Research, MPhil or PhD.

Why choose this course?

The course is designed for those who want a broad overview of information management and security as well as technical knowledge of networking and security. The course is ideal for those who are looking to take up a governance/compliance role within an organisation, or for those who are looking to take charge of data management.

During the course you will gain skills in programming, computer security, data governance and compliance.

Modules

• Emerging Technologies
• Data Modelling and Management
• Professional Project Management
• Managing Information Systems Strategy and Security Risks
• Networking Administration and Management
• Data Governance and Compliance
• Computer and Network Security
• Ethical Hacking Tools and Techniques
• MSc project – Information Management and Security

Assessment

Throughout your course you will be exposed to a wide variety of assessment techniques including: written examinations, case studies, practical coursework assignments, problem worksheets, presentations and viva- voce (voice) examinations.

This will allow you to apply the knowledge and understanding you have gained during the learning phase, to a variety of challenging and complex practical situations.

Careers

You will gain valuable skills for a career within Information Management and Security as well as those relevant for the wider world of IT and business.

The unit ‘Professional Project Management’ requires you to work in a team to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

The final project fosters independent and autonomous study. You learn to take up the responsibility of conducting your project, typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more

The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

About this degree

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits.

The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules

  • Computer Security I (15 credits)
  • Computer Security II (15 credits)
  • Introduction to Cryptography (15 credits)
  • Research in Information Security (15 credits)

Optional modules

Students choose 60 credits from the following:

  • Applied Cryptography (15 credits)
  • Cryptanalysis (15 credits)
  • Cybercrime (15 credits)
  • Distributed Systems and Security (15 credits)
  • Information Security Management (15 credits)
  • Language Based Security (15 credits)
  • Malware (15 credits)
  • People and Security (15 credits)
  • Philosophy, Politics and Economics of Security and Privacy (15 credits)
  • Privacy Enhancing Technologies (15 credits)

Please note: the availability and delivery of optional modules may vary, depending on your selection.

Dissertation/report

All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning

The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Further information on modules and degree structure is available on the department website: Information Security MSc

Careers

UCL graduates are keenly sought after by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Recent career destinations for this degree

  • Information Security Expert, State Oil Company of Azerbaijan Republic
  • IT Risk and Cyber Security Associate, PwC
  • PhD Research Student in Computer Science, UCL
  • Security Engineer, Morgan Stanley
  • Technical Analyst, The Royal Bank of Scotland (RBS)

Employability

Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts arise through the ACE-CS guest lecture series integrated into the degree.

Careers data is taken from the ‘Destinations of Leavers from Higher Education’ survey undertaken by HESA looking at the destinations of UK and EU students in the 2013–2015 graduating cohorts six months after graduation.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research.

UCL received the highest percentage (96%) for quality of research in Computer Science and Informatics in the UK's most recent Research Excellence Framework (REF2014).

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. 

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Accreditation

Information Security has been successfully awarded full certification from the National Cyber Security Centre (NCSC). Students who wish to gain the certification with their degree need to choose COMPGA14 Information Security Management as one of their optional modules.

Research Excellence Framework (REF)

The Research Excellence Framework, or REF, is the system for assessing the quality of research in UK higher education institutions. The 2014 REF was carried out by the UK's higher education funding bodies, and the results used to allocate research funding from 2015/16.

The following REF score was awarded to the department: Computer Science

96% rated 4* (‘world-leading’) or 3* (‘internationally excellent’)

Learn more about the scope of UCL's research, and browse case studies, on our Research Impact website.



Read less
On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. Read more

On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. In the Cyber Security course, Swansea Computer Science takes a holistic and interdisciplinary approach, bringing together modules on diverse topics such as penetration testing, formal modelling, information security management, cryptography and AI in order to equip our students with a suitable mindset for a career in cyber security. The department's cyber security lab provides the perfect backdrop for exploring the security landscape, allowing Cyber Security students and staff to carry out experiments in network security, mobile security, and to explore threats and defence mechanisms in the context of the Internet of Things.

Key Features of the MSc in Cyber Security

  • We are top in the UK for career prospects [Guardian University Guide 2018]
  • 5th in the UK overall [Guardian University Guide 2018]
  • 7th  in the UK for student satisfaction with 98% [National Student Survey 2016]
  • We are in the UK Top 10 for teaching quality [Times & Sunday Times University Guide 2017]
  • 12th in the UK overall and Top in Wales [Times & Sunday Times University Guide 2017]
  • 91.9% in graduate employment or further study six months after leaving University [DHLE Survey 2016]
  • UK TOP 20 for Research Excellence [Research Excellence Framework 2014]
  • Our Project Fair allows students to present their work to local industry
  • Strong links with industry
  • £31m Computational Foundry for computer and mathematical sciences will provide the most up-to-date and high quality teaching facilities featuring world-leading experimental set-ups, devices and prototypes to accelerate innovation and ensure students will be ready for exciting and successful careers. (From September 2018)
  • Top University in Wales [Times & Sunday Times University Guide 2017]

Our increasingly connected world presents continual new and serious security threats. From privacy violations (hacking, monitoring communications, leaking sensitive data, stealing and publishing private information) through to the drugs trade, sex trafficking and terrorism, Computer Science can provide the techniques required for mitigating such risks, in order to provide secure, reliable and trustworthy systems.

Taught component: The MSc in Cyber Security offers a range of modules, taught by internationally renowned researchers and covering topics such as: Cryptography and Network Security, Penetration Testing, Information Security Management, Embedded Systems Modelling and Verification Techniques, Web Application Development, Blockchain, Cryptocurrencies and Smart Contracts, Advanced Topics: AI and Cyber Security Invention and Innovation in Computing.

Dissertation component: A further four months duration is spent undertaking a substantial research project (60 credits), which will involve using and exploring cutting edge techniques for specifying, developing, verifying and accessing systems against security criteria. Cyber Security Students will benefit from our broad range of industrial partners and internationally leading research expertise.

Possible Future Pathways: Cyber Threat Analyst - Penetration Tester PhD Researcher - Data Security Analyst Secure Web Developer - Verification Engineer.

Modules

Modules on the Cyber Security course may include:

  • Information Security Management
  • Computer Science Project Research Methods
  • Critical Systems
  • IT-Security: Cryptography and Network Security
  • Security Vulnerabilities and Penetration Testing
  • Invention and Innovation in Computing
  • Blockchain, Cryptocurrencies and Smart Contracts
  • Advanced Topics: Artificial Intelligence and Cyber Security
  • Web Application Development
  • Embedded System Design

Facilities for MSc in Cyber Security

The Department is well equipped for teaching, and is continually upgrading its laboratories to ensure equipment is up-to-date – equipment is never more than three years old, and rarely more than two. Currently, students use three fully networked laboratories: one, running Windows; another running Linux; and a project laboratory, containing specialised equipment. These laboratories support a wide range of software, including the programming languages Java, C# and the .net framework, C, C++, Haskell and Prolog among many; integrated programme development environments such as Visual Studio and Netbeans; the widely-used Microsoft Office package; web access tools; and many special purpose software tools including graphical rendering and image manipulation tools; expert system production tools; concurrent system modelling tools; World Wide Web authoring tools; and databases.

As part of our expansion, we are building the Computational Foundry on our Bay Campus for computer and mathematical sciences. As a student on the MSc in Cyber Security, you will study at the Bay Campus in the new Computational Foundry, a dedicated £32 million building for computational studies, providing the latest labs, resources and ecosystems for world leading, interdisciplinary research.

Careers for MSc in Cyber Security Graduates

All Computer Science courses including the MSc in Cyber Security will provide you the transferable skills and knowledge to help you take advantage of the excellent employment and career development prospects in an ever growing and changing computing and ICT industry.

94% of our Postgraduate Taught Graduates were in professional level work or study [DLHE 14/15].

Jobs include:

  • Software Engineer: Motorola Solutions
  • Change Coordinator: Logica
  • Software Developer/Engineer: NS Technology
  • Workflow Developer: Irwin Mitchell
  • IT Developer: Crimsan Consultants
  • Consultant: Crimsan Consultants
  • Programmer: Evil Twin Artworks
  • Web Developer & Web Support: VSI Thinking
  • Software Developer: Wireless Innovations
  • Associate Business Application Analyst: CDC Software
  • Software Developer: OpenBet Technologies
  • Technical Support Consultant: Alterian
  • Programming: Rock It
  • Software Developer: BMJ Group


Read less
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society. Read more

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The programme will:

  • Provide students with advanced knowledge and understanding of information security theory and concepts
  • Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
  • Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
  • Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

Programme learning outcomes

Knowledge and understanding

Students will gain:

  • Knowledge and understanding of the general information security aims and challenges
  • Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
  • Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
  • Knowledge and understanding of technical concepts and mechanisms for digital forensics
  • Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
  • The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
  • The ability to implement or apply existing information security mechanisms and technologies in practice
  • The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
  • The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills

Students will leave the programme with the ability to:

  • Analyse and solve problems of technical nature under consideration of various risks and constraints
  • Make effective and efficient decisions in an environment of conflicting interests
  • Think strategically 
  • Synthesise and critically evaluate the work of others
  • Apply fundamental knowledge to investigate new and emerging technologies
  • Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills

Students will gain the ability to:

  • Come up with technical solutions to a range of problems
  • Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
  • Implement mechanisms and apply them in a wider context of more complex systems
  • Present their opinions and findings and to produce a high-quality report

Key / transferable skills

Students will have:

  • The ability to communicate concepts and results in a clear and effective manner
  • The time and resource management planning
  • The ability to work with available resources, to collect and analyse research-oriented material

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. Read more
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. A key issue in IT strategy is Information Security, which is becoming more critical with the interconnection of systems through the Internet and the sharing of resources with business partners, clients and customers.

This Masters degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management.

You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.

What will I study?

You will study security from two perspectives: the concepts of computer and network security, together with a systemic approach to information security management. The programme of study is informed by ISO27000 legal compliance requirements and professional body knowledge requirements of ISACA (Information Systems Audit and Control Association), ITIL (Information Technology Infrastructure Library) and the Information Systems Security Certification Consortium (ISC)2. The study of computer forensics enables further specialisation.

IT Management is approached from a strategic and risk-based perspective, and includes business continuity and project management. A recent technology development that could have radical impact in both security and IT management is cloud computing, and the course provides an option to enable you to develop a sound understanding of the related issues and technology. Professional, ethical and contemporary issues in computing and research methods are also integrated into the programme.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars and technology-enhanced learning (e.g. Virtual Learning Environment, wiki). Classes are highly interactive, with practical application of concepts a key factor, as well as cases drawn from real-life. The MSc Information Security and IT Management is designed around small groups so you can be sure that you will have plenty of individual discussion with your tutors.

How will I be assessed?

Throughout the programme we will assess your vocational capability, academic critical thinking and intellectual development. Coursework, case studies, problem-solving exercises and exams may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academics who are research-active and regularly engage within the wider business and academic environment. Staff specialise in particular subjects so you will benefit from a wide range of knowledge and experience.

What are my career prospects?

The MSc in Information Security and IT Management will provide you with the skills and knowledge to develop your interests as an IT security professional and IT manager. As organisations become ever more dependent on IT, there are increasing opportunities for specialist positions related to security. The course provides knowledge and skills which underpin Information Systems Security Certification Consortium or (ISC)2 and ISACA certifications.

Read less
The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Read more

The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the US and beyond and the analysis of intelligence collection. The M.S. in National Security Affairs and International Relations is offered online worldwide.

National security affairs is one of the fastest growing professions with positions open in the public sector in the federal, state and local governments and in the private sector. This program is designed for professionals in the field seeking career advancement, those who aspire to enter the field, individuals in related professions, and those retired from the military and government seeking consulting and other positions. Examples of potential students include personnel in the military, federal, state and local governments, law enforcement, corporations, and academia, as well as recent college graduates.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes. 

M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the U.S. and beyond, and the analysis of intelligence collection. Students will also develop a deep understanding of the international context in which U.S. national security issues are shaped.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes.

Following completion of the program core, students must complete 15 credits of coursework from the list of available electives. The majority of the elective offerings were developed specifically for the national security and international relations program, with a small number drawn from closely related fields. The elective list contains both courses that emphasize domestic security and courses that have a broader international focus, resulting in sufficient breadth of subject matter to allow students to tailor their choices around particular academic or professional interests.

Students interested in Cyber Security can choose to take a specific concentration in this area. Students who choose this option must complete 9 credits from the Cyber Security concentration and 6 credits from the elective list. Before choosing this option, students must secure permission from the Department of History and Political Science. After a consultation, it will be determined whether the student can enter the Cyber Security concentration, or if additional foundation courses will be required in order to enter and successfully complete the concentration.

Core Courses (21 credits)

  • NSAM 5001 - Current Issues in National Security (3 credits)
  • NSAM 5003 - National Intelligence Collection and Analysis: Theory and Practice (3 credits)
  • NSAM 5004 - Border Protection and Military Issue (3 credits)
  • NSAM 5005 - Research and Evaluation in National Security Affairs (3 credits)
  • NSAM 5010 - US Foreign Policy and National Security (3 credits)
  • NSAM 5014 - Ethical Issues in National Security (3 credits)
  • NSAM 5016 - International Relations: Theory and Practice (3 credits)

Electives (15 credits)

  • NSAM 5002 - Terrorists and Terrorism: Theory and Practice (3 credits)
  • NSAM 5015 - Civil Liberties and National Security (3 credits)
  • NSAM 5020 - International Law and Institutions (3 credits)
  • NSAM 5030 - American Government and Domestic Security (3 credits)
  • NSAM 5040 - Cyber Conflict and Statecraft (3 credits)
  • DEM 5090 - Weapons of Mass Threat and Communicable Diseases (3 credits)
  • MHS 5314 - Bioterrorism and Weapons of Mass Destruction (3 credits)
  • NSAM 5502 - Directed Readings in National Security Affairs (3 credits)
  • NSAM 5650 - Economic Statecraft in National Security Affairs (3 credits)
  • NSAM 6130 - Practicum/Internship (3 credits)
  • NSAM 6690 - Special Topics in National Security Affairs and International Relations (3 credits)
  • NSAM 6700 - Directed Thesis in National Security Affairs and International Relations (6 credits)

Optional Cyber Security Concentration

  • MMIS 0683 - Fundamentals of Security Technologies (3 credits)
  • MMIS 0684 - Information Security Management (3 credits)
  • MMIS 0685 - Information Security Governance (3 credits)
  • MMIS 0686 - Information Systems Auditing (3 credits)
  • MMIS 0687 - Information Security Project (3 credits)

Practicum

In addition to successfully completing all course work, students must pass a tabletop examination to be awarded the M.S. in National Security Affairs and International Relations. When a student has completed all coursework, has maintained a minimum of 3.0 GPA with no "incomplete" grades, and is a "student in good standing" with no disciplinary actions pending or disciplinary tasks to complete, the student will be eligible to take the tabletop examination. The tabletop exam is an assessment of the student's ability to integrate the knowledge and skills gained through course work.The exam tests the student's written ability to critically analyze and apply conflict assessment, theory, and research methodology to hypothetical conflict situations. The exam also tests knowledge of material specific to the academic curriculum.



Read less
The Cryptography and Data Security major subject educates future experts with strong and broad knowledge on mathematical aspects of cryptography and data security. Read more

The Cryptography and Data Security major subject educates future experts with strong and broad knowledge on mathematical aspects of cryptography and data security. The students may also complement their theoretical knowledge with the courses of the Networked Systems Security in order to obtain profound and substantial education and expertise in the networked systems security and field of technology.

Programme structure

  1. Advanced-level studies in the major subject 50 ECTS credits
  2. Language, intermediate level and optional studies 40 ECTS credits
  3. Thesis for the Master of Science degree 30 ECTS credits

Academic excellence and experience 

The Master’s Degree Programme in Information Security and Cryptography is a two-year programme. The Cryptography and Data Security major subject focuses on mathematical aspects of cryptography and data security. The covered topics include:

  • modern asymmetric and symmetric cryptosystems,
  • cryptographic protocols and
  • algorithms related to information security.

In addition to the theoretical aspects, you will also learn to apply cryptographic algorithms and protocols in real-life environments. This goal is ensured by the multi-disciplinary studies of the major. Besides mathematics courses, you will also have compulsory studies both in networked systems security and management aspects of information security.

Master's thesis and topics

In the Master’s thesis, you must prove your ability to conduct scientific research and to produce mathematical text. You need to master the research methods, knowledge of the research field and skill of scientific writing.

The goal of the Master’s thesis is to

  • train students in independent problem solving for demanding research questions
  • to train students in presentation and argumentation skills, both oral and written
  • train students in search and critical evaluation of information
  • train students in mathematical argumentation
  • develop an ability to engage in a constructive dialogue with related disciplines
  • gain insight into actual research and development work as well as the possibilities and constraints of information security methods in the application domain and in the society at large.

Examples of thesis topics:

  • Private Evaluation of Decision Tree Classifiers
  • A Study of Privacy Preserving Queries with Bloom Filters
  • Elliptic Curve Cryptosystems: Comparing Weierstrass, Hesse and Edwards Curves
  • One-way Function and Their Application in Protocols

Competence description 

In the programme, based on the newest research, you will obtain profound and substantial knowledge on the mathematical aspects of cryptography and data security as well as experience of applying the theoretical knowledge on real-life scenarios. You can also learn teamwork and acquire a unique skillset in multi-disciplinary international Capstone projects. Thus, the major offers a strong expertise for a career in fields related to information security.

As a student in this major, you will gain skills in:

  • mathematical foundations of cryptography,
  • cryptographic algorithms and protocols,
  • networked systems security,
  • multi-disciplinary security and information management and
  • teamwork.

Job options 

In both Europe and Finland, the information intensive industry has become the most important business sector. Moreover, information has become one of the most relevant products in the information society. Securing this business sector and its products is vital in the modern era.

The degrees of this programme cover different areas of information security. Based on the personally planned expertise profiles, successful careers as information security experts in the IT sector are achievable in Finland and abroad. The education also benefits from co-operation with regional companies, especially in terms of optional Capstone projects.

A personal study plan made for each student creates an individual information security expertise profile. Possible job titles are:

  • cryptography engineer,
  • network security engineer and
  • information security manager.

Career in research

The Master’s degree provides eligibility for scientific postgraduate degree studies. Postgraduate degrees are doctoral and licentiate degrees.

Graduates from the programme are eligible to apply for a position in the University of Turku Graduate School (UTUGS). The Graduate School consists of 16 doctoral programmes which cover all disciplines and doctoral candidates of the University.

Together with the doctoral programmes, the Graduate School provides systematic and high quality doctoral training. UTUGS aims to train highly qualified experts with the skills required for both professional career in research and other positions of expertise.



Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:

  • EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
  • Specialist input from guest lecturers
  • Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
  • Specialist technicians to ensure you can get the most out of these technologies.

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the full course document.

Core modules

Digital Forensics pathway

Cyber Security Pathway

Professional accreditation

This programme is accredited by BCS, The Chartered Institute for IT, for fully meeting the further learning educational requirement for Chartered IT Professional (CITP) status and for partially satisfying the underpinning knowledge requirements set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC) and the Science Council for Chartered or Incorporated Engineer (CEng or IEng) status. Note that there are additional requirements, including work experience, to achieve full CITP, CEng, or IEng status. Graduates of this accredited degree will also be eligible for professional membership of BCS (MBCS).

The BCS accreditation is an indicator of the programme’s quality to students and employers; it is also an important benchmark of the programme’s standard in providing high quality computing education, and commitment to developing future IT professionals that have the potential to achieve Chartered status. The programme is also likely to be recognised by other countries that are signatories to international accords.

Career path

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;


Read less
The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Read more

The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Whilst these technologies bring us untold benefits, they also expose businesses, governments and individuals to repeated threats, such as fraud through data manipulation, deliberate sabotage and blackmail. As a result, businesses, governments and individuals around the world rely on the expertise and innovations of information security specialists, without which global communications systems would grind to a halt.

Want to join this expanding field and learn from the very best? Our flagship Information Security programme was the first of its kind in the world. It is certified by GCHQ, the UK Government Communications Headquarters, and taught by academics and industrial partners in one of the largest and most established Information Security Groups in the world. We are a UK Academic Centre of Excellence for cyber security research, and an Engineering and Physical Sciences Research Council (EPSRC) Centre for Doctoral Training in cyber security. We work closely with industry, and much of our curriculum and research is informed and audited by the industry itself. Our teachers are specialists in the field, with backgrounds in computer science, engineering, mathematics, statistics and the social sciences.

Our broad curriculum encompasses cryptography, fraud detection, system security, network security, device security and the study of how security itself should be managed. You will learn about the technical, legal and commercial aspects of the industry and have the chance to complete a supervised dissertation on a topic of your choice. In a typical year you could benefit from lectures and seminars given by as many as 50 different guest speakers. You will also have access to our virtualisation software, for experimenting with network security settings and ideas, as well as to our Penetration Testing Laboratory and industry-sponsored Smart Card Centre.

We offer a friendly, supportive learning environment and you will have a dedicated personal adviser to guide you through your studies. The skills you gain will open up a range of high-level career options and provide a solid foundation if you wish to progress to a PhD. Our graduates are in demand for their cutting-edge grasp of the field as well as their technical expertise and transferrable skills such as data handling, analysis, problem solving and research. The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

  • Join a world-class Information Security Group, recognised as an Academic Centre of Excellence by the UK Government.
  • Learn from an interdisciplinary team of renowned information security specialists who are involved in pioneering research in the field.
  • Benefit from our close ties with the information security industry.
  • Enjoy the flexibility to tailor your degree to your particular interests and complete a supervised research project of your own.

The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

Course structure

Core modules

  • Security Management
  • Introduction to Cryptography and Security Mechanisms
  • Project
  • Network Security
  • Computer Security (Operating Systems)
  • Security Technologies
  • Secure Business Architectures

Optional modules

In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.

  • Legal and Regulatory Aspects of Information Security
  • Advanced Cryptography
  • Database Security
  • Cyber Crime
  • Smart Cards, RFIDs and Embedded Systems Security
  • Software Security
  • Digital Forensics
  • Security Testing - Theory and Practice
  • Cyber Security

Teaching & assessment

We use a range of teaching methods, including seminars, lectures and practical lab work. There is a strong focus on small group teaching. The programme has a flexible, modular structure, combining a sueprvised dissertation and mandatory courses that together make up 120 of the 180 credits required to pass, with a range of optional modules on specialist topics, worth 20 credits each.

During your studies you will be invited to attend an intensive, two-day revision course to prepare for the Certified Information Systems Security Professional (CISSP) exams, which you will then be able to sit on campus, through an established arrangement with (ISC)2.

Assessment is through a combination of end-of-year examinations sat in May or June and the written dissertation, which has to be submitted in September.

Your future career

By the end of this programme you will possess the knowledge and skills to pursue a career as a cyber security professional, and an ideal basis for moving on to further postgraduate research if you prefer. You will have an advanced knowledge and understanding of the latest breakthroughs and techniques, as well as key challenges and opportunities in the field. This programme will also give you valuable transferable skills such as advanced IT skills, data handling, analysis, research, communication, problem solving, time management, adaptability and self-motivation.

Our graduates are highly employable and in recent years they have gone on to forge successful careers in a wide range of sectors, including: banking, telecommunications, security consultancies, the civil service, public utilities and the retail sector.

You will be assigned a personal advisor to guide you through your studies and advise you on further postgraduate opportunities. The campus Careers team will be on hand to offer advice and guidance on your chosen career and the University of London Careers Advisory Service runs regular sessions on finding summer internships or vacation employment and securing employment after graduation.



Read less
Computer and information security is a vital issue in today’s IT environment. This programme will provide you with the necessary skills to understand and apply specialised security knowledge in the identification and resolution of IT security threats facing modern organisations. Read more
Computer and information security is a vital issue in today’s IT environment. This programme will provide you with the necessary skills to understand and apply specialised security knowledge in the identification and resolution of IT security threats facing modern organisations. Develop a rounded view of key security domain topics such as security management and computer forensics, and gain the hands-on skills to confidently implement, configure and manage the tools you’ll face in practice.

Key features

-Be confident studying a degree accredited by BCS, The Chartered Institute for IT. The University has been awarded Academic Partner status by the Institute of Information Security Professionals (IISP), in recognition of the significant base of security-related expertise within the institution. This link encourages and enables a dialogue between academia and the wider community of security practitioners.
-Learn from research-active staff at the forefront of knowledge, conducting research within the Centre for Security, Communications and Network Research.
-Put your skills into practice in our high specification security, networking and digital forensic laboratories.
-Technology supported learning with free iPad mini and eBooks.
-Active Computer and Information Security Society (CISS) provide opportunities for networking, problem solving, speakers from industry as well as a valuable source of contacts.
-Build on the foundation which this course offers and take the opportunity to progress onto a research degree at MPhil or PhD level.
-Explore the option of completing the programme over two years with an integral work placement year.
-Benefit from the courses extensive links with major professional bodies and societies such as the BCS, ISACA, IFIP Technical Committee 11 and the Institute for Information Security Professionals (IISP).
-Take the opportunity to make career inroads through strong industrial links with major organisations such as Kaspersky Labs, Symantec, Orange, France-Telecom, and various UK government departments.
-Engage with the BCS South West branch programme, who hold many of their sessions at Plymouth University. The branch has a rich programme of events that contributes to broadening the knowledge and experience of the students.
-Continually under review to ensure all content is relevant and timely the programme has recently begun to offer AccessData Certification as a part of the cybercrime and investigation module, enabling you to achieve professional recognition as well as academic credit.

Course details

During your year of study you will gain an understanding of key topics such as security management, cryptography, network and system security, computer forensics, and protection in application scenarios. You'll also benefit from being taught a wide variety of hands-on skills, which enable you to implement, configure and manage many of the typical controls you will encounter in practice - including firewalls, intrusion detection systems, authentication and access mechanisms, and forensic case management tools. The project will enable you to explore and develop in-depth knowledge on a particular area of security. You'll become a subject expert and push the boundaries of the current understanding.

Core modules
-SEC501 Information Security Management and Governance
-SEC503 Intrusion Analysis and Incident Management
-BPIE500 Masters Stage 1 Placement Preparation
-PROJ513 MSc Project (September)
-SEC502 Network Security and Penetration Testing
-SEC505 Digital Forensic Investigation
-SEC504 Secure Systems Architectures and Mechanisms
-FTGS507 Professional and Research Skills with Entrepreneurship

Optional placement year
-BPIE501 Computing Masters Industrial Placement

Every postgraduate taught course has a detailed programme specification document describing the programme aims, the programme structure, the teaching and learning methods, the learning outcomes and the rules of assessment.

Read less
Effective information management is key to the success of any organisation. The MBA Information Management develops knowledgeable and capable executives who will become managers in the IT / computing industry, or in companies in other sectors. Read more
Effective information management is key to the success of any organisation. The MBA Information Management develops knowledgeable and capable executives who will become managers in the IT / computing industry, or in companies in other sectors. The aim of the programme is to provide graduates with a range of management knowledge and skills, together with a thorough foundation in information management, information technology, and its commercial applications. The programme includes topical case studies, and reflects contemporary developments within the sector. The course is suitable for graduates in a wide range of disciplines, including Engineering, Finance, Social Sciences and other subjects.

Compulsory Modules:

Organisations and People: This module examines key issues arising from contemporary research in organisational behaviour (OB) and human resource management (HRM). It provides an integrated analysis of management, organisations and people, developing the conceptual, strategic and practical skills necessary for managers in complex, global organisational contexts. Specific topics include:

The nature of organisations
Organisation structures: strategy, design and function, job design
Organisation cultures: values, ethics, norms of behaviour
Theories and models of management: classical and contemporary
Individual differences: perception, learning, motivation, equality and diversity
Groups and teams in the organisation
Managing relationships: power, conflict, communication, engagement
Managers as leaders, people developers, coaches
Managing job satisfaction and performance

International Strategic Management: This module analyses strategic decision-making within business. You will develop a critical understanding of the strategic processes of business management, the interconnections with the functional domains of marketing, human resource management and corporate finance, and the management of knowledge systems. Specific topics include:

Concepts of strategic management applicable to business
Prescriptive and emergent strategies
Strategy implementation through capacity building and resource allocation
Managing, monitoring and reviewing strategic change
Organisational designs for strategic advantage
Human resources strategy, marketing and corporate financial strategy
Organisational learning and knowledge management

Management Research: This module analyses the philosophical basis for research in the management sciences, and examines a number of key methodological issues and approaches. Research designs for both quantitative and qualitative research methodologies are developed, including interviews, case studies, focus groups, surveys and experiments. Specific topics include:

Research methodologies and philosophy: positivism and interpretivism
Qualitative research methods and the search for meaning
Selecting a research strategy and design
Data gathering, documentary records, triangulation and mixed methods
Content analysis, conversation analysis, discourse analysis, grounded theory
Quantitative research design and methodologies
Univariate and multivariate analysis, factor, cluster and discriminant analysis

Web Technologies: This module provides an understanding of the basic technologies and structures for developing web applications, including internet resource creation, search techniques and programming languages for creating web content. You will create and use multimedia content in web applications, and gain familiarity with technologies for creating secure web applications. Specific topics include:

Internet concepts; networks; ISO 7 layer model; basic network architecture; routing; domain names; email; ftp; telnet; HTTP
WWW concepts; Internet resources; URI, and URI resolution, URL, URN; relation to XML namespaces; search engines; search algorithms; search engine optimisation
JavaScript; PHP; CSS; programming tools and environments
Multimedia; WWW support for multimedia; file compression
Internet Security; Cryptography; standards for the Internet; public key systems; signatures; authentication; trust management; electronic cash; security issues; firewalls
Web programming; HTML; XML; form input; CGI scripting; Perl programming

Finance for Managers: This module is designed for those who aim to achieve a basic understanding of financial management and control, and who require an understanding of finance in order to manage an organisation effectively. Financial planning and control are central themes, as well as the appraisal techniques of investment projects. Specific topics include:

Principles underlying the preparation of accounting information
Recording business transactions
Preparation and analysis of financial statements
Preparation of budgets, financial planning and control
Costing methods, uses and interpretation of cost data
Investment appraisal techniques

Databases: This module shows how to design a database and intelligently query a database using SQL; and provides an introductory level of understanding in database systems. A mini project is carried out towards the end of the module. This project allows you to complete the entire development process, from informal user requirements, to ER/EER modelling, transformation into relations, normalisation, and finally to the SQL commands to create and query the database. Specific topics include:

Characteristics of a relational database
ER/EER modelling of simple applications
Relational model and relational algebra
Transformation of an ER/EER model into a relational database
Normalisation techniques
Uses of SQL language to create and query a database

Technologies for Internet Systems: This module introduces technologies and tools for Internet Systems and e-commerce systems. Technologies and structures for developing web applications are examined. Technical issues for implementing an e-system, and commonly-available technology components, are covered. You will implement a practical web based e-commerce system using relevant technologies, taking into account current market implementation. Specific topics include:

e-commerce ideas and concepts
Internet concepts; networks; basic network architecture; routing; domain names; email; telnet; HTTP
Architectures and technologies, e-payment, e-commerce software and hardware, e-security, auctions
Design and implementation: HTML, XML, CSS, JavaScript, DOM, SVG
Research awareness: agent-based e-commerce; web services; grid computing; virtual organisations

Information Systems: This module examines the major types and components of Information Systems, their functions, benefits and limitations. The theoretical underpinnings of Information Systems are analysed. You will study the main business and personal uses of Information Systems, and how such systems are developed, procured and deployed. Specific topics include:

Understanding the nature of organisations and the people within them, and their use of information for strategic business purposes
The influence of human and organisational factors on the successful introduction of information systems
Methods and techniques involved in project and programme management
The importance of business processes and techniques for process modelling

Part 2:

For MBA Information Management, you MUST:

Complete two of the following Applied Business Projects: Business Planning; e-Business and Chain Value; Human Resource Management; International Business; Operations Management; Investment and Private Banking.
Write a Computing project, Software Hut. Software Hut is a project in which students (in groups) analyse, design and implement a software product for an organisation.

Read less

Show 10 15 30 per page



Cookie Policy    X