• University of Bristol Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of Southampton Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • Aberystwyth University Featured Masters Courses

Postgrad LIVE! Study Fair

Birmingham | Bristol | Sheffield | Liverpool | Edinburgh

University of Stuttgart Featured Masters Courses
University of Reading Featured Masters Courses
Cass Business School Featured Masters Courses
University of Bedfordshire Featured Masters Courses
Teesside University Featured Masters Courses
"internet" AND "security"…×
0 miles

Masters Degrees (Internet Security)

We have 242 Masters Degrees (Internet Security)

  • "internet" AND "security" ×
  • clear all
Showing 1 to 15 of 242
Order by 
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually. Read more
Cybercrime threats are growing as the economy increasingly depends on the Internet, such as through cloud computing, electronic communication and e-commerce, with estimates showing that they cost the UK up to £27 billion annually.

In addition, surveys from PricewaterhouseCoopers and the Department for Business, Innovation and Skills show a significant shortage of information security professionals and a lack of security awareness, especially in small and medium-sized enterprises (SMEs), indicating an urgent need for student education, the provision of up-to-date educational resources, industry training and the embedding of good practice.

This MSc in Cyber Security addresses these requirements by increasing relevant knowledge and skills in line with the UK Government’s National Cyber Security Strategy, while also addressing the national skills shortage in information security.

You will develop an understanding of current issues in information security and cyber security, as well as gain in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource and for analysing and controlling security risks.

What will I study?

You will study cyber security from the perspectives of technical aspects of network security, penetration testing and computer forensics, while also adopting a systematic approach to information security management.

The programme will cover topics including information security management; information risk management; implementing secure systems; information assurance methodologies and testing; operational security management; incident management; audit, assurance and review; and business continuity management.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars, one-to-one tutorials, and technology-enhanced learning (such as via a virtual learning environment). Classes are highly interactive, with the practical application of concepts being a key factor, as well as case studies drawn from real-life.

How will I be assessed?

We will assess your vocational capability, academic critical thinking and intellectual development throughout the programme. Coursework, case studies, exams and problem-solving exercises may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academic staff who are research-active and fully engaged with the wider business and academic community.

What are my career prospects?

The MSc has been designed to meet the Government Communications Headquarters (GCHQ) certification criteria for Masters degrees, as well as satisfying the professional body knowledge requirements of the Information Systems Audit and Control Association (ISACA) and the Information Systems Security Certification Consortium (ISC)².

The programme also aligns with international standards (ISO27001/2) for information security management systems and is informed by the PAS 555:2013 Cyber Security Risk Governance and Management Specification.

On successful completion of the course, you will be equipped with the necessary skills and expertise to work as a cyber security professional, or information security professional, in roles such as an information security engineer/manager, ISO27001 auditor, computer forensic analyst, cyber security specialist or security engineer.

Read less
With the proliferation of mobile and pervasive devices with network capability, along with widespread popularity of the Internet, more and more users and application providers expect services to be available anytime and anywhere. Read more
With the proliferation of mobile and pervasive devices with network capability, along with widespread popularity of the Internet, more and more users and application providers expect services to be available anytime and anywhere.

The Master of Networks and Security (MNS) gives you the skills to manage and administer computer networks and security, and prepares you for a career in network administration or network management, or as a systems analyst, systems designer, data communications specialist, or network security engineer or administrator.

As a network and security professional, your specialised skills will always be in high demand, as well as highly rewarded.

The MNS expands your knowledge of how to design, deploy and maintain networks and application services, by combining theory with practice. You explore issues faced both by users and application providers, and devise possible solutions.

The MNS caters to students from a variety of backgrounds by including preparatory IT units. However, if you already have a degree in IT or engineering, you may accelerate your study with an exemption from these preparatory units, or perhaps choose to take further networks and security electives.

The advanced studies of an MNS include a range of topics, from network structure, design, quality of service and protocols, to information, software and network security.

The course emphasises the principles and management of computer networks and the security technologies upon which organisations rely. You will learn how to evaluate the security needs of an organisation's infrastructure and create plans to protect it against potential attacks and security breaches.

In your final semester, you may take part in an Industry Experience program, working in a small team with industry mentors to develop entrepreneurial IT solutions. Or you may undertake a minor-thesis research project, investigating cutting-edge problems in networks and security under the supervision of internationally recognised researchers.

High-achieving students who complete the research component may progress to further research study.Graduates may be eligible for Australian Computer Society (ACS) professional membership.

Visit the website http://www.study.monash/courses/find-a-course/2016/networks-and-security-c6002?domestic=true

Overview

With the proliferation of mobile and pervasive devices with network capability and the popularity and the availability of Internet, more and more users and application providers are seeking and providing services with the access and delivery paradigm of anytime and anywhere. In order to harness such rapidly changing technology, one needs to have clear understanding, knowledge and experience that transcends these technologies in order to able to design, deploy and maintain networks and application services. This course not only provides an in-depth knowledge on the principles of these technologies, but also explores issues that are faced both by the users and the application providers, and provides possible solutions. The theory is interrelated with the practice which makes this course unique.

Course Structure

The course is structured in three parts, A, B and C. All students complete Part B (core studies). Depending upon prior qualifications, you may receive credit for Part A Foundations for advanced networks and security studies or Part C Advanced practice or a combination of the two.

Note that if you are eligible for credit for prior studies you may elect not to receive the credit.

PART A. Foundations for advanced networks and security studies
These studies will provide an orientation to the field of networks and security at graduate level. They are intended for students whose previous qualification is not in a cognate field.

PART B. Core Master's study
These studies draw on best practices within the broad realm of IT networks and security theory and practice. You will gain an understanding of information and computer security and IT project management principles. Your study will focus on your choice of units within Networks and Security.

PART C. Advanced practice
The focus of these studies is professional or scholarly work that can contribute to a portfolio of professional development. You have two options.

The first option is a research pathway including a thesis. Students wishing to use this Masters course as a pathway to a higher degree by research should take this first option.

The second option is a program of coursework involving advanced study and an Industry experience studio project.

Students admitted to the course, who have a recognised honours degree in a discipline cognate to networks and security, will receive credit for Part C, however, should they wish to complete a 24 point research project as part of the course they should consult with the course coordinator.

For more information visit the faculty website - http://www.study.monash/media/links/faculty-websites/information-technology

Find out how to apply here - http://www.study.monash/courses/find-a-course/2016/networks-and-security-c6002?domestic=true#making-the-application

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
Learn how to identify new and existing cyber threats and determine methods and processes to minimise attacks. Gain skills in a real-life business context, by cracking passwords and wireless networks and testing web applications for vulnerabilities and security breaches. Read more
Learn how to identify new and existing cyber threats and determine methods and processes to minimise attacks. Gain skills in a real-life business context, by cracking passwords and wireless networks and testing web applications for vulnerabilities and security breaches.

Cyber security is a priority for governments and organisations throughout the world. We’ll work together to explore how organisations and individuals can take action to protect themselves online from cyber-attacks.

We’ll begin by understanding networks and operating systems, how they work and the strengths and weaknesses of them. You’ll then think like a hacker, working from the inside out, as you recognise the threats to an organisation and its resources, and learn to implement and test secure systems.

Focusing on the strategic deployment and implementation of cyber security within an organisation, you’ll cover all aspects of cyber security including network security, computer security and information security.

You’ll apply your knowledge and skills hands-on in a real-life context, in our specialised lab, which is already equipped with tools such as Kali LInux, Wireshark, Nmap and Burp Suite. You’ll write your own Metasploit modules, automate social-engineering attacks, bypass antivirus software and turn access to one machine as you take total control of the enterprise.

You’ll gain skills in communicating information to higher levels of the corporation’s managers, giving you confidence to present your invaluable problem solving solutions and strategic security planning in any organisation.

We know there’s a worldwide shortage of skills graduates in cyber security, so you’ll be ahead of the game as you further your career and make a real impact on a society that is increasingly dependent on the internet and IT technology.

See the website http://www.anglia.ac.uk/study/postgraduate/cyber-security

Careers

The 2015 Global Information Security Workforce Study predicts that the global cyber security workforce shortage will reach 1.5 million by 2020, as demand outstrips supply. This means that there hasn't been a better time to join the cyber security sector.

Computer security is a fast developing area and your skills in computer, network and information security could see you working closely with lawyers, government, commercial organisations, the education sector and investigation agencies, as well as the finance and e-commerce sectors and national security organisations.

You’re also in the perfect position to continue your academic career and move up to our research degree Computer Science PhD.

Modules & assessment

Computer Networks
Operating Systems and Virtualisation
Secure Systems
Research Methods
Advanced Network Security Principles
Penetration Testing
Major Project

Assessment

We’ll asses your knowledge and understanding through a case study in which you’ll design, implement and test the security strategy of an organisation. You’ll also complete in-class tests, written assignments, software projects and presentations as part of the course.

Your faculty

The Faculty of Science & Technology is one of the largest of five faculties at Anglia Ruskin University. Whether you choose to study with us full- or part-time, on campus or at a distance, there’s an option whatever your level – from a foundation degree, to a BSc, MSc, PhD or professional doctorate.

Whichever course you pick, you’ll gain the theory and practical skills needed to progress with confidence. Join us and you could find yourself learning in the very latest laboratories or on field trips or work placements with well-known and respected companies. You may even have the opportunity to study abroad.

Everything we do in the faculty has a singular purpose: to provide a world-class environment to create, share and advance knowledge in science and technology fields. This is key to all of our futures.

Read less
Cyber security is a topic of growing importance, as ICT affects ever more aspects of our daily lives Businesses and government rely on ICT to an ever larger degree. Read more

Cyber security is a topic of growing importance, as ICT affects ever more aspects of our daily lives Businesses and government rely on ICT to an ever larger degree. Both assessing the security of existing ICT solutions and developing more secure solutions for the future pose major scientific and societal challenges.

This Master specialisation covers a broad range of topics that is important for computer security. This includes topics in computer science (software, computer networks, and hardware, esp. smart-cards and RFID), but also mathematical aspects (cryptography and security protocols), as well as organisational and management issues, legal aspects, and societal issues (in particular privacy).

Master's specialisation in Cyber Security

The Digital Security group at Radboud University is the largest research group in computer security in the Netherlands, with a strong international reputation. Several times, research by the group made the news headlines. For example, in 2008 students revealed security flaws in the chipcard used for public transport in the Netherlands (the ov-chipkaart) and as the London Oyster card. In 2013, two researchers of the Digital Security group found security vulnerabilities in car immobiliser systems used by various car manufacturers.

This master specialisation is offered in a collaboration with the Eindhoven University of Technology (TU/e) and the University of Twente (UT), through a virtual institute called the Kerckhoffs Institute (http://www.kerckhoffs-institute.org/). Mandatory courses offered at the TU/e and UT can be followed by video connections, but following optional courses at these institutes may require traveling to Eindhoven or Enschede. Such courses are always scheduled back-to-back at one location to minimise travel time. While this does incur a cost in time and travel expenses, it does offer a unique opportunity to choose courses from the broad range of specialties at the three universities.

Cyber Security is a specialisation in the Master's programme in Computing Science and available for students with a Bachelor's degree in Computing Science or Mathematics.

Admission requirements for international students

1. A completed Bachelor's degree in Computing Science or related area

In order to get admission to this Master’s you will need a completed Bachelor’s degree in Computing Sciences or a related discipline.

2. A proficiency in English

In order to take part in the programme, you need to have fluency in English, both written and spoken. Non-native speakers of English without a Dutch Bachelor's degree or VWO diploma need one of the following:

- TOEFL score of >575 (paper based) or >232 (computer based) or >90 (internet based)

- IELTS score of >6.5

- Cambridge Certificate of Advanced English (CAE) or Certificate of Proficiency in English (CPE), with a mark of C or higher

Career prospects

ICT security is a hot topic, with excellent job opportunities. Some students join companies that specialise in security, such as security evaluation labs, consultancy companies, or ICT companies that develop security solutions. Students with security expertise are also in strong demand by the (growing) number of organisations that heavily rely on ICT security, both in the private and public sector. Finally, some graduates go on to pursue a career in scientific or industrial research.

Radboud University Master's Open Day 10 March 2018



Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
The executive master’s programme in Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats. Read more

The executive master’s programme in Cyber Security takes a multidisciplinary approach that helps you develop effective and sustainable solutions for cyber risks and threats.

Why study Cyber Security?

The programme, which is for working professionals, will teach you to make connections between the technical, legal, administrative, economic and psychological aspects of digital security. Being able to look at a security problem from all angles will help you develop sound strategies to protect both organisations and individuals.

During this programme, you will learn to:

  • Identify the complexities and interdependencies in cyber space
  • Contribute solutions to cyber risks, both from a technological and a policy and administrative approach
  • Relegate cyber threats to acceptable risks
  • Build a bridge between largely technical and more administrative-oriented professionals in organisations
  • Translate technical and operational issues to a strategic level
  • Reflect critically on new developments and results of research into cyber security
  • Offer independent contributions to cyber security research

This programme is offered by Leiden University, Delft University of Technology and The Hague University of Applied Sciences and various private partners, under the umbrella of the Cyber Security Academy.

Reasons to choose Cyber Security at Leiden University?

As a student in the Cyber Security programme, you will benefit from:

  • Expert instructors: The programme is taught by top experts from Leiden University, TU Delft and The Hague University of Applied Sciences. You will also have guest lectures from professionals such as management consultants (KPMG, VKA, KPN) and technical specialists (NFI, ENCS, FOX-IT).
  • Ties to the industry: You will learn at the The Hague Security Delta campus, which is the leading European security cluster of private and public organisations and knowledge institutions in the broad field of security.
  • Advanced facilities: You will have access to multifunctional spaces with modern IT facilities such as a Real Time Intelligence Centre and a Serious Gaming Lab

Is Cyber Security the right programme for you?

Are you a professional who deals with cyber security issues in the public or private sector? Do you have a background in administration, law or IT? Would you like to further your expertise in cyber security, improving your ability to meet the challenges of today and tomorrow?

This programme is designed for highly educated professionals (computer scientists, lawyers, policy makers) with several years of professional experience in and/or affinity with issues in the field of cyber security.



Read less
This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs. Read more

About the course

This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs.

Cyber Technology MSc consists of four main themes; Cyber Security, Software Engineering, Digital Forensics, and Management. It can be studied by combining modules from all four themes allowing you to specialise in your chosen area of interest. You have the opportunity to choose mixed pathways, for example the choices of modules could lead to a degree in Cyber Security with Management.

Reasons to study:

• Develop skills required for a rapidly changing sector
gain the latest skills, techniques and knowledge required in one of the most exciting areas of computing

• Developed in conjunction with industry experts
modules are developed with Deloitte PLC, Airbus Group, BT and Rolls-Royce ensuring that you explore issues relevant to industry

• Dedicated Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in digital forensics

• Taught by expert academic staff
taught by expert staff within our Cyber Security Centre and Software Technology Research Laboratory who recognised leaders in the cyber security domain

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Excellent career prospects
graduates are prepared for roles such as consultancy, software houses or project management within organisations that are cyber security specialists within law enforcement, government; in commercial IT departments and security consultancies

Teaching and Assessment

Each module is delivered over the duration of four full days. It targets both concepts and practical skills that are relevant to industry. A multiple choice (MC) test at the end of the course provides attendees feedback on their achievements and must be passed before continuation of the academic assessment through coursework.

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects, multiple choice and laboratory-based assessments.

Contact and learning hours

You will normally attend 3 hours of timetabled taught sessions each week for each module undertaken during term time, for full time study this would be 12 hours per week during term time. You are expected to undertake around 24 further hours of independent study and assignments as required per week. Alternate study modes and entry points may change the timetabled session available, please contact us for details.

Academic Expertise

The programme is managed and delivered through our renowned Cyber Security Centre and Software Technology Research Laboratory.

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex-vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors.

Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Cyber threats are on the increase and have been highlighted by the UK government as one of the four main threats to the UK. Read more
Cyber threats are on the increase and have been highlighted by the UK government as one of the four main threats to the UK. There is an increasing demand from business and government for individuals skilled in computer science and cyber security who can design, build, and maintain secure software and systems that can protect people, business and data from malicious attack.

This programme builds on the knowledge gained in a first degree to equip you with advanced computer science and cyber security skills necessary to produce modern secure systems. The theory taught in the lectures is reinforced in the practicals where you have the opportunity to use industry standard tools and techniques in our dedicated security, server and networking laboratories which provide a safe space for you to practice both offensive and defensive security techniques.

Why choose this course?

Dedicated security, server and networking laboratories with enterprise equipment including Cisco switches, routers, firewalls and Dell servers. Small, dedicated private cloud that allows you to create more complex cyber security scenarios and to investigate cloud security issues. Access to a wide range of enterprise software to ensure realistic deployment environments.

An emphasis on live projects, alongside group work modelled on industry standard working patterns, giving you the opportunity to develop skills that are directly applicable to the workplace. Staff with a wide range of expertise in computer science and cyber security. An opportunity to apply to undertake a placement which enables you to practice and refine your skills within a company or organisation.

This course in detail

The MSc in Computer Science for Cyber Security has a modular course-unit design providing you with maximum flexibility and choice. To qualify for a master’s degree without placement, you must pass modules amounting to 180 credits. This comprises six taught modules (20 credits each) plus your dissertation (60 credits). To qualify for a master's degree with placement you need to undertake a one-year placement in between the taught component and the dissertation.

The Postgraduate Diploma in Computer Science for Cyber Security allows you to concentrate on the taught part of the degree and is ideal for people working in the computing industry who wish to brush up their skills. To qualify for a Postgraduate Diploma, you must pass modules amounting to 120 credits. This comprises six taught modules (20 credits each). In some cases, it may be possible for a student on a Postgraduate Diploma to do 3 taught modules (20 credits each) plus your dissertation (60 credits).

The Postgraduate Certificate in Computer Science for Cyber Security allows you to concentrate on the taught part of the degree and is ideal for people working in the computing industry who wish to learn a specific area in this rapidly changing discipline. To qualify for a Postgraduate Certificate, you must pass modules amounting to 60 credits. This comprises three taught modules (20 credits each).

Semester 1 has the following modules:
-Research and Scholarship Methods (compulsory for MSc)
-Network Principles (compulsory for MSc)
-Secure Systems Architecture (compulsory for MSc and PG Dip)

Semester 2 has the following modules:
-Operating Systems Development (compulsory for MSc and PG Dip)
-Secure Programming (compulsory for MSc)
-Low level Techniques and Tools (compulsory for MSc and PG Dip)

If you are studying for an MSc you will also take:
-MSc Dissertation (completed over summer)

MSc students have the option to apply to undertake a placement. Placement positions are not guaranteed, however the department will help and support students in finding a placement.

Please note: as our courses are reviewed regularly as part of our quality assurance framework, the list of taught modules offered may vary from the list here.

Teaching and learning

The taught modules include lectures, seminars, library and internet research, and practical design and experimentation.

Teaching staff include experienced academic staff and practitioners in the field of Computer Science and Cyber Security. Visiting speakers from business and industry help to maintain relevance to the evolution of the industry.

Laboratory facilities include dedicated security, server and networking laboratories.

Careers and professional development

This programme allows graduates to undertake a wide range of roles in IT and cyber security. Common careers in this area are IT security professionals, penetration testers, digital forensic investigators, software developers, systems engineers, technical analysts, IT managers, and consultants.

Read less
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. Read more
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. A key issue in IT strategy is Information Security, which is becoming more critical with the interconnection of systems through the Internet and the sharing of resources with business partners, clients and customers.

This Masters degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management.

You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.

What will I study?

You will study security from two perspectives: the concepts of computer and network security, together with a systemic approach to information security management. The programme of study is informed by ISO27000 legal compliance requirements and professional body knowledge requirements of ISACA (Information Systems Audit and Control Association), ITIL (Information Technology Infrastructure Library) and the Information Systems Security Certification Consortium (ISC)2. The study of computer forensics enables further specialisation.

IT Management is approached from a strategic and risk-based perspective, and includes business continuity and project management. A recent technology development that could have radical impact in both security and IT management is cloud computing, and the course provides an option to enable you to develop a sound understanding of the related issues and technology. Professional, ethical and contemporary issues in computing and research methods are also integrated into the programme.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars and technology-enhanced learning (e.g. Virtual Learning Environment, wiki). Classes are highly interactive, with practical application of concepts a key factor, as well as cases drawn from real-life. The MSc Information Security and IT Management is designed around small groups so you can be sure that you will have plenty of individual discussion with your tutors.

How will I be assessed?

Throughout the programme we will assess your vocational capability, academic critical thinking and intellectual development. Coursework, case studies, problem-solving exercises and exams may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academics who are research-active and regularly engage within the wider business and academic environment. Staff specialise in particular subjects so you will benefit from a wide range of knowledge and experience.

What are my career prospects?

The MSc in Information Security and IT Management will provide you with the skills and knowledge to develop your interests as an IT security professional and IT manager. As organisations become ever more dependent on IT, there are increasing opportunities for specialist positions related to security. The course provides knowledge and skills which underpin Information Systems Security Certification Consortium or (ISC)2 and ISACA certifications.

Read less
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. Read more
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. The significance of information security and the demand for relevant skills has been emphasised recently by high-profile incidents concerning the privacy of personal data and security of financial information.

This specialist MSc course focuses on the technical aspects of computer systems security and systems administration, particularly penetration testing. It is accredited by the Tiger Scheme and will give you exemption from some of its professional examinations.

You will be taught by an internationally recognised team from the University’s Information Security Research Group, and external speakers contribute to delivering the latest expertise and developments.

See the website http://courses.southwales.ac.uk/courses/254-msc-computer-systems-security

What you will study

Modules include:
- Network Security
- Practical Windows Security
- Practical UNIX Security
- Vulnerability Development
- Professional Skills Development
- Advanced Research Methods
- Project Management
- Research Project: an investigation of your choice, related to the course
- MSc Project: the development and evaluation of a significant application or task, related to the course

Learning and teaching methods

The course is delivered in four major blocks to offer an intensive but focused learning pattern, with two start points each year – February and September. Full-time students will typically spend 12 hours in classes each week. If you choose to study part-time, this is reduced to around six hours each week. You will study through lectures, tutorials, practical sessions, seminars and projects.

Work Experience and Employment Prospects

Career opportunities are excellent – the demand for specialists in this area continues to rise as companies become increasingly dependent on computers and the internet. On graduation, you will be equipped for careers that require in-depth knowledge of technical security issues. Potential roles include systems administrator, security penetration tester or information security consultant, and skills gained strongly relate to the roles of information security analyst and IT security co-ordinator.

With education to Masters level now the recognised professional level of competence, graduates will be better placed to pursue careers in industry, or continue their interest in computer systems security through research at PhD level.

Assessment methods

You will need to spend a significant amount of time working independently, reading and preparing for assessments. Assessment is primarily by coursework, varying from a research-style paper or essay to programming assignments. You will also work on a significant research project and a major project of your own choice, where strong independent thinking, critical analysis and project management skills will be important.

Facilities

We have a full range of high-specification computer labs and an ongoing investment programme to ensure that our facilities stay at the forefront of computing developments.

Read less
The Internet forms a paradigm shift in the way the world operates and communicates. This has huge significance for the future, and a solid understanding of Internet technology is almost a guarantee for a successful career. Read more
The Internet forms a paradigm shift in the way the world operates and communicates. This has huge significance for the future, and a solid understanding of Internet technology is almost a guarantee for a successful career.

This programme aims to give students a broad, comprehensive and detailed knowledge about all aspects of computer networks.

Focusing on all aspects of what is relevant to future network experts, the programme provides a view on network architecture, protocols, security, performance and programming as well as wireless networks.

See the website http://www.lboro.ac.uk/study/postgraduate/programmes/departments/computer-science/internet-computing-network-security/

Programme modules

Taught Modules:
- Network Modelling and Performance
- Internet Systems
- Internet Protocol Design
- Building Secure Networks
- Cryptography and Secure Systems
- Wireless Networks
- Project Preparation
- Research Methods
- Individual Project

Module delivery

Full-time MSc programmes are of 12 months duration. Modules are based over two 15 week semesters with the rest of the 12 months spent on a guided personal research project. Many of our students undertake industry-oriented projects.

The intensive 2-3 week module teaching structure may appeal to those in employment who wish to study on a part-time basis. To maintain the relevance of previous study, part-time students are recommended to complete the programme in as short a time as possible, although up to seven years is permitted for the MSc.

Modules listed are correct at the time of publication, however, we continually review content, so modules may change.

Assessment

Taught modules, with a total modular weight of 120 credits, assessed by coursework and in-class tests. Project: 60 credits.

Careers and further study

Graduates achieve the necessary qualification to seek employment in industry immediately and gain a solid basis from which to pursue a career in industry or academia.

Sponsorships, Scholarships and Bursaries

The Department awards University Scholarships and Department Bursaries to a number of highly qualified students. External funding may also be available.

Why choose computer science at Loughborough?

We form a lively community within a stimulating learning and working environment, and regularly welcome visiting lecturers and researchers who contribute to the intellectual and social life of the Department, now housed in the multi-million pound refurbished Haslegrave Building.

The Quality Assurance Agency has given the Department the highest available commendation for the standard of its teaching provision.

- Facilities
Our departmental facilities and student support services offer the best all-round experience for learning, enhancing employability and expanding skills desirable outside University life.
Students have 24-hour exclusive access to computer laboratories, including a dedicated MSc laboratory, supported by a team of systems specialists, and our virtual learning environment provides online access to lectures and other material.

- Research
Our research not only helps to keep the curriculum up to date, but also gives students the opportunity to work on collaborative projects with industry partners.

- Career Prospects
Our graduates have gone on to enjoy careers within a diverse range of organisations, including Google, Credit Suisse, Ocado, Rolls-Royce, Winton Capital and AVG Technologies.

Find out how to apply here http://www.lboro.ac.uk/study/postgraduate/programmes/departments/computer-science/internet-computing-network-security/

Read less

Show 10 15 30 per page



Cookie Policy    X