• Regent’s University London Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • University of York Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Swansea University Featured Masters Courses
King’s College London Featured Masters Courses
University of Greenwich Featured Masters Courses
Queen Mary University of London Featured Masters Courses
University of Greenwich Featured Masters Courses
University of Leeds Featured Masters Courses
"malware"×
0 miles

Masters Degrees (Malware)

  • "malware" ×
  • clear all
Showing 1 to 15 of 15
Order by 
This popular and high-quality GCHQ-accredited Masters degree delivers modern enterprise Cyber Security, coupled with Digital Forensics for investigation and incident response. Read more
This popular and high-quality GCHQ-accredited Masters degree delivers modern enterprise Cyber Security, coupled with Digital Forensics for investigation and incident response.

Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics.

The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

See the website http://www.napier.ac.uk/en/Courses/MSc-Advanced-Security-and-Digital-Forensics-Postgraduate-FullTime

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

The MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

SAAS Funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Read less
This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. Read more
This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cyber security perspective.

Key benefits

• We welcome applications from students who may not have formal/traditional entry criteria but who have relevant experience or the ability to pursue the course successfully.

• The Accreditation of Prior Learning (APL) process could help you to make your work and life experience count. The APL process can be used for entry onto courses or to give you exemptions from parts of your course.

• Two forms of APL may be used for entry: the Accreditation of Prior Certificated Learning (APCL) or the Accreditation of Prior Experiential Learning (APEL).

Visit the website: http://www.salford.ac.uk/pgt-courses/cyber-security,-threat-intelligence-and-forensics

Course detail

You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidences and present them in the court of law. You will use your knowledge of programming to analyse different malwares to determine how they work and how countermeasures can be developed. Only a small percentage of cyber security professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.

You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cyber security while you operate within a well-formed professional and ethical framework.

Suitable For

Suitable for graduates of a computing subject that includes programming and networking, and who love go down to a low level to discover how things work.

Format

• Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
• Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
• Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
• The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.

Modules

• Cyber Forensics and Malware Investigation
• Information Security in Practice
• Penetration Testing and Exploit Development
• Cyber Threat Intelligence
• Project

Assessment

• Examination (20%) assesses your immediate response to small or medium unseen problems
• Coursework (45%) assesses your considered and in-depth response to a larger problem
• Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.

Career Prospects

Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.

How to apply: http://www.salford.ac.uk/study/postgraduate/applying

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
This course is available full-time over one year, or part-time over three years. It is made up of 8 assessed modules taught in week-long blocks and an individual project module. Read more
This course is available full-time over one year, or part-time over three years.

It is made up of 8 assessed modules taught in week-long blocks and an individual project module.

This course is suitable for those with a Computer Science related degree and is for those students who already possess a strong computer science, software engineering or information technology background.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face.

Our new MSc in Cyber Security is a forward-looking course that gives you the skills and knowledge you need in the core areas of cyber security. It emphasises the important technical material that will help you make effective cyber security decisions, and addresses issues such as:
-Identity
-Trust and reputation
-Cryptography
-Network security
-Malware and intrusion detection
-Risk management
-Development of high assurance systems

If you are looking to follow a career in industry or government, this course will provide you with a broad education in cyber security, that allows you to make technically informed principled decisions. This course will also prepare you if you are seeking a research career in cyber security - a research skills module is a mandatory part of the course.

It has been designed for students who already possess a strong computer science, software engineering or information technology background who want to broaden their knowledge about the specific challenges in cyber security and of possible solutions to those challenges.

Course structure
The MSc in Cyber Security is offered as a one-year full-time course, or can be taken part-time over three years.

The first half of the course is taken up by taught modules. Each module comprises a mix of lectures, problem classes and practical classes, plus a personal study time. In the second half of the course, students undertake an individual research project under the supervision of a member of staff.

Course aims
-To educate students in the theories, principles, practices and technologies of cyber security.
-To provide the knowledge and understanding of the principles underpinning effective approaches to cyberdefence.

Learning outcomes
When you graduate from the MSc in Cyber Security, you will have developed a detailed understanding of the fundamental aspects of cyber security. The course emphasises the important technical material that must be understood in order to make effective cyber security decision making.

You will understand extant threats to current and emerging system types, and understand and be familiar with a range of technologies that can be brought to bear to reduce risks.

This course will equip you for a career in industry or government, particularly in strategic cyber security decision making, or if you are seeking a research career in this area.

Project

The dissertation project undertaken by students over the summer is carried out individually, supervised by a member of academic staff. It may involve working with an external organisation. Students are also encouraged to work with academic staff to create projects of interest to them.

All projects are vetted to ensure suitability for the MSc. Provided academic criteria are met, there is considerable flexibility in the choice of cyber security topics for the project. Though many projects may follow naturally from the taught material, projects may also investigate suitably challenging topics outside that material.

The outputs from this module are a project dissertation together with a conference paper length summary of the work.

Projects are worth 5/9 of the total mark for the MSc.

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. Read more

Aim

Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the MSc is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges.

This taught programme provides a strong foundational education in the core areas of cyber security and offers practical training in key software tools and programs. Applied practical skills will be developed further in specialised projects exploring leading edge issues in cyber security research.

The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen's University Belfast's Centre for Secure Information Technologies (CSIT).

CSIT is a GCHQ accredited Academic Centre of Excellence in Cyber Security Research and is the UK's largest university research lab in this field. CSIT is fast developing a reputation as a global innovation hub for cyber security and is influenced throughout by its strong history of commercial engagement with world leading companies including Infosys, Cisco, IBM, Thales, BAE Systems, McAfee, Roke, and Altera.

Programme Content

The MSc in Cyber Security is available in two options, lasting either 1 or 2 years:

The 1-year MSc consists of six taught modules (120 CATS points) and a 4-5 months practical project of a research nature/work placement (60 CATS points).

The 2-year MSc consists of six taught modules (120 CATS points) and a 12 months practical project of a research nature/work placement (60 CATS points).

One compulsory module and a choice of five from seven other modules as listed below:
• Applied Cryptography
• Computer Forensics
• Network Security and Monitoring
• Software Assurance
• Malware
• Media Security
• Intelligent Information Systems
• Ethical & Legal Issues in Cyber Security (Compulsory)

In any given year further specialist topics may be available for selection or listed topics may not be offered.

Assessment

Comprises written examination and coursework/lab work in six modules; and a dissertation on your research project (180 CATS points total).

Opportunities for Careers

Strong Industry Engagement
A key differentiator of our MSc programme will be the opportunity to closely engage with CSIT industry partners. The programme offers an enhanced education experience, including the facilitation of industrial internships and work placements with leading security professionals, as well as other commercially specified projects. Our Scholarships and Work Placements programme offers a significant opportunity for students to enhance career prospects by directly engaging with potential employers.

Opportunities for placements are being provided by the following companies: Austrian Institute of Technology (AIT), Facebook, IBM, McAfee, PwC, RepKnight, Roke, Thales, and United Technologies Research CEntre (UTRC).

Professional Skills Training
Students will be offered a range of personal development and transferable skills training to improve their professional skills and increase their employability. Courses will cover: project management, presentation skills, communication strategies, networking skills, public engagement and entrepreneurship. Invited seminars and special guest lectures from industrial and academic leaders offer students a chance to engage with leaders in the cyber security profession.

Careers
Our graduates have found that holding a prestigious MSc qualification from Queen's (one of the UK's top engineering schools) has significantly enhanced their job opportunities and employment prospects. With demand for cyber security experts growing at 12 times the rate of the overall job market, students can expect their career prospects to be enhanced significantly after graduation.

Our MSc in Cyber Security will prepare graduates for successful careers in secure systems development, security architecture development, network security, data analytics, and right up to board level positions such as Chief Information Security Officer (CISO). Prospects for research and academic career paths in cyber security will also be enhanced by the MSc.

Special Features

Work Placements and Scholarships Programme
A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security degree programme. These opportunities are being provided on a competitive basis by CSIT's industrial partners and others affiliated with the Work Placements and Scholarships Programme. Once accepted for this masters degree you will be eligible to apply for opportunities made available via the programme.

Funding

A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security course via our Work Placements and Scholarships Programme.

Scholarship Opportunities:
CSIT Scholarships (x2) – UK/EU
- Open to UK/EU applicants to the 1-year MSc in Cyber Security
- Only students who are graduating in 2014 with an Undergraduate course in relevant discipline areas are eligible to apply
- Scholarships cover fees and a paid summer internship at CSIT
- How to Apply: Eligible students who apply for the 1-year MSc in Cyber Security will automatically be considered for these scholarships.

GREAT Queen’s University Belfast Scholarships (x2) – India
- Open to India students
- Scholarship value: £1500
- For further information and how to apply see:
http://www.qub.ac.uk/home/StudyatQueens/InternationalStudents/InternationalScholarships/GREATQueensUniversityBelfastScholarships-India/

Full details and further announcements about our Scholarships and Work Placements programme are available at http://www.csit.qub.ac.uk/msc

Read less
This award is a Masters degree that is designed to broaden understanding and knowledge of computing science, and enhance the ability to apply this within industry or commerce. Read more
This award is a Masters degree that is designed to broaden understanding and knowledge of computing science, and enhance the ability to apply this within industry or commerce. Also in addition to gaining an in-depth knowledge of state-of-the-art technologies, it also develops further the competence and ability to apply them, particularly through the inclusion of an optional period in industry as an integral part of the course.

BCS accredited: CITP Further Learning and CEng/CSci (partial fulfilment). BCS, the Chartered Institute for IT, champions the global IT profession and accredits UK Computing courses.

Course content

The core modules will equip you with professional and research skills and will explore the social, legal and ethical aspects of computer science. The option modules will allow you to develop key skills in the different branches of computer science such as programming, multimedia, web, games, Android and mobile application development etc.

Core Modules
-Professional Development
-Research Methods

Option Modules, Subject to availability
-Programming for Web Applications
-Operational and Analytical Databases
-Cybercrime Forensic Analysis
-Digital Forensics Fundamentals
-Malware Analysis and Reverse Engineering
-Media Editing and Multimedia Applications
-Mobile Web and Multimedia
-Information System Management & Strategy
-IT Infrastructure
-Project & Change Management
-Location Aware Mobile Application Development
-Advanced Android Application Development
-Android Application Development
-Application Development for iOS Devices
-Enterprise Mobility
-Mobile Computing and Wireless
-Database Design and Development
-Engineering Internet Applications
-Enterprise Applications
-Information Systems Analysis Modelling & Design
-Knowledge Management

Final module
-MSc Dissertation

Graduate destinations

On completion of the course you will be a computing professional with a broad and deep knowledge of technical material and an ability to apply it. You will be adept at delivering IT solutions and systems appropriate for industry and commerce, fully prepared for a successful career in academia or industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

Degree information

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits. The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules
-Computer Security I
-Computer Security II
-Introduction to Cryptography
-Research in Information Security

Optional modules - students choose four of the following:
-Distributed Systems and Security
-People and Security
-Applied Cryptography
-Information Security Management
-Language Based Security
-Philosophy, Politics and Economics of Security and Privacy
-Malware
-Cryptanalysis
-Cybercrime
-Privacy Enhancing Technologies
-Relevant options from other MSc degree programmes

Dissertation/report
All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning
The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Careers

UCL graduates are keenly sought by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Top career destinations for this degree:
-Risk IT RTB Support Administrator, Lloyds Banking Group
-Technical Analyst, The Royal Bank of Scotland (RBS)
-IT Lead Developer, MOVE Guides
-Software Developer, Oracle
-Cisco Certified Network Associate (CCNA) Routing and Switching, Cisco

Employability
Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts occur through the ACE-CS guest lecture series integrated into the course.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research, and was one of the top-rated departments in the UK government's recent Research Excellence Framework.

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. Students from the degree won the first UK Cyber Security Challenge in code cracking in 2013.

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Develop a different set of skills with this new one year conversion masters course. Read more
Develop a different set of skills with this new one year conversion masters course.

Fascinated by cybercrime and want to learn how to tackle it? As organisations and government departments are becoming increasingly more reliant on computer networks and virtual environments for their business functions, cyber security is now realised to be of critical importance. Southampton Solent University’s essential cyber security engineering conversion masters degree is well suited to students from a wide range of backgrounds, helping you to develop new skills and gain advanced theoretical and practical proficiencies in dealing with computer, network and information security.

‌•Computing students have full access to the University’s state-of-the-art IT and networking facilities.
‌•Students will learn the latest techniques in tackling cybercrime and managing security systems.
‌•To complement studies, students can benefit from enhancement activities, such as industry talks, code jams, and employability support.
‌•Southampton Solent hosts regular lectures given by the British Computer Society (BCS), which computing students are encouraged to attend.
‌•Small group teaching allows for tailored support, helping students to shape the course to their own interests.
‌•The course comes to a close with students conducting their own research projects. This can be an excellent way to specialise knowledge, or act as a springboard for PhD study.

The industry

Recent research conducted by the UK government suggests that the costs of cybercrime to the UK could be in the order of £27 billion per year. To combat this, the Government has invested in a National Cyber Security programme which aims to make the UK one of the most secure places in the world to do business in cyberspace.

The cyber security sector has grown to over £17 billion in the UK, employing over 100,000 people. With the increasing importance for organisations to ensure their computer networks are robust against attempted security breaches, this sector is likely to grow, with high demand for skilled cyber security engineers.

A postgraduate qualification can put you at the forefront of this demand, demonstrating your commitment to the industry and your ability to carry out in-depth computing research.
This is echoed from reports and comments from industry-

“As a small software house, dealing with a group of international corporates, we have a regular need for graduates with strong software engineering and database skills. Given that we design systems that link to e-commerce, a good understanding of cyber security engineering is also key. Over the years we have found the pool of graduates with the required technical skills has seriously diminished so the more technical graduates from Solent University are an important source for us.”
John Noden, Managing Director/Executive Director Technical Design, Zentive

The programme

Southampton Solent’s cyber security engineering master’s conversion degree will help equip students with the essential skills and knowledge to become cyber security specialists, learning how to tackle cybercrime and manage security systems.

As well as gaining a firm grounding in web and software development, students on this course will learn the necessary skills to become ethical hackers, penetrate test networks, and prevent and eradicate malware. Students will also develop their problem-solving skills and explore research methods.

The course curriculum is developed with input from a variety of sources, including an industrial liaison panel, to ensure students are studying the latest technology and working practices employed by industry experts.

To aid study, students have full access to the University’s specialist networking labs equipped with industry-standard networking equipment from Cisco, Fluke and HP, as well as high-fidelity simulation systems, including the market-leading Opnet. Using Alienware computers and CISCO Packet Tracer, students can practice their software development skills and test their web applications.

The course has a strong focus on employability, and hosts regular industry speakers and events by the BCS to help students build their professional network.

Next steps

Think you’ve got what it takes to enter the challenging world of cyber security? Using the latest methods and technology, Southampton Solent’s cyber security engineering master’s conversion degree will help provide you with the skills to tap into this fast-growing industry. Apply today.http://www.solent.ac.uk/courses/2016/postgraduate/cyber-security-engineering-msc/course-details.aspx#tab1

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system. Read more
This postgraduate course builds on your existing graduate skills by providing detailed knowledge of electronic attacks and how to defend against the methods used to gain access and exploit a system.

Postgraduate funding (tuition fee and living cost loan) may be available from the Student Awards Agency for Scotland for those who meet the eligibility criteria.

Why choose this course?

-Abertay is the only university in the UK that offers a Masters programme in Ethical Hacking.
-It provides the core skills to allow you to take positions in a variety of companies where computer security is a major issue.
-Graduates will be at the forefront of new developments in security.
-Benefit from an active teaching group with a growing reputation based on industry links and Knowledge Transfer projects.
-It is delivered in a project based, entrepreneurial and enterprise culture.

Our students are passionate about their subject area and developing their knowledge. Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns.

We aim to change the way you think. We encourage lively debates about pertinent ethical and security issues. Students develop the hacker mindset, determined to ‘do their bit’ to improve security in the world of Computing.

Join our Graduate School

Our Graduate School is a dedicated facility providing support, training and professional development opportunities to our vibrant postgraduate community. Specially designed to promote integration and inculcation of interdisciplinary working in our next generation of researchers, postgraduates study and learn together at Abertay - from Environmental Management to Law, Psychology, Bioscience, Economics and Business, Cybersecurity and Computer Games Development.

When you join us as a postgraduate student or researcher, you’ll be joining a community of creative like-minded scholars and will automatically be provided with access to our dedicated study and social spaces – a forum in which you can meet, work and learn with other researchers and postgraduates from across the University. You’ll benefit from training and professional development opportunities as well as support with funding applications, placement opportunities, teaching support, public engagement and outreach activity.

What you study

From forensic computing to network security, the course covers a wide range of subjects. Within these, you will learn about web hacking, password cracking, malware analysis, port scanning, buffer overflows and much more.

You also learn how to evaluate the impact of security problems and recommend improvements to a network’s security within a legal and ethical framework. You will also conduct a masters project within an area of cybersecurity that will allow you to build on your existing skills.

How you learn

Teaching is focused on lectures and practical sessions in dedicated classrooms. Lectures are used to present the key concepts, while practicals increase your understanding of the subject and allow you to develop your competence in technological and theoretical work. The course is taught using a problem-based learning approach. You will spend about 12 hours per week attending classes and about 30 hours a week of private study.

How you are assessed

The taught course will be assessed using a combination of written coursework, presentations and seminars, with a written dissertation at MSc level.

Read less

  • 1
Show 10 15 30 per page


Share this page:

Cookie Policy    X