• Aberystwyth University Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • University of Southampton Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • University of Bristol Featured Masters Courses

Postgrad LIVE! Study Fair

Birmingham | Bristol | Sheffield | Liverpool | Edinburgh

University of Nottingham in China Featured Masters Courses
Southampton Solent University Featured Masters Courses
University of Reading Featured Masters Courses
University of Cambridge Featured Masters Courses
Swansea University Featured Masters Courses
"msc" AND "in" AND "infor…×
0 miles

Masters Degrees (Msc In Information Security)

We have 502 Masters Degrees (Msc In Information Security)

  • "msc" AND "in" AND "information" AND "security" ×
  • clear all
Showing 1 to 15 of 502
Order by 
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. Read more

Aim

Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the MSc is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges.

This taught programme provides a strong foundational education in the core areas of cyber security and offers practical training in key software tools and programs. Applied practical skills will be developed further in specialised projects exploring leading edge issues in cyber security research.

The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen's University Belfast's Centre for Secure Information Technologies (CSIT).

CSIT is a GCHQ accredited Academic Centre of Excellence in Cyber Security Research and is the UK's largest university research lab in this field. CSIT is fast developing a reputation as a global innovation hub for cyber security and is influenced throughout by its strong history of commercial engagement with world leading companies including Infosys, Cisco, IBM, Thales, BAE Systems, McAfee, Roke, and Altera.

Programme Content

The MSc in Cyber Security is available in two options, lasting either 1 or 2 years:

The 1-year MSc consists of six taught modules (120 CATS points) and a 4-5 months practical project of a research nature/work placement (60 CATS points).

The 2-year MSc consists of six taught modules (120 CATS points) and a 12 months practical project of a research nature/work placement (60 CATS points).

One compulsory module and a choice of five from seven other modules as listed below:
• Applied Cryptography
• Computer Forensics
• Network Security and Monitoring
• Software Assurance
• Malware
• Media Security
• Intelligent Information Systems
• Ethical & Legal Issues in Cyber Security (Compulsory)

In any given year further specialist topics may be available for selection or listed topics may not be offered.

Assessment

Comprises written examination and coursework/lab work in six modules; and a dissertation on your research project (180 CATS points total).

Opportunities for Careers

Strong Industry Engagement
A key differentiator of our MSc programme will be the opportunity to closely engage with CSIT industry partners. The programme offers an enhanced education experience, including the facilitation of industrial internships and work placements with leading security professionals, as well as other commercially specified projects. Our Scholarships and Work Placements programme offers a significant opportunity for students to enhance career prospects by directly engaging with potential employers.

Opportunities for placements are being provided by the following companies: Austrian Institute of Technology (AIT), Facebook, IBM, McAfee, PwC, RepKnight, Roke, Thales, and United Technologies Research CEntre (UTRC).

Professional Skills Training
Students will be offered a range of personal development and transferable skills training to improve their professional skills and increase their employability. Courses will cover: project management, presentation skills, communication strategies, networking skills, public engagement and entrepreneurship. Invited seminars and special guest lectures from industrial and academic leaders offer students a chance to engage with leaders in the cyber security profession.

Careers
Our graduates have found that holding a prestigious MSc qualification from Queen's (one of the UK's top engineering schools) has significantly enhanced their job opportunities and employment prospects. With demand for cyber security experts growing at 12 times the rate of the overall job market, students can expect their career prospects to be enhanced significantly after graduation.

Our MSc in Cyber Security will prepare graduates for successful careers in secure systems development, security architecture development, network security, data analytics, and right up to board level positions such as Chief Information Security Officer (CISO). Prospects for research and academic career paths in cyber security will also be enhanced by the MSc.

Special Features

Work Placements and Scholarships Programme
A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security degree programme. These opportunities are being provided on a competitive basis by CSIT's industrial partners and others affiliated with the Work Placements and Scholarships Programme. Once accepted for this masters degree you will be eligible to apply for opportunities made available via the programme.

Funding

A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security course via our Work Placements and Scholarships Programme.

Scholarship Opportunities:
CSIT Scholarships (x2) – UK/EU
- Open to UK/EU applicants to the 1-year MSc in Cyber Security
- Only students who are graduating in 2014 with an Undergraduate course in relevant discipline areas are eligible to apply
- Scholarships cover fees and a paid summer internship at CSIT
- How to Apply: Eligible students who apply for the 1-year MSc in Cyber Security will automatically be considered for these scholarships.

GREAT Queen’s University Belfast Scholarships (x2) – India
- Open to India students
- Scholarship value: £1500
- For further information and how to apply see:
http://www.qub.ac.uk/home/StudyatQueens/InternationalStudents/InternationalScholarships/GREATQueensUniversityBelfastScholarships-India/

Full details and further announcements about our Scholarships and Work Placements programme are available at http://www.csit.qub.ac.uk/msc

Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society. Read more

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The programme will:

  • Provide students with advanced knowledge and understanding of information security theory and concepts
  • Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
  • Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
  • Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

Programme learning outcomes

Knowledge and understanding

Students will gain:

  • Knowledge and understanding of the general information security aims and challenges
  • Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
  • Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
  • Knowledge and understanding of technical concepts and mechanisms for digital forensics
  • Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
  • The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
  • The ability to implement or apply existing information security mechanisms and technologies in practice
  • The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
  • The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills

Students will leave the programme with the ability to:

  • Analyse and solve problems of technical nature under consideration of various risks and constraints
  • Make effective and efficient decisions in an environment of conflicting interests
  • Think strategically 
  • Synthesise and critically evaluate the work of others
  • Apply fundamental knowledge to investigate new and emerging technologies
  • Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills

Students will gain the ability to:

  • Come up with technical solutions to a range of problems
  • Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
  • Implement mechanisms and apply them in a wider context of more complex systems
  • Present their opinions and findings and to produce a high-quality report

Key / transferable skills

Students will have:

  • The ability to communicate concepts and results in a clear and effective manner
  • The time and resource management planning
  • The ability to work with available resources, to collect and analyse research-oriented material

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

Degree information

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits. The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules
-Computer Security I
-Computer Security II
-Introduction to Cryptography
-Research in Information Security

Optional modules - students choose four of the following:
-Distributed Systems and Security
-People and Security
-Applied Cryptography
-Information Security Management
-Language Based Security
-Philosophy, Politics and Economics of Security and Privacy
-Malware
-Cryptanalysis
-Cybercrime
-Privacy Enhancing Technologies
-Relevant options from other MSc degree programmes

Dissertation/report
All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning
The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Careers

UCL graduates are keenly sought by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Top career destinations for this degree:
-Risk IT RTB Support Administrator, Lloyds Banking Group
-Technical Analyst, The Royal Bank of Scotland (RBS)
-IT Lead Developer, MOVE Guides
-Software Developer, Oracle
-Cisco Certified Network Associate (CCNA) Routing and Switching, Cisco

Employability
Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts occur through the ACE-CS guest lecture series integrated into the course.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research, and was one of the top-rated departments in the UK government's recent Research Excellence Framework.

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. Students from the degree won the first UK Cyber Security Challenge in code cracking in 2013.

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Read less
Getting to grips with the ever-changing shifts of international politics can be daunting. Our MSc in International Relations introduces you to the fundamental principles of global interaction, and refining your knowledge within specialist classes. Read more
Getting to grips with the ever-changing shifts of international politics can be daunting. Our MSc in International Relations introduces you to the fundamental principles of global interaction, and refining your knowledge within specialist classes. You will learn in a systematic and engaging way about the origins, evolution and multifaceted character of the international political system, before turning to the Security Studies specialism, providing specialist insights on power, influence and governance within key national, regional and international structures.

A fascinating and relevant degree supported in 2017 by a competitively-awarded Jean Monnet Studentship (£2000) as well as the possibility of in-house internships. CCCU graduates are well placed to specialise in careers connected to key areas of international relations, enhanced with expertise in security.

Visit the website https://www.canterbury.ac.uk/study-here/courses/postgraduate/international-relations.aspx

Course detail

Through a combination of core and specialist modules, the MSc in International Relations is constructed around a series of modules that will help you analyse the multifaceted origins, evolution and conflictual development of the international political system. You will explore the analytical application of a range of the core theories and contemporary concepts that make up the canon of International Relations. You will interrogate the relative merits and shortcomings of ideologies, political, economic and socio-cultural philosophies, structures of power, and systems of governance across in order to better understand the global political system.

Suitability

The new MSc in International Relations offered at Canterbury Christ Church University is established upon a firm foundation of research­led teaching, using innovative and blended learning methods, expertise driven insights, and a clear commitment to guiding and supporting all facets of graduate student development. Our International Relations programmes will provide you with the opportunity to gain comprehensive conceptual knowledge of the prime structures and interconnections that make up international relations, and an indispensable practical understanding of national, institutional, legal, political, economic and socio­cultural actors of the global community.

The 2017 MSc in International Relations is offered with a specialism in Security Studies, allowing you to gain an especially strong understanding of the role of power and influence, the distribution of authority and governance within national, regional and international modes of security, and the principles driving the narratives and practices of security. Offered both full and part-time, CCCU’s innovative MSc in International Relations will help you tackle the ‘big issues’ in international politics with confidence and curiosity, equipping you for career paths in local, national, and international arenas thanks to innovative modules and a ‘calling card’ thesis.

Content

• Faculty Research Module (40 Credits)
• Advanced Research in Politics and International Relations (20 Credits)
• Critical Issues: Shifting Perspectives (20 Credits)
• Contemporary Security (20 Credits)
• Security in the Digital Age (20 Credits)
• Dissertation: Assessing Security Studies (60 Credits)

Format

Modules on International Relations (as well as the Security Studies specialism) are comprised of formal lectures on key themes of IR, security and globalisation, and interactive seminars that explore global actors, structures, and policies, making use of a robust range of teaching and learning styles to deconstruct this complex and fast changing subject area. Based on nationally recognized, award winning teaching styles, graduate classes are engaging and interactive, ranging from simulation games that reflect the actual workings of an international institution or a given security actor, to negotiation-based group work, as well as the analysis of key international policy texts, treaties or conventions, In addition, students are encouraged to produce work in the form of briefing notes, blogs and pieces of advocacy, all focusing on contemporary challenges to the international structure, ensuring that students completing the MSc in International Relation graduate with an advanced knowledge of their chosen area through the most contemporary pedagogic styles.

Assessment

Students of the MSc in International Relations will be assessed through a range of methods, including essays, briefing notes, book reviews, portfolios, individual and group oral presentations, action research, political role play, simulations, standard examinations, as well as a sustained piece of academic work in the form of a thesis, all of which take account of two key inter­dependent aspects:

What can I do next?

An MSc in International Relations will provide you with an exceptionally wide knowledge base, allowing you to command both the organising principles and nuanced specifics of the contemporary regional, international and global structure. This innovative, relevant and marketable degree will ensure you with a refined understanding of international relations as a whole, as well as the role and application of your Security Studies specialism. In order to complete this demanding degree, you will be able to thoroughly and expertly use a wide range of sources and forms of information to critically assess the contemporary international structure, its various distributions of power and influence, and ensuing forms of authority and governance within national, regional and international modes.

You will also be able to demonstrate a comprehensive understanding of the numerous forms of security, from the canon of securitisation studies to myriad practical examples of political, economic, social and even cultural security implicit in the concept of a world that is increasingly interdependent and yet predisposed to enduring state structures. As such, you will emerge with an enduring understanding of both the contemporary international structure, in terms of its various distributions of power, wealth and interactive mechanisms of governance, from traditional sovereign units to international level structures.

How to apply

For information on how to apply, please follow this link: https://www.canterbury.ac.uk/study-here/how-to-apply/how-to-apply.aspx

Funding

-Masters Loans-

From 2016/17 government loans of up to £10,000 are available for postgraduate Masters study. The loans will be paid directly to students by the Student Loans Company and will be subject to both personal and course eligibility criteria.

For more information available here: https://www.canterbury.ac.uk/study-here/funding-your-degree/funding-your-postgraduate-degree.aspx

-2017/18 Entry Financial Support-

Information on alternative funding sources is available here: https://www.canterbury.ac.uk/study-here/funding-your-degree/2017-18-entry-financial-support.aspx

Read less
Food security is a complex issue of global significance and understanding the role and contribution of seafood within food security is an emerging research area. Read more

Introduction

Food security is a complex issue of global significance and understanding the role and contribution of seafood within food security is an emerging research area. Seafood products are provided by both aquaculture and capture fisheries and are one of the most highly traded food products globally. Including seafood in our daily diet provides an affordable source of macro and micronutrients required for optimal human health and development.
This course is designed to introduce the global issues affecting seafood production and trading, and will promote an understanding of the key factors affecting aquatic food production, post-harvest protocols, post-mortem metabolic events and microbial/chemical processes key for food safety and quality. Sensory assessment and shelf-life extension technologies will also be covered. The course will also examine other key issues in seafood trading such as traceability systems, certifications as well as the impact of governance and legislation on the global seafood sector.
This is the only aquatic food security MSc currently available in the UK. It will comprehensively follow the food chain from production through to consumer health and welfare.

Key information

- Degree type: MSc
- Study methods: Full-time
- Start date: September
- Course Director: Rachel Norman

English language requirements

If English is not your first language you must have one of the following qualifications as evidence of your English language skills:
- IELTS: 6.0 with 5.5 minimum in each skill
- Cambridge Certificate of Proficiency in English (CPE): Grade C
- Cambridge Certificate of Advanced English (CAE): Grade C
- Pearson Test of English (Academic): 54 with 51 in each component
- IBT TOEFL: 80 with no subtest less than 17

For more information go to English language requirements https://www.stir.ac.uk/study-in-the-uk/entry-requirements/english/

If you don’t meet the required score you may be able to register for one of our pre-sessional English courses. To register you must hold a conditional offer for your course and have an IELTS score 0.5 or 1.0 below the required standard. View the range of pre-sessional courses http://www.intohigher.com/uk/en-gb/our-centres/into-university-of-stirling/studying/our-courses/course-list/pre-sessional-english.aspx .

Structure and content

This course shares some modules with the MSc in Sustainable Aquaculture and there is flexibility within the system to change the degree title depending on what advanced modules are taken. The course is divided into four taught modules, containing 18 subject areas or topics, and a single Research Project module.

Delivery and assessment

In addition to lectures, tutorials and seminars, a number of assignments must be completed. Laboratory-based practical sessions are also important elements of the course. Taught module assessment is continuous, involving short tests, seminars, essays, practical reports, critical and computational analysis, field assignments and set project reports. The Research Project module is examined through written dissertation and seminar presentations by both supervisors and an external examiner.

Modes of study

The course is available on a block-release basis (by selecting individual or a series of modules) over a period not exceeding five academic years.

Why Stirling?

REF2014
In REF2014 Stirling was placed 6th in Scotland and 45th in the UK with almost three quarters of research activity rated either world-leading or internationally excellent.

Rating

The Institute of Aquaculture, with a rating of 2.45 in the latest Research Assessment Exercise (RAE), was graded the top aquaculture department in the UK.

Strengths

This MSc brings a unique perspective to the expertise that already exists in Stirling on global seafood production. It is the only MSc in the UK that focusses on how seafood can contribute to global food security.
We have a number of links in the production, processing and retail industries and this will provide students with the opportunity to interact with industry and potentially carry out a project which is of direct relevance to the sector.
We also have links within Asia and Europe which will allow the opportunity to undertake the Research Project overseas.

Academic strengths

The Institute of Aquaculture has been closely associated with the global expansion of aquaculture initially through developing and improving the existing production systems and the development of new farmed species. In recent years our research has focused on increasing the sustainability and reducing the environmental impact of these activities. In addition, we have recently invested in new posts in Aquatic Food Security whose activities also include research into food safety and quality post harvest, aquatic animal nutrition, as well as developing mathematical models of production systems. We therefore have expertise that covers the whole production cycle from farm to fork.
The Institute of Aquaculture is internationally recognised for both research and teaching and is one of only a handful of institutions devoted to aquatic food security. The goal is to develop and promote aquatic food security building on the Institute staff expertise in sustainable aquatic animal production.

Careers and employability

- Career opportunities
Demand for well qualified postgraduates to contribute to food production and the supply chain will continue to increase in line with demand to double food production over the coming decades. This course provides each student with the appropriate knowledge and practical experience important for a career in aquatic food security. The course has been developed to provide students with core knowledge and practical skills on aquaculture, food safety/quality, numerical analysis and legislation appropriate to aquatic food security. These skills will be equally applicable to those wishing to pursue an academic career as well as those seeking employment in Government or industry.

- Employability
This course has been developed to provide students with core knowledge and practical skills on aquaculture, food safety/quality, numerical analysis and legislation appropriate to aquatic food security. These skills will be equally applicable to those wishing to pursue an academic career as well as those seeking employment in Government or industry.

- Industry connections
We have a number of links in the production, processing and retail industries which provides students with the opportunity to interact with industry and potentially carry out a project which is of direct relevance to the sector. We also have links within Asia and Europe which allows the opportunity to undertake the research project overseas.

Read less
Learn about both the technical and the business issues that can bridge the gap between IT security and business risk. Read more
Learn about both the technical and the business issues that can bridge the gap between IT security and business risk.

Who is it for?

This Masters course is aimed at IT professionals with approximately five years’ experience and is intended to provide them with the skills that they need to progress to a management role in information security and risk. The course will appeal to companies and professionals that need to develop or improve their capability in managing IT-related security, in order to enter markets with higher demands of dependability and security, comply with new regulations, or re-qualify for new roles.

Objectives

Concerns about cyber security and information risk have led to a growing market for technical specialists, but there is also a need for more senior professionals with an awareness of both the technical and the business issues who can bridge the gap between IT security and business risk.

On this Management of Information Security and Risk MSc programme you will learn about both the technical and the business issues that can bridge the gap between IT security and business risk.

Understand how to communicate these risks to both the technical staff and the executive business team (CEO, CIO, CFO and COO) in a language they share. Focus on human-machine interaction and decision making within today's increasingly complex Political-Economical-Socio-Technical (PEST) systems.

Find out about latest industry and government standards, legislation and best practice from leading technical experts and network with your peers to compare and contrast best practices from different industries.

Teaching and learning

The modules are taught by academics at the Centre for Software Reliability, within the School of Mathematics, Computer Science and Engineering, and also by visiting lecturers from industry. We also have invited speakers from academia and industry in most modules. Teaching takes place via seminars, lectures, group work and tutorials. The assessment is through coursework only – this consists of written work (individual and group), presentations and peer review.

The modules will be delivered in block mode, with students taking two modules per term. Each module consists of two blocks as follows:
-Thursday evening: 5pm - 9pm
-Friday: 9am-5pm
-Saturday: 9am-5pm

In summary, assuming attendance at the Thursday evening sessions can be done without having to take any time off from work, the students are expected to take eight Fridays off from work in a calendar year (though some employers may allow their employees to take these times off as study leave), and they will need to also attend classes for a further eight Saturdays (i.e. two Fridays and two Saturdays per module). Timetables are for guidance only and are subject to change.

Modules

The course covers the skills and knowledge necessary to be successful in senior roles in information security and risk.

The course supports the extra breadth of knowledge required by people with professional experience to help them progress towards target roles in management or consulting on security, assurance and risk.

Applicants can also apply to enrol on individual modules as CPDs. It will then be possible for you to gradually build credits for the MSc should you wish to take this route. City, University of London is also an approved MoD Enhanced Learning Credits (ELC) scheme provider (ID-1538).

Modules providing Professional Skills
-Information Leadership (15 credits)
-Executive Development (15 credits)
-Socio-Technical Systems (15 credits)
-IT Risk Management for effective performance and the prevention of fraud, error and disaster (15 credits)

Specialised Security and Risk Modules
-Information Security Management (15 credits)
-IT Risk and Resilience (15 credits)
-Quantitative Risk Analysis (15 credits)
-Assurance Cases (15 credits)

Career prospects

This course will appeal to companies and professionals that need to develop or improve their capability in managing IT-related security, in order to enter markets with higher demands of dependability and security, comply with new regulations, or re-qualify for new roles. Graduates should be suitable for consideration as the CSO or Security Architects and Senior Information Risk Managers and would also greatly help them in information security Consultancy and Auditing roles.

Our previous and existing cohort of students have all been employed full-time in a wide range of companies, including multi-billion pound turnover internationals in the aviation industry, global auditing companies (e.g. KPMG), media companies (e.g. Sky and Sony), financial services companies (e.g. Deutsche Bank) in the City of London, small and medium enterprises (SMEs), government departments and NHS trusts. The programme helps students build a strong network with their peers and maintain it as part of their career development.

Read less
Overview. Becoming an expert designer and coordinator of information systems projects, with knowledge in data analysis and cyber law, and thus enabling you to take a leading role when tackling any ICT project. Read more

Overview

Becoming an expert designer and coordinator of information systems projects, with knowledge in data analysis and cyber law, and thus enabling you to take a leading role when tackling any ICT project.

There is hardly a company in the world that doesn’t use ICT in some shape or form and many of them face problems in getting ICT to do what it’s supposed to do. So they turn to ICT technicians for advice. However, more often than not, technical problems are only the tip of the iceberg, and a broader perspective is needed to understand and solve them. Radboud University’s Master’s programme in Information Sciences will teach you to become a digital architect who can look beyond mere technical sides to ICT adoption and assist in designing competitive business solutions.

We’ll teach you the broad theoretical foundations you’ll need to understand the technological aspect of any ICT project that may come your way and we’ll help you look beyond technological concerns when tackling ICT-related problems in practice. Radboud University is well known in the field of information architecture, systems theory, and the quality and security of information systems.

There is a large demand for well-trained information experts who can help implement sound, secure, user-friendly technology. Many of our students are offered jobs even before they graduate, as consultants, project managers or ICT specialists.

See the website http://www.ru.nl/masters/toxicology

Why study Information Sciences at Radboud University?

- Data analysis, privacy and cyber law are the essential components of modern ICT. Radboud University is unique in offering this combination within the field of Information Sciences.

- This programme offers a good mix: forming a solid technical, organisational and legal foundation, getting hands-on experience and developing the insights needed to take a leading role in successful change programmes with active engagement from both technical savvy people and those unfamiliar with the field.

- The field of Information Sciences has the highest chance of finding employment and graduates are offered some of the highest salary for starter position in the Netherlands.

- The second half of your programme offers the possibility of an internship, which in this field is paid and can contribute to financing your Master’s study. We have close contacts with the private sector which can help you to find your own internship position.

- Electives enable you in fine-tuning the focus of this specialisation to meet your own academic and professional interests.

- You will be taught by top researchers and ICT experts of the Institute for Computing and Information Sciences (iCIS), which was ranked first in the latest national research assessment.

- Some graduates even start their own businesses, something that the Mercator Incubator right here in Nijmegen could help you with.

Technical and management students

This programme is suited for both students with a technological background with management ambitions, as those with a management background and a strong affinity with technology wanting to specialise in ICT. As the programme is a technological programme we do expect the management students to have taken a minor in Information Sciences during their Bachelor’s study, or they will need to take a half-year pre-Master’s programme before being admitted

Our approach to this field

At Radboud University, we believe that a good information specialist is more than an expert in information architecture, systems theory, and the quality and security of information systems. They form the bridge between the people involved. You’ll therefore need to learn to work together with different stakeholders within a project, for example, the super technical programmer, the demanding client and, in some cases, the computer illiterate user. You’ll need to be able represent all their interests and find a solution that’s satisfactory to all. By the end of the programme you’ll be a well-trained digital architect with the necessary managerial skills.

Radboud University's information specialists also work closely with colleagues from other disciplines, such as law, medicine, brain research, and artificial intelligence. Because information systems have a wide application, this Master’s programme shows you how to look beyond the borders of your own discipline. And the annual study trips in the elective ICT in a Different Culture – to countries such as India, Brazil, and South Africa – will also enable you to extend your own boundaries.

Career prospects

There is a big demand for highly trained information experts who can apply good, user-friendly technology. Many of our students are offered jobs even before they graduate. Most go into industry, banking and insurance, or to public-sector organisations such as schools and hospitals.

Students with this Master’s could think of positions as consultants, project managers or ICT specialists. And more companies are adding the position of Chief Information Officer (CIO) to their board of directors. This Master’s programme is definitely a good stepping stone to reaching this kind of position in your future career.

- Your own company

Some students develop their own ideas and innovations while taking part in this Master’s. They see what’s on offer, understand what’s lacking and realise where the possibilities lie. In Nijmegen there are plenty of opportunities for those wanting to start their own business. For example, the Mercator Incubator could help those with a good business plan with advice or even by offering affordable accommodation and other facilities for the first year or two of setting up a company.

See the website http://www.ru.nl/masters/toxicology

Radboud University Master's Open Day 10 March 2018



Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
This qualification develops a rigorous approach to the study and application of computing, and incorporates transferable skills that are highly applicable to professional development in the field. Read more

MSc in Computing

This qualification develops a rigorous approach to the study and application of computing, and incorporates transferable skills that are highly applicable to professional development in the field. You can choose between the flexible MSc in Computing (offering a wide choice of industry relevant modules), and the more focused MSc in Computing (Software Engineering) or MSc in Computing (Information Security and Forensics), which enable you to develop in-depth specialist knowledge. All three routes finish with a substantial independent project, with either a professional or research orientation. The professional project engages in a research scenario in an employment-related setting of your choice, while the research project enables you to design a research proposal relating to an issue or problem of professional relevance to you or an employer, institution or public body.

Key features of the course

•Brings together theory and practice and draws on your own background and experience
•Enables you to tailor your studies to your specific career needs and professional interests
•Provides an excellent platform for further research studies.

This qualification is eligible for a Postgraduate Loan available from Student Finance England.

Modules

There are three pathways available for this degree:

•MSc in Computing
•MSc in Computing (Software Engineering)
•MSc in Computing (Information Security and Forensics)

We advise you to begin with modules from the first list for each pathway before moving on to the second.

MSc in Computing

To gain this qualification, you need 180 credits as follows:

60 credits from the optional modules in List A:

List A:

• Data management (M816)
• Digital forensics (M812)
• Information security (M811)
• Project management (M815)
• Software development (M813)
• Software engineering (M814)

Plus

A further 60 credits from List A, or from List B:

List B: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus

A further 30 credits from List B, or any 30-credit module at OU Level 3 or above.

MSc in Computing (Software Engineering)

To gain this qualification, you need 180 credits as follows:

60 credits of compulsory modules (starting with M813):

Compulsory modules

• Software development (M813)
• Software engineering (M814)

Plus

60 credits from List C:

List C: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Data management (M816)
• Digital forensics (M812)
• Information security (M811)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Project management (M815)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus a further 30 credits from List C, or any 30-credit module at OU Level 3 or above.

MSc in Computing (Information Security and Forensics)

To gain this qualification, you need 180 credits as follows:

60 credits of compulsory modules (starting with M811):

Compulsory modules

• Information security (M811)
• Digital forensics (M812)

Plus

60 credits from List D:

List D: optional modules

• Advanced routing CCNP 1 (T824)
• Continuing professional development in practice (U810)
• Data management (M816)
• Managing systemic change: inquiry, action and interaction (TU812)
• Managing technological innovation (T848)
• Network security (T828)
• Problem solving and improvement: quality and other approaches (T889)
• Project management (M815)
• Software development (M813)
• Software engineering (M814)
• Strategic capabilities for technological innovation (T849)
• Thinking strategically: systems tools for managing change (TU811)

Plus

60 credits from either the Research route or Professional route:

Research route

Compulsory module

• Research project (T802)

Professional route

Compulsory module

• The MSc professional project (T847)

Plus a further 30 credits from List D, or any 30-credit module at OU Level 3 or above.

The modules quoted in this description are currently available for study. However, as we review the curriculum on a regular basis, the exact selection may change over time.

Credit transfer

If you have already completed some successful study at postgraduate level at another institution you may be able to transfer credit for this study and count it towards this Open University qualification. If you wish to apply to transfer credit you must do so as soon as possible as it may affect your choice of OU modules. If you are awarded credit for study completed elsewhere, you may find that you need to study fewer OU modules to complete your qualification with us.

Visit our Credit Transfer site for more information and details of how to apply for credit transfer.

Read less
The University of Bradford Cyber Security MSc is a taught postgraduate programme, offering one-year full-time or two-year part-time study options. Read more

The University of Bradford Cyber Security MSc is a taught postgraduate programme, offering one-year full-time or two-year part-time study options.

Students complete a range of core modules before carrying out an independent research project and dissertation. The course awards a full Master of Science qualification.

The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. The focus within this programme on the principles, technologies and practices of cyber security helps you to gain the appropriate skills for future PhD studies and research careers as well as to become competent practitioners. The programme comprises particular developments in security with a firm base in academic research and also offers the opportunity for you to study selected topics in advanced computer science.

Included in the programme is the opportunity to enhance industry relevant skills with study in ISO27001 Lead Implementer and Ethical Hacking. These skill areas were highlighted by past alumni and industry practitioners for inclusion in the programme. Therefore, you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking.

This programme meets a continued growing demand for specialists in this area by offering a way for individuals in current employment with relevant industry experience as well as recent graduates to study and enhance and develop their skills. The MSc Cyber Security programme will therefore draw graduates wishing to enhance their undergraduate studies in computing with advanced study of security to equip them for senior positions with responsibility for the IT technical and management based security of an organisation. In addition, the programme encourages those with relevant industry skills to specialise in cyber security or refine and develop their existing expertise.

For more information on the part time version of this course, please view this web-page: http://www.brad.ac.uk/study/courses/info/cyber-security-msc-part-time

Professional Accreditation

This course is accredited by the British Computer Society.

Why Bradford?

-Within this programme you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking

-Meets commercial needs for employees who are able to understand and think strategically about future developments in this area

-Provide a high academic quality of service to you, covering both theoretical and practical aspects of computing, networking and cyber security

-Enable you to equip yourself with knowledge, skills and understanding, at an advanced level within the chosen field of study

-MSc Cyber Security draws upon the successful research expertise of the School of Electrical Engineering and Computer Science in addition to that within the Interdisciplinary Research Centre (IRC) in Cyber Security. This base of expertise and research is a fantastic resource for the continued development of the programme in cyber security

Modules

-Business Systems Security

-Networks and Protocols

-Foundations of Cryptography (PG)

-Internet Security and Protocols

-ISO27000 Framework (ISMS)

-Ethical Hacking

-Dissertation

Career support and prospects

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.

The course is designed to equip graduates for senior positions with responsibility for the IT-based security of an organisation.

Application process

The easiest way to apply is online.

This will help us process your application more quickly and allow you to submit your supporting documents electronically.

If you are unable to apply online, please email  to request a paper application form.

We will also need the following supporting documents, along with any other information specified on the course page:

  • Degree certificates/transcripts
  • Research proposal (if required)
  • Two references (including one academic reference)
  • Evidence of English language level (if required)
  • A copy of your passport

International students

If you applying from outside the UK and require additional support you may apply through your country representative.

They can help you at every stage and communicate with the University on your behalf. They often provide additional services to ensure your smooth arrival to the UK such as visa application support and assistance with your travel arrangements.

Funding

The following postgraduate funding may be available to study the Cyber Security MSc at the University of Bradford.

UK postgraduate loans:

Erasmus funding:

Funding from FindAMasters:

Fees

UK / EU: £7,750

International: £17,600



Read less
Organisations operate within increasingly unpredictable, competitive, constrained and demanding environments. Information is crucial to their success as it is required for decision making at all levels. Read more

Course Description

Organisations operate within increasingly unpredictable, competitive, constrained and demanding environments. Information is crucial to their success as it is required for decision making at all levels. Consequently there is a need to understand the strategic importance of information and develop agile, effective and secure ways to exploit it to its full potential. To do this, effective information capability management must be developed throughout the organisation so that the right information is available to the right people at the right time in an effective, efficient and secure manner.

An appropriate infrastructure is required to enable effective information capability management to address strategic business needs. This is dependent on joined-up systems of processes, technology and appropriately skilled, competent and motivated people focused on delivering clearly understood business benefit. The Information Capability Management (ICM) MSc has been developed to address these important issues.

Overview

Skilled professionals are needed to enable organisations to realise the strategic benefits that successfully exploiting information can provide. Success in business of all types and in all sectors, both public and private, is dependant on:

•Understanding the value of information as a strategic asset
•Developing agile, effective and efficient systems that make this information available.
•Countering cyber threats with appropriate cyber security.

The internationally recognised Information Capability Management course successfully supports the development of these professionals. Students from Government departments, industry and other organisations within the UK and internationally come together to study and discuss issues and develop skills that will enable solutions now and in the future.

Key goals of the course are to provide students with postgraduate level education in order to:

•Develop in individuals an awareness of the management, user and supplier communities
•Recognise the stakeholder roles, needs and expectations within these communities
•Enable effective communication and a shared understanding between these stakeholders in order to meet capability objectives
•Master the principles and practice that underlie the delivery of effective, efficient and secure systems in various business spaces that exploit information in order to provide strategic benefit

Start date: Full Time: September / Part Time: January

Duration: Full-time MSc - one year, Part-time MSc - up to three years, Full-time PgCert - one year, Part-time PgCert - two years, Full-time PgDip - one year, Part-time PgDip - two years

Course overview

MSc students must complete a taught phase consisting of twelve modules, followed by an individual dissertation in a relevant topic.

PgDip students are required to undertake the same taught phase as the MSc, but without the individual dissertation.

PgCert students must complete the core module (Foundations of Information Systems) together with five other modules.

Modules

Qualifications achieved by completing:
PgCert: Foundations of Information Systems and any five other modules
PgDip: All modules
MSc: All modules and the dissertation.

Core:
- Cyber Security and Information Assurance
- Dissertation
- Emerging Technology Monitoring
- Foundations of Information Systems
- Information Storage and Retrieval
- Methods and Tools for Information Systems Development
- Organisation Development
- Professional Issues
- Programme and Project Management for Information Systems
- Software Engineering (IS)
- Strategic Application of Information Systems
- Systems Architecture
- Data-led Decision Support
- Data Modelling, Storage and Management

Individual Project

The Individual Project is the opportunity for a student to utilise and demonstrate their understanding of the taught phase of the course by applying their learning to a real world problem. It is also an opportunity to develop skills and achieve a greater level of understanding in a specific area or areas of relevance to the course. Students are allocated a supervisor and have access to subject matter experts to support them in the project phase.

Assessment

Spread throughout the programme and includes coursework, group presentations and examinations during the taught phase and for the MSc a research based dissertation.

Career opportunities

Takes you on to further senior career opportunities and to become one of the next generation of senior professionals delivering business benefit through exploitation of information with skills in appropriate areas including business analysis, strategy development and implementation, information assurance, cyber security, organisational development and strategic application of information systems.

For further information

On this course, please visit our course webpage http://www.cranfield.ac.uk/Courses/Masters/Information-Capability-Management

Read less
We are living through an era of tumultuous change in how politics is conducted and communicated. The great digital disruption of the early 21st century continues to work its way through media systems around the world, forcing change, adaptation, and renewal across a whole range of areas. Read more
We are living through an era of tumultuous change in how politics is conducted and communicated. The great digital disruption of the early 21st century continues to work its way through media systems around the world, forcing change, adaptation, and renewal across a whole range of areas: political parties and campaigns, interest groups, social movements, activist organisations, news and journalism, the communication industries, governments, and international relations.

In the New Political Communication Unit at Royal Holloway, University of London, we believe the key to making sense of these chaotic developments is the idea of power—how it is generated, how it is used, and how it shapes the diverse information and communication flows that affect all our lives.

This unique new Masters degree, which replaces the MSc in New Political Communication, is for critically-minded, free-thinking individuals who want to engage with the exciting intellectual ferment that is being generated by these unprecedented times. The curriculum integrates rigorous study of the very best academic research with an emphasis on making sense of political communication as it is practiced in the real world, in both "old" and "new" media settings.

While not a practice-based course, the MSc Media, Power, and Public Affairs is perfect for those who wish to build a career in the growing range of professions that require deep and critical insight into the relationship between media and politics and public communication more generally. These include advocacy, campaign management, political communication consultancy, journalism, government communication, policy analysis, public opinion and semantic polling, and public diplomacy, to name but a few. Plus, due to its strong emphasis on scholarly rigour, the MSc in Media, Power, and Public Affairs is also the perfect foundation for a PhD in political communication.

You will study a mixture of core and elective units, including a generous choice of free options, and write a supervised dissertation over the summer. Teaching is conducted primarily in small group seminars that meet weekly for two hours, supplemented by individual tuition for the dissertation.

This course is also offered at Postgraduate Diploma level for those who do not have the academic background necessary to begin an advanced Masters degree. The structure of the Diploma is identical except that you will not write a dissertation. If you are successful on the Diploma you may transfer to the MSc, subject to academic approval.

See the website https://www.royalholloway.ac.uk/politicsandir/coursefinder/mscpgdipmediapowerandpublicaffairs.aspx

Why choose this course?

- be taught by internationally-leading scholars in the field of political communication

- the curriculum integrates rigorous study of the very best academic research with an emphasis on making sense of political communication as it is practiced in the real world, in both "old" and "new" media settings

- perfect for those who wish to build a career in the growing range of professions that require deep and critical insight into the relationship between media and politics and public communication more generally

- a unique focus on the question of power and influence in today’s radically networked societies.

On completion of the programme, you will have:
- advanced knowledge and critical understanding of key concepts, theoretical debates, and developments in the field of political communication

- advanced knowledge of the texts, theories, and methods used to enhance understanding of the issues, processes, and phenomena in the field of political communication

- advanced knowledge and critical understanding of research methods in the social sciences

- a solid foundation for a career in the growing range of professions that require deep and critical insight into the relationship between media and politics and public communication more generally, or for a PhD in any area of media and politics.

Department research and industry highlights

- The New Political Communication Unit’s research agenda focuses on the impact of new media and communication technologies on politics, policy and governance. Core staff include Professor Andrew Chadwick, Professor Ben O’Loughlin, Dr Alister Miskimmon, and Dr Cristian Vaccari. Recent books include Andrew Chadwick’s The Hybrid Media System: Politics and Power (Oxford University Press, 2013), Cristian Vaccari’s Digital Politics in Western Democracies: A Comparative Study (Johns Hopkins University Press), and Alister Miskimmon, Ben O’Loughlin, and Laura Roselle’s, Strategic Narratives: Communication Power and the New World Order (Routledge, 2013). Andrew Chadwick edits the Oxford University Press book series Oxford Studies in Digital Politics and Ben O’Loughlin is co-editor of the journal Media, War and Conflict. The Unit hosts a large number of PhD students working in the field of new political communication.

Course content and structure

You will study four core course units (chosen from a total of six options), two elective units, and write a dissertation over the summer. Course units include one of three disciplinary training pathway courses, a course in research design, analysing international politics, and specialist options in international relations.

Students studying for the Postgraduate Diploma do not undertake the dissertation.

Core course units:
Media, Power, and Public Affairs: You will examine the relationship between media, politics and power in contemporary political life. This unit focuses on a number of important foundational themes, including theories of media effects, the construction of political news, election campaigning, government communications and spin, media regulation, the emergence of digital media, the globalisation of media, agenda setting, and propaganda and the role of media in international affairs. The overarching rationale is that we live in an era in which the massive diversity of media, new technologies, and new methodologies demands new forms of analysis. The approach will be comparative and international.

Internet and New Media Politics:
 Drawing predominantly, though not exclusively, upon specialist academic journal literatures, this course focuses on a number of important contemporary debates about the role and influence of new technologies on the values, processes and outcomes of: global governance institutions; public bureaucracies; journalism and news production; representative institutions including political parties and legislatures; pressure groups and social movements. It also examines persistent and controversial policy problems generated by digital media, such as privacy and surveillance, the nature of contemporary media systems, and the balance of power between older and newer media logics in social and political life. By the end of the course students will have an understanding of the key issues thrown up by the internet and new media, as well as a critical perspective on what these terms actually mean. The approach will be comparative, drawing on examples from around the world, including the developing world, but the principal focus will be on the politics of the United States and Britain.

Social Media and Politics: This course addresses the various ways in which social media are changing the relationships between politicians, citizens, and the media. The course will start by laying out broad arguments and debates about the democratic implications of social media that are ongoing not just in academic circles but also in public commentary, political circles, and policy networks—do social media expand or narrow civic engagement? Do they lead to cross-cutting relationships or self-reinforcing echo chambers? Do they hinder or promote political participation? Are they useful in campaigns or just the latest fashion? Do they foster effective direct communication between politicians and citizens? Are they best understood as technologies of freedom or as surveillance tools? These debates will be addressed throughout the course by drawing on recent empirical research published in the most highly rated academic journals in the field. The course will thus enable students to understand how social media are used by citizens, politicians, and media professionals to access, distribute, and co-produce contents that are relevant to politics and public affairs and establish opportunities for political and civic engagement.

Media, War and Conflict:
The post-9/11 global security situation and the 2003 Iraq war have prompted a marked increase in interest in questions concerning media, war and conflict. This unit examines the relationships between media, governments, military, and audiences/publics, in light of old, new, and potential future security events.

Introduction to Qualitative Research Methods in Politics and International Relations:
 You will be provided with an introduction to core theories and qualitative approaches in politics and international relations. You will examine a number of explanatory/theoretical frameworks, their basic assumptions, strengths and weaknesses, and concrete research applications. You will consider the various qualitative techniques available for conducting research, the range of decisions qualitative researchers face, and the trade-offs researchers must consider when designing qualitative research.

Dissertation (MSc only): The dissertation gives you the opportunity to study an aspect of Media, Power, and Public Affairs in depth. You will be assigned a dissertation supervisor and the length of the piece will be 12,000 words.

Elective course units:
Note: not all course units are available every year, but may include:
- Politics of Democracy
- Elections and Parties
- United States Foreign Policy
- Human Rights: From Theory to Practice
- Theories and Concepts in International Public Policy
- Contemporary Anglo-American Political Theory
- Transnational Security Studies
- Conflict and Conflict Resolution in the Middle East
- The Law of Cyber Warfare
- Comparative Political Executives
- European Union Politics and Policy
- International Public Policy in Practice
- Sovereignty, Rights and Justice
- Theories of Globalisation
- Introduction to Quantitative Research Methods in Politics and International Relations

Assessment

Assessment is carried out by coursework and an individually-supervised dissertation.

Employability & career opportunities

Advocacy, campaign management, political communication consultancy, journalism, government communication, policy analysis, public opinion and semantic polling, public diplomacy, PhD research.

How to apply

Applications for entry to all our full-time postgraduate degrees can be made online https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less

Show 10 15 30 per page



Cookie Policy    X