Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.
The course has four main focuses
This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.
You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.
On this course you
Free training and certification exam
Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.
Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.
BSI lead auditor qualification
• ISO27001 Lead Auditor
BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.
Guest Speakers from industry
Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.
In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.
We developed this course along two main lines.
The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.
The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.
Semester one modules
Semester two modules
Semester three modules
You study research methods and do a substantial research project leading to a dissertation.
Group and individual coursework. You also do a range of
On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.
The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.
Strategy, policy, governance
• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)
Risk management, verification and compliance
• risk analyst • risk assessor • business information security officer • reviewer • auditor
Incident and threat management and response
• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity
Operations and security management
• network security officer • systems security officer • information security officer • crypto custodian • information manager
Engineering, architecture and design
• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation
Education, training and awareness
• security programme manager
• security researcher
Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.
The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.
Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.
This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.
Example module listing
The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
The programme will:
Knowledge and understanding
Students will gain:
Intellectual / cognitive skills
Students will leave the programme with the ability to:
Professional practical skills
Students will gain the ability to:
Key / transferable skills
Students will have:
We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.
In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.
Becoming an expert designer and coordinator of information systems projects, with knowledge in data analysis and cyber law, and thus enabling you to take a leading role when tackling any ICT project.
There is hardly a company in the world that doesn’t use ICT in some shape or form and many of them face problems in getting ICT to do what it’s supposed to do. So they turn to ICT technicians for advice. However, more often than not, technical problems are only the tip of the iceberg, and a broader perspective is needed to understand and solve them. Radboud University’s Master’s programme in Information Sciences will teach you to become a digital architect who can look beyond mere technical sides to ICT adoption and assist in designing competitive business solutions.
We’ll teach you the broad theoretical foundations you’ll need to understand the technological aspect of any ICT project that may come your way and we’ll help you look beyond technological concerns when tackling ICT-related problems in practice. Radboud University is well known in the field of information architecture, systems theory, and the quality and security of information systems.
There is a large demand for well-trained information experts who can help implement sound, secure, user-friendly technology. Many of our students are offered jobs even before they graduate, as consultants, project managers or ICT specialists.
See the website http://www.ru.nl/masters/toxicology
- Data analysis, privacy and cyber law are the essential components of modern ICT. Radboud University is unique in offering this combination within the field of Information Sciences.
- This programme offers a good mix: forming a solid technical, organisational and legal foundation, getting hands-on experience and developing the insights needed to take a leading role in successful change programmes with active engagement from both technical savvy people and those unfamiliar with the field.
- The field of Information Sciences has the highest chance of finding employment and graduates are offered some of the highest salary for starter position in the Netherlands.
- The second half of your programme offers the possibility of an internship, which in this field is paid and can contribute to financing your Master’s study. We have close contacts with the private sector which can help you to find your own internship position.
- Electives enable you in fine-tuning the focus of this specialisation to meet your own academic and professional interests.
- You will be taught by top researchers and ICT experts of the Institute for Computing and Information Sciences (iCIS), which was ranked first in the latest national research assessment.
- Some graduates even start their own businesses, something that the Mercator Incubator right here in Nijmegen could help you with.
This programme is suited for both students with a technological background with management ambitions, as those with a management background and a strong affinity with technology wanting to specialise in ICT. As the programme is a technological programme we do expect the management students to have taken a minor in Information Sciences during their Bachelor’s study, or they will need to take a half-year pre-Master’s programme before being admitted
At Radboud University, we believe that a good information specialist is more than an expert in information architecture, systems theory, and the quality and security of information systems. They form the bridge between the people involved. You’ll therefore need to learn to work together with different stakeholders within a project, for example, the super technical programmer, the demanding client and, in some cases, the computer illiterate user. You’ll need to be able represent all their interests and find a solution that’s satisfactory to all. By the end of the programme you’ll be a well-trained digital architect with the necessary managerial skills.
Radboud University's information specialists also work closely with colleagues from other disciplines, such as law, medicine, brain research, and artificial intelligence. Because information systems have a wide application, this Master’s programme shows you how to look beyond the borders of your own discipline. And the annual study trips in the elective ICT in a Different Culture – to countries such as India, Brazil, and South Africa – will also enable you to extend your own boundaries.
There is a big demand for highly trained information experts who can apply good, user-friendly technology. Many of our students are offered jobs even before they graduate. Most go into industry, banking and insurance, or to public-sector organisations such as schools and hospitals.
Students with this Master’s could think of positions as consultants, project managers or ICT specialists. And more companies are adding the position of Chief Information Officer (CIO) to their board of directors. This Master’s programme is definitely a good stepping stone to reaching this kind of position in your future career.
- Your own company
Some students develop their own ideas and innovations while taking part in this Master’s. They see what’s on offer, understand what’s lacking and realise where the possibilities lie. In Nijmegen there are plenty of opportunities for those wanting to start their own business. For example, the Mercator Incubator could help those with a good business plan with advice or even by offering affordable accommodation and other facilities for the first year or two of setting up a company.
See the website http://www.ru.nl/masters/toxicology
The University of Bradford Cyber Security MSc is a taught postgraduate programme, offering one-year full-time or two-year part-time study options.
Students complete a range of core modules before carrying out an independent research project and dissertation. The course awards a full Master of Science qualification.
The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. The focus within this programme on the principles, technologies and practices of cyber security helps you to gain the appropriate skills for future PhD studies and research careers as well as to become competent practitioners. The programme comprises particular developments in security with a firm base in academic research and also offers the opportunity for you to study selected topics in advanced computer science.
Included in the programme is the opportunity to enhance industry relevant skills with study in ISO27001 Lead Implementer and Ethical Hacking. These skill areas were highlighted by past alumni and industry practitioners for inclusion in the programme. Therefore, you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking.
This programme meets a continued growing demand for specialists in this area by offering a way for individuals in current employment with relevant industry experience as well as recent graduates to study and enhance and develop their skills. The MSc Cyber Security programme will therefore draw graduates wishing to enhance their undergraduate studies in computing with advanced study of security to equip them for senior positions with responsibility for the IT technical and management based security of an organisation. In addition, the programme encourages those with relevant industry skills to specialise in cyber security or refine and develop their existing expertise.
For more information on the part time version of this course, please view this web-page: http://www.brad.ac.uk/study/courses/info/cyber-security-msc-part-time
This course is accredited by the British Computer Society.
-Within this programme you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking
-Meets commercial needs for employees who are able to understand and think strategically about future developments in this area
-Provide a high academic quality of service to you, covering both theoretical and practical aspects of computing, networking and cyber security
-Enable you to equip yourself with knowledge, skills and understanding, at an advanced level within the chosen field of study
-MSc Cyber Security draws upon the successful research expertise of the School of Electrical Engineering and Computer Science in addition to that within the Interdisciplinary Research Centre (IRC) in Cyber Security. This base of expertise and research is a fantastic resource for the continued development of the programme in cyber security
-Business Systems Security
-Networks and Protocols
-Foundations of Cryptography (PG)
-Internet Security and Protocols
-ISO27000 Framework (ISMS)
The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.
Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.
The course is designed to equip graduates for senior positions with responsibility for the IT-based security of an organisation.
The easiest way to apply is online.
This will help us process your application more quickly and allow you to submit your supporting documents electronically.
If you are unable to apply online, please email [email protected] to request a paper application form.
We will also need the following supporting documents, along with any other information specified on the course page:
If you applying from outside the UK and require additional support you may apply through your country representative.
They can help you at every stage and communicate with the University on your behalf. They often provide additional services to ensure your smooth arrival to the UK such as visa application support and assistance with your travel arrangements.
The following postgraduate funding may be available to study the Cyber Security MSc at the University of Bradford.
UK / EU: £7,750