• Birmingham City University Featured Masters Courses
  • Ulster University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Bristol Featured Masters Courses
Cranfield University Featured Masters Courses
Imperial College London Featured Masters Courses
Staffordshire University Featured Masters Courses
Cass Business School Featured Masters Courses
University of Dundee Featured Masters Courses
"internet" AND "security"…×
0 miles

Masters Degrees (Internet Security)

We have 267 Masters Degrees (Internet Security)

  • "internet" AND "security" ×
  • clear all
Showing 1 to 15 of 267
Order by 
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:

  • EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
  • Specialist input from guest lecturers
  • Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
  • Specialist technicians to ensure you can get the most out of these technologies.

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the full course document.

Core modules

Digital Forensics pathway

Cyber Security Pathway

Professional accreditation

This programme is accredited by BCS, The Chartered Institute for IT, for fully meeting the further learning educational requirement for Chartered IT Professional (CITP) status and for partially satisfying the underpinning knowledge requirements set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC) and the Science Council for Chartered or Incorporated Engineer (CEng or IEng) status. Note that there are additional requirements, including work experience, to achieve full CITP, CEng, or IEng status. Graduates of this accredited degree will also be eligible for professional membership of BCS (MBCS).

The BCS accreditation is an indicator of the programme’s quality to students and employers; it is also an important benchmark of the programme’s standard in providing high quality computing education, and commitment to developing future IT professionals that have the potential to achieve Chartered status. The programme is also likely to be recognised by other countries that are signatories to international accords.

Career path

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;


Read less
This postgraduate qualification allows you to study aspects of cyber security in depth as well as developing your research and analytical skills – whilst undertaking your own individual thesis project investigating an area of particular interest. Read more
This postgraduate qualification allows you to study aspects of cyber security in depth as well as developing your research and analytical skills – whilst undertaking your own individual thesis project investigating an area of particular interest. You will be able to utilise our state of the art facilities – ensuring you are exposed to cutting edge technology and are able to pursue your specialist interests.

Course content

Today’s need for Internet security products and services, has led to a demand for people with relevant knowledge and expertise to design, implement and manage secure Internet applications. The MSc in Internet Technology and Security is designed to equip you with the necessary knowledge and skills whilst providing the opportunity to become specialised in a field that is highly sought after.

While primarily having a technological focus, this pathway also provides an awareness of the business context, encourages development of interpersonal skills which can make a vital contribution to problem solving in business.

All modules are 20 credit modules except for the dissertation which is a 60 credit module. An MSc is awarded on successful completion of 180 credits (six 20 credit modules and one 60 credit dissertation module). Not all the designated modules may run or be offered in Stage two due to staff availability or low numbers of students choosing a module.

Course modules (16/17)

-Databases
-Dissertation
-Internet Programming
-Internet Security
-Modern Computer Architecture
-Visual Object Software
-Computer Networks
-Distributed Systems
-Formal Methods for Software Construction
-Immersive Technologies
-Intelligent Systems
-Media Techniques
-Mobile Device Software Development
-Modelling for Serious Games
-Software Engineering
-Specification Analysis and Design

Methods of Learning

Theoretical lectures and seminars are reinforced by practical examples and case studies and using state of the art computer simulation tools and laboratory facilities.

Assessments

Assessment is by coursework, oral presentations, group work, practical reports, critical reviews and all students undertake a substantial independent research dissertation.

Facilities and Special Features

You will have access to approximately 150 PC and Linux workstation computers housed in six bespoke computer laboratories, all with digital projection facilities, and maintained by two technicians. These facilities were brand new, state of the art hardware and furniture for the start of the calendar year 2010 in the newly refurbished Newton building.

Careers

Recent studies show a continuing demand for well trained computing personnel. Successful graduates will have a whole range of possible employment paths in front of them within the broad IT/computing domain.

Read less
On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. Read more

On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. In the Cyber Security course, Swansea Computer Science takes a holistic and interdisciplinary approach, bringing together modules on diverse topics such as penetration testing, formal modelling, information security management, cryptography and AI in order to equip our students with a suitable mindset for a career in cyber security. The department's cyber security lab provides the perfect backdrop for exploring the security landscape, allowing Cyber Security students and staff to carry out experiments in network security, mobile security, and to explore threats and defence mechanisms in the context of the Internet of Things.

Key Features of the MSc in Cyber Security

  • We are top in the UK for career prospects [Guardian University Guide 2018]
  • 5th in the UK overall [Guardian University Guide 2018]
  • 7th  in the UK for student satisfaction with 98% [National Student Survey 2016]
  • We are in the UK Top 10 for teaching quality [Times & Sunday Times University Guide 2017]
  • 12th in the UK overall and Top in Wales [Times & Sunday Times University Guide 2017]
  • 91.9% in graduate employment or further study six months after leaving University [DHLE Survey 2016]
  • UK TOP 20 for Research Excellence [Research Excellence Framework 2014]
  • Our Project Fair allows students to present their work to local industry
  • Strong links with industry
  • £31m Computational Foundry for computer and mathematical sciences will provide the most up-to-date and high quality teaching facilities featuring world-leading experimental set-ups, devices and prototypes to accelerate innovation and ensure students will be ready for exciting and successful careers. (From September 2018)
  • Top University in Wales [Times & Sunday Times University Guide 2017]

Our increasingly connected world presents continual new and serious security threats. From privacy violations (hacking, monitoring communications, leaking sensitive data, stealing and publishing private information) through to the drugs trade, sex trafficking and terrorism, Computer Science can provide the techniques required for mitigating such risks, in order to provide secure, reliable and trustworthy systems.

Taught component: The MSc in Cyber Security offers a range of modules, taught by internationally renowned researchers and covering topics such as: Cryptography and Network Security, Penetration Testing, Information Security Management, Embedded Systems Modelling and Verification Techniques, Web Application Development, Blockchain, Cryptocurrencies and Smart Contracts, Advanced Topics: AI and Cyber Security Invention and Innovation in Computing.

Dissertation component: A further four months duration is spent undertaking a substantial research project (60 credits), which will involve using and exploring cutting edge techniques for specifying, developing, verifying and accessing systems against security criteria. Cyber Security Students will benefit from our broad range of industrial partners and internationally leading research expertise.

Possible Future Pathways: Cyber Threat Analyst - Penetration Tester PhD Researcher - Data Security Analyst Secure Web Developer - Verification Engineer.

Modules

Modules on the Cyber Security course may include:

  • Information Security Management
  • Computer Science Project Research Methods
  • Critical Systems
  • IT-Security: Cryptography and Network Security
  • Security Vulnerabilities and Penetration Testing
  • Invention and Innovation in Computing
  • Blockchain, Cryptocurrencies and Smart Contracts
  • Advanced Topics: Artificial Intelligence and Cyber Security
  • Web Application Development
  • Embedded System Design

Facilities for MSc in Cyber Security

The Department is well equipped for teaching, and is continually upgrading its laboratories to ensure equipment is up-to-date – equipment is never more than three years old, and rarely more than two. Currently, students use three fully networked laboratories: one, running Windows; another running Linux; and a project laboratory, containing specialised equipment. These laboratories support a wide range of software, including the programming languages Java, C# and the .net framework, C, C++, Haskell and Prolog among many; integrated programme development environments such as Visual Studio and Netbeans; the widely-used Microsoft Office package; web access tools; and many special purpose software tools including graphical rendering and image manipulation tools; expert system production tools; concurrent system modelling tools; World Wide Web authoring tools; and databases.

As part of our expansion, we are building the Computational Foundry on our Bay Campus for computer and mathematical sciences. As a student on the MSc in Cyber Security, you will study at the Bay Campus in the new Computational Foundry, a dedicated £32 million building for computational studies, providing the latest labs, resources and ecosystems for world leading, interdisciplinary research.

Careers for MSc in Cyber Security Graduates

All Computer Science courses including the MSc in Cyber Security will provide you the transferable skills and knowledge to help you take advantage of the excellent employment and career development prospects in an ever growing and changing computing and ICT industry.

94% of our Postgraduate Taught Graduates were in professional level work or study [DLHE 14/15].

Jobs include:

  • Software Engineer: Motorola Solutions
  • Change Coordinator: Logica
  • Software Developer/Engineer: NS Technology
  • Workflow Developer: Irwin Mitchell
  • IT Developer: Crimsan Consultants
  • Consultant: Crimsan Consultants
  • Programmer: Evil Twin Artworks
  • Web Developer & Web Support: VSI Thinking
  • Software Developer: Wireless Innovations
  • Associate Business Application Analyst: CDC Software
  • Software Developer: OpenBet Technologies
  • Technical Support Consultant: Alterian
  • Programming: Rock It
  • Software Developer: BMJ Group


Read less
The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. Read more

The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. The focus within this programme on the principles, technologies and practices of cyber security helps you to gain the appropriate skills for future PhD studies and research careers as well as to become competent practitioners. The programme comprises particular developments in security with a firm base in academic research and also offers the opportunity for you to study selected topics in advanced computer science.

Included in the programme is the opportunity to enhance industry relevant skills with study in ISO27001 Lead Implementer and Ethical Hacking. These skill areas were highlighted by past alumni and industry practitioners for inclusion in the programme. Therefore, you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking.

This programme meets a continued growing demand for specialists in this area by offering a way for individuals in current employment with relevant industry experience as well as recent graduates to study and enhance and develop their skills. The MSc Cyber Security programme will therefore draw graduates wishing to enhance their undergraduate studies in computing with advanced study of security to equip them for senior positions with responsibility for the IT technical and management based security of an organisation. In addition, the programme encourages those with relevant industry skills to specialise in cyber security or refine and develop their existing expertise. 

Professional accreditation

This course is accredited by the British Computer Society.

It is also provisionally certified by GCHQ.

Our ISO 27001 Lead Auditor Training is Certified by the Professional Evaluation and Certification Board (PECB).

What you will study

The MSc programme in Cyber Security is intended to respond to current academic challenges provided by increasing reliance on computers and networks for core business activity and to meet commercial needs for employees who are able.

Core Modules

Learning and assessment

The programme includes innovative and active learning methods. Throughout your programme, we make use of case studies so that you can apply your theoretical understanding to real-world issues. In this way, abstract concepts are brought to life through practical activities. We also use methods associated with the “flipped classroom” where content is outside the classroom leaving more time and space for activities and active learning within tutorial and lecture sessions.

Career prospects

The course is designed to equip graduates for senior positions with responsibility for the IT-based security of an organisation.

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.



Read less
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually. Read more
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually.

In addition, surveys from PricewaterhouseCoopers and the Department for Business, Innovation and Skills show a significant shortage of information security professionals and a lack of security awareness, especially in small and medium-sized enterprises (SMEs), indicating an urgent need for student education, the provision of up-to-date educational resources, industry training and the embedding of good practice.

This MSc in Cyber Security addresses these requirements by increasing relevant knowledge and skills in line with the UK Government’s National Cyber Security Strategy, while also addressing the national skills shortage in information security.

You will develop an understanding of current issues in information security and cyber security, as well as gain in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource and for analysing and controlling security risks.

What will I study?

You will study cyber security from the perspectives of technical aspects of network security, penetration testing and computer forensics, while also adopting a systematic approach to information security management.

The programme will cover topics including information security management; information risk management; implementing secure systems; information assurance methodologies and testing; operational security management; incident management; audit, assurance and review; and business continuity management.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars, one-to-one tutorials, and technology-enhanced learning (such as via a virtual learning environment). Classes are highly interactive, with the practical application of concepts being a key factor, as well as case studies drawn from real-life.

How will I be assessed?

We will assess your vocational capability, academic critical thinking and intellectual development throughout the programme. Coursework, case studies, exams and problem-solving exercises may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academic staff who are research-active and fully engaged with the wider business and academic community.

What are my career prospects?

The MSc has been designed to meet the Government Communications Headquarters (GCHQ) certification criteria for Masters degrees, as well as satisfying the professional body knowledge requirements of the Information Systems Audit and Control Association (ISACA) and the Information Systems Security Certification Consortium (ISC)².

The programme also aligns with international standards (ISO27001/2) for information security management systems and is informed by the PAS 555:2013 Cyber Security Risk Governance and Management Specification.

On successful completion of the course, you will be equipped with the necessary skills and expertise to work as a cyber security professional, or information security professional, in roles such as an information security engineer/manager, ISO27001 auditor, computer forensic analyst, cyber security specialist or security engineer.

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more

This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Through our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Full time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Part time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Year 2

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Careers

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.



Read less
Learn how to identify new and existing cyber threats and determine methods and processes to minimise attacks. Gain skills in a real-life business context, by cracking passwords and wireless networks and testing web applications for vulnerabilities and security breaches. Read more
Learn how to identify new and existing cyber threats and determine methods and processes to minimise attacks. Gain skills in a real-life business context, by cracking passwords and wireless networks and testing web applications for vulnerabilities and security breaches.

Cyber security is a priority for governments and organisations throughout the world. We’ll work together to explore how organisations and individuals can take action to protect themselves online from cyber-attacks.

We’ll begin by understanding networks and operating systems, how they work and the strengths and weaknesses of them. You’ll then think like a hacker, working from the inside out, as you recognise the threats to an organisation and its resources, and learn to implement and test secure systems.

Focusing on the strategic deployment and implementation of cyber security within an organisation, you’ll cover all aspects of cyber security including network security, computer security and information security.

You’ll apply your knowledge and skills hands-on in a real-life context, in our specialised lab, which is already equipped with tools such as Kali LInux, Wireshark, Nmap and Burp Suite. You’ll write your own Metasploit modules, automate social-engineering attacks, bypass antivirus software and turn access to one machine as you take total control of the enterprise.

You’ll gain skills in communicating information to higher levels of the corporation’s managers, giving you confidence to present your invaluable problem solving solutions and strategic security planning in any organisation.

We know there’s a worldwide shortage of skills graduates in cyber security, so you’ll be ahead of the game as you further your career and make a real impact on a society that is increasingly dependent on the internet and IT technology.

See the website http://www.anglia.ac.uk/study/postgraduate/cyber-security

Careers

The 2015 Global Information Security Workforce Study predicts that the global cyber security workforce shortage will reach 1.5 million by 2020, as demand outstrips supply. This means that there hasn't been a better time to join the cyber security sector.

Computer security is a fast developing area and your skills in computer, network and information security could see you working closely with lawyers, government, commercial organisations, the education sector and investigation agencies, as well as the finance and e-commerce sectors and national security organisations.

You’re also in the perfect position to continue your academic career and move up to our research degree Computer Science PhD.

Modules & assessment

Computer Networks
Operating Systems and Virtualisation
Secure Systems
Research Methods
Advanced Network Security Principles
Penetration Testing
Major Project

Assessment

We’ll asses your knowledge and understanding through a case study in which you’ll design, implement and test the security strategy of an organisation. You’ll also complete in-class tests, written assignments, software projects and presentations as part of the course.

Your faculty

The Faculty of Science & Technology is one of the largest of five faculties at Anglia Ruskin University. Whether you choose to study with us full- or part-time, on campus or at a distance, there’s an option whatever your level – from a foundation degree, to a BSc, MSc, PhD or professional doctorate.

Whichever course you pick, you’ll gain the theory and practical skills needed to progress with confidence. Join us and you could find yourself learning in the very latest laboratories or on field trips or work placements with well-known and respected companies. You may even have the opportunity to study abroad.

Everything we do in the faculty has a singular purpose: to provide a world-class environment to create, share and advance knowledge in science and technology fields. This is key to all of our futures.

Read less
Cyber security is a topic of growing importance, as ICT affects ever more aspects of our daily lives Businesses and government rely on ICT to an ever larger degree. Read more

Cyber security is a topic of growing importance, as ICT affects ever more aspects of our daily lives Businesses and government rely on ICT to an ever larger degree. Both assessing the security of existing ICT solutions and developing more secure solutions for the future pose major scientific and societal challenges.

This Master specialisation covers a broad range of topics that is important for computer security. This includes topics in computer science (software, computer networks, and hardware, esp. smart-cards and RFID), but also mathematical aspects (cryptography and security protocols), as well as organisational and management issues, legal aspects, and societal issues (in particular privacy).

Master's specialisation in Cyber Security

The Digital Security group at Radboud University is the largest research group in computer security in the Netherlands, with a strong international reputation. Several times, research by the group made the news headlines. For example, in 2008 students revealed security flaws in the chipcard used for public transport in the Netherlands (the ov-chipkaart) and as the London Oyster card. In 2013, two researchers of the Digital Security group found security vulnerabilities in car immobiliser systems used by various car manufacturers.

This master specialisation is offered in a collaboration with the Eindhoven University of Technology (TU/e) and the University of Twente (UT), through a virtual institute called the Kerckhoffs Institute (http://www.kerckhoffs-institute.org/). Mandatory courses offered at the TU/e and UT can be followed by video connections, but following optional courses at these institutes may require traveling to Eindhoven or Enschede. Such courses are always scheduled back-to-back at one location to minimise travel time. While this does incur a cost in time and travel expenses, it does offer a unique opportunity to choose courses from the broad range of specialties at the three universities.

Cyber Security is a specialisation in the Master's programme in Computing Science and available for students with a Bachelor's degree in Computing Science or Mathematics.

Admission requirements for international students

1. A completed Bachelor's degree in Computing Science or related area

In order to get admission to this Master’s you will need a completed Bachelor’s degree in Computing Sciences or a related discipline.

2. A proficiency in English

In order to take part in the programme, you need to have fluency in English, both written and spoken. Non-native speakers of English without a Dutch Bachelor's degree or VWO diploma need one of the following:

- TOEFL score of >575 (paper based) or >232 (computer based) or >90 (internet based)

- IELTS score of >6.5

- Cambridge Certificate of Advanced English (CAE) or Certificate of Proficiency in English (CPE), with a mark of C or higher

Career prospects

ICT security is a hot topic, with excellent job opportunities. Some students join companies that specialise in security, such as security evaluation labs, consultancy companies, or ICT companies that develop security solutions. Students with security expertise are also in strong demand by the (growing) number of organisations that heavily rely on ICT security, both in the private and public sector. Finally, some graduates go on to pursue a career in scientific or industrial research.



Read less
With the proliferation of mobile and pervasive devices with network capability, along with widespread popularity of the Internet, more and more users and application providers expect services to be available anytime and anywhere. Read more

With the proliferation of mobile and pervasive devices with network capability, along with widespread popularity of the Internet, more and more users and application providers expect services to be available anytime and anywhere.

The Master of Networks and Security (MNS) gives you the skills to manage and administer computer networks and security, and prepares you for a career in network administration or network management, or as a systems analyst, systems designer, data communications specialist, or network security engineer or administrator.

As a network and security professional, your specialised skills will always be in high demand, as well as highly rewarded.

The MNS expands your knowledge of how to design, deploy and maintain networks and application services, by combining theory with practice. You explore issues faced both by users and application providers, and devise possible solutions.

The MNS caters to students from a variety of backgrounds by including preparatory IT units. However, if you already have a degree in IT or engineering, you may accelerate your study with an exemption from these preparatory units, or perhaps choose to take further networks and security electives.

The advanced studies of an MNS include a range of topics, from network structure, design, quality of service and protocols, to information, software and network security.

The course emphasises the principles and management of computer networks and the security technologies upon which organisations rely. You will learn how to evaluate the security needs of an organisation's infrastructure and create plans to protect it against potential attacks and security breaches.

In your final semester, you may take part in an Industry Experience program, working in a small team with industry mentors to develop entrepreneurial IT solutions. Or you may undertake a minor-thesis research project, investigating cutting-edge problems in networks and security under the supervision of internationally recognised researchers.

High-achieving students who complete the research component may progress to further research study. Graduates may be eligible for Australian Computer Society (ACS) professional membership.

Course structure

The course is structured in three parts, A, B and C. All students complete Part B (core studies). Depending upon prior qualifications, you may receive credit for Part A Foundations for advanced networks and security studies or Part C Advanced practice or a combination of the two.

Note that if you are eligible for credit for prior studies you may elect not to receive the credit.

PART A. Foundations for advanced networks and security studies

These studies will provide an orientation to the field of networks and security at graduate level. They are intended for students whose previous qualification is not in a cognate field.

PART B. Core Master's study

These studies draw on best practices within the broad realm of IT networks and security theory and practice. You will gain an understanding of information and computer security and IT project management principles. Your study will focus on your choice of units within Networks and Security.

PART C. Advanced practice

The focus of these studies is professional or scholarly work that can contribute to a portfolio of professional development. You have two options.

The first option is a research pathway including a thesis. Students wishing to use this Masters course as a pathway to a higher degree by research should take this first option.

The second option is a program of coursework involving advanced study and an Industry experience studio project.

Students admitted to the course, who have a recognised honours degree in a discipline cognate to networks and security, will receive credit for Part C, however, should they wish to complete a 24 point research project as part of the course they should consult with the course coordinator.



Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
The executive master’s programme in Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats. Read more

The executive master’s programme in Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.

Why study Cyber Security?

The programme, which is for working professionals, will teach you to make connections between the technical, legal, administrative, economic and psychological aspects of digital security. Being able to look at a security problem from all angles will help you develop sound strategies to protect both organisations and individuals.

During this programme, you will learn to:

  • Identify the complexities and interdependencies in cyber space
  • Contribute solutions to cyber risks, both from a technological and a policy and administrative approach
  • Relegate cyber threats to acceptable risks
  • Build a bridge between largely technical and more administrative-oriented professionals in organisations
  • Translate technical and operational issues to a strategic level
  • Reflect critically on new developments and results of research into cyber security
  • Offer independent contributions to cyber security research

This programme is offered by Leiden University, Delft University of Technology and The Hague University of Applied Sciences and various private partners, under the umbrella of the Cyber Security Academy.

Reasons to choose Cyber Security at Leiden University?

As a student in the Cyber Security programme, you will benefit from:

  • Expert instructors: The programme is taught by top experts from Leiden University, TU Delft and The Hague University of Applied Sciences. You will also have guest lectures from professionals such as management consultants (KPMG, VKA, KPN) and technical specialists (NFI, ENCS, FOX-IT).
  • Ties to the industry: You will learn at the The Hague Security Delta campus, which is the leading European security cluster of private and public organisations and knowledge institutions in the broad field of security.
  • Advanced facilities: You will have access to multifunctional spaces with modern IT facilities such as a Real Time Intelligence Centre and a Serious Gaming Lab

Is Cyber Security the right programme for you?

Are you a professional who deals with cyber security issues in the public or private sector? Do you have a background in administration, law or IT? Would you like to further your expertise in cyber security, improving your ability to meet the challenges of today and tomorrow?

This programme is designed for highly educated professionals (computer scientists, lawyers, policy makers) with several years of professional experience in and/or affinity with issues in the field of cyber security.



Read less
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. Read more
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. A key issue in IT strategy is Information Security, which is becoming more critical with the interconnection of systems through the Internet and the sharing of resources with business partners, clients and customers.

This Masters degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management.

You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.

What will I study?

You will study security from two perspectives: the concepts of computer and network security, together with a systemic approach to information security management. The programme of study is informed by ISO27000 legal compliance requirements and professional body knowledge requirements of ISACA (Information Systems Audit and Control Association), ITIL (Information Technology Infrastructure Library) and the Information Systems Security Certification Consortium (ISC)2. The study of computer forensics enables further specialisation.

IT Management is approached from a strategic and risk-based perspective, and includes business continuity and project management. A recent technology development that could have radical impact in both security and IT management is cloud computing, and the course provides an option to enable you to develop a sound understanding of the related issues and technology. Professional, ethical and contemporary issues in computing and research methods are also integrated into the programme.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars and technology-enhanced learning (e.g. Virtual Learning Environment, wiki). Classes are highly interactive, with practical application of concepts a key factor, as well as cases drawn from real-life. The MSc Information Security and IT Management is designed around small groups so you can be sure that you will have plenty of individual discussion with your tutors.

How will I be assessed?

Throughout the programme we will assess your vocational capability, academic critical thinking and intellectual development. Coursework, case studies, problem-solving exercises and exams may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academics who are research-active and regularly engage within the wider business and academic environment. Staff specialise in particular subjects so you will benefit from a wide range of knowledge and experience.

What are my career prospects?

The MSc in Information Security and IT Management will provide you with the skills and knowledge to develop your interests as an IT security professional and IT manager. As organisations become ever more dependent on IT, there are increasing opportunities for specialist positions related to security. The course provides knowledge and skills which underpin Information Systems Security Certification Consortium or (ISC)2 and ISACA certifications.

Read less
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. Read more
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. The significance of information security and the demand for relevant skills has been emphasised recently by high-profile incidents concerning the privacy of personal data and security of financial information.

This specialist MSc course focuses on the technical aspects of computer systems security and systems administration, particularly penetration testing. It is accredited by the Tiger Scheme and will give you exemption from some of its professional examinations.

You will be taught by an internationally recognised team from the University’s Information Security Research Group, and external speakers contribute to delivering the latest expertise and developments.

See the website http://courses.southwales.ac.uk/courses/254-msc-computer-systems-security

What you will study

Modules include:
- Network Security
- Practical Windows Security
- Practical UNIX Security
- Vulnerability Development
- Professional Skills Development
- Advanced Research Methods
- Project Management
- Research Project: an investigation of your choice, related to the course
- MSc Project: the development and evaluation of a significant application or task, related to the course

Learning and teaching methods

The course is delivered in four major blocks to offer an intensive but focused learning pattern, with two start points each year – February and September. Full-time students will typically spend 12 hours in classes each week. If you choose to study part-time, this is reduced to around six hours each week. You will study through lectures, tutorials, practical sessions, seminars and projects.

Work Experience and Employment Prospects

Career opportunities are excellent – the demand for specialists in this area continues to rise as companies become increasingly dependent on computers and the internet. On graduation, you will be equipped for careers that require in-depth knowledge of technical security issues. Potential roles include systems administrator, security penetration tester or information security consultant, and skills gained strongly relate to the roles of information security analyst and IT security co-ordinator.

With education to Masters level now the recognised professional level of competence, graduates will be better placed to pursue careers in industry, or continue their interest in computer systems security through research at PhD level.

Assessment methods

You will need to spend a significant amount of time working independently, reading and preparing for assessments. Assessment is primarily by coursework, varying from a research-style paper or essay to programming assignments. You will also work on a significant research project and a major project of your own choice, where strong independent thinking, critical analysis and project management skills will be important.

Facilities

We have a full range of high-specification computer labs and an ongoing investment programme to ensure that our facilities stay at the forefront of computing developments.

Read less
Masters/MSc postgraduate degree course in Cyber Security. Computing infrastructure is now vital for communication, government, commerce, and control of our physical environment, and is a potential target of terrorist and criminal attacks. Read more

Masters/MSc postgraduate degree course in Cyber Security:

Computing infrastructure is now vital for communication, government, commerce, and control of our physical environment, and is a potential target of terrorist and criminal attacks. Graduates who understand the technologies and practices that underpin secure computer systems are in great and ever-growing demand.

This programme will give you the skills you need to deal with current and future cyber security threats. It provides a solid foundation for graduates to pursue a career in the software industry or research.

Course details

Cyber security is about designing systems that resist attack. As computers become ever more prevalent and ever more connected with each other, the opportunities for attackers become even greater, and the need to resist them becomes more urgent. 

This is a one-year full-time degree programme for graduates in a computing-related discipline. It will allow students to obtain the knowledge and expertise to evaluate, designand build secure computer systems, processes and people that are involved in cyber security. It covers the theory and practice of designing and building secure systems and gives you a firm grounding in cryptography, network security and secure programming, as well as optional modules in topics such as hardware and embedded system security, operating systems and incident management and forensics.

The programme also gives you practical experience with technologies and toolkits for building internet-based software. All students undertake a large, personally supervised project in the final months of the course.

Our curriculum has been developed with the involvement of key individuals in the cyber security industry. As well as advising us on the skills they seek when recruiting graduates, they also contribute directly to the MSc programme through guest lectures and project supervision. In recent years, we have had guest lecturers from Microsoft, Vodafone, Siemens, IBM and Hewlett Packard.

Learning and teaching

The programme includes lectures, tutorials, exercise classes, practical work, projects and independent study.

You will gain knowledge and understanding of:

  • the essential facts, concepts, principles and theories relating to computer security
  • appropriate theory, practices and tools for the design, implementation and evaluation of secure computer systems
  • appropriate theory, practices and processes for the management and governance of cyber security in industry

You will also attain the following skills and attributes:

  • the ability to apply the knowledge and understanding noted above to the analysis of a given information handling problem
  • the ability to specify, design and construct secure computer systems, using appropraite tools, and to document all stages of this process
  • the ability to discover vulnerabilities in implementations
  • the ability to evaluate internet-based software systems in relation to given computer security requirements
  • the ability to work independently on a substantial software project
  • management of learning and development, including time management, organisational skills and the ability to pursue independently further development of your IT education

Employability

The MSc in Cyber Security is a new  programme, but graduates of the MSc in Computer Security have gone on to work for Companies including Accenture, IBM, PriceWaterhouseCoopers, BT and Delcam.

Our students gain the knowledge to become leaders in the field of cyber security and to shape the technologies that will be developed in the future. They are equipped to work on secure software development within the software and IT industry, or to become cyber security consultants. They may also choose to move on to PhD research.

University Careers Network

Preparation for your career should be one of the first things you think about as you start university. Whether you have a clear idea of where your future aspirations lie or want to consider the broad range of opportunities available once you have a Birmingham degree, our Careers Network can help you achieve your goal.

Our unique careers guidance service is tailored to your academic subject area, offering a specialised team (in each of the five academic colleges) who can give you expert advice. Our team source exclusive work experience opportunities to help you stand out amongst the competition, with mentoring, global internships and placements available to you. Once you have a career in your sights, one-to-one support with CVs and job applications will help give you the edge.

If you make the most of the wide range of services you will be able to develop your career from the moment you arrive.



Read less
Cyber threats are on the increase and have been highlighted by the UK government as one of the four main threats to the UK. Read more
Cyber threats are on the increase and have been highlighted by the UK government as one of the four main threats to the UK. There is an increasing demand from business and government for individuals skilled in computer science and cyber security who can design, build, and maintain secure software and systems that can protect people, business and data from malicious attack.

This programme builds on the knowledge gained in a first degree to equip you with advanced computer science and cyber security skills necessary to produce modern secure systems. The theory taught in the lectures is reinforced in the practicals where you have the opportunity to use industry standard tools and techniques in our dedicated security, server and networking laboratories which provide a safe space for you to practice both offensive and defensive security techniques.

Why choose this course?

Dedicated security, server and networking laboratories with enterprise equipment including Cisco switches, routers, firewalls and Dell servers. Small, dedicated private cloud that allows you to create more complex cyber security scenarios and to investigate cloud security issues. Access to a wide range of enterprise software to ensure realistic deployment environments.

An emphasis on live projects, alongside group work modelled on industry standard working patterns, giving you the opportunity to develop skills that are directly applicable to the workplace. Staff with a wide range of expertise in computer science and cyber security. An opportunity to apply to undertake a placement which enables you to practice and refine your skills within a company or organisation.

This course in detail

The MSc in Computer Science for Cyber Security has a modular course-unit design providing you with maximum flexibility and choice. To qualify for a master’s degree without placement, you must pass modules amounting to 180 credits. This comprises six taught modules (20 credits each) plus your dissertation (60 credits). To qualify for a master's degree with placement you need to undertake a one-year placement in between the taught component and the dissertation.

The Postgraduate Diploma in Computer Science for Cyber Security allows you to concentrate on the taught part of the degree and is ideal for people working in the computing industry who wish to brush up their skills. To qualify for a Postgraduate Diploma, you must pass modules amounting to 120 credits. This comprises six taught modules (20 credits each). In some cases, it may be possible for a student on a Postgraduate Diploma to do 3 taught modules (20 credits each) plus your dissertation (60 credits).

The Postgraduate Certificate in Computer Science for Cyber Security allows you to concentrate on the taught part of the degree and is ideal for people working in the computing industry who wish to learn a specific area in this rapidly changing discipline. To qualify for a Postgraduate Certificate, you must pass modules amounting to 60 credits. This comprises three taught modules (20 credits each).

Semester 1 has the following modules:
-Research and Scholarship Methods (compulsory for MSc)
-Network Principles (compulsory for MSc)
-Secure Systems Architecture (compulsory for MSc and PG Dip)

Semester 2 has the following modules:
-Operating Systems Development (compulsory for MSc and PG Dip)
-Secure Programming (compulsory for MSc)
-Low level Techniques and Tools (compulsory for MSc and PG Dip)

If you are studying for an MSc you will also take:
-MSc Dissertation (completed over summer)

MSc students have the option to apply to undertake a placement. Placement positions are not guaranteed, however the department will help and support students in finding a placement.

Please note: as our courses are reviewed regularly as part of our quality assurance framework, the list of taught modules offered may vary from the list here.

Teaching and learning

The taught modules include lectures, seminars, library and internet research, and practical design and experimentation.

Teaching staff include experienced academic staff and practitioners in the field of Computer Science and Cyber Security. Visiting speakers from business and industry help to maintain relevance to the evolution of the industry.

Laboratory facilities include dedicated security, server and networking laboratories.

Careers and professional development

This programme allows graduates to undertake a wide range of roles in IT and cyber security. Common careers in this area are IT security professionals, penetration testers, digital forensic investigators, software developers, systems engineers, technical analysts, IT managers, and consultants.

Read less

Show 10 15 30 per page



Cookie Policy    X