• Jacobs University Bremen gGmbH Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • Aberystwyth University Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Northumbria University Featured Masters Courses

Postgrad LIVE! Study Fair

Birmingham | Bristol | Sheffield | Liverpool | Edinburgh

University of Hertfordshire Featured Masters Courses
Cranfield University Featured Masters Courses
Cass Business School Featured Masters Courses
Nottingham Trent University Featured Masters Courses
London School of Economics and Political Science Featured Masters Courses
"information" AND "system…×
0 miles

Masters Degrees (Information Systems Security)

We have 456 Masters Degrees (Information Systems Security)

  • "information" AND "systems" AND "security" ×
  • clear all
Showing 1 to 15 of 456
Order by 
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society. Read more

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The programme will:

  • Provide students with advanced knowledge and understanding of information security theory and concepts
  • Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
  • Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
  • Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

Programme learning outcomes

Knowledge and understanding

Students will gain:

  • Knowledge and understanding of the general information security aims and challenges
  • Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
  • Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
  • Knowledge and understanding of technical concepts and mechanisms for digital forensics
  • Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
  • The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
  • The ability to implement or apply existing information security mechanisms and technologies in practice
  • The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
  • The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills

Students will leave the programme with the ability to:

  • Analyse and solve problems of technical nature under consideration of various risks and constraints
  • Make effective and efficient decisions in an environment of conflicting interests
  • Think strategically 
  • Synthesise and critically evaluate the work of others
  • Apply fundamental knowledge to investigate new and emerging technologies
  • Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills

Students will gain the ability to:

  • Come up with technical solutions to a range of problems
  • Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
  • Implement mechanisms and apply them in a wider context of more complex systems
  • Present their opinions and findings and to produce a high-quality report

Key / transferable skills

Students will have:

  • The ability to communicate concepts and results in a clear and effective manner
  • The time and resource management planning
  • The ability to work with available resources, to collect and analyse research-oriented material

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more

The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

About this degree

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits.

The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules

  • Computer Security I (15 credits)
  • Computer Security II (15 credits)
  • Introduction to Cryptography (15 credits)
  • Research in Information Security (15 credits)

Optional modules

Students choose 60 credits from the following:

  • Applied Cryptography (15 credits)
  • Cryptanalysis (15 credits)
  • Cybercrime (15 credits)
  • Distributed Systems and Security (15 credits)
  • Information Security Management (15 credits)
  • Language Based Security (15 credits)
  • Malware (15 credits)
  • People and Security (15 credits)
  • Philosophy, Politics and Economics of Security and Privacy (15 credits)
  • Privacy Enhancing Technologies (15 credits)

Please note: the availability and delivery of optional modules may vary, depending on your selection.

Dissertation/report

All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning

The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Further information on modules and degree structure is available on the department website: Information Security MSc

Careers

UCL graduates are keenly sought after by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Recent career destinations for this degree

  • Information Security Expert, State Oil Company of Azerbaijan Republic
  • IT Risk and Cyber Security Associate, PwC
  • PhD Research Student in Computer Science, UCL
  • Security Engineer, Morgan Stanley
  • Technical Analyst, The Royal Bank of Scotland (RBS)

Employability

Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts arise through the ACE-CS guest lecture series integrated into the degree.

Careers data is taken from the ‘Destinations of Leavers from Higher Education’ survey undertaken by HESA looking at the destinations of UK and EU students in the 2013–2015 graduating cohorts six months after graduation.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research.

UCL received the highest percentage (96%) for quality of research in Computer Science and Informatics in the UK's most recent Research Excellence Framework (REF2014).

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. 

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Accreditation

Information Security has been successfully awarded full certification from the National Cyber Security Centre (NCSC). Students who wish to gain the certification with their degree need to choose COMPGA14 Information Security Management as one of their optional modules.

Research Excellence Framework (REF)

The Research Excellence Framework, or REF, is the system for assessing the quality of research in UK higher education institutions. The 2014 REF was carried out by the UK's higher education funding bodies, and the results used to allocate research funding from 2015/16.

The following REF score was awarded to the department: Computer Science

96% rated 4* (‘world-leading’) or 3* (‘internationally excellent’)

Learn more about the scope of UCL's research, and browse case studies, on our Research Impact website.



Read less
This course builds upon typical computing courses available at undergraduate level and develops new knowledge and skills in areas critical for the successful introduction of information systems into business enterprises and organisations. Read more

This course builds upon typical computing courses available at undergraduate level and develops new knowledge and skills in areas critical for the successful introduction of information systems into business enterprises and organisations.

Information systems (IS) today are large, complex, varied in form and distributed, serving different types of people who use a variety of devices to access information. Specialists who recognise diverse business needs, and have a systematic approach to understanding the impact of technology on organisations, are essential to the success of any IS/IT strategy. Equal in importance to the architectures of systems and the supporting technologies, is the management and delivery of content, whether in the form of data, documents, images and sound.

Increasingly, the fundamental systems comprise digital architectures and networks which then embody and enable the distribution of digital content. Developed information systems are in reality socio-technical systems incorporating people, technologies and content. The information systems specialist becomes a more broadly based information professional as they extend their range and scope of operations towards the end users and their environments. Providing services to users and people at large and ensuring information resources deliver value is equally a part of the wider world of information systems.

Course detail

The course also provides a route for people with other backgrounds and experience to engage with the world of information systems. It helps you gain a full understanding of how information systems are designed and constructed, and of the impact of technology and its integration into an organisation.

It will also give you the skills you need to work effectively in a business-consulting environment, and provide a solid basis for research.

Modules

  • Enterprise Architecture
  • Knowledge Management
  • Consultancy and Technical Innovation
  • Information Systems Project Management
  • UML Component Modelling
  • Advanced Rich Media (optional)
  • Data Architecture (optional)
  • Security Management (optional)
  • HCI for Information Systems (optional)
  • Mobile Applications Development (optional)
  • Research Methods
  • Dissertation.

Format

Diverse methods are used to explore all aspects of the field. A strong supportive culture exists amongst the course tutors which enables students to achieve their potential.

Assessment

Course assessed work is a significant part of the total assessment. There is practical work, report writing, critical academic writing and the skills and knowledge gained in these contribute to a capacity to deliver a high quality dissertation.

There are a number of end of module exams. Course tutors provide appropriate support throughout the module to ensure candidates are well prepared.

Career and study progression

The course aims to provide routes into a number of career options and positions. There are good opportunities for employment in the core IS and ICT functions at the development and service levels. Employers require information officers, librarians, information service staff, content and intelligence gatherers and analysts, researchers, editors, searchers and intermediaries, advice and assistance workers, data managers, management information systems staff, as well as multimedia content workers, mapping specialists and cartographers, marketing research, public relations and communication staff. All these wider information professional positions are grounded in the fundamental core the discipline of information systems and the broader computing and ICT environment.

Graduates have a good record of achieving employment and progressing in professional information work especially in the voluntary and private sector as well as in the public sector.

Outstanding graduates have gone on to further study at the level of MPhil and PhD at UWL and at other institutions. We actively encourage students with potential for research to make their interest known early on in their course.

How to apply

Click the following link for information on how to apply to this course.

Scholarships and bursaries

Information about scholarships and bursaries can be found here.



Read less
The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Read more

The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the US and beyond and the analysis of intelligence collection. The M.S. in National Security Affairs and International Relations is offered online worldwide.

National security affairs is one of the fastest growing professions with positions open in the public sector in the federal, state and local governments and in the private sector. This program is designed for professionals in the field seeking career advancement, those who aspire to enter the field, individuals in related professions, and those retired from the military and government seeking consulting and other positions. Examples of potential students include personnel in the military, federal, state and local governments, law enforcement, corporations, and academia, as well as recent college graduates.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes. 

M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the U.S. and beyond, and the analysis of intelligence collection. Students will also develop a deep understanding of the international context in which U.S. national security issues are shaped.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes.

Following completion of the program core, students must complete 15 credits of coursework from the list of available electives. The majority of the elective offerings were developed specifically for the national security and international relations program, with a small number drawn from closely related fields. The elective list contains both courses that emphasize domestic security and courses that have a broader international focus, resulting in sufficient breadth of subject matter to allow students to tailor their choices around particular academic or professional interests.

Students interested in Cyber Security can choose to take a specific concentration in this area. Students who choose this option must complete 9 credits from the Cyber Security concentration and 6 credits from the elective list. Before choosing this option, students must secure permission from the Department of History and Political Science. After a consultation, it will be determined whether the student can enter the Cyber Security concentration, or if additional foundation courses will be required in order to enter and successfully complete the concentration.

Core Courses (21 credits)

  • NSAM 5001 - Current Issues in National Security (3 credits)
  • NSAM 5003 - National Intelligence Collection and Analysis: Theory and Practice (3 credits)
  • NSAM 5004 - Border Protection and Military Issue (3 credits)
  • NSAM 5005 - Research and Evaluation in National Security Affairs (3 credits)
  • NSAM 5010 - US Foreign Policy and National Security (3 credits)
  • NSAM 5014 - Ethical Issues in National Security (3 credits)
  • NSAM 5016 - International Relations: Theory and Practice (3 credits)

Electives (15 credits)

  • NSAM 5002 - Terrorists and Terrorism: Theory and Practice (3 credits)
  • NSAM 5015 - Civil Liberties and National Security (3 credits)
  • NSAM 5020 - International Law and Institutions (3 credits)
  • NSAM 5030 - American Government and Domestic Security (3 credits)
  • NSAM 5040 - Cyber Conflict and Statecraft (3 credits)
  • DEM 5090 - Weapons of Mass Threat and Communicable Diseases (3 credits)
  • MHS 5314 - Bioterrorism and Weapons of Mass Destruction (3 credits)
  • NSAM 5502 - Directed Readings in National Security Affairs (3 credits)
  • NSAM 5650 - Economic Statecraft in National Security Affairs (3 credits)
  • NSAM 6130 - Practicum/Internship (3 credits)
  • NSAM 6690 - Special Topics in National Security Affairs and International Relations (3 credits)
  • NSAM 6700 - Directed Thesis in National Security Affairs and International Relations (6 credits)

Optional Cyber Security Concentration

  • MMIS 0683 - Fundamentals of Security Technologies (3 credits)
  • MMIS 0684 - Information Security Management (3 credits)
  • MMIS 0685 - Information Security Governance (3 credits)
  • MMIS 0686 - Information Systems Auditing (3 credits)
  • MMIS 0687 - Information Security Project (3 credits)

Practicum

In addition to successfully completing all course work, students must pass a tabletop examination to be awarded the M.S. in National Security Affairs and International Relations. When a student has completed all coursework, has maintained a minimum of 3.0 GPA with no "incomplete" grades, and is a "student in good standing" with no disciplinary actions pending or disciplinary tasks to complete, the student will be eligible to take the tabletop examination. The tabletop exam is an assessment of the student's ability to integrate the knowledge and skills gained through course work.The exam tests the student's written ability to critically analyze and apply conflict assessment, theory, and research methodology to hypothetical conflict situations. The exam also tests knowledge of material specific to the academic curriculum.



Read less
Information systems (IS) today are large, complex, varied in form and distributed, serving different types of people who use a variety of devices to access information. Read more

Information systems (IS) today are large, complex, varied in form and distributed, serving different types of people who use a variety of devices to access information. Specialists who recognise diverse business needs, and have a systematic approach to understanding the impact of technology on organisations, are essential to the success of any IS/IT strategy. Equal in importance to the architectures of systems and the supporting technologies, is the management and delivery of content, whether in the form of data, documents, images and sound.

Increasingly, the fundamental systems comprise digital architectures and networks which then embody and enable the distribution of digital content. Developed information systems are in reality socio-technical systems incorporating people, technologies and content. The information systems specialist becomes a more broadly based information professional as they extend their range and scope of operations towards the end users and their environments. Providing services to users and people at large and ensuring information resources deliver value is equally a part of the wider world of information systems.

Course detail

This course builds on typical undergraduate computing courses studied at level 4 and 5 or equivalent ( such as HND) by offering a level 6 entry route 'integrated' to a level 7 Masters course.

The two year combination provides a route to develop new knowledge and skills in areas critical to the introduction and success of modern information systems for enterprises. The course also provides a route for people with other backgrounds and experience to engage with the world of information systems. It helps you gain a full understanding of how information systems are designed and constructed, and of the impact of technology and its integration into an organisation. It will also give you the skills you need to work effectively in a business-consulting environment, and provide a solid basis for research.

To qualify for the award of MSc Information Systems (Integrated), candidates on the integrated pathway must study five level 6 modules consisting of 20 credits each and two 10 credits each, and six level 7 modules consisting of 20 credits and a 60 credits dissertation module.

Modules

Year One (Level 6)

• Strategies and Systems or Advanced Business Systems

• Development Methodologies

• Computer Security

• Advanced Databases

• Project Preparation

• Project

• IT Industry

Year Two (Level 7)

• Project Management

• Consultancy and Technological Innovation

• Enterprise Architecture

• Knowledge Management

• Learning and Professional Development

• Employability Skills and Employment

• HCI for Information Systems (optional)

• Mobile Applications Development ( optional)

• Data Architectures ( optional)

• UML Component Modelling(optional)

• Security Management ( optional)

• Research Methods

• Dissertation

Note: students select one option from the list offered

Format

Teaching consists of lectures, seminars and laboratory work to provide a basis for the intensive individual study you need to undertake to maximize your investment of time and potential outcomes from taking the course.

Assessment

Course assessed work is a significant part of the total assessment. There is practical work, report writing, critical academic writing and the skills and knowledge gained in these contribute to a capacity to deliver a high quality dissertation.

There are a number of end of module exams. Course tutors provide appropriate support throughout the module to ensure candidates are well prepared.

Career and study progression

The course aims to provide routes into a number of careers:

- information officers

- librarians, information service staff

- content and intelligence gatherers

- analysts

- researchers

- editors

- searchers and intermediaries

- advice and assistance workers

- data managers

- management information systems staff

- multimedia content workers

- mapping specialists and cartographers

- marketing research

- public relations and communication staff.

Outstanding graduates have gone on to further study at the level of MPhil and PhD at UWL and at other institutions. We actively encourage students with potential for research to make their interest known early on in their course.

How to apply

Click the following link for information on how to apply to this course.

Scholarships and bursaries

Information about scholarships and bursaries can be found here.



Read less
Organisations operate within increasingly unpredictable, competitive, constrained and demanding environments. Information is crucial to their success as it is required for decision making at all levels. Read more

Course Description

Organisations operate within increasingly unpredictable, competitive, constrained and demanding environments. Information is crucial to their success as it is required for decision making at all levels. Consequently there is a need to understand the strategic importance of information and develop agile, effective and secure ways to exploit it to its full potential. To do this, effective information capability management must be developed throughout the organisation so that the right information is available to the right people at the right time in an effective, efficient and secure manner.

An appropriate infrastructure is required to enable effective information capability management to address strategic business needs. This is dependent on joined-up systems of processes, technology and appropriately skilled, competent and motivated people focused on delivering clearly understood business benefit. The Information Capability Management (ICM) MSc has been developed to address these important issues.

Overview

Skilled professionals are needed to enable organisations to realise the strategic benefits that successfully exploiting information can provide. Success in business of all types and in all sectors, both public and private, is dependant on:

•Understanding the value of information as a strategic asset
•Developing agile, effective and efficient systems that make this information available.
•Countering cyber threats with appropriate cyber security.

The internationally recognised Information Capability Management course successfully supports the development of these professionals. Students from Government departments, industry and other organisations within the UK and internationally come together to study and discuss issues and develop skills that will enable solutions now and in the future.

Key goals of the course are to provide students with postgraduate level education in order to:

•Develop in individuals an awareness of the management, user and supplier communities
•Recognise the stakeholder roles, needs and expectations within these communities
•Enable effective communication and a shared understanding between these stakeholders in order to meet capability objectives
•Master the principles and practice that underlie the delivery of effective, efficient and secure systems in various business spaces that exploit information in order to provide strategic benefit

Start date: Full Time: September / Part Time: January

Duration: Full-time MSc - one year, Part-time MSc - up to three years, Full-time PgCert - one year, Part-time PgCert - two years, Full-time PgDip - one year, Part-time PgDip - two years

Course overview

MSc students must complete a taught phase consisting of twelve modules, followed by an individual dissertation in a relevant topic.

PgDip students are required to undertake the same taught phase as the MSc, but without the individual dissertation.

PgCert students must complete the core module (Foundations of Information Systems) together with five other modules.

Modules

Qualifications achieved by completing:
PgCert: Foundations of Information Systems and any five other modules
PgDip: All modules
MSc: All modules and the dissertation.

Core:
- Cyber Security and Information Assurance
- Dissertation
- Emerging Technology Monitoring
- Foundations of Information Systems
- Information Storage and Retrieval
- Methods and Tools for Information Systems Development
- Organisation Development
- Professional Issues
- Programme and Project Management for Information Systems
- Software Engineering (IS)
- Strategic Application of Information Systems
- Systems Architecture
- Data-led Decision Support
- Data Modelling, Storage and Management

Individual Project

The Individual Project is the opportunity for a student to utilise and demonstrate their understanding of the taught phase of the course by applying their learning to a real world problem. It is also an opportunity to develop skills and achieve a greater level of understanding in a specific area or areas of relevance to the course. Students are allocated a supervisor and have access to subject matter experts to support them in the project phase.

Assessment

Spread throughout the programme and includes coursework, group presentations and examinations during the taught phase and for the MSc a research based dissertation.

Career opportunities

Takes you on to further senior career opportunities and to become one of the next generation of senior professionals delivering business benefit through exploitation of information with skills in appropriate areas including business analysis, strategy development and implementation, information assurance, cyber security, organisational development and strategic application of information systems.

For further information

On this course, please visit our course webpage http://www.cranfield.ac.uk/Courses/Masters/Information-Capability-Management

Read less
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments. Read more
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments.

It offers a broad overview of information management and security, as well as technical knowledge of networking and security.

It is ideal for those keen on a governance/compliance role, or for roles requiring you to take charge of data management.

Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/information-management-and-security#about

Course detail

• Study areas including: computer security, data modelling and management, emerging technologies, advanced security countermeasures, professional project management, networking administration and management, information security management and data governance and compliance
• Explore the career opportunities presented by the growth area of information security
• Develop your technical and managerial skills, with valuable experience of managing systems security strategy
• Gain valuable experience and industry links by working on projects for real businesses through our Academic into Business Computing (ABC) centre
• Benefit from a course which qualifies you roles including Information Architect, Data Modeller, Information Business Consultant, in Information Security and Network Management or go on to further study on an MSc by Research, MPhil or PhD.

Why choose this course?

The course is designed for those who want a broad overview of information management and security as well as technical knowledge of networking and security. The course is ideal for those who are looking to take up a governance/compliance role within an organisation, or for those who are looking to take charge of data management.

During the course you will gain skills in programming, computer security, data governance and compliance.

Modules

• Emerging Technologies
• Data Modelling and Management
• Professional Project Management
• Managing Information Systems Strategy and Security Risks
• Networking Administration and Management
• Data Governance and Compliance
• Computer and Network Security
• Ethical Hacking Tools and Techniques
• MSc project – Information Management and Security

Assessment

Throughout your course you will be exposed to a wide variety of assessment techniques including: written examinations, case studies, practical coursework assignments, problem worksheets, presentations and viva- voce (voice) examinations.

This will allow you to apply the knowledge and understanding you have gained during the learning phase, to a variety of challenging and complex practical situations.

Careers

You will gain valuable skills for a career within Information Management and Security as well as those relevant for the wider world of IT and business.

The unit ‘Professional Project Management’ requires you to work in a team to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

The final project fosters independent and autonomous study. You learn to take up the responsibility of conducting your project, typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
This programme aims to prepare students for a successful career in the IT sector, even if they do not have a prior degree in computer science. Read more

This programme aims to prepare students for a successful career in the IT sector, even if they do not have a prior degree in computer science. It enables students who have studied computer science previously to expand their knowledge and acquire further skills across a broader range of computer science topics.

Taught modules address mobile and cloud computing, big data and database systems, and the importance of information security, in relation to the foundational information systems principles.

This programme will equip you with professional skills that will allow you to work as an IT consultant/manager, system architect/analyst, or software developer in any industry field that heavily relies on software and information technology.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The aims of the programme are to:

  • Prepare students for a range of computing related careers
  • Enable students to understand, design and apply information systems and software development technologies
  • Enable students to develop interest and basic skills for doing research in computer science
  • Enable students to realise their full potential for learning and communication
  • Enable students to appreciate rapid innovation and creativity in computer science

Programme learning outcomes

The programme provides opportunities for students to develop and demonstrate knowledge and understanding, skills, qualities and other attributes in the following areas:

Knowledge and understanding

Students will gain an understanding of:

  • The principles of information systems and software development
  • The principles and applications of contents technologies
  • The practice of information systems and software development
  • The professional issues involved in the exploitation of computing
  • The areas of emergent and innovative computing technologies
  • The key research issues in information and software systems

Intellectual / cognitive skills

Students will be able to:

  • Understand and articulate the requirements of the users of software systems / applications
  • Succinctly present, to a range of audience, knowledge relevant to the building, testing and deployment of a system
  • Research and develop solutions through the application of systems analysis / software engineering methods

Professional practical skills

Students will gain the ability to:

  • Specify, design and develop software systems and applications
  • Critically evaluate software systems and tools
  • Work as a member of a development team
  • Communicate with potential and actual users and to understand their needs
  • Retrieve Information
  • Analyse data and present information in appropriate ways
  • Plan, research, manage and implement a major project

Key / transferable skills

Students will gain skills in:

  • Research and information retrieval skills
  • Numeracy in both understanding and presenting cases involving a quantitative dimension
  • Time management and organisational skills
  • Self-learning skills
  • Effective use of specialist IT facilities
  • Continuing professional development

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less
An increasing number of organisations store, manipulate and communicate valuable and confidential information electronically. However, a number of threats compromise the security of this information. Read more
An increasing number of organisations store, manipulate and communicate valuable and confidential information electronically. However, a number of threats compromise the security of this information.

The MSc Information and Network Security aims to produce computing specialists who are able to design and maintain secure information systems and networks.

Visit the website: http://www.rgu.ac.uk/computing/study-options/part-time-learning/information-and-network-security

Course detail

This course is designed to satisfy the demands of industry and IT providers for software developers and computing practitioners who:

• know the legal requirements of information security and are able to implement current information security standards;
• are proficient in the use of state-of-the-art principles, techniques, tools and methodologies for& the design, implementation and maintenance of secure information systems;
• are able to design and maintain secure computer networks;
• can safely recover an information system or network from a successful security attack.

Modules

- Computer Security
- Database Security
- System Programming and Security
- Network Management (CISCO CCNA)
- Network Security
- Web System Development
- Professional Development and Research Skills
- Project

Format

Throughout the course, content is complemented by practical work, allowing you to support your theoretical development by providing real-life simulation. You will be taught through a mixture of lectures, tutorials, labs and external speakers. You will also be supported through our online virtual learning environment where you can access a wide variety of resources and other support materials.

The course will include industry sessions.

The individual project provides an opportunity for applying specialist knowledge together with analytic, problem-solving, managerial and communication skills to a particular area of interest within the secure information systems and networks. Working with the full support and guidance of an allocated project supervisor, you will be given the opportunity to propose, plan, specify, develop, evaluate, and present a substantial project.

Placements and accreditations

Students who perform particularly well during their first semester of studies will be invited to apply for a 45-week internship.

Careers

The course prepares you for a career in information and network security. Job openings include: IT security engineer, information and data security analyst, network manager, IT security developer, IT risk and fraud specialist and e-business security analyst.

Aberdeen is home to many multinational oil and gas companies and associated suppliers such as mainstream software houses, IT providers to major oil-related companies, specialist software consultancies, and venture capital start-ups.

The university is involved in a number of commercial collaborations on a local, national and international scale with organisations such as BP, British Geological Survey, Wood Group PSN, Accenture, WIPRO and many Aberdeen-based software development companies.

The course also prepares students for research careers by providing the skills necessary of an effective researcher. Suitable MSc graduates may continue to PhD programmes within the school.

How to apply

To find out how to apply, use the following link: http://www.rgu.ac.uk/applyonline

Funding

For information on funding, including loans, scholarships and Disabled Students Allowance (DSA) please click the following link: http://www.rgu.ac.uk/future-students/finance-and-scholarships/financial-support/uk-students/postgraduate-students/postgraduate-students/

Read less
Typically information governance/security and law have been taught as distinct subjects in different discipline areas. Read more
Typically information governance/security and law have been taught as distinct subjects in different discipline areas. In recognition of the relationship that exists between information governance/information security and the protection of personal data this programme brings together these subjects in one multi-disciplinary qualification.

The Postgraduate Certificate in Data Protection Law and Information Governance is a distance learning course that has been specifically designed to meet the needs of professionals already working in data protection and/or information governance. You will study three modules. The first of these, the legal research module, will develop your ability to undertake legal research and to present your research findings appropriately. In the second module you will develop your understanding of information governance and security principles that underpin the management of an organisation’s information assets. The third module will focus upon data protection law and practice.

The programme will not only provide you with valuable knowledge of current law and proposed developments to the law and to the principles of information governance, it will also enhance your ability to advise upon both information governance and data protection. The research, writing and presentation skills you will develop will also be of use to you in your working environment. Unlike typical CPD type learning this programme will challenge you to undertake critical evaluation of the law and to consider the application of information governance and security to your own/a chosen organisation.

Learn From The Best

This programme is delivered jointly by academics within Northumbria Law School and the iSchool, in the Faculty of Engineering and Environment. Northumbria Law School is actively involved in research and consultancy in the field of data protection, information sharing, freedom of information and privacy law. The iSchool, which delivers the information governance and security module, is widely recognised for its innovative distance and work-based learning programmes in information and records management and for its related research.

This course is delivered by a team of solicitors and academics with extensive experience in data protection and information governance, who are actively researching the area. In addition our team also boast memberships to key professional bodies, in addition to editing industry publications such as the Records Management Journal.

Teaching And Assessment

This course is primarily delivered online to provide flexibility and the ability for you to study at times convenient to you. We believe, however, that opportunities to engage with your tutors and with fellow students are an important part of your learning experience. On two of the modules you will be offered the opportunity to meet your tutors and attend lectures or workshops at the University at an optional study day. All of the content will be available online should you not be able to attend. On the third module you will be encouraged to engage with your tutor and with fellow students via the module discussion board.

Module Overview
KC7046 - Information Governance and Security (Core, 20 Credits)
LW7002 - Data Protection (Core, 20 Credits)
LW7003 - Legal Research (Core, 20 Credits)

Each taught module is assessed via written assignment. On the legal research module you will work in a group with other postgraduate students to undertake the research, writing and review of that assignment. On the data protection module and the information governance module you will submit an individual written assignment at the end of each module. As part of the assessment process you will be expected to undertake a critical evaluation of the law, and to consider information governance and security in your own or another chosen organisation.

Learning Environment

Your course will be delivered online using the latest innovative software. Learning materials such as module handbooks, assessment information, lecture presentation slides, recorded lectures and electronic reading lists will be available via our highly accessible e-learning platform, Blackboard. You can also access student support and other key University systems through your personal account.

Research-Rich Learning

Research Rich learning (RRL) is embedded across the programme, reflecting the pervasive research culture of the law school. Your student journey commences with the Legal Research module. This module will help you to gain a clear awareness and understanding of appropriate legal research methods and legal sources and how to cite those sources. In your subsequent modules your tutors will expose you to a range of academic literature covering substantive data protection law and relevant information governance and data security frameworks and principles. You will also develop your legal research skills further as your tutors encourage you to discuss, evaluate and critically examine relevant principles and frameworks and as you undertake your own research in order to complete your module assignments.

Give Your Career An Edge

It is envisaged that most students who study this programme will already be employed within the data protection/information governance fields. It recognises that the introduction of a new data protection regulation will result in significant challenges for professionals working in the data protection field, and seeks to help you to develop the skills and knowledge which you will need to do your job professionally notwithstanding the changing legislation framework.

Your Future

This course provides academic recognition of your knowledge of data protection and information governance law and your ability to apply that knowledge to practice. It also provides a strong foundation for further study. Should you decide upon completion of the programme that you wish to further develop your knowledge of information rights law or information governance/security then Northumbria Law School and the Faculty of Engineering and Environment both offer masters programmes in these fields. This programme provides you with a stepping stone towards study a Masters in Law (an LLM). Successful completion of this programme exempts you from study of the first three modules on the Pg Dip/LLM in Information Rights Law and Practice.

What Does Britain Leaving The EU Mean For This Course?

We can confirm that we will not be changing the course in light of the Brexit decision. The focus in this course will be the current legal framework, and any likely reforms including the GDPR. There are several reasons why the course will not be changed at this particular point. Firstly there are no changes to the current legal framework on data protection or environmental information. This is well explained in a statement by the information commissioner's office https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/06/referendum-result-response/ and was reiterated by Baroness Neville-Rolfe, the Government Minister responsible for Data Protection, on 4 July. These statements also acknowledge that there is a need for reform in data protection and that would have to be seen in the context of European data protection laws. Although it is not clear what the exact relationship of the UK and EU will be in the future there is a recognition that there will be a need for equivalency of data protection law in the UK with other countries. The need for equivalency of the law is likely to be necessary whether the UK is part of the single market, or if it exits the European economic area, in order for EU countries to send data to us as part of the 8th principle (See Schedule 1 of the Data Protection Act 1998). As such the GDPR still has relevance in our understanding of what would be required to achieve equivalent protection and what likely reforms on data protection may be considered in the UK. From an educational perspective the examination of reforms such as the GDPR provide a useful mechanism to critique current data protection laws, allowing for the discussion of strengths and weaknesses, even if all those reforms are not ultimately adopted. We will of course keep the position under review, as we do with all our teaching areas in order to ensure that learning material reflects both the current law and likely changes to that law.

Read less
This course enables graduates in Business or Information Systems to further their knowledge and career opportunities in business-led information systems. Read more
This course enables graduates in Business or Information Systems to further their knowledge and career opportunities in business-led information systems.

An interdisciplinary course, it provides technical knowledge of applied programming, computer security, financial and business data analysis, strategic management of information systems and project management.

Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/business-information-systems

Course detail

• Study on an interdisciplinary course that combines information technology and business, with areas including applied programming, computer security, information management and security, financial analysis, data modelling and management, professional project management, business data analysis and data compliance and governance
• Explore state-of-the-art and emerging information system solutions
• Develop your analytical, evaluative and problem-solving skills, enabling you to propose, critique and justify potential information system solutions to business-oriented problems
• Gain a thorough understanding of the roles information systems play in the business environment as well as related ethical and legal considerations
• Benefit from valuable experience through our Academic into Business Computing (ABC) centre, opening up new career opportunities such as Business Analyst, Systems Analyst, Project Manager, IT consultant or IT/Business Lecturer.

Modules

• Applied Programming
• Data Modelling and Management
• Professional Project Management
• Managing Information Systems Strategy and Security Risks
• Emerging Technologies
• Computer and Network Security
• Financial Analysis
• Business Data Analysis
• MSc Project - Business Information Systems

Assessment

We employ a variety of assessment methods including written examinations, practical coursework assignments, problem worksheets, presentations and viva-voce (oral) examinations. This aims to ensure you are able to apply the knowledge gained to practical situations.

Careers

You will gain valuable skills for a career within Business Information Systems as well as those relevant for a much wider range of applications such as information analysis or decision support systems.

The unit ‘Professional Project Management’ requires you to work in a team to apply current project management and ethics methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

The final project fosters independent and autonomous study. You will learn to take up the responsibility of conducting your project, typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
Gain a prestigious MSc in Information Security. by distance learning. Read more

Gain a prestigious MSc in Information Security

by distance learning

A world renowned programme; the first of its kind in the world, this Information Security course looks at both technical and management aspects of cyber security and teaches you about technologies including cryptography, computer security, fraud detection, and digital forensics.

- You will gain cyber security skills for senior level careers by focusing on principles and issues, and you will learn how information security can best be managed.

- You will benefit from Royal Holloway’s wealth of research, expertise and practical consulting experience, which ensures that the degree is up to date and commercially relevant.

- You can study most modules on a stand alone basis and earn CPE credits. Students come from a variety of backgrounds, ranging from new graduates through to senior security managers in blue chip enterprises seeking a formal qualification in Information Security.

Hear from a graduate

“Achieving the Masters has significantly benefited my career in Information Security; previously, I provided specific technical advice to customers, but now, with the breadth and depth of knowledge gained during the MSc, I also deliver security strategy consulting to senior executives.” Paul Schwarzenberger, MSc Information Security

Prestige

The programme has been developed by academics within the Information Security Group (ISG) [external link] at Royal Holloway, University of London, one of the foremost academic security groups in the world.

ISG awarded Centre of Excellence status - Royal Holloway, University of London has been recognised for its world class research in the field of cyber security by UK intelligence agencies GCHQ.

The ISG is at the cutting edge of research into the design and evaluation of smart cards, electronic commerce, security management, mobile telecommunications security, and the integration of security techniques into specific applications. The ISG was awarded a Queen's Anniversary Prize in 1998 in recognition of it providing "a unique national resource for the training of information security specialists".

"A pioneering course that continues to provide students with the essential knowledge and understanding of information security, with many graduates going on to fill senior roles." Malcolm Marshall, Partner, KPMG.

Career progression

Graduates of the programme can be found in many organisations, ranging from large financial institutions to technology and research- oriented organisations, as well as security specialists. The MSc is also a foundation for further postgraduate research.

Continuing Professional Education (CPE)

You can study any of the compulsory core modules, plus the optional module 'Digital forensics', on a stand-alone basis and earn CPE credits. On successful completion of each module you will receive a University of London certificate.

Your time commitment

This programme is offered online, enabling you to fit your studies around work and family commitments. To complete in the minimum study period you will need to study 24 hours per week during the academic session (September-April). To complete the degree in four years, which is normal for those in full time employment, you will need to study about 12 hours per week over the academic session.

Excellent support

Fully supported by a Virtual Learning Environment, you will take part in online tutor-supported seminars and discussions; a virtual student cafe allows you to interact and network with other students.

Contact us

If you have any questions, please contact our Student Advice Centre.



Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less

Show 10 15 30 per page



Cookie Policy    X