• Cardiff University Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • Birmingham City University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Northampton Featured Masters Courses
London Metropolitan University Featured Masters Courses
University College London Featured Masters Courses
University of Dundee Featured Masters Courses
Nottingham Trent University Featured Masters Courses
Swansea University Featured Masters Courses
"msc" AND "in" AND "infor…×
0 miles

Masters Degrees (Msc In Information Security)

We have 517 Masters Degrees (Msc In Information Security)

  • "msc" AND "in" AND "information" AND "security" ×
  • clear all
Showing 1 to 15 of 517
Order by 
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more

The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

About this degree

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits.

The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules

  • Computer Security I (15 credits)
  • Computer Security II (15 credits)
  • Introduction to Cryptography (15 credits)
  • Research in Information Security (15 credits)

Optional modules

Students choose 60 credits from the following:

  • Applied Cryptography (15 credits)
  • Cryptanalysis (15 credits)
  • Cybercrime (15 credits)
  • Distributed Systems and Security (15 credits)
  • Information Security Management (15 credits)
  • Language Based Security (15 credits)
  • Malware (15 credits)
  • People and Security (15 credits)
  • Philosophy, Politics and Economics of Security and Privacy (15 credits)
  • Privacy Enhancing Technologies (15 credits)

Please note: the availability and delivery of optional modules may vary, depending on your selection.

Dissertation/report

All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning

The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Further information on modules and degree structure is available on the department website: Information Security MSc

Careers

UCL graduates are keenly sought after by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Recent career destinations for this degree

  • Information Security Expert, State Oil Company of Azerbaijan Republic
  • IT Risk and Cyber Security Associate, PwC
  • PhD Research Student in Computer Science, UCL
  • Security Engineer, Morgan Stanley
  • Technical Analyst, The Royal Bank of Scotland (RBS)

Employability

Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts arise through the ACE-CS guest lecture series integrated into the degree.

Careers data is taken from the ‘Destinations of Leavers from Higher Education’ survey undertaken by HESA looking at the destinations of UK and EU students in the 2013–2015 graduating cohorts six months after graduation.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research.

UCL received the highest percentage (96%) for quality of research in Computer Science and Informatics in the UK's most recent Research Excellence Framework (REF2014).

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. 

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Accreditation

Information Security has been successfully awarded full certification from the National Cyber Security Centre (NCSC). Students who wish to gain the certification with their degree need to choose COMPGA14 Information Security Management as one of their optional modules.

Research Excellence Framework (REF)

The Research Excellence Framework, or REF, is the system for assessing the quality of research in UK higher education institutions. The 2014 REF was carried out by the UK's higher education funding bodies, and the results used to allocate research funding from 2015/16.

The following REF score was awarded to the department: Computer Science

96% rated 4* (‘world-leading’) or 3* (‘internationally excellent’)

Learn more about the scope of UCL's research, and browse case studies, on our Research Impact website.



Read less
On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. Read more

On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. In the Cyber Security course, Swansea Computer Science takes a holistic and interdisciplinary approach, bringing together modules on diverse topics such as penetration testing, formal modelling, information security management, cryptography and AI in order to equip our students with a suitable mindset for a career in cyber security. The department's cyber security lab provides the perfect backdrop for exploring the security landscape, allowing Cyber Security students and staff to carry out experiments in network security, mobile security, and to explore threats and defence mechanisms in the context of the Internet of Things.

Key Features of the MSc in Cyber Security

  • We are top in the UK for career prospects [Guardian University Guide 2018]
  • 5th in the UK overall [Guardian University Guide 2018]
  • 7th  in the UK for student satisfaction with 98% [National Student Survey 2016]
  • We are in the UK Top 10 for teaching quality [Times & Sunday Times University Guide 2017]
  • 12th in the UK overall and Top in Wales [Times & Sunday Times University Guide 2017]
  • 91.9% in graduate employment or further study six months after leaving University [DHLE Survey 2016]
  • UK TOP 20 for Research Excellence [Research Excellence Framework 2014]
  • Our Project Fair allows students to present their work to local industry
  • Strong links with industry
  • £31m Computational Foundry for computer and mathematical sciences will provide the most up-to-date and high quality teaching facilities featuring world-leading experimental set-ups, devices and prototypes to accelerate innovation and ensure students will be ready for exciting and successful careers. (From September 2018)
  • Top University in Wales [Times & Sunday Times University Guide 2017]

Our increasingly connected world presents continual new and serious security threats. From privacy violations (hacking, monitoring communications, leaking sensitive data, stealing and publishing private information) through to the drugs trade, sex trafficking and terrorism, Computer Science can provide the techniques required for mitigating such risks, in order to provide secure, reliable and trustworthy systems.

Taught component: The MSc in Cyber Security offers a range of modules, taught by internationally renowned researchers and covering topics such as: Cryptography and Network Security, Penetration Testing, Information Security Management, Embedded Systems Modelling and Verification Techniques, Web Application Development, Blockchain, Cryptocurrencies and Smart Contracts, Advanced Topics: AI and Cyber Security Invention and Innovation in Computing.

Dissertation component: A further four months duration is spent undertaking a substantial research project (60 credits), which will involve using and exploring cutting edge techniques for specifying, developing, verifying and accessing systems against security criteria. Cyber Security Students will benefit from our broad range of industrial partners and internationally leading research expertise.

Possible Future Pathways: Cyber Threat Analyst - Penetration Tester PhD Researcher - Data Security Analyst Secure Web Developer - Verification Engineer.

Modules

Modules on the Cyber Security course may include:

  • Information Security Management
  • Computer Science Project Research Methods
  • Critical Systems
  • IT-Security: Cryptography and Network Security
  • Security Vulnerabilities and Penetration Testing
  • Invention and Innovation in Computing
  • Blockchain, Cryptocurrencies and Smart Contracts
  • Advanced Topics: Artificial Intelligence and Cyber Security
  • Web Application Development
  • Embedded System Design

Facilities for MSc in Cyber Security

The Department is well equipped for teaching, and is continually upgrading its laboratories to ensure equipment is up-to-date – equipment is never more than three years old, and rarely more than two. Currently, students use three fully networked laboratories: one, running Windows; another running Linux; and a project laboratory, containing specialised equipment. These laboratories support a wide range of software, including the programming languages Java, C# and the .net framework, C, C++, Haskell and Prolog among many; integrated programme development environments such as Visual Studio and Netbeans; the widely-used Microsoft Office package; web access tools; and many special purpose software tools including graphical rendering and image manipulation tools; expert system production tools; concurrent system modelling tools; World Wide Web authoring tools; and databases.

As part of our expansion, we are building the Computational Foundry on our Bay Campus for computer and mathematical sciences. As a student on the MSc in Cyber Security, you will study at the Bay Campus in the new Computational Foundry, a dedicated £32 million building for computational studies, providing the latest labs, resources and ecosystems for world leading, interdisciplinary research.

Careers for MSc in Cyber Security Graduates

All Computer Science courses including the MSc in Cyber Security will provide you the transferable skills and knowledge to help you take advantage of the excellent employment and career development prospects in an ever growing and changing computing and ICT industry.

94% of our Postgraduate Taught Graduates were in professional level work or study [DLHE 14/15].

Jobs include:

  • Software Engineer: Motorola Solutions
  • Change Coordinator: Logica
  • Software Developer/Engineer: NS Technology
  • Workflow Developer: Irwin Mitchell
  • IT Developer: Crimsan Consultants
  • Consultant: Crimsan Consultants
  • Programmer: Evil Twin Artworks
  • Web Developer & Web Support: VSI Thinking
  • Software Developer: Wireless Innovations
  • Associate Business Application Analyst: CDC Software
  • Software Developer: OpenBet Technologies
  • Technical Support Consultant: Alterian
  • Programming: Rock It
  • Software Developer: BMJ Group


Read less
Gain a prestigious MSc in Information Security. by distance learning. Read more

Gain a prestigious MSc in Information Security

by distance learning

A world renowned programme; the first of its kind in the world, this Information Security course looks at both technical and management aspects of cyber security and teaches you about technologies including cryptography, computer security, fraud detection, and digital forensics.

- You will gain cyber security skills for senior level careers by focusing on principles and issues, and you will learn how information security can best be managed.

- You will benefit from Royal Holloway’s wealth of research, expertise and practical consulting experience, which ensures that the degree is up to date and commercially relevant.

- You can study most modules on a stand alone basis and earn CPE credits. Students come from a variety of backgrounds, ranging from new graduates through to senior security managers in blue chip enterprises seeking a formal qualification in Information Security.

Hear from a graduate

“Achieving the Masters has significantly benefited my career in Information Security; previously, I provided specific technical advice to customers, but now, with the breadth and depth of knowledge gained during the MSc, I also deliver security strategy consulting to senior executives.” Paul Schwarzenberger, MSc Information Security

Prestige

The programme has been developed by academics within the Information Security Group (ISG) [external link] at Royal Holloway, University of London, one of the foremost academic security groups in the world.

ISG awarded Centre of Excellence status - Royal Holloway, University of London has been recognised for its world class research in the field of cyber security by UK intelligence agencies GCHQ.

The ISG is at the cutting edge of research into the design and evaluation of smart cards, electronic commerce, security management, mobile telecommunications security, and the integration of security techniques into specific applications. The ISG was awarded a Queen's Anniversary Prize in 1998 in recognition of it providing "a unique national resource for the training of information security specialists".

"A pioneering course that continues to provide students with the essential knowledge and understanding of information security, with many graduates going on to fill senior roles." Malcolm Marshall, Partner, KPMG.

Career progression

Graduates of the programme can be found in many organisations, ranging from large financial institutions to technology and research- oriented organisations, as well as security specialists. The MSc is also a foundation for further postgraduate research.

Continuing Professional Education (CPE)

You can study any of the compulsory core modules, plus the optional module 'Digital forensics', on a stand-alone basis and earn CPE credits. On successful completion of each module you will receive a University of London certificate.

Your time commitment

This programme is offered online, enabling you to fit your studies around work and family commitments. To complete in the minimum study period you will need to study 24 hours per week during the academic session (September-April). To complete the degree in four years, which is normal for those in full time employment, you will need to study about 12 hours per week over the academic session.

Excellent support

Fully supported by a Virtual Learning Environment, you will take part in online tutor-supported seminars and discussions; a virtual student cafe allows you to interact and network with other students.

Contact us

If you have any questions, please contact our Student Advice Centre.



Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:

  • EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
  • Specialist input from guest lecturers
  • Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
  • Specialist technicians to ensure you can get the most out of these technologies.

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the full course document.

Core modules

Digital Forensics pathway

Cyber Security Pathway

Professional accreditation

This programme is accredited by BCS, The Chartered Institute for IT, for fully meeting the further learning educational requirement for Chartered IT Professional (CITP) status and for partially satisfying the underpinning knowledge requirements set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC) and the Science Council for Chartered or Incorporated Engineer (CEng or IEng) status. Note that there are additional requirements, including work experience, to achieve full CITP, CEng, or IEng status. Graduates of this accredited degree will also be eligible for professional membership of BCS (MBCS).

The BCS accreditation is an indicator of the programme’s quality to students and employers; it is also an important benchmark of the programme’s standard in providing high quality computing education, and commitment to developing future IT professionals that have the potential to achieve Chartered status. The programme is also likely to be recognised by other countries that are signatories to international accords.

Career path

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;


Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Read more

The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Whilst these technologies bring us untold benefits, they also expose businesses, governments and individuals to repeated threats, such as fraud through data manipulation, deliberate sabotage and blackmail. As a result, businesses, governments and individuals around the world rely on the expertise and innovations of information security specialists, without which global communications systems would grind to a halt.

Want to join this expanding field and learn from the very best? Our flagship Information Security programme was the first of its kind in the world. It is certified by GCHQ, the UK Government Communications Headquarters, and taught by academics and industrial partners in one of the largest and most established Information Security Groups in the world. We are a UK Academic Centre of Excellence for cyber security research, and an Engineering and Physical Sciences Research Council (EPSRC) Centre for Doctoral Training in cyber security. We work closely with industry, and much of our curriculum and research is informed and audited by the industry itself. Our teachers are specialists in the field, with backgrounds in computer science, engineering, mathematics, statistics and the social sciences.

Our broad curriculum encompasses cryptography, fraud detection, system security, network security, device security and the study of how security itself should be managed. You will learn about the technical, legal and commercial aspects of the industry and have the chance to complete a supervised dissertation on a topic of your choice. In a typical year you could benefit from lectures and seminars given by as many as 50 different guest speakers. You will also have access to our virtualisation software, for experimenting with network security settings and ideas, as well as to our Penetration Testing Laboratory and industry-sponsored Smart Card Centre.

We offer a friendly, supportive learning environment and you will have a dedicated personal adviser to guide you through your studies. The skills you gain will open up a range of high-level career options and provide a solid foundation if you wish to progress to a PhD. Our graduates are in demand for their cutting-edge grasp of the field as well as their technical expertise and transferrable skills such as data handling, analysis, problem solving and research. The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

  • Join a world-class Information Security Group, recognised as an Academic Centre of Excellence by the UK Government.
  • Learn from an interdisciplinary team of renowned information security specialists who are involved in pioneering research in the field.
  • Benefit from our close ties with the information security industry.
  • Enjoy the flexibility to tailor your degree to your particular interests and complete a supervised research project of your own.

The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

Course structure

Core modules

  • Security Management
  • Introduction to Cryptography and Security Mechanisms
  • Project
  • Network Security
  • Computer Security (Operating Systems)
  • Security Technologies
  • Secure Business Architectures

Optional modules

In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.

  • Legal and Regulatory Aspects of Information Security
  • Advanced Cryptography
  • Database Security
  • Cyber Crime
  • Smart Cards, RFIDs and Embedded Systems Security
  • Software Security
  • Digital Forensics
  • Security Testing - Theory and Practice
  • Cyber Security

Teaching & assessment

We use a range of teaching methods, including seminars, lectures and practical lab work. There is a strong focus on small group teaching. The programme has a flexible, modular structure, combining a sueprvised dissertation and mandatory courses that together make up 120 of the 180 credits required to pass, with a range of optional modules on specialist topics, worth 20 credits each.

During your studies you will be invited to attend an intensive, two-day revision course to prepare for the Certified Information Systems Security Professional (CISSP) exams, which you will then be able to sit on campus, through an established arrangement with (ISC)2.

Assessment is through a combination of end-of-year examinations sat in May or June and the written dissertation, which has to be submitted in September.

Your future career

By the end of this programme you will possess the knowledge and skills to pursue a career as a cyber security professional, and an ideal basis for moving on to further postgraduate research if you prefer. You will have an advanced knowledge and understanding of the latest breakthroughs and techniques, as well as key challenges and opportunities in the field. This programme will also give you valuable transferable skills such as advanced IT skills, data handling, analysis, research, communication, problem solving, time management, adaptability and self-motivation.

Our graduates are highly employable and in recent years they have gone on to forge successful careers in a wide range of sectors, including: banking, telecommunications, security consultancies, the civil service, public utilities and the retail sector.

You will be assigned a personal advisor to guide you through your studies and advise you on further postgraduate opportunities. The campus Careers team will be on hand to offer advice and guidance on your chosen career and the University of London Careers Advisory Service runs regular sessions on finding summer internships or vacation employment and securing employment after graduation.



Read less
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society. Read more

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The programme will:

  • Provide students with advanced knowledge and understanding of information security theory and concepts
  • Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
  • Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
  • Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

Programme learning outcomes

Knowledge and understanding

Students will gain:

  • Knowledge and understanding of the general information security aims and challenges
  • Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
  • Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
  • Knowledge and understanding of technical concepts and mechanisms for digital forensics
  • Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
  • The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
  • The ability to implement or apply existing information security mechanisms and technologies in practice
  • The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
  • The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills

Students will leave the programme with the ability to:

  • Analyse and solve problems of technical nature under consideration of various risks and constraints
  • Make effective and efficient decisions in an environment of conflicting interests
  • Think strategically 
  • Synthesise and critically evaluate the work of others
  • Apply fundamental knowledge to investigate new and emerging technologies
  • Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills

Students will gain the ability to:

  • Come up with technical solutions to a range of problems
  • Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
  • Implement mechanisms and apply them in a wider context of more complex systems
  • Present their opinions and findings and to produce a high-quality report

Key / transferable skills

Students will have:

  • The ability to communicate concepts and results in a clear and effective manner
  • The time and resource management planning
  • The ability to work with available resources, to collect and analyse research-oriented material

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less
Aim. Our MSc in Applied Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. Read more

Aim

Our MSc in Applied Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the MSc is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges.

This taught programme provides a strong foundational education in the core areas of cyber security and offers practical training in key software tools and programs. Applied practical skills will be developed further in specialised projects exploring leading edge issues in cyber security research.

The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen's University Belfast's Centre for Secure Information Technologies (CSIT).

CSIT is a GCHQ accredited Academic Centre of Excellence in Cyber Security Research and is the UK's largest university research lab in this field. CSIT is fast developing a reputation as a global innovation hub for cyber security and is influenced throughout by its strong history of commercial engagement with world leading companies including Infosys, Cisco, IBM, Thales, BAE Systems, McAfee, Roke, and Altera.

Programme Content

The MSc in Cyber Security is available in two options, lasting either 1 or 2 years:

The 1-year MSc consists of six taught modules (120 CATS points) and a 4-5 months practical project of a research nature/work placement (60 CATS points).

The 2-year MSc consists of six taught modules (120 CATS points) and a 12 months practical project of a research nature/work placement (60 CATS points).

Six compulsory modules:

• Applied Cryptography

• Computer Forensics

• Network Security and Monitoring

• Software Assurance

• Malware

• Ethical & Legal Issues in Cyber Security

Assessment

Comprises written examination and coursework/lab work in six modules; and a dissertation on your research project (180 CATS points total).

Opportunities for Careers

Strong Industry Engagement

A key differentiator of our MSc programme will be the opportunity to closely engage with CSIT industry partners. The programme offers an enhanced education experience, including the facilitation of industrial internships and work placements with leading security professionals, as well as other commercially specified projects. Our Scholarships and Work Placements programme offers a significant opportunity for students to enhance career prospects by directly engaging with potential employers.

Opportunities for placements are being provided by the following companies: Austrian Institute of Technology (AIT), Facebook, IBM, McAfee, PwC, RepKnight, Roke, Thales, and United Technologies Research CEntre (UTRC).

Professional Skills Training

Students will be offered a range of personal development and transferable skills training to improve their professional skills and increase their employability. Courses will cover: project management, presentation skills, communication strategies, networking skills, public engagement and entrepreneurship. Invited seminars and special guest lectures from industrial and academic leaders offer students a chance to engage with leaders in the cyber security profession.

Careers

Our graduates have found that holding a prestigious MSc qualification from Queen's (one of the UK's top engineering schools) has significantly enhanced their job opportunities and employment prospects. With demand for cyber security experts growing at 12 times the rate of the overall job market, students can expect their career prospects to be enhanced significantly after graduation.

Our MSc in Cyber Security will prepare graduates for successful careers in secure systems development, security architecture development, network security, data analytics, and right up to board level positions such as Chief Information Security Officer (CISO). Prospects for research and academic career paths in cyber security will also be enhanced by the MSc.

Special Features

Work Placements and Scholarships Programme

A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security degree programme. These opportunities are being provided on a competitive basis by CSIT's industrial partners and others affiliated with the Work Placements and Scholarships Programme. Once accepted for this masters degree you will be eligible to apply for opportunities made available via the programme.

Funding

- For further information and how to apply see:

http://www.qub.ac.uk/Study/Scholarshipsandfunding/



Read less
About the course. Developed in conjunction with Deloitte UK, our Cyber Security MSc provides you with knowledge of the very latest cyber security principles, practices, tools and techniques. Read more

About the course

Developed in conjunction with Deloitte UK, our Cyber Security MSc provides you with knowledge of the very latest cyber security principles, practices, tools and techniques. The programme is provisionally certified by GCHQ, taught by a team of specialist staff in purpose-built cyber security computer laboratories. The involvement of the Industrial Advisory Group (Airbus, BT, Deloitte UK and Rolls-Royce) in designing the course and supporting its delivery and development ensures the teaching remains current and supportive of the real challenges cyber security specialists face in the rapidly changing cyber domain. You will gain a holistic perspective of cyber security, including the underpinning technology of the cyber domain and the role of linguistics, psychology and sociology in dealing with new cyber challenges. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts

developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre

access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest

combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity

you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects

employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

• Foundations of Cyber Security

• Cyber Threat Intelligence

• Host and Network Security

• Penetration Testing and Incident Response

• Cyber Engineering

• Digital Forensics Principles and Practice

• Malware Analysis

• Legal, Ethical and Professional Practice

• Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.

The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:

Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:

http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:

http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx



Read less
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. Read more
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. A key issue in IT strategy is Information Security, which is becoming more critical with the interconnection of systems through the Internet and the sharing of resources with business partners, clients and customers.

This Masters degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management.

You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.

What will I study?

You will study security from two perspectives: the concepts of computer and network security, together with a systemic approach to information security management. The programme of study is informed by ISO27000 legal compliance requirements and professional body knowledge requirements of ISACA (Information Systems Audit and Control Association), ITIL (Information Technology Infrastructure Library) and the Information Systems Security Certification Consortium (ISC)2. The study of computer forensics enables further specialisation.

IT Management is approached from a strategic and risk-based perspective, and includes business continuity and project management. A recent technology development that could have radical impact in both security and IT management is cloud computing, and the course provides an option to enable you to develop a sound understanding of the related issues and technology. Professional, ethical and contemporary issues in computing and research methods are also integrated into the programme.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars and technology-enhanced learning (e.g. Virtual Learning Environment, wiki). Classes are highly interactive, with practical application of concepts a key factor, as well as cases drawn from real-life. The MSc Information Security and IT Management is designed around small groups so you can be sure that you will have plenty of individual discussion with your tutors.

How will I be assessed?

Throughout the programme we will assess your vocational capability, academic critical thinking and intellectual development. Coursework, case studies, problem-solving exercises and exams may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academics who are research-active and regularly engage within the wider business and academic environment. Staff specialise in particular subjects so you will benefit from a wide range of knowledge and experience.

What are my career prospects?

The MSc in Information Security and IT Management will provide you with the skills and knowledge to develop your interests as an IT security professional and IT manager. As organisations become ever more dependent on IT, there are increasing opportunities for specialist positions related to security. The course provides knowledge and skills which underpin Information Systems Security Certification Consortium or (ISC)2 and ISACA certifications.

Read less
Getting to grips with the ever-changing shifts of international politics can be daunting. Our MSc in International Relations introduces you to the fundamental principles of global interaction, and refining your knowledge within specialist classes. Read more
Getting to grips with the ever-changing shifts of international politics can be daunting. Our MSc in International Relations introduces you to the fundamental principles of global interaction, and refining your knowledge within specialist classes. You will learn in a systematic and engaging way about the origins, evolution and multifaceted character of the international political system, before turning to the Security Studies specialism, providing specialist insights on power, influence and governance within key national, regional and international structures.

A fascinating and relevant degree supported in 2017 by a competitively-awarded Jean Monnet Studentship (£2000) as well as the possibility of in-house internships. CCCU graduates are well placed to specialise in careers connected to key areas of international relations, enhanced with expertise in security.

Visit the website https://www.canterbury.ac.uk/study-here/courses/postgraduate/international-relations.aspx

Course detail

Through a combination of core and specialist modules, the MSc in International Relations is constructed around a series of modules that will help you analyse the multifaceted origins, evolution and conflictual development of the international political system. You will explore the analytical application of a range of the core theories and contemporary concepts that make up the canon of International Relations. You will interrogate the relative merits and shortcomings of ideologies, political, economic and socio-cultural philosophies, structures of power, and systems of governance across in order to better understand the global political system.

Suitability

The new MSc in International Relations offered at Canterbury Christ Church University is established upon a firm foundation of research­led teaching, using innovative and blended learning methods, expertise driven insights, and a clear commitment to guiding and supporting all facets of graduate student development. Our International Relations programmes will provide you with the opportunity to gain comprehensive conceptual knowledge of the prime structures and interconnections that make up international relations, and an indispensable practical understanding of national, institutional, legal, political, economic and socio­cultural actors of the global community.

The 2017 MSc in International Relations is offered with a specialism in Security Studies, allowing you to gain an especially strong understanding of the role of power and influence, the distribution of authority and governance within national, regional and international modes of security, and the principles driving the narratives and practices of security. Offered both full and part-time, CCCU’s innovative MSc in International Relations will help you tackle the ‘big issues’ in international politics with confidence and curiosity, equipping you for career paths in local, national, and international arenas thanks to innovative modules and a ‘calling card’ thesis.

Content

• Faculty Research Module (40 Credits)
• Advanced Research in Politics and International Relations (20 Credits)
• Critical Issues: Shifting Perspectives (20 Credits)
• Contemporary Security (20 Credits)
• Security in the Digital Age (20 Credits)
• Dissertation: Assessing Security Studies (60 Credits)

Format

Modules on International Relations (as well as the Security Studies specialism) are comprised of formal lectures on key themes of IR, security and globalisation, and interactive seminars that explore global actors, structures, and policies, making use of a robust range of teaching and learning styles to deconstruct this complex and fast changing subject area. Based on nationally recognized, award winning teaching styles, graduate classes are engaging and interactive, ranging from simulation games that reflect the actual workings of an international institution or a given security actor, to negotiation-based group work, as well as the analysis of key international policy texts, treaties or conventions, In addition, students are encouraged to produce work in the form of briefing notes, blogs and pieces of advocacy, all focusing on contemporary challenges to the international structure, ensuring that students completing the MSc in International Relation graduate with an advanced knowledge of their chosen area through the most contemporary pedagogic styles.

Assessment

Students of the MSc in International Relations will be assessed through a range of methods, including essays, briefing notes, book reviews, portfolios, individual and group oral presentations, action research, political role play, simulations, standard examinations, as well as a sustained piece of academic work in the form of a thesis, all of which take account of two key inter­dependent aspects:

What can I do next?

An MSc in International Relations will provide you with an exceptionally wide knowledge base, allowing you to command both the organising principles and nuanced specifics of the contemporary regional, international and global structure. This innovative, relevant and marketable degree will ensure you with a refined understanding of international relations as a whole, as well as the role and application of your Security Studies specialism. In order to complete this demanding degree, you will be able to thoroughly and expertly use a wide range of sources and forms of information to critically assess the contemporary international structure, its various distributions of power and influence, and ensuing forms of authority and governance within national, regional and international modes.

You will also be able to demonstrate a comprehensive understanding of the numerous forms of security, from the canon of securitisation studies to myriad practical examples of political, economic, social and even cultural security implicit in the concept of a world that is increasingly interdependent and yet predisposed to enduring state structures. As such, you will emerge with an enduring understanding of both the contemporary international structure, in terms of its various distributions of power, wealth and interactive mechanisms of governance, from traditional sovereign units to international level structures.

How to apply

For information on how to apply, please follow this link: https://www.canterbury.ac.uk/study-here/how-to-apply/how-to-apply.aspx

Funding

-Masters Loans-

From 2016/17 government loans of up to £10,000 are available for postgraduate Masters study. The loans will be paid directly to students by the Student Loans Company and will be subject to both personal and course eligibility criteria.

For more information available here: https://www.canterbury.ac.uk/study-here/funding-your-degree/funding-your-postgraduate-degree.aspx

-2017/18 Entry Financial Support-

Information on alternative funding sources is available here: https://www.canterbury.ac.uk/study-here/funding-your-degree/2017-18-entry-financial-support.aspx

Read less
Food security is a complex issue of global significance and understanding the role and contribution of seafood within food security is an emerging research area. Read more

Introduction

Food security is a complex issue of global significance and understanding the role and contribution of seafood within food security is an emerging research area. Seafood products are provided by both aquaculture and capture fisheries and are one of the most highly traded food products globally. Including seafood in our daily diet provides an affordable source of macro and micronutrients required for optimal human health and development.
This course is designed to introduce the global issues affecting seafood production and trading, and will promote an understanding of the key factors affecting aquatic food production, post-harvest protocols, post-mortem metabolic events and microbial/chemical processes key for food safety and quality. Sensory assessment and shelf-life extension technologies will also be covered. The course will also examine other key issues in seafood trading such as traceability systems, certifications as well as the impact of governance and legislation on the global seafood sector.
This is the only aquatic food security MSc currently available in the UK. It will comprehensively follow the food chain from production through to consumer health and welfare.

Key information

- Degree type: MSc
- Study methods: Full-time
- Start date: September
- Course Director: Rachel Norman

English language requirements

If English is not your first language you must have one of the following qualifications as evidence of your English language skills:
- IELTS: 6.0 with 5.5 minimum in each skill
- Cambridge Certificate of Proficiency in English (CPE): Grade C
- Cambridge Certificate of Advanced English (CAE): Grade C
- Pearson Test of English (Academic): 54 with 51 in each component
- IBT TOEFL: 80 with no subtest less than 17

For more information go to English language requirements https://www.stir.ac.uk/study-in-the-uk/entry-requirements/english/

If you don’t meet the required score you may be able to register for one of our pre-sessional English courses. To register you must hold a conditional offer for your course and have an IELTS score 0.5 or 1.0 below the required standard. View the range of pre-sessional courses http://www.intohigher.com/uk/en-gb/our-centres/into-university-of-stirling/studying/our-courses/course-list/pre-sessional-english.aspx .

Structure and content

This course shares some modules with the MSc in Sustainable Aquaculture and there is flexibility within the system to change the degree title depending on what advanced modules are taken. The course is divided into four taught modules, containing 18 subject areas or topics, and a single Research Project module.

Delivery and assessment

In addition to lectures, tutorials and seminars, a number of assignments must be completed. Laboratory-based practical sessions are also important elements of the course. Taught module assessment is continuous, involving short tests, seminars, essays, practical reports, critical and computational analysis, field assignments and set project reports. The Research Project module is examined through written dissertation and seminar presentations by both supervisors and an external examiner.

Modes of study

The course is available on a block-release basis (by selecting individual or a series of modules) over a period not exceeding five academic years.

Why Stirling?

REF2014
In REF2014 Stirling was placed 6th in Scotland and 45th in the UK with almost three quarters of research activity rated either world-leading or internationally excellent.

Rating

The Institute of Aquaculture, with a rating of 2.45 in the latest Research Assessment Exercise (RAE), was graded the top aquaculture department in the UK.

Strengths

This MSc brings a unique perspective to the expertise that already exists in Stirling on global seafood production. It is the only MSc in the UK that focusses on how seafood can contribute to global food security.
We have a number of links in the production, processing and retail industries and this will provide students with the opportunity to interact with industry and potentially carry out a project which is of direct relevance to the sector.
We also have links within Asia and Europe which will allow the opportunity to undertake the Research Project overseas.

Academic strengths

The Institute of Aquaculture has been closely associated with the global expansion of aquaculture initially through developing and improving the existing production systems and the development of new farmed species. In recent years our research has focused on increasing the sustainability and reducing the environmental impact of these activities. In addition, we have recently invested in new posts in Aquatic Food Security whose activities also include research into food safety and quality post harvest, aquatic animal nutrition, as well as developing mathematical models of production systems. We therefore have expertise that covers the whole production cycle from farm to fork.
The Institute of Aquaculture is internationally recognised for both research and teaching and is one of only a handful of institutions devoted to aquatic food security. The goal is to develop and promote aquatic food security building on the Institute staff expertise in sustainable aquatic animal production.

Careers and employability

- Career opportunities
Demand for well qualified postgraduates to contribute to food production and the supply chain will continue to increase in line with demand to double food production over the coming decades. This course provides each student with the appropriate knowledge and practical experience important for a career in aquatic food security. The course has been developed to provide students with core knowledge and practical skills on aquaculture, food safety/quality, numerical analysis and legislation appropriate to aquatic food security. These skills will be equally applicable to those wishing to pursue an academic career as well as those seeking employment in Government or industry.

- Employability
This course has been developed to provide students with core knowledge and practical skills on aquaculture, food safety/quality, numerical analysis and legislation appropriate to aquatic food security. These skills will be equally applicable to those wishing to pursue an academic career as well as those seeking employment in Government or industry.

- Industry connections
We have a number of links in the production, processing and retail industries which provides students with the opportunity to interact with industry and potentially carry out a project which is of direct relevance to the sector. We also have links within Asia and Europe which allows the opportunity to undertake the research project overseas.

Read less
Overview. Becoming an expert designer and coordinator of information systems projects, with knowledge in data analysis and cyber law, and thus enabling you to take a leading role when tackling any ICT project. Read more

Overview

Becoming an expert designer and coordinator of information systems projects, with knowledge in data analysis and cyber law, and thus enabling you to take a leading role when tackling any ICT project.

There is hardly a company in the world that doesn’t use ICT in some shape or form and many of them face problems in getting ICT to do what it’s supposed to do. So they turn to ICT technicians for advice. However, more often than not, technical problems are only the tip of the iceberg, and a broader perspective is needed to understand and solve them. Radboud University’s Master’s programme in Information Sciences will teach you to become a digital architect who can look beyond mere technical sides to ICT adoption and assist in designing competitive business solutions.

We’ll teach you the broad theoretical foundations you’ll need to understand the technological aspect of any ICT project that may come your way and we’ll help you look beyond technological concerns when tackling ICT-related problems in practice. Radboud University is well known in the field of information architecture, systems theory, and the quality and security of information systems.

There is a large demand for well-trained information experts who can help implement sound, secure, user-friendly technology. Many of our students are offered jobs even before they graduate, as consultants, project managers or ICT specialists.

See the website http://www.ru.nl/masters/toxicology

Why study Information Sciences at Radboud University?

- Data analysis, privacy and cyber law are the essential components of modern ICT. Radboud University is unique in offering this combination within the field of Information Sciences.

- This programme offers a good mix: forming a solid technical, organisational and legal foundation, getting hands-on experience and developing the insights needed to take a leading role in successful change programmes with active engagement from both technical savvy people and those unfamiliar with the field.

- The field of Information Sciences has the highest chance of finding employment and graduates are offered some of the highest salary for starter position in the Netherlands.

- The second half of your programme offers the possibility of an internship, which in this field is paid and can contribute to financing your Master’s study. We have close contacts with the private sector which can help you to find your own internship position.

- Electives enable you in fine-tuning the focus of this specialisation to meet your own academic and professional interests.

- You will be taught by top researchers and ICT experts of the Institute for Computing and Information Sciences (iCIS), which was ranked first in the latest national research assessment.

- Some graduates even start their own businesses, something that the Mercator Incubator right here in Nijmegen could help you with.

Technical and management students

This programme is suited for both students with a technological background with management ambitions, as those with a management background and a strong affinity with technology wanting to specialise in ICT. As the programme is a technological programme we do expect the management students to have taken a minor in Information Sciences during their Bachelor’s study, or they will need to take a half-year pre-Master’s programme before being admitted

Our approach to this field

At Radboud University, we believe that a good information specialist is more than an expert in information architecture, systems theory, and the quality and security of information systems. They form the bridge between the people involved. You’ll therefore need to learn to work together with different stakeholders within a project, for example, the super technical programmer, the demanding client and, in some cases, the computer illiterate user. You’ll need to be able represent all their interests and find a solution that’s satisfactory to all. By the end of the programme you’ll be a well-trained digital architect with the necessary managerial skills.

Radboud University's information specialists also work closely with colleagues from other disciplines, such as law, medicine, brain research, and artificial intelligence. Because information systems have a wide application, this Master’s programme shows you how to look beyond the borders of your own discipline. And the annual study trips in the elective ICT in a Different Culture – to countries such as India, Brazil, and South Africa – will also enable you to extend your own boundaries.

Career prospects

There is a big demand for highly trained information experts who can apply good, user-friendly technology. Many of our students are offered jobs even before they graduate. Most go into industry, banking and insurance, or to public-sector organisations such as schools and hospitals.

Students with this Master’s could think of positions as consultants, project managers or ICT specialists. And more companies are adding the position of Chief Information Officer (CIO) to their board of directors. This Master’s programme is definitely a good stepping stone to reaching this kind of position in your future career.

- Your own company

Some students develop their own ideas and innovations while taking part in this Master’s. They see what’s on offer, understand what’s lacking and realise where the possibilities lie. In Nijmegen there are plenty of opportunities for those wanting to start their own business. For example, the Mercator Incubator could help those with a good business plan with advice or even by offering affordable accommodation and other facilities for the first year or two of setting up a company.

See the website http://www.ru.nl/masters/toxicology



Read less
Who is it for?. This course is designed for graduate students and IT/ICT professionals who want to prepare for a successful career in computer, network and information security. Read more

Who is it for?

This course is designed for graduate students and IT/ICT professionals who want to prepare for a successful career in computer, network and information security. It will help you to develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

This Masters programme will particularly suit students who have completed a first degree in a computing subject, such as computer science or business computing. It will also suit graduates who have completed a numerate subject with a significant computing component, such as applied mathematics, engineering or physics.

Objectives

The Cyber Security MSc aims to help you:

  • Specialise in advanced aspects of cyber security, including cryptography and network security
  • Information security management and security audits
  • Engage with researchers to develop your scientific knowledge and skills
  • Explore and specialise in the socio-technical aspects of security, cybercrime and digital forensics
  • Critically evaluate the technical, social and management dimensions of computing systems and technologies from a security perspective
  • Gain tangible experience that extends across all the security specific core modules
  • Acquire the knowledge, skills and techniques needed as a professional in computer science.

The course features real-life scenarios and a cyber-security challenge to provide you with hands-on experience in testing and analysing computing systems:

  • Semester 1 - become an ethical hacker. Your challenge: to identify flaws in a computer system by breaking its crypto components and retrieving sensitive information from an e-commerce company.
  • Semester 2 - become an investigator. Your challenge: to analyse network traffic, logs and detect attacks in a company's network. You must trace hackers and bring them to justice with concrete proof and reporting.

Accreditation

Accredited by BCS, The Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional, and on behalf of the Science Council for the purposes of partially meeting the academic requirement for registration as a Chartered Scientist and a Chartered Engineer.

Internships

As a postgraduate student on a Computing and Information Systems course, you will have the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used increase the levels of both specialisation of content and autonomy of learning as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:

  • Present and explain the theoretical concepts underpinning a particular subject
  • Highlight the most significant aspects of a module's syllabus
  • Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem-solving. Laboratory sessions serve a similar purpose as the tutorials, helping to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and substantial coursework assignments for each module, amounting to approximately 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used across all of the security specific modules to ensure that you get appropriate hands-on operational experience of relevant aspects of cyber security, including testing and analysis. Some of the coursework may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge.

The individual project (full time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends by up to six months.

The assessments focus on activities that you need to undertake either as part of your role or to support you in developing your professional practice. The assessment for the project module is in the form of a traditional dissertation reporting your work.

Modules

You will cover areas of Masters-level computer science, such as research methods and scientific presentation and analysis skills. There are eight taught modules in total, comprising five core modules, two security elective modules and one general elective module. In addition, there is a full-time individual project completed over the summer.

The taught modules are delivered through 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Coursework assignments for each module, amount to approximately 120 hours per module.

The individual project (full time) is carried out over the summer, and if done without a placement, lasts approximately 14 weeks or 600 hours.

Career prospects

This MSc is geared towards preparing you for a successful career in the field of cyber security, providing you with highly sought-after specialist analytical, operational and development skills in both technical and socio-technical areas.

As a result, our graduates move into a range of careers in the IT/ICT sector, as well as the telecommunications and banking industries.



Read less
This qualification develops a rigorous approach to the study and application of computing, and incorporates transferable skills that are highly applicable to professional development in the field. Read more

MSc in Computing

This qualification develops a rigorous approach to the study and application of computing, and incorporates transferable skills that are highly applicable to professional development in the field. You can choose between the flexible MSc in Computing (offering a wide choice of industry relevant modules), and the more focused MSc in Computing (Software Engineering) or MSc in Computing (Information Security and Forensics), which enable you to develop in-depth specialist knowledge. All three routes finish with a substantial independent project, with either a professional or research orientation. The professional project engages in a research scenario in an employment-related setting of your choice, while the research project enables you to design a research proposal relating to an issue or problem of professional relevance to you or an employer, institution or public body.

Key features of the course

•Brings together theory and practice and draws on your own background and experience
•Enables you to tailor your studies to your specific career needs and professional interests
•Provides an excellent platform for further research studies.

This qualification is eligible for a Postgraduate Loan available from Student Finance England.

Modules

There are three pathways available for this degree:

•MSc in Computing
•MSc in Computing (Software Engineering)
•MSc in Computing (Information Security and Forensics)

We advise you to begin with modules from the first list for each pathway before moving on to the second.

MSc in Computing

To gain this qualification, you need 180 credits as follows:

60 credits from the optional modules in List A:

List A:

• Data management (M816)
• Digital forensics (M812)
• Information security (M811)
• Project management (M815)
• Software development (M813)
• Software engineering (M814)

Plus

A further 60 credits from List A, or from List B:

List B: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus

A further 30 credits from List B, or any 30-credit module at OU Level 3 or above.

MSc in Computing (Software Engineering)

To gain this qualification, you need 180 credits as follows:

60 credits of compulsory modules (starting with M813):

Compulsory modules

• Software development (M813)
• Software engineering (M814)

Plus

60 credits from List C:

List C: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Data management (M816)
• Digital forensics (M812)
• Information security (M811)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Project management (M815)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus a further 30 credits from List C, or any 30-credit module at OU Level 3 or above.

MSc in Computing (Information Security and Forensics)

To gain this qualification, you need 180 credits as follows:

60 credits of compulsory modules (starting with M811):

Compulsory modules

• Information security (M811)
• Digital forensics (M812)

Plus

60 credits from List D:

List D: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Data management (M816)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Project management (M815)
• Software development (M813)
• Software engineering (M814)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus a further 30 credits from List D, or any 30-credit module at OU Level 3 or above.

The modules quoted in this description are currently available for study. However, as we review the curriculum on a regular basis, the exact selection may change over time.

Credit transfer

If you have already completed some successful study at postgraduate level at another institution you may be able to transfer credit for this study and count it towards this Open University qualification. If you wish to apply to transfer credit you must do so as soon as possible as it may affect your choice of OU modules. If you are awarded credit for study completed elsewhere, you may find that you need to study fewer OU modules to complete your qualification with us.

Visit our Credit Transfer site for more information and details of how to apply for credit transfer.

Read less

Show 10 15 30 per page



Cookie Policy    X