• Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • University of Northampton Featured Masters Courses
Cranfield University Featured Masters Courses
University of Dundee Featured Masters Courses
University of Hertfordshire Featured Masters Courses
Cranfield University Featured Masters Courses
Swansea University Featured Masters Courses
"it" AND "security"×
0 miles

Masters Degrees (It Security)

We have 988 Masters Degrees (It Security)

  • "it" AND "security" ×
  • clear all
Showing 1 to 15 of 988
Order by 
Globally, organizations and businesses are increasingly reliant on information technology. Key enterprise data and customer information are stored and shared, communications are made, and transactions between customers, banks, and partners are completed. Read more

Globally, organizations and businesses are increasingly reliant on information technology. Key enterprise data and customer information are stored and shared, communications are made, and transactions between customers, banks, and partners are completed.

Because of the volume and importance of enterprise data that is stored and shared electronically, the defence against ever-evolving cybercrimes has become extremely costly in both the private and public sectors.

It’s estimated by the New Zealand National Cyber Security Centre that cyber-attacks on New Zealand computers and networks have more than doubled in five years. The global cost of cyber-crime has been put at $600 billion a year.

Organisations now seek skilled professionals who have both technical and managerial skill-sets and who can lead teams of technologists to develop and implement security policies and procedures in the defence against cyber threats and can also monitor and audit enterprise information systems.

There is an immediate need in the economy for IT security management professionals. IT Security Specialist is listed on both the Skilled Occupations and Long term skills shortage list by Immigration New Zealand.

The NMIT Post-Graduate Diploma in IT Security Management has been developed by staff with experience in international IT security and digital forensics programmes. It’s aimed at undergraduates seeking a pathway into IT work or people already working in the IT sector looking for a move into managerial roles.

Programme design

This programme is designed to provide students with skills needed to bridge the gap that often exists between enterprise managers and the technical aspects of IT security in the modern digital and internetconnected environment.

The Programme content is applied in focus and is targeted at job-ready skill acquisition. Using a balance of practical work, case studies and theory, the courses prepare students with effective communication and project management knowledge for innovative and effective leadership in crucial areas of IT security. The programme also lays the foundations of research skills which are relevant to IT security and to further postgraduate-level study.

Bring your own device (BYOD)

You are required to have your own laptop with these minimum specifications.



Read less
MSc IT Security helps you to develop your computing skills in the theory and practice of computer security and forensic technology. Read more
MSc IT Security helps you to develop your computing skills in the theory and practice of computer security and forensic technology. This requires an understanding of hardware, operating systems, communications software, attention to detail, creative problem-solving, investigative skills and an appreciation of computer threats and security counter-measures. You will also have the opportunity to work on a substantial project of your own choice. These skills can lead to a range of careers in systems management and computer security.

LEARNING ENVIRONMENT AND ASSESSMENT

The School of Physical Sciences and Computing provides an 'electronic learning' environment to facilitate flexible learning. This environment combines traditional face-to-face lecture/tutorial and practical sessions with additional, resource-rich, online materials allowing you to continue independent learning through a variety of approaches.

Assessment methods will include individual and group assignments, presentation, seminars and examinations.

LEARNING OUTCOMES & AIMS

We aim to explore the concept and principles of IT Security which will enable you to develop skills in critical evaluation and the tools and techniques that are used within IT Security and management. You will investigate the current trends and research that is relevant to IT Security which will enable you to develop a systematic approach to security policy and planning. You will plan, undertake and evaluate a substantial IT Security related project in which you will put into practice and develop your self-management, communication, critical evaluation and technical skills.

Our degree is designed to equip you with the theoretical knowledge and practical skills that are needed within industry.

OPPORTUNITIES

To enhance your work experience you will have an opportunity to undertake an industrial placement as part your MSc. This will extend your study time by six or twelve months depending on the length of the placement. Alternatively there are opportunities to choose an industry-based project.

The University will support you to seek employment as a security specialist. The skills developed by the course are also valuable in a range of computing environments.

There are opportunities to continue with your studies to MPhil or PhD.

FURTHER INFORMATION

As organisations become more dependent on sophisticated computers and communications to support their operations and to store valuable data, they become more vulnerable to IT-based attacks. The expertise of the information security professional is in managing corporate IT resources, protecting servers and computers, and tracking intruders on their networks. On this course you will learn about the tools and procedures that can be used to identify computer security weaknesses that could lead to the loss of sensitive computer data. You will develop the necessary skills to become an IT security problem-solver in order to meet the growing demand for specialists in this area.

You will develop transferable skills in evaluation of ideas and concepts, effective communication, synthesis of ideas and become a reflective practitioner. You will have the opportunity to plan and carry out a supervised project in the field of computer security or computer forensics.

Read less
Security management is becoming more and more important, with many organisations now employing specialists to protect their information and reputation from risks, threats and crises. Read more
Security management is becoming more and more important, with many organisations now employing specialists to protect their information and reputation from risks, threats and crises.

This programme will suit you if you are either in or wish to move into a role where you are responsible for the management and deployment of IT security, including infrastructure, policy making, governance and compliance.

In this programme you will consider the impact of the changing IT security landscape and focus on the design and establishment of prevention plans within your organisation. You will consider the evolving field of technology and its rapid development within the context of security risks.

Modules

Technology and Trend Monitoring
Information Security Strategy Development
Risk Management
IT Security Management
IS Governance
Cloud Systems and Applications
Research Project

Read less
With cyber-crime keeping up with the rapid development of technology, there is a growing need for staff with cyber security specialists knowledge who know how to read and analyse data in order to protect business information and reputation from risks, threats and crises. Read more
With cyber-crime keeping up with the rapid development of technology, there is a growing need for staff with cyber security specialists knowledge who know how to read and analyse data in order to protect business information and reputation from risks, threats and crises.

This programme will suit you if you are either in or wish to move into a role where you are responsible for the management and deployment of IT security, whilst developing relevant data handling skills that will assist you in making strategy driven decisions that benefit your business.

Modules:

Data Design
Data Handling and Decision Making
Data Visualisation and Interpretation
Information Security Strategy Development
IT Security Management
IS Governance
Research Project

Read less
This. MSc IT Security. course is designed to enable students to combine technical excellence in internet implementation with specialist computer security knowledge. Read more

This MSc IT Security course is designed to enable students to combine technical excellence in internet implementation with specialist computer security knowledge. The course includes the opportunity to do a paid work placement for a year in industry.

This course is a fast-track conversion course for those with no computing qualification but would like a career in the computing and IT industry.On completion of the course you will be well qualified for work in industry or for further study for PhD.

Modules

  • Information security management
  • Computer forensics
  • Internet programming
  • Computer security
  • Network and cloud security
  • Research methods
  • Major project

COME VISIT US ON OUR NEXT OPEN DAY!

Visit us on campus throughout the year, find and register for our next open event on http://www.ntu.ac.uk/pgevents.



Read less
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. Read more
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. In this course, you will develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and enhance and challenge your knowledge of computer networking and cyber security.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course, for example in networking, network security and cyber security, IT security, computer forensics. Careers range from the traditional network and network security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Read more
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and work experience opportunities are available in a relevant working environment before you undertake your final project. This additional and crucial element will provide a unique student experience that will enhance your employability after graduation.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

Although each of the modules taught in the above courses have a significant hands-on practical workshops the idea of introducing actual "Work Experience" in a relevant working environment is unique and we believe this additional and crucial element will provide a unique student experience that will help their employability after graduation. The course team will guarantee a paid employment opportunity for all students taking the Computer Networking and Security With Work Experience. The Cisco Academy manager has built a network of relevant employers in the past 15 years through the Networking Academy and its contacts. The academy has currently 18 smaller academies providing continuous technical and academic support as well as training their instructors according to Cisco’s regulations. These academies are mainly local and range from schools to technical colleges. It is hoped that students on this course will be able to be placed in these academies for their work experience part of the course.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Work Experience (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course:for example in Networking, Network Security and Cyber Security, IT Security, Computer Forensics. Careers range from the traditional Network and Network Security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

[Moving to one campus]]
Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:

  • EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
  • Specialist input from guest lecturers
  • Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
  • Specialist technicians to ensure you can get the most out of these technologies.

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the full course document.

Core modules

Digital Forensics pathway

Cyber Security Pathway

Professional accreditation

This programme is accredited by BCS, The Chartered Institute for IT, for fully meeting the further learning educational requirement for Chartered IT Professional (CITP) status and for partially satisfying the underpinning knowledge requirements set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC) and the Science Council for Chartered or Incorporated Engineer (CEng or IEng) status. Note that there are additional requirements, including work experience, to achieve full CITP, CEng, or IEng status. Graduates of this accredited degree will also be eligible for professional membership of BCS (MBCS).

The BCS accreditation is an indicator of the programme’s quality to students and employers; it is also an important benchmark of the programme’s standard in providing high quality computing education, and commitment to developing future IT professionals that have the potential to achieve Chartered status. The programme is also likely to be recognised by other countries that are signatories to international accords.

Career path

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;


Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more

This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Through our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Full time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Part time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Year 2

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Careers

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.



Read less
This course has been developed in consultation with industry practitioners. The School of Maths and Computing has strong links with senior policy developers in Government and industry and is a national leader and innovator in the field of cybersecurity information sharing and threat intelligence. Read more

This course has been developed in consultation with industry practitioners. The School of Maths and Computing has strong links with senior policy developers in Government and industry and is a national leader and innovator in the field of cybersecurity information sharing and threat intelligence.

This Master’s course is highly valuable to a variety of participants with an interest in Cybersecurity;

· It will prepare a student well for achieving success in gaining employment; the demand for cybersecurity professionals currently outstrips the supply of talent. Employment opportunities include (but are not limited to); Cybersecurity Consultant,

Cybersecurity Analyst, IT Security Manager, Security Architect and Compliance roles.

· For anyone thinking of undertaking further study in cybersecurity e.g. Research Degree or Professional Certifications.

· Those already in the sector who wish to enhance / widen their knowledge and gain an advanced degree qualification

· Those from a generalist IT or Governance background who wish to develop a depth of understanding in managing, developing and implementing secure computer and information systems within organisations.

· It may be appropriate for anyone with a strong interest wishing to gain an advanced level of knowledge of cybersecurity or graduates from other disciplines (depending on experience).

This course is available for full or part-time study.

What happens on the course?

You will learn, understand and be able to apply international standards and tools and techniques available to issues related to cybersecurity, information assurance and compliance. Through course material, interactive discussion, practical exercises and small group based work, you will learn, understand, and evaluate security problems, The focus is on risks and you will develop an advanced knowledge of the threats and vulnerabilities that all organisations need to mitigate in order to avoid serious data breaches.

You will be able to address critical security issues and demonstrate the ability to apply a variety of methods to secure data. You will benefit from interactive classes designed for the experience and professional practice of Cybersecurity. Typical practical activities include; addressing web-based security issues and configuring servers and network equipment for secure operation. Students will learn, understand, articulate and engage in the practical application of a wide range of security methods, tools and techniques which are available for the management and application of Cybersecurity. Students will enhance their understanding through research, analysis, synthesis and the production of a specialist dissertation relating to cybersecurity. Opportunities will be provided during the course to engage with cybersecurity professionals.

Career path

There is an increasing demand for qualified people in all aspects of CyberSecurity and Forensics.The opportunities include but are not limited to:

• Security Consultant

• CyberSecurity Consultant

• CyberSecurityAnalyst

• IT Security Manager

• Risk Officer

• Security Architect

This MSc contributes substantially to the career development of IT professionals by enabling high level practitioners to work in an IT security management capacity. If you are from an ITor general management background, the depth of understanding you will gain from this course will contribute to your ability as a manager to develop and implement secure computer and information systems and manage their governance for organisations. While the academic level is masters,there is a strong practical application and professional orientation to the curriculum.

What skills will you gain?

At the end of this course you, the student, will be able to:

Develop robust security policies, justify the selection of suitable mechanisms for enforcement of such policies and be confident in the practices pertaining to systems security;

Analyse, categorise and evaluate security problems, and demonstrate a detailed knowledge and understanding of the most critical aspects;

Recommend and apply appropriate methods for the secure transmission and storage of data;

Demonstrate expertise in the construction and implementation of a functional security design for a network system;

Display mastery of the necessary knowledge required to manage the security of computer systems within an organisation;

Conduct research into advanced areas of Computer Systems Security through analysis and synthesis, deal professionally with complex issues, make sound judgements in the absence of complete data and communicate conclusions clearly through appropriate media.

Who accredits this course?

Accreditation will be applied for from the British Computer Society and the Institute for the Management of Information Systems.



Read less
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. Read more
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. A key issue in IT strategy is Information Security, which is becoming more critical with the interconnection of systems through the Internet and the sharing of resources with business partners, clients and customers.

This Masters degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management.

You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.

What will I study?

You will study security from two perspectives: the concepts of computer and network security, together with a systemic approach to information security management. The programme of study is informed by ISO27000 legal compliance requirements and professional body knowledge requirements of ISACA (Information Systems Audit and Control Association), ITIL (Information Technology Infrastructure Library) and the Information Systems Security Certification Consortium (ISC)2. The study of computer forensics enables further specialisation.

IT Management is approached from a strategic and risk-based perspective, and includes business continuity and project management. A recent technology development that could have radical impact in both security and IT management is cloud computing, and the course provides an option to enable you to develop a sound understanding of the related issues and technology. Professional, ethical and contemporary issues in computing and research methods are also integrated into the programme.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars and technology-enhanced learning (e.g. Virtual Learning Environment, wiki). Classes are highly interactive, with practical application of concepts a key factor, as well as cases drawn from real-life. The MSc Information Security and IT Management is designed around small groups so you can be sure that you will have plenty of individual discussion with your tutors.

How will I be assessed?

Throughout the programme we will assess your vocational capability, academic critical thinking and intellectual development. Coursework, case studies, problem-solving exercises and exams may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academics who are research-active and regularly engage within the wider business and academic environment. Staff specialise in particular subjects so you will benefit from a wide range of knowledge and experience.

What are my career prospects?

The MSc in Information Security and IT Management will provide you with the skills and knowledge to develop your interests as an IT security professional and IT manager. As organisations become ever more dependent on IT, there are increasing opportunities for specialist positions related to security. The course provides knowledge and skills which underpin Information Systems Security Certification Consortium or (ISC)2 and ISACA certifications.

Read less
This programme teaches students the skills required to manage a software project by producing criteria to monitor the project's progress and measure outcomes. Read more

This programme teaches students the skills required to manage a software project by producing criteria to monitor the project's progress and measure outcomes. Students learn how to formulate requirements for a business system and are given an underpinning in the nature of software development and its inherent complexity. The programme also covers system modelling and user interface and database design. Students learn to develop a system from determining its requirements and graphic user interface to database implementation.

This programme is of particular interest to those with a first degree in business or with business experience. Students are given an understanding of the information technologies upon which e-commerce is built and how these technologies provide us with new ways of organising and managing business. On successful completion of this programme, students should be proficient in the development of Internet, web and database technologies. They should also have the project management skills required for IT consultancy and strategic decision making.

Through our short course centre opportunity may also be provided to study for the Microsoft Technology Associate Exams.

Full time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Part time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Year 2

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This degree is accredited by the British Computer Society (BCS). This programme has the following accreditation: partial CITP. Your programme can therefore lead to partial exemption of the BCS Chartered IT Professional (CITP) status.

Careers

Graduates from this programme can pursue careers as business analysts, IT consultants and IT managers. Opportunities exist to develop a career working as independent consultants or within teams in diverse areas such as business and IT, internet and e-commerce applications, teaching and training.



Read less
Visit our website for more information on fees, scholarships, postgraduate loans and other funding options to study International Security and Development (Extended) at Swansea University - 'Welsh University of the Year 2017' (Times and Sunday Times Good University Guide 2017). Read more

Visit our website for more information on fees, scholarships, postgraduate loans and other funding options to study International Security and Development (Extended) at Swansea University - 'Welsh University of the Year 2017' (Times and Sunday Times Good University Guide 2017).

The MA in International Security and Development introduces students to issues and debates within International Security. This includes coverage of both ‘traditional’ security issues such as war and conflict and ‘non-traditional’ issues such as economic security, environmental security, health, identity and migration.

Key Features of MA in International Security and Development

Issues of security, violence and conflict have become central to international politics and to development policy and discourse. In order to comprehend the modern world, a full appreciation of the realities of conflict and violence, has become essential.

Drawing on the Department’s expertise in the field of security, International Security and Development students are also provided with an advanced introduction to key approaches in the study of security including realism, securitization theory, feminist approaches, critical theory and poststructuralism.

Students enrolled on the MA in International Security and Development benefit from the College of Arts and Humanities' Graduate Centre. The Graduate Centre fosters and supports individual and collaborative research activity of international excellence and offers a vibrant and supportive environment for students pursuing postgraduate research and taught masters study including those in International Security and Development. The Centre provides postgraduate training to enhance academic and professional development and facilitates participation in seminar programmes, workshops and international conferences.

The full-time International Security and Development course structure is split across the year with three modules taken in each academic semester (a total of six modules) and then a dissertation over the summer. Students study four compulsory modules, the research module and one optional module. The dissertation is written on a specialist research topic of the student's choosing.

Part-time study in MA in International Security and Development is available.

The Extended MA (EMA) in International Security and Development is a 240-credit postgraduate qualification that is equivalent to 120 ECTS (European Credit Transfer System) and is thus a recognised Masters qualification throughout the European Union. The EMA is a standard UK MA plus an additional 60 credits (30 ECTS) and this additional coursework is undertaken in one semester at a partner institution overseas. The EMA in International Security and Development is therefore not only an EU recognised postgraduate qualification it also adds a study abroad experience thus enhancing the qualification’s employability credentials.

The partner institution for EMA International Security and Development is the Department of International and Area Studies at The University of Oklahoma. The Department of International and Area Studies is an exciting and rapidly growing academic unit within the University of Oklahoma. It has approximately twenty faculty members and, critically for this EMA in International Security and Development, their expertise lie within the fields of security and development. The University of Oklahoma Norman Campus is located approximately 20 minutes south of Oklahoma City on a breathtaking campus. Created in 1890 The University of Oklahoma enrols more than 30,000 students, it has achieved the Carnegie Foundation’s highest tier of research activity classification, and is ranked in the top 400 universities in the world according to the Times Higher rankings.

MA in International Security and Development Programme Aims

- To develop advanced knowledge and understanding of International Security and Development.

- To develop critical, theoretical and analytical skills, improve written and oral communication skills.

- To acquire research skills in International Security and Development.

Modules

Modules on the MA in International Security and Development typically include:

• Violence, Conflict and Development

• Critical Security

• International Security in the Asia Pacific

• Civil Society and International Development

• Approaches to International Relations

• War, Identity and Society

• Governance: From State Formation to Global Governance

• War in Space

• State of Africa

• Human Rights and Humanitarian Intervention

• Rights Based Approaches to Development

Who should Apply?

Students interested in International Security and Development, from a politics, international relations, development studies, law, humanities, social science, international business or related background. Students interested in preparation for postgraduate research, MPhil or PhD, or who wish to develop skills and knowledge related to International Security and Development.

Careers

Career expectations are excellent for International Security and Development graduates. MA in International Security and Development degree holders may move on to doctoral study or enter employment sectors such as the diplomatic corps, the armed forces, intelligence and risk analysis, relief and humanitarian organisations, law and finance, government and politics and international business.

Research Interests

The following research groups at Swansea provide a distinct international and multi-disciplinary forum for the advancement of the

study of international security and development including:

• International Relations & Security

• Development Studies

• Cultural Political Economy

• Policy and Governance

• International Communication

Regular research seminars and lectures are run through these groups and also through the Research Institute for Arts and Humanities (RIAH) which students are encouraged to attend.

Student Quote

“I am now in my fourth year at Swansea University and can honestly say that I have enjoyed every moment. My undergraduate years were so good that I choose to stay on for another year to complete my Masters in International Security and Development and this is a decision I certainly do not regret. I feel like my degree has provided me with the tools needed to thrive in the world of employment, and the MA in International Security and Development I am now studying towards will only improve my chances of getting a high end job.”

Chris Harber, International Security and Development, MA



Read less
The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Read more

The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the US and beyond and the analysis of intelligence collection. The M.S. in National Security Affairs and International Relations is offered online worldwide.

National security affairs is one of the fastest growing professions with positions open in the public sector in the federal, state and local governments and in the private sector. This program is designed for professionals in the field seeking career advancement, those who aspire to enter the field, individuals in related professions, and those retired from the military and government seeking consulting and other positions. Examples of potential students include personnel in the military, federal, state and local governments, law enforcement, corporations, and academia, as well as recent college graduates.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes. 

M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the U.S. and beyond, and the analysis of intelligence collection. Students will also develop a deep understanding of the international context in which U.S. national security issues are shaped.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes.

Following completion of the program core, students must complete 15 credits of coursework from the list of available electives. The majority of the elective offerings were developed specifically for the national security and international relations program, with a small number drawn from closely related fields. The elective list contains both courses that emphasize domestic security and courses that have a broader international focus, resulting in sufficient breadth of subject matter to allow students to tailor their choices around particular academic or professional interests.

Students interested in Cyber Security can choose to take a specific concentration in this area. Students who choose this option must complete 9 credits from the Cyber Security concentration and 6 credits from the elective list. Before choosing this option, students must secure permission from the Department of History and Political Science. After a consultation, it will be determined whether the student can enter the Cyber Security concentration, or if additional foundation courses will be required in order to enter and successfully complete the concentration.

Core Courses (21 credits)

  • NSAM 5001 - Current Issues in National Security (3 credits)
  • NSAM 5003 - National Intelligence Collection and Analysis: Theory and Practice (3 credits)
  • NSAM 5004 - Border Protection and Military Issue (3 credits)
  • NSAM 5005 - Research and Evaluation in National Security Affairs (3 credits)
  • NSAM 5010 - US Foreign Policy and National Security (3 credits)
  • NSAM 5014 - Ethical Issues in National Security (3 credits)
  • NSAM 5016 - International Relations: Theory and Practice (3 credits)

Electives (15 credits)

  • NSAM 5002 - Terrorists and Terrorism: Theory and Practice (3 credits)
  • NSAM 5015 - Civil Liberties and National Security (3 credits)
  • NSAM 5020 - International Law and Institutions (3 credits)
  • NSAM 5030 - American Government and Domestic Security (3 credits)
  • NSAM 5040 - Cyber Conflict and Statecraft (3 credits)
  • DEM 5090 - Weapons of Mass Threat and Communicable Diseases (3 credits)
  • MHS 5314 - Bioterrorism and Weapons of Mass Destruction (3 credits)
  • NSAM 5502 - Directed Readings in National Security Affairs (3 credits)
  • NSAM 5650 - Economic Statecraft in National Security Affairs (3 credits)
  • NSAM 6130 - Practicum/Internship (3 credits)
  • NSAM 6690 - Special Topics in National Security Affairs and International Relations (3 credits)
  • NSAM 6700 - Directed Thesis in National Security Affairs and International Relations (6 credits)

Optional Cyber Security Concentration

  • MMIS 0683 - Fundamentals of Security Technologies (3 credits)
  • MMIS 0684 - Information Security Management (3 credits)
  • MMIS 0685 - Information Security Governance (3 credits)
  • MMIS 0686 - Information Systems Auditing (3 credits)
  • MMIS 0687 - Information Security Project (3 credits)

Practicum

In addition to successfully completing all course work, students must pass a tabletop examination to be awarded the M.S. in National Security Affairs and International Relations. When a student has completed all coursework, has maintained a minimum of 3.0 GPA with no "incomplete" grades, and is a "student in good standing" with no disciplinary actions pending or disciplinary tasks to complete, the student will be eligible to take the tabletop examination. The tabletop exam is an assessment of the student's ability to integrate the knowledge and skills gained through course work.The exam tests the student's written ability to critically analyze and apply conflict assessment, theory, and research methodology to hypothetical conflict situations. The exam also tests knowledge of material specific to the academic curriculum.



Read less
On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. Read more

On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. In the Cyber Security course, Swansea Computer Science takes a holistic and interdisciplinary approach, bringing together modules on diverse topics such as penetration testing, formal modelling, information security management, cryptography and AI in order to equip our students with a suitable mindset for a career in cyber security. The department's cyber security lab provides the perfect backdrop for exploring the security landscape, allowing Cyber Security students and staff to carry out experiments in network security, mobile security, and to explore threats and defence mechanisms in the context of the Internet of Things.

Key Features of the MSc in Cyber Security

  • We are top in the UK for career prospects [Guardian University Guide 2018]
  • 5th in the UK overall [Guardian University Guide 2018]
  • 7th  in the UK for student satisfaction with 98% [National Student Survey 2016]
  • We are in the UK Top 10 for teaching quality [Times & Sunday Times University Guide 2017]
  • 12th in the UK overall and Top in Wales [Times & Sunday Times University Guide 2017]
  • 91.9% in graduate employment or further study six months after leaving University [DHLE Survey 2016]
  • UK TOP 20 for Research Excellence [Research Excellence Framework 2014]
  • Our Project Fair allows students to present their work to local industry
  • Strong links with industry
  • £31m Computational Foundry for computer and mathematical sciences will provide the most up-to-date and high quality teaching facilities featuring world-leading experimental set-ups, devices and prototypes to accelerate innovation and ensure students will be ready for exciting and successful careers. (From September 2018)
  • Top University in Wales [Times & Sunday Times University Guide 2017]

Our increasingly connected world presents continual new and serious security threats. From privacy violations (hacking, monitoring communications, leaking sensitive data, stealing and publishing private information) through to the drugs trade, sex trafficking and terrorism, Computer Science can provide the techniques required for mitigating such risks, in order to provide secure, reliable and trustworthy systems.

Taught component: The MSc in Cyber Security offers a range of modules, taught by internationally renowned researchers and covering topics such as: Cryptography and Network Security, Penetration Testing, Information Security Management, Embedded Systems Modelling and Verification Techniques, Web Application Development, Blockchain, Cryptocurrencies and Smart Contracts, Advanced Topics: AI and Cyber Security Invention and Innovation in Computing.

Dissertation component: A further four months duration is spent undertaking a substantial research project (60 credits), which will involve using and exploring cutting edge techniques for specifying, developing, verifying and accessing systems against security criteria. Cyber Security Students will benefit from our broad range of industrial partners and internationally leading research expertise.

Possible Future Pathways: Cyber Threat Analyst - Penetration Tester PhD Researcher - Data Security Analyst Secure Web Developer - Verification Engineer.

Modules

Modules on the Cyber Security course may include:

  • Information Security Management
  • Computer Science Project Research Methods
  • Critical Systems
  • IT-Security: Cryptography and Network Security
  • Security Vulnerabilities and Penetration Testing
  • Invention and Innovation in Computing
  • Blockchain, Cryptocurrencies and Smart Contracts
  • Advanced Topics: Artificial Intelligence and Cyber Security
  • Web Application Development
  • Embedded System Design

Facilities for MSc in Cyber Security

The Department is well equipped for teaching, and is continually upgrading its laboratories to ensure equipment is up-to-date – equipment is never more than three years old, and rarely more than two. Currently, students use three fully networked laboratories: one, running Windows; another running Linux; and a project laboratory, containing specialised equipment. These laboratories support a wide range of software, including the programming languages Java, C# and the .net framework, C, C++, Haskell and Prolog among many; integrated programme development environments such as Visual Studio and Netbeans; the widely-used Microsoft Office package; web access tools; and many special purpose software tools including graphical rendering and image manipulation tools; expert system production tools; concurrent system modelling tools; World Wide Web authoring tools; and databases.

As part of our expansion, we are building the Computational Foundry on our Bay Campus for computer and mathematical sciences. As a student on the MSc in Cyber Security, you will study at the Bay Campus in the new Computational Foundry, a dedicated £32 million building for computational studies, providing the latest labs, resources and ecosystems for world leading, interdisciplinary research.

Careers for MSc in Cyber Security Graduates

All Computer Science courses including the MSc in Cyber Security will provide you the transferable skills and knowledge to help you take advantage of the excellent employment and career development prospects in an ever growing and changing computing and ICT industry.

94% of our Postgraduate Taught Graduates were in professional level work or study [DLHE 14/15].

Jobs include:

  • Software Engineer: Motorola Solutions
  • Change Coordinator: Logica
  • Software Developer/Engineer: NS Technology
  • Workflow Developer: Irwin Mitchell
  • IT Developer: Crimsan Consultants
  • Consultant: Crimsan Consultants
  • Programmer: Evil Twin Artworks
  • Web Developer & Web Support: VSI Thinking
  • Software Developer: Wireless Innovations
  • Associate Business Application Analyst: CDC Software
  • Software Developer: OpenBet Technologies
  • Technical Support Consultant: Alterian
  • Programming: Rock It
  • Software Developer: BMJ Group


Read less

Show 10 15 30 per page



Cookie Policy    X