• Imperial College London Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of York Featured Masters Courses
  • Regent’s University London Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
King’s College London Featured Masters Courses
University of Kent Featured Masters Courses
University of Kent Featured Masters Courses
Southampton Solent University Featured Masters Courses
University of Birmingham Featured Masters Courses
"information" AND "system…×
0 miles

Masters Degrees (Information Systems Security)

  • "information" AND "systems" AND "security" ×
  • clear all
Showing 1 to 15 of 444
Order by 
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. The course has four main focuses:
-Information security management
-Ethical hacking
-System hardening
-Computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you:
-Develop the knowledge, understanding and skills to work as a computing security professional.
-Learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
-Develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
-Develop the effective and appropriate communication skills you need to be a security professional.

For more information, see the website: https://www.shu.ac.uk/study-here/find-a-course/msc-information-systems-security

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Registered Tester syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

-ISO27001 Lead Auditor
BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

Full time –12-18 months.
Part time – typically 2 years.
Starts September.

Course design
We developed this course along two main lines. The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks. The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester One modules
-Information security concepts and principles
-Network security
-Systems and application security
-Web applications and e-commerce security

Semester Two modules
-BSI ISO27001 lead auditor
-Group-based case study with capture the flag

Semester Two options
-Computer forensics and incident response
-Information security management
-Incident handling and hacking techniques (ethical hacking)

Semester Three modules
You study research methods and do a substantial research project leading to a dissertation.

Assessment: group and individual coursework. You also do a range of: problem solving assignments; workshops; practical projects; research activities.

Other admission requirements

You can apply for prior certificated credit or prior experiential credit for the course if it is appropriate. We consider any professional certification of a suitable level and other criteria related to your application. In some cases we may ask you to take an entrance exam. Overseas applicants from countries whose first language is not English must normally produce evidence of competence in English. An IELTS score of 6.0 with 5.5 in all skills (or equivalent) is the standard for non-native speakers of English. If your English language skill is currently below an IELTS score of 6.0 with a minimum of 5.5 in all skills we recommend you consider a Sheffield Hallam University Pre-sessional English course which will enable you to achieve an equivalent English level.

Read less
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security. Read more
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security.

Our course is provisionally certified by GCHQ and taught by experts, and equips you with the theoretical grounding and hands-on experience demanded by the information-security sector.

PROGRAMME OVERVIEW

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Dissertation
-Information and Network Security
-Symmetric Cryptography
-Asymmetric Cryptography
-Information Security Management
-Multimedia Security and Digital Forensics
-Secure Systems and Applications
-Information Security for Business and Government
-Project Management and Business Strategy
-Database Systems
-Cloud Computing

EDUCATIONAL AIMS OF THE PROGRAMME

The programme will:
-Provide students with advanced knowledge and understanding of information security theory and concepts
-Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
-Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
-Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

PROGRAMME LEARNING OUTCOMES

Knowledge and understanding
-Knowledge and understanding of the general information security aims and challenges
-Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
-Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
-Knowledge and understanding of technical concepts and mechanisms for digital forensics
-Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
-The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
-The ability to implement or apply existing information security mechanisms and technologies in practice
-The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
-The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills
-Analyse and solve problems of technical nature under consideration of various risks and constraints
-Make effective and efficient decisions in an environment of conflicting interests
-Think strategically
-Synthesise and critically evaluate the work of others
-Apply fundamental knowledge to investigate new and emerging technologies
-Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills
-Come up with technical solutions to a range of problems
-Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
Implement mechanisms and apply them in a wider context of more complex systems
-Present their opinions and findings and to produce a high-quality report

Key / transferable skills
-The ability to communicate concepts and results in a clear and effective manner
-The time and resource management planning
-The ability to work with available resources, to collect and analyse research-oriented material

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
This programme delivers a thorough grounding in current technologies and trends, offering comprehensive training in the fundamentals of the subject. Read more
This programme delivers a thorough grounding in current technologies and trends, offering comprehensive training in the fundamentals of the subject.

It combines high-quality education with rigorous intellectual challenges, enabling you to understand the principles of knowledge management, decision-making and design in process systems and business-information technologies.

PROGRAMME OVERVIEW

The MSc Information and Process Systems Engineering programme is aimed at graduates of traditional engineering, science and related disciplines.

Graduates from non-IT or related disciplines tend to be ill-prepared for the information and knowledge-related challenges and demands of today’s business environments.

We offer a wide selection of modules spanning process engineering, information systems, business and management. All taught modules are delivered by qualified experts in the topics and academic staff, assisted by specialist external lecturers.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year. Part-time students must study at least two taught technical modules per academic year. The programme consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Information Security Management
-Optimisation and Decision-Making
-Process Modelling and Simulation
-Technology, Business and Research Seminars
-Database Systems
-Knowledge-Based Systems and Artificial Intelligence
-Process and Energy Integration
-Process Systems Design
-Supply Chain Management
-Biomass Processing Technology
-Process Safety and Operation Integrity
-Process and Energy Integration
-Transition to a Low Carbon Economy
-Dissertation

FACILITIES, EQUIPMENT AND ACADEMIC SUPPORT

Modules related to the different groups are taught by a total of six full-time members of staff and a number of visiting lecturers.

An extensive library is available for individual study. It stocks more than 85,000 printed books and e-books, and more than 1,400 (1,100 online) journal titles, all in the broad area of engineering. The library support can be extended further through inter-library loans.

As part of their learning experience, students have at their disposal a wide range of relevant software needed to support the programme material dissertation projects.

In recent years, this work included the design of various knowledge-based and business systems on the internet, the application of optimisation algorithms, and semantic web applications, as well as modelling of process systems.

Numerous laboratory facilities across the Faculty and the University are also available for those opting for technology-based projects, such as the process engineering facility, a control and robotics facility and signal processing labs.

The work related to the MSc dissertation can often be carried out in parallel with, and in support of, on-going research. In the past, several graduates have carried on their MSc research to a PhD programme.

RESEARCH

Process integration and systems analysis for sustainability of resources and energy efficiency are carried out within our well-established Centre for Process and Information Systems Engineering (PRISE).

CAREER PROSPECTS

Engineers and scientists are increasingly expected to have skills in information systems engineering and decision support systems alongside their main technical and/or scientific expertise.

Graduates of these programmes will be well prepared to help technology-intensive organisations make important decisions in respect of vast amounts of information, by adopting, combining, implementing and executing the right technologies.

EDUCATIONAL AIMS OF THE PROGRAMME

The primary aims are achieved through a balanced, multi-disciplinary curriculum with a core of information systems engineering modules and decision-making and process systems engineering modules as well as a flexible element by way of elective modules that permit students to pursue an element of specialisation relevant to their backgrounds, interests and/or career aspirations.

An integrated approach is taken so as to provide a coherent view that explores the interrelationships between the various components of the programme.

The programme draws on the stimulus of recent research activities in the Faculty of Engineering and Physical Sciences. The programme provides the students with the basis for developing their own approach to learning and personal development.

PROGRAMME LEARNING OUTCOMES

The programme provides opportunities for students to develop and demonstrate knowledge and understanding, skills, qualities and other attributes in the following areas:

Knowledge and understanding
-The sources, technologies, systems, performance, and applications in information and process engineering
-Approaches to the assessment of information and process technologies
-Decision making in complex systems
-Optimisation and operations research
-Technical systems modelling
-Databases and data protection
-Representation of design processes
-Systematic approaches to observing organisational data security processes
-Understanding research issues
-Literature studies and research planning
-Experimental planning
-Communication of research outcomes
-Design of decision-support systems
-Development of databases, ontologies and agent-based architectures
-Information technology and security
-Process modelling and simulation

Intellectual / cognitive skills
-Select, define and focus upon an issue at an appropriate level
-Collect and digest knowledge and information selectively and independently to support a particular scientific or engineering enquiry
-Develop and apply relevant and sound methodologies for analysing the issue, developing solutions, recommendations and logical conclusions, and for evaluating the results of own or other’s work

Professional practical skills
-Assess the available information and process and their interaction
-Design and select appropriate collection and storage, and optimise and evaluate system design
-Apply generic systems engineering methods such as conceptual design and optimization to facilitate the assessment and development of information, information security and process technologies and systems

Key / transferable skills
-Preparation and delivery of communication and presentation
-Report and essay writing
-Use of general and professional computing tools
-Collaborative working with team members
-Organizing and planning of work
-Research into new areas, particularly in the aspect of literature review and skills acquisition

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
Our Masters in Information Systems addresses recent advances in IT, the internet, web technologies, and business applications, to explore how information systems can increase productivity, improve decision-making and lead to a significant competitive advantage. Read more
Our Masters in Information Systems addresses recent advances in IT, the internet, web technologies, and business applications, to explore how information systems can increase productivity, improve decision-making and lead to a significant competitive advantage.

PROGRAMME OVERVIEW

This programme aims to prepare students for a successful career in the IT sector, even if they do not have a prior degree in computer science. It enables students who have studied computer science previously to expand their knowledge and acquire further skills across a broader range of computer science topics.

Taught modules address mobile and cloud computing, big data and database systems, and the importance of information security, in relation to the foundational information systems principles.

This programme will equip you with professional skills that will allow you to work as an IT consultant/manager, system architect/analyst, or software developer in any industry field that heavily relies on software and information technology.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Dissertation
-Information Systems Development
-HTML5 and CSS3 for Mobile Applications
-Information Security Management
-Information and Network Security
-Practical Business Analytics
-Database Systems
-Project Management and Business Strategy
-Cloud Computing
-Information Security for Business and Government

EDUCATIONAL AIMS OF THE PROGRAMME

The aims of the programme are to:
-Prepare students for a range of computing related careers
-Enable students to understand, design and apply information systems and software development technologies
-Enable students to develop interest and basic skills for doing research in computer science
-Enable students to realise their full potential for learning and communication
-Enable students to appreciate rapid innovation and creativity in computer science

PROGRAMME LEARNING OUTCOMES

The programme provides opportunities for students to develop and demonstrate knowledge and understanding, skills, qualities and other attributes in the following areas:

Knowledge and understanding
-The principles of information systems and software development
-The principles and applications of contents technologies
-The practice of information systems and software development
-The professional issues involved in the exploitation of computing
-The areas of emergent and innovative computing technologies
-The key research issues in information and software systems

Intellectual / cognitive skills
-Understand and articulate the requirements of the users of software systems / applications
-Succinctly present, to a range of audience, knowledge relevant to the building, testing and deployment of a system
-Research and develop solutions through the application of systems analysis / software engineering methods

Professional practical skills
-Specify, design and develop software systems and applications
-Critically evaluate software systems and tools
-Work as a member of a development team
-Communicate with potential and actual users and to understand their needs
-Retrieve Information
-Analyse data and present information in appropriate ways
-Plan, research, manage and implement a major project

Key / transferable skills
-Research and information retrieval skills
-Numeracy in both understanding and presenting cases involving a quantitative dimension
-Time management and organisational skills
-Self-learning skills
-Effective use of specialist IT facilities
-Continuing professional development

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
This course builds upon typical computing courses available at undergraduate level and develops new knowledge and skills in areas critical for the successful introduction of information systems into business enterprises and organisations. Read more
This course builds upon typical computing courses available at undergraduate level and develops new knowledge and skills in areas critical for the successful introduction of information systems into business enterprises and organisations.

Information systems (IS) today are large, complex, varied in form and distributed, serving different types of people who use a variety of devices to access information. Specialists who recognise diverse business needs, and have a systematic approach to understanding the impact of technology on organisations, are essential to the success of any IS/IT strategy. Equal in importance to the architectures of systems and the supporting technologies, is the management and delivery of content, whether in the form of data, documents, images and sound.

Increasingly, the fundamental systems comprise digital architectures and networks which then embody and enable the distribution of digital content. Developed information systems are in reality socio-technical systems incorporating people, technologies and content. The information systems specialist becomes a more broadly based information professional as they extend their range and scope of operations towards the end users and their environments. Providing services to users and people at large and ensuring information resources deliver value is equally a part of the wider world of information systems.

Course detail

The course also provides a route for people with other backgrounds and experience to engage with the world of information systems. It helps you gain a full understanding of how information systems are designed and constructed, and of the impact of technology and its integration into an organisation.

It will also give you the skills you need to work effectively in a business-consulting environment, and provide a solid basis for research.

Modules

• Enterprise Architecture
• Knowledge Management
• Consultancy and Technical Innovation
• Information Systems Project Management
• UML Component Modelling
• Advanced Rich Media (optional)
• Data Architecture (optional)
• Security Management (optional)
• HCI for Information Systems (optional)
• Mobile Applications Development (optional)
• Research Methods
• Dissertation.

Format

Diverse methods are used to explore all aspects of the field. A strong supportive culture exists amongst the course tutors which enables students to achieve their potential.

Assessment

Course assessed work is a significant part of the total assessment. There is practical work, report writing, critical academic writing and the skills and knowledge gained in these contribute to a capacity to deliver a high quality dissertation.

There are a number of end of module exams. Course tutors provide appropriate support throughout the module to ensure candidates are well prepared.

Career and study progression

The course aims to provide routes into a number of career options and positions. There are good opportunities for employment in the core IS and ICT functions at the development and service levels. Employers require information officers, librarians, information service staff, content and intelligence gatherers and analysts, researchers, editors, searchers and intermediaries, advice and assistance workers, data managers, management information systems staff, as well as multimedia content workers, mapping specialists and cartographers, marketing research, public relations and communication staff. All these wider information professional positions are grounded in the fundamental core the discipline of information systems and the broader computing and ICT environment.

Graduates have a good record of achieving employment and progressing in professional information work especially in the voluntary and private sector as well as in the public sector.

Outstanding graduates have gone on to further study at the level of MPhil and PhD at UWL and at other institutions. We actively encourage students with potential for research to make their interest known early on in their course.

How to apply

Click the following link for information on how to apply to this course: http://www.uwl.ac.uk/students/postgraduate/how-apply

Scholarships and bursaries

Information about scholarships and bursaries can be found here: http://www.uwl.ac.uk/students/postgraduate/scholarships-and-bursaries

Read less
Information systems (IS) today are large, complex, varied in form and distributed, serving different types of people who use a variety of devices to access information. Read more
Information systems (IS) today are large, complex, varied in form and distributed, serving different types of people who use a variety of devices to access information. Specialists who recognise diverse business needs, and have a systematic approach to understanding the impact of technology on organisations, are essential to the success of any IS/IT strategy. Equal in importance to the architectures of systems and the supporting technologies, is the management and delivery of content, whether in the form of data, documents, images and sound.

Increasingly, the fundamental systems comprise digital architectures and networks which then embody and enable the distribution of digital content. Developed information systems are in reality socio-technical systems incorporating people, technologies and content. The information systems specialist becomes a more broadly based information professional as they extend their range and scope of operations towards the end users and their environments. Providing services to users and people at large and ensuring information resources deliver value is equally a part of the wider world of information systems.

Course detail

This course builds on typical undergraduate computing courses studied at level 4 and 5 or equivalent ( such as HND) by offering a level 6 entry route 'integrated' to a level 7 Masters course.

The two year combination provides a route to develop new knowledge and skills in areas critical to the introduction and success of modern information systems for enterprises. The course also provides a route for people with other backgrounds and experience to engage with the world of information systems. It helps you gain a full understanding of how information systems are designed and constructed, and of the impact of technology and its integration into an organisation. It will also give you the skills you need to work effectively in a business-consulting environment, and provide a solid basis for research.

To qualify for the award of MSc Information Systems (Integrated), candidates on the integrated pathway must study five level 6 modules consisting of 20 credits each and two 10 credits each, and six level 7 modules consisting of 20 credits and a 60 credits dissertation module.

Modules

Year One (Level 6)
• Strategies and Systems or Advanced Business Systems
• Development Methodologies
• Computer Security
• Advanced Databases
• Project Preparation
• Project
• IT Industry
Year Two (Level 7)
• Project Management
• Consultancy and Technological Innovation
• Enterprise Architecture
• Knowledge Management
• Learning and Professional Development
• Employability Skills and Employment
• HCI for Information Systems (optional)
• Mobile Applications Development ( optional)
• Data Architectures ( optional)
• UML Component Modelling(optional)
• Security Management ( optional)
• Research Methods
• Dissertation

Note: students select one option from the list offered

Format

Teaching consists of lectures, seminars and laboratory work to provide a basis for the intensive individual study you need to undertake to maximize your investment of time and potential outcomes from taking the course.

Assessment

Course assessed work is a significant part of the total assessment. There is practical work, report writing, critical academic writing and the skills and knowledge gained in these contribute to a capacity to deliver a high quality dissertation.

There are a number of end of module exams. Course tutors provide appropriate support throughout the module to ensure candidates are well prepared.

Career and study progression

The course aims to provide routes into a number of careers:
- information officers
- librarians, information service staff
- content and intelligence gatherers
- analysts
- researchers
- editors
- searchers and intermediaries
- advice and assistance workers
- data managers
- management information systems staff
- multimedia content workers
- mapping specialists and cartographers
- marketing research
- public relations and communication staff.

Outstanding graduates have gone on to further study at the level of MPhil and PhD at UWL and at other institutions. We actively encourage students with potential for research to make their interest known early on in their course.

How to apply

Click the following link for information on how to apply to this course: http://www.uwl.ac.uk/students/postgraduate/how-apply

Scholarships and bursaries

Information about scholarships and bursaries can be found here: http://www.uwl.ac.uk/students/postgraduate/scholarships-and-bursaries

Read less
Organisations operate within increasingly unpredictable, competitive, constrained and demanding environments. Information is crucial to their success as it is required for decision making at all levels. Read more

Course Description

Organisations operate within increasingly unpredictable, competitive, constrained and demanding environments. Information is crucial to their success as it is required for decision making at all levels. Consequently there is a need to understand the strategic importance of information and develop agile, effective and secure ways to exploit it to its full potential. To do this, effective information capability management must be developed throughout the organisation so that the right information is available to the right people at the right time in an effective, efficient and secure manner.

An appropriate infrastructure is required to enable effective information capability management to address strategic business needs. This is dependent on joined-up systems of processes, technology and appropriately skilled, competent and motivated people focused on delivering clearly understood business benefit. The Information Capability Management (ICM) MSc has been developed to address these important issues.

Overview

Skilled professionals are needed to enable organisations to realise the strategic benefits that successfully exploiting information can provide. Success in business of all types and in all sectors, both public and private, is dependant on:

•Understanding the value of information as a strategic asset
•Developing agile, effective and efficient systems that make this information available.
•Countering cyber threats with appropriate cyber security.

The internationally recognised Information Capability Management course successfully supports the development of these professionals. Students from Government departments, industry and other organisations within the UK and internationally come together to study and discuss issues and develop skills that will enable solutions now and in the future.

Key goals of the course are to provide students with postgraduate level education in order to:

•Develop in individuals an awareness of the management, user and supplier communities
•Recognise the stakeholder roles, needs and expectations within these communities
•Enable effective communication and a shared understanding between these stakeholders in order to meet capability objectives
•Master the principles and practice that underlie the delivery of effective, efficient and secure systems in various business spaces that exploit information in order to provide strategic benefit

Start date: Full Time: September / Part Time: January

Duration: Full-time MSc - one year, Part-time MSc - up to three years, Full-time PgCert - one year, Part-time PgCert - two years, Full-time PgDip - one year, Part-time PgDip - two years

Course overview

MSc students must complete a taught phase consisting of twelve modules, followed by an individual dissertation in a relevant topic.

PgDip students are required to undertake the same taught phase as the MSc, but without the individual dissertation.

PgCert students must complete the core module (Foundations of Information Systems) together with five other modules.

Modules

Qualifications achieved by completing:
PgCert: Foundations of Information Systems and any five other modules
PgDip: All modules
MSc: All modules and the dissertation.

Core:
- Cyber Security and Information Assurance
- Dissertation
- Emerging Technology Monitoring
- Foundations of Information Systems
- Information Storage and Retrieval
- Methods and Tools for Information Systems Development
- Organisation Development
- Professional Issues
- Programme and Project Management for Information Systems
- Software Engineering (IS)
- Strategic Application of Information Systems
- Systems Architecture
- Data-led Decision Support
- Data Modelling, Storage and Management

Individual Project

The Individual Project is the opportunity for a student to utilise and demonstrate their understanding of the taught phase of the course by applying their learning to a real world problem. It is also an opportunity to develop skills and achieve a greater level of understanding in a specific area or areas of relevance to the course. Students are allocated a supervisor and have access to subject matter experts to support them in the project phase.

Assessment

Spread throughout the programme and includes coursework, group presentations and examinations during the taught phase and for the MSc a research based dissertation.

Career opportunities

Takes you on to further senior career opportunities and to become one of the next generation of senior professionals delivering business benefit through exploitation of information with skills in appropriate areas including business analysis, strategy development and implementation, information assurance, cyber security, organisational development and strategic application of information systems.

For further information

On this course, please visit our course webpage http://www.cranfield.ac.uk/Courses/Masters/Information-Capability-Management

Read less
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments. Read more
The course is designed for computing and non-computing graduates wanting to develop skills and experience in managing data securely in business environments.

It offers a broad overview of information management and security, as well as technical knowledge of networking and security.

It is ideal for those keen on a governance/compliance role, or for roles requiring you to take charge of data management.

Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/information-management-and-security#about

Course detail

• Study areas including: computer security, data modelling and management, emerging technologies, advanced security countermeasures, professional project management, networking administration and management, information security management and data governance and compliance
• Explore the career opportunities presented by the growth area of information security
• Develop your technical and managerial skills, with valuable experience of managing systems security strategy
• Gain valuable experience and industry links by working on projects for real businesses through our Academic into Business Computing (ABC) centre
• Benefit from a course which qualifies you roles including Information Architect, Data Modeller, Information Business Consultant, in Information Security and Network Management or go on to further study on an MSc by Research, MPhil or PhD.

Why choose this course?

The course is designed for those who want a broad overview of information management and security as well as technical knowledge of networking and security. The course is ideal for those who are looking to take up a governance/compliance role within an organisation, or for those who are looking to take charge of data management.

During the course you will gain skills in programming, computer security, data governance and compliance.

Modules

• Emerging Technologies
• Data Modelling and Management
• Professional Project Management
• Managing Information Systems Strategy and Security Risks
• Networking Administration and Management
• Data Governance and Compliance
• Computer and Network Security
• Ethical Hacking Tools and Techniques
• MSc project – Information Management and Security

Assessment

Throughout your course you will be exposed to a wide variety of assessment techniques including: written examinations, case studies, practical coursework assignments, problem worksheets, presentations and viva- voce (voice) examinations.

This will allow you to apply the knowledge and understanding you have gained during the learning phase, to a variety of challenging and complex practical situations.

Careers

You will gain valuable skills for a career within Information Management and Security as well as those relevant for the wider world of IT and business.

The unit ‘Professional Project Management’ requires you to work in a team to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

The final project fosters independent and autonomous study. You learn to take up the responsibility of conducting your project, typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
An increasing number of organisations store, manipulate and communicate valuable and confidential information electronically. However, a number of threats compromise the security of this information. Read more
An increasing number of organisations store, manipulate and communicate valuable and confidential information electronically. However, a number of threats compromise the security of this information.

The MSc Information and Network Security aims to produce computing specialists who are able to design and maintain secure information systems and networks.

Visit the website: http://www.rgu.ac.uk/computing/study-options/part-time-learning/information-and-network-security

Course detail

This course is designed to satisfy the demands of industry and IT providers for software developers and computing practitioners who:

• know the legal requirements of information security and are able to implement current information security standards;
• are proficient in the use of state-of-the-art principles, techniques, tools and methodologies for& the design, implementation and maintenance of secure information systems;
• are able to design and maintain secure computer networks;
• can safely recover an information system or network from a successful security attack.

Modules

- Computer Security
- Database Security
- System Programming and Security
- Network Management (CISCO CCNA)
- Network Security
- Web System Development
- Professional Development and Research Skills
- Project

Format

Throughout the course, content is complemented by practical work, allowing you to support your theoretical development by providing real-life simulation. You will be taught through a mixture of lectures, tutorials, labs and external speakers. You will also be supported through our online virtual learning environment where you can access a wide variety of resources and other support materials.

The course will include industry sessions.

The individual project provides an opportunity for applying specialist knowledge together with analytic, problem-solving, managerial and communication skills to a particular area of interest within the secure information systems and networks. Working with the full support and guidance of an allocated project supervisor, you will be given the opportunity to propose, plan, specify, develop, evaluate, and present a substantial project.

Placements and accreditations

Students who perform particularly well during their first semester of studies will be invited to apply for a 45-week internship.

Careers

The course prepares you for a career in information and network security. Job openings include: IT security engineer, information and data security analyst, network manager, IT security developer, IT risk and fraud specialist and e-business security analyst.

Aberdeen is home to many multinational oil and gas companies and associated suppliers such as mainstream software houses, IT providers to major oil-related companies, specialist software consultancies, and venture capital start-ups.

The university is involved in a number of commercial collaborations on a local, national and international scale with organisations such as BP, British Geological Survey, Wood Group PSN, Accenture, WIPRO and many Aberdeen-based software development companies.

The course also prepares students for research careers by providing the skills necessary of an effective researcher. Suitable MSc graduates may continue to PhD programmes within the school.

How to apply

To find out how to apply, use the following link: http://www.rgu.ac.uk/applyonline

Funding

For information on funding, including loans, scholarships and Disabled Students Allowance (DSA) please click the following link: http://www.rgu.ac.uk/future-students/finance-and-scholarships/financial-support/uk-students/postgraduate-students/postgraduate-students/

Read less
Typically information governance/security and law have been taught as distinct subjects in different discipline areas. Read more
Typically information governance/security and law have been taught as distinct subjects in different discipline areas. In recognition of the relationship that exists between information governance/information security and the protection of personal data this programme brings together these subjects in one multi-disciplinary qualification.

The Postgraduate Certificate in Data Protection Law and Information Governance is a distance learning course that has been specifically designed to meet the needs of professionals already working in data protection and/or information governance. You will study three modules. The first of these, the legal research module, will develop your ability to undertake legal research and to present your research findings appropriately. In the second module you will develop your understanding of information governance and security principles that underpin the management of an organisation’s information assets. The third module will focus upon data protection law and practice.

The programme will not only provide you with valuable knowledge of current law and proposed developments to the law and to the principles of information governance, it will also enhance your ability to advise upon both information governance and data protection. The research, writing and presentation skills you will develop will also be of use to you in your working environment. Unlike typical CPD type learning this programme will challenge you to undertake critical evaluation of the law and to consider the application of information governance and security to your own/a chosen organisation.

Learn From The Best

This programme is delivered jointly by academics within Northumbria Law School and the iSchool, in the Faculty of Engineering and Environment. Northumbria Law School is actively involved in research and consultancy in the field of data protection, information sharing, freedom of information and privacy law. The iSchool, which delivers the information governance and security module, is widely recognised for its innovative distance and work-based learning programmes in information and records management and for its related research.

This course is delivered by a team of solicitors and academics with extensive experience in data protection and information governance, who are actively researching the area. In addition our team also boast memberships to key professional bodies, in addition to editing industry publications such as the Records Management Journal.

Teaching And Assessment

This course is primarily delivered online to provide flexibility and the ability for you to study at times convenient to you. We believe, however, that opportunities to engage with your tutors and with fellow students are an important part of your learning experience. On two of the modules you will be offered the opportunity to meet your tutors and attend lectures or workshops at the University at an optional study day. All of the content will be available online should you not be able to attend. On the third module you will be encouraged to engage with your tutor and with fellow students via the module discussion board.

Module Overview
KC7046 - Information Governance and Security (Core, 20 Credits)
LW7002 - Data Protection (Core, 20 Credits)
LW7003 - Legal Research (Core, 20 Credits)

Each taught module is assessed via written assignment. On the legal research module you will work in a group with other postgraduate students to undertake the research, writing and review of that assignment. On the data protection module and the information governance module you will submit an individual written assignment at the end of each module. As part of the assessment process you will be expected to undertake a critical evaluation of the law, and to consider information governance and security in your own or another chosen organisation.

Learning Environment

Your course will be delivered online using the latest innovative software. Learning materials such as module handbooks, assessment information, lecture presentation slides, recorded lectures and electronic reading lists will be available via our highly accessible e-learning platform, Blackboard. You can also access student support and other key University systems through your personal account.

Research-Rich Learning

Research Rich learning (RRL) is embedded across the programme, reflecting the pervasive research culture of the law school. Your student journey commences with the Legal Research module. This module will help you to gain a clear awareness and understanding of appropriate legal research methods and legal sources and how to cite those sources. In your subsequent modules your tutors will expose you to a range of academic literature covering substantive data protection law and relevant information governance and data security frameworks and principles. You will also develop your legal research skills further as your tutors encourage you to discuss, evaluate and critically examine relevant principles and frameworks and as you undertake your own research in order to complete your module assignments.

Give Your Career An Edge

It is envisaged that most students who study this programme will already be employed within the data protection/information governance fields. It recognises that the introduction of a new data protection regulation will result in significant challenges for professionals working in the data protection field, and seeks to help you to develop the skills and knowledge which you will need to do your job professionally notwithstanding the changing legislation framework.

Your Future

This course provides academic recognition of your knowledge of data protection and information governance law and your ability to apply that knowledge to practice. It also provides a strong foundation for further study. Should you decide upon completion of the programme that you wish to further develop your knowledge of information rights law or information governance/security then Northumbria Law School and the Faculty of Engineering and Environment both offer masters programmes in these fields. This programme provides you with a stepping stone towards study a Masters in Law (an LLM). Successful completion of this programme exempts you from study of the first three modules on the Pg Dip/LLM in Information Rights Law and Practice.

What Does Britain Leaving The EU Mean For This Course?

We can confirm that we will not be changing the course in light of the Brexit decision. The focus in this course will be the current legal framework, and any likely reforms including the GDPR. There are several reasons why the course will not be changed at this particular point. Firstly there are no changes to the current legal framework on data protection or environmental information. This is well explained in a statement by the information commissioner's office https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/06/referendum-result-response/ and was reiterated by Baroness Neville-Rolfe, the Government Minister responsible for Data Protection, on 4 July. These statements also acknowledge that there is a need for reform in data protection and that would have to be seen in the context of European data protection laws. Although it is not clear what the exact relationship of the UK and EU will be in the future there is a recognition that there will be a need for equivalency of data protection law in the UK with other countries. The need for equivalency of the law is likely to be necessary whether the UK is part of the single market, or if it exits the European economic area, in order for EU countries to send data to us as part of the 8th principle (See Schedule 1 of the Data Protection Act 1998). As such the GDPR still has relevance in our understanding of what would be required to achieve equivalent protection and what likely reforms on data protection may be considered in the UK. From an educational perspective the examination of reforms such as the GDPR provide a useful mechanism to critique current data protection laws, allowing for the discussion of strengths and weaknesses, even if all those reforms are not ultimately adopted. We will of course keep the position under review, as we do with all our teaching areas in order to ensure that learning material reflects both the current law and likely changes to that law.

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

Degree information

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits. The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules
-Computer Security I
-Computer Security II
-Introduction to Cryptography
-Research in Information Security

Optional modules - students choose four of the following:
-Distributed Systems and Security
-People and Security
-Applied Cryptography
-Information Security Management
-Language Based Security
-Philosophy, Politics and Economics of Security and Privacy
-Malware
-Cryptanalysis
-Cybercrime
-Privacy Enhancing Technologies
-Relevant options from other MSc degree programmes

Dissertation/report
All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning
The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Careers

UCL graduates are keenly sought by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Top career destinations for this degree:
-Risk IT RTB Support Administrator, Lloyds Banking Group
-Technical Analyst, The Royal Bank of Scotland (RBS)
-IT Lead Developer, MOVE Guides
-Software Developer, Oracle
-Cisco Certified Network Associate (CCNA) Routing and Switching, Cisco

Employability
Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts occur through the ACE-CS guest lecture series integrated into the course.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research, and was one of the top-rated departments in the UK government's recent Research Excellence Framework.

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. Students from the degree won the first UK Cyber Security Challenge in code cracking in 2013.

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Read less
This course enables graduates in Business or Information Systems to further their knowledge and career opportunities in business-led information systems. Read more
This course enables graduates in Business or Information Systems to further their knowledge and career opportunities in business-led information systems.

An interdisciplinary course, it provides technical knowledge of applied programming, computer security, financial and business data analysis, strategic management of information systems and project management.

Intermediate qualifications available:

• Postgraduate certificate – 60 credits at Masters level
• Postgraduate diploma – 120 credits at Masters level

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/business-information-systems

Course detail

• Study on an interdisciplinary course that combines information technology and business, with areas including applied programming, computer security, information management and security, financial analysis, data modelling and management, professional project management, business data analysis and data compliance and governance
• Explore state-of-the-art and emerging information system solutions
• Develop your analytical, evaluative and problem-solving skills, enabling you to propose, critique and justify potential information system solutions to business-oriented problems
• Gain a thorough understanding of the roles information systems play in the business environment as well as related ethical and legal considerations
• Benefit from valuable experience through our Academic into Business Computing (ABC) centre, opening up new career opportunities such as Business Analyst, Systems Analyst, Project Manager, IT consultant or IT/Business Lecturer.

Modules

• Applied Programming
• Data Modelling and Management
• Professional Project Management
• Managing Information Systems Strategy and Security Risks
• Emerging Technologies
• Computer and Network Security
• Financial Analysis
• Business Data Analysis
• MSc Project - Business Information Systems

Assessment

We employ a variety of assessment methods including written examinations, practical coursework assignments, problem worksheets, presentations and viva-voce (oral) examinations. This aims to ensure you are able to apply the knowledge gained to practical situations.

Careers

You will gain valuable skills for a career within Business Information Systems as well as those relevant for a much wider range of applications such as information analysis or decision support systems.

The unit ‘Professional Project Management’ requires you to work in a team to apply current project management and ethics methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control. You will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

The final project fosters independent and autonomous study. You will learn to take up the responsibility of conducting your project, typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Read less
A world renowned programme; the first of its kind in the world, this Information Security course looks at both technical and management aspects of cyber security and teaches you about technologies including cryptography, computer security, fraud detection, and digital forensics. Read more

Gain a prestigious MSc in Information Security

by distance learning

A world renowned programme; the first of its kind in the world, this Information Security course looks at both technical and management aspects of cyber security and teaches you about technologies including cryptography, computer security, fraud detection, and digital forensics.

- You will gain cyber security skills for senior level careers by focusing on principles and issues, and you will learn how information security can best be managed.

- You will benefit from Royal Holloway’s wealth of research, expertise and practical consulting experience, which ensures that the degree is up to date and commercially relevant.

- You can study most modules on a stand alone basis and earn CPE credits. Students come from a variety of backgrounds, ranging from new graduates through to senior security managers in blue chip enterprises seeking a formal qualification in Information Security.

Hear from a graduate

“Achieving the Masters has significantly benefited my career in Information Security; previously, I provided specific technical advice to customers, but now, with the breadth and depth of knowledge gained during the MSc, I also deliver security strategy consulting to senior executives.” Paul Schwarzenberger, MSc Information Security

Prestige

The programme has been developed by academics within the Information Security Group (ISG) [external link] at Royal Holloway, University of London, one of the foremost academic security groups in the world.

ISG awarded Centre of Excellence status - Royal Holloway, University of London has been recognised for its world class research in the field of cyber security by UK intelligence agencies GCHQ.

The ISG is at the cutting edge of research into the design and evaluation of smart cards, electronic commerce, security management, mobile telecommunications security, and the integration of security techniques into specific applications. The ISG was awarded a Queen's Anniversary Prize in 1998 in recognition of it providing "a unique national resource for the training of information security specialists".

"A pioneering course that continues to provide students with the essential knowledge and understanding of information security, with many graduates going on to fill senior roles." Malcolm Marshall, Partner, KPMG.

Career progression

Graduates of the programme can be found in many organisations, ranging from large financial institutions to technology and research- oriented organisations, as well as security specialists. The MSc is also a foundation for further postgraduate research.

Continuing Professional Education (CPE)

You can study any of the compulsory core modules, plus the optional module 'Digital forensics', on a stand-alone basis and earn CPE credits. On successful completion of each module you will receive a University of London certificate.

Your time commitment

This programme is offered online, enabling you to fit your studies around work and family commitments. To complete in the minimum study period you will need to study 24 hours per week during the academic session (September-April). To complete the degree in four years, which is normal for those in full time employment, you will need to study about 12 hours per week over the academic session.

Excellent support

Fully supported by a Virtual Learning Environment, you will take part in online tutor-supported seminars and discussions; a virtual student cafe allows you to interact and network with other students.

Contact us

If you have any questions, please contact our Student Advice Centre:
http://www.londoninternational.ac.uk/contact-us

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less

Show 10 15 30 per page


Share this page:

Cookie Policy    X