• Imperial College London Featured Masters Courses
  • Regent’s University London Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • University of York Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
University of Leeds Featured Masters Courses
Coventry University Featured Masters Courses
University of Sussex Featured Masters Courses
Swansea University Featured Masters Courses
"penetration"×
0 miles

Masters Degrees (Penetration)

  • "penetration" ×
  • clear all
Showing 1 to 15 of 46
Order by 
This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. Read more
This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cyber security perspective.

Key benefits

• We welcome applications from students who may not have formal/traditional entry criteria but who have relevant experience or the ability to pursue the course successfully.

• The Accreditation of Prior Learning (APL) process could help you to make your work and life experience count. The APL process can be used for entry onto courses or to give you exemptions from parts of your course.

• Two forms of APL may be used for entry: the Accreditation of Prior Certificated Learning (APCL) or the Accreditation of Prior Experiential Learning (APEL).

Visit the website: http://www.salford.ac.uk/pgt-courses/cyber-security,-threat-intelligence-and-forensics

Course detail

You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidences and present them in the court of law. You will use your knowledge of programming to analyse different malwares to determine how they work and how countermeasures can be developed. Only a small percentage of cyber security professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.

You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cyber security while you operate within a well-formed professional and ethical framework.

Suitable For

Suitable for graduates of a computing subject that includes programming and networking, and who love go down to a low level to discover how things work.

Format

• Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
• Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
• Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
• The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.

Modules

• Cyber Forensics and Malware Investigation
• Information Security in Practice
• Penetration Testing and Exploit Development
• Cyber Threat Intelligence
• Project

Assessment

• Examination (20%) assesses your immediate response to small or medium unseen problems
• Coursework (45%) assesses your considered and in-depth response to a larger problem
• Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.

Career Prospects

Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.

How to apply: http://www.salford.ac.uk/study/postgraduate/applying

Read less
This popular and high-quality GCHQ-accredited Masters degree delivers modern enterprise Cyber Security, coupled with Digital Forensics for investigation and incident response. Read more
This popular and high-quality GCHQ-accredited Masters degree delivers modern enterprise Cyber Security, coupled with Digital Forensics for investigation and incident response.

Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics.

The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

See the website http://www.napier.ac.uk/en/Courses/MSc-Advanced-Security-and-Digital-Forensics-Postgraduate-FullTime

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

The MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

SAAS Funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Read less
This is a programme of study that involves networking, software development technologies and architectures for the design and management of modern distributed computer systems and networks. Read more
This is a programme of study that involves networking, software development technologies and architectures for the design and management of modern distributed computer systems and networks. The emphasis is on a software engineering approach based on sound modern software engineering project management methods, tools and techniques, which enable an integrated lifecycle systems development view.

The programme aims to provide students with the knowledge, skills and understanding required to allow them to contribute to the planning, design and management of modern network based computer systems. Students will gain the understanding of critical evaluation of existing technology options, future developments, protocols, architecture and tools needed to support the development and delivery of advanced network services. Upon successful completion of this Master's programme graduates are expected to be proficient in the development of new enterprise distributed and/or web-enabled systems, the integration of legacy systems into intranets or extranets, and advanced data and telecommunication technologies.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/csne

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
System Administration and Security (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Software Tools and Techniques (15 credits)
Clouds, Grids and Virtualisation (15 credits)
Mobile and Network Technologies (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Cyber Security (15 credits)
Enterprise Software Engineering Development (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
Enterprise Web Programming (15 credits)
Systems Development Management and Governance (15 credits)
Penetration Testing (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Network and Internet Technology and Design (15 credits)
Software Tools and Techniques (15 credits)
Clouds, Grids and Virtualisation (15 credits)

Students are required to choose 30 credits from this list of options.

System Administration and Security (15 credits)
Network Architectures and Services (15 credits)
Mobile and Network Technologies (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Network and Internet Technology and Design (15 credits)
Software Tools and Techniques (15 credits)
Clouds, Grids and Virtualisation (15 credits)

Students are required to choose 15 credits from this list of options.

System Administration and Security (15 credits)
Network Architectures and Services (15 credits)
Mobile and Network Technologies (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Cyber Security (15 credits)
Enterprise Software Engineering Development (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
Enterprise Web Programming (15 credits)
Systems Development Management and Governance (15 credits)
Penetration Testing (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Graduates from this programme are equipped for employment in industry commerce or education to work as independent consultants or within teams in diverse areas such as networking, business data communication and telecommunication, Internet and ecommerce applications, IT support, advanced research, teaching and training.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643961

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. Read more
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. The significance of information security and the demand for relevant skills has been emphasised recently by high-profile incidents concerning the privacy of personal data and security of financial information.

This specialist MSc course focuses on the technical aspects of computer systems security and systems administration, particularly penetration testing. It is accredited by the Tiger Scheme and will give you exemption from some of its professional examinations.

You will be taught by an internationally recognised team from the University’s Information Security Research Group, and external speakers contribute to delivering the latest expertise and developments.

See the website http://courses.southwales.ac.uk/courses/254-msc-computer-systems-security

What you will study

Modules include:
- Network Security
- Practical Windows Security
- Practical UNIX Security
- Vulnerability Development
- Professional Skills Development
- Advanced Research Methods
- Project Management
- Research Project: an investigation of your choice, related to the course
- MSc Project: the development and evaluation of a significant application or task, related to the course

Learning and teaching methods

The course is delivered in four major blocks to offer an intensive but focused learning pattern, with two start points each year – February and September. Full-time students will typically spend 12 hours in classes each week. If you choose to study part-time, this is reduced to around six hours each week. You will study through lectures, tutorials, practical sessions, seminars and projects.

Work Experience and Employment Prospects

Career opportunities are excellent – the demand for specialists in this area continues to rise as companies become increasingly dependent on computers and the internet. On graduation, you will be equipped for careers that require in-depth knowledge of technical security issues. Potential roles include systems administrator, security penetration tester or information security consultant, and skills gained strongly relate to the roles of information security analyst and IT security co-ordinator.

With education to Masters level now the recognised professional level of competence, graduates will be better placed to pursue careers in industry, or continue their interest in computer systems security through research at PhD level.

Assessment methods

You will need to spend a significant amount of time working independently, reading and preparing for assessments. Assessment is primarily by coursework, varying from a research-style paper or essay to programming assignments. You will also work on a significant research project and a major project of your own choice, where strong independent thinking, critical analysis and project management skills will be important.

Facilities

We have a full range of high-specification computer labs and an ongoing investment programme to ensure that our facilities stay at the forefront of computing developments.

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
Today there are high level tools easily available to perform sophisticated attacks on computer and network systems. As a result computer network security is a very important consideration in every organisation using computer networks. Read more
Today there are high level tools easily available to perform sophisticated attacks on computer and network systems. As a result computer network security is a very important consideration in every organisation using computer networks. Without proper implementation, businesses could suffer financial losses. There are excellent opportunities in this area with excellent rewards. At present there are skills shortages globally in some areas of security which is an indicator of the demand for highly skilled security professionals.

The MSc in Computer Networks with Security aims to produce postgraduates with an advanced understanding of modern networks with the integrated need of security. The course aims to prepare the student with specialist knowledge and skillset in key areas such as threat analysis, network security systems, cryptography, cybersecurity, penetration testing, wireless security and information security. Students will develop skills to critically evaluate the threats and vulnerabilities of network systems and to implement and integrate security strategies. They will also be able to develop the ability to critically evaluate and implement principles and practices used in modern day cryptography used to secure data and communication in computer network systems. There will be an opportunity to explore current security tools used in penetration testing and get hands on experience at configuring enterprise level security appliances such as firewalls, intrusion detection systems and VPNs.

Course structure

Each MSc course consists of three learning modules (40 credits each) plus an individual project (60 credits). Each learning module consists of a short course of lectures and initial hands-on experience. This is followed by a period of independent study supported by a series of tutorials. During this time you complete an Independent Learning Package (ILP). The ILP is matched to the learning outcomes of the module. It can be either a large project or a series of small tasks depending on the needs of each module. Credits for each module are awarded following the submission of a completed ILP and its successful defence in a viva voce examination. This form of assessment develops your communication and personal skills and is highly relevant to the workplace. Overall, each learning module comprises approximately 400 hours of study.

The project counts for one third of the course and involves undertaking a substantial research or product development project. For part-time students, this can be linked to their employment. It is undertaken in two phases. In the first part, the project subject area is researched and a workplan developed. The second part involves the main research and development activity. In all, the project requires approximately 600 hours of work.

Further flexibility is provided within the structure of the courses in that you can study related topic areas by taking modules from other courses as options (pre-requisite knowledge and skills permitting). Prior to starting your course, you are sent a Course Information and Preparation Pack which provides information to give you a flying start.

MSc Computer Networks Suite of Courses

The MSc in Computer Networks has three distinct pathways:
-Security
-Communications
-Cloud Technologies

The course structure is quite flexible, affording industry-based students an opportunity to attend and accumulate module credits over an extended period of time. It also simultaneously serves the full-time student cohort which generally progresses through the MSc pathway in a single calendar year.

The MSc programmes are short course based and feature assessment through sequentially submitted result portfolios for the work packages, ie the ILPs. These are assigned immediately on each short course module where the students are able to concentrate their study efforts just on the most recently-taught subject material. This greatly promotes efficient focused learning. The individual oral examination administered for each ILP furnishes valuable experience in oral defence, and frees students from written examination burdens.

The technical tasks undertaken in ILPs, along with the required major project, thoroughly exercise the concepts covered in the course modules and give scope for originality and industry-relevant study. Team-working activities encouraged within modules, along with the all-oral individual examination regimen employed in this Networks MSc Suite, have proven solidly beneficial in refining the communication and employability-enhancing skills that are strongly valued by industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations. International (none UK / EU) students who require the Tier 4 visa for a full time study in the UK are not able to apply for the Sandwich degree initially due to Immigration regulations.
However, we do encourage International students on a Tier 4 visa , once enrolled, to apply for a placement. Students who are successful with finding a placement will be provided with help and advice with their visa extension application (subject to the University deadlines and Immigration requirements).

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

On the computing extended MSc you will spend your first semester studying modules which have been written to provide you with the academic, professional and technical skills that you will need to succeed on your chosen award.

All students on the extended MSc study the same modules for one semester and then study specialist modules depending on their degree. This means that whether you have chosen MSc Computer Science, MSc Cyber Security, MSc Web Development or any of our other taught MSc Computing awards, you will study the following modules in your first semester:

Academic English: This module will help you to develop your English Language speaking, listening, reading and writing skills and will introduce you to the conventions of academic writing. Study Skills & Employability: This module will help you to develop the skills and knowledge required to support study at Masters level. It will also help you to develop skills which will aid you in the job market and will look at things such as writing a C.V. and creating a personal development plan.

Computing Fundamentals: This is a double module which has been designed to provide an introduction to fundamental concepts which underpin Computing. The module will enable you to revise and refresh your existing skills to prepare you for study on your specialist awards.

Throughout the Cyber Security course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations. Unfortunately applicants who require a Tier 4 visa for study in the UK are not able to apply for the Sandwich degree in the first instance due to visa regulations. We encourage International students, once enrolled, to apply for a placement and if successful apply to extend their visa and transfer to the sandwich award

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

[[Course content
On the computing extended MSc you will spend your first semester studying modules which have been written to provide you with the academic, professional and technical skills that you will need to succeed on your chosen award. All students on the extended MSc study the same modules for one semester and then study specialist modules depending on their degree. This means that whether you have chosen MSc Computer Science, MSc Computer Networks & Security, MSc Web Development or any of our other taught MSc Computing awards, you will study the following modules in your first semester:

Academic English: This module will help you to develop your English Language speaking, listening, reading and writing skills and will introduce you to the conventions of academic writing.

Study skills & Employability: This module will help you to develop the skills and knowledge required to support study at Masters level. It will also help you to develop skills which will aid you in the job market and will look at things such as writing a C.V. and creating a personal development plan.

Computing Fundamentals: This is a double module which has been designed to provide an introduction to fundamental concepts which underpin Computing. The module will enable you to revise and refresh your existing skills to prepare you for study on your specialist awards.

After successfully completing the first semester you will commence your course specific study

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. Read more
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. This MSc can lead to a career such as a network system administrator, security analyst, ethical hacker or a security consultant.

Why choose this course?

The MSc Cyber Security consists of two major parts: taught modules and an MSc project. Each taught module has an assigned number of credits (either 15 or 30). In order to obtain an MSc degree you must study and pass 120 credits of compulsory taught modules plus the project i.e. 180 credits in total.

[[Careers
Our masters programme is designed to give Computer Science graduates the specialist, up-to-date skills and knowledge sought after by employers, whether in business, industry, government or research. This particular course will prepare you for a career such as a software engineer, developer or project manager.

Teaching methods

Classes consist of lectures, small group seminars, and practical work in our well-equipped laboratories. We use modern, industry-standard software wherever possible. There are specialist facilities for networking and multimedia and a project laboratory especially for masters students. In addition to scheduled classes, you will be expected a significant amount of time in self-study, taking advantage of the extensive and up-to-date facilities. These include the Learning Resource Centres, open 24x7, with 1,500 computer workstations and wifi access, Studynet our versatile online study environment usable on and off campus, and open access to our labs.

Work Placement

This MSc is available with an optional one year industry placement. The 'with placement' programmes give you additional industrial experience by applying the skills you have learned throughout your studies.

This offers you the opportunity to work for one year in a highly professional and stimulating environment. You will be a full time employee in a company earning a salary and will learn new skills that can't be taught at University. During the placement, you will be able to gain further insight into industrial practice that you can take forward into your individual project.

We will provide excellent academic and personal support during both your academic and placement periods together with comprehensive careers guidance from our very experienced dedicated Careers and Placements Service.

Although the responsibility for finding a placement is with you, our Careers and Placements Service maintains a wide variety of employers who offer placement opportunities and organise special training sessions to help you secure a placement, from job application to the interview. Optional one-to-one consultations are also available.

In order to qualify for the placement period you must maintain an overall average pass mark of not less than 60% across all modules studied in semester ‘A’.

Structure

Core Modules
-Advanced Computer Science Masters Project
-Programming Paradigms

Optional
-Advanced Databases
-Artificial Life with Robotics
-Data Mining
-Digital Forensics
-Distributed Systems Security
-Human Computer Interaction: Principles and Practice
-Information Security, Management and Compliance
-Investigative Methods for Computer Science
-Measures and Models for Software Engineering
-Mobile Standards, Interfaces and Applications
-Multicast and Multimedia Networking
-Network System Administration
-Neural Networks and Machine Learning
-Penetration Testing
-Professional Issues
-Programming for Software Engineers
-Secure Systems Programming
-Software Engineering Practice and Experience
-Theory and Practice of Artificial Intelligence
-Wireless, Mobile and Ad-hoc Networking

Read less
On this MA you will interrogate digital culture as you develop and think through your own projects in our bespoke Centre for Cultural Studies media lab. Read more
On this MA you will interrogate digital culture as you develop and think through your own projects in our bespoke Centre for Cultural Studies media lab. You will undertake research and writing that incorporates contemporary art, software studies, critical theory, philosophy and cultural studies. http://www.gold.ac.uk/pg/ma-digital-culture/

Our modes of art, experimentation, work, sociability, politics and economies are changed in tandem with the development of digitality. Many of us are now continuously wired into our networks for fun, at work, and at home. We often find ourselves at the margins of networked relationships where different flows of power form from the residue we leave behind in electronic memories. On one hand we find ourselves policed by the ability to sort large amounts of information on the move, on the other, new spaces grow from technical innovation, experimentation and artistic methods.

Join our MA Digital Culture and help create new insights within these logics. Your writing and projects will be supported in an interdisciplinary environment. You do not necessarily need to have an initial project in mind, nor a technical background, just an enthusiasm for learning and experimentation. Each year we have a very lively mix of students who bring prior experience from across the arts, humanities, and sciences.

The MA in Digital Culture helps students develop and realize innovative projects and prepare for, or to create a bridge towards, a critical career in the cultural, creative, educational, analytical, and computational sectors.

This program is based on the research excellence in cultural studies (Scott Lash), software studies (Matthew Fuller), media philosophy (Luciana Parisi) and critical practices (Graham Harwood).

The MA in Digital Culture grew out of the prior MA Interactive Media: Critical Theory and Practice.

Contact the department

If you have specific questions about the degree, contact the Centre for Cultural Studies.

Modules & Structure

We use art methodologies alongside those from computing and cultural theory. A key method adopted in the Lab is to make the space between theory and practice ambiguous. The class makes and explores things, attempting to explain the phenomena being looked at or thought about. Explanation in this context is not necessarily a reduction of phenomena to literature or a system of logics, but can instead be thought of as knowledge incorporated into a thing that we create, look at or point to, through figuring out a proposition.

In practice this means we may:

-Learn MySQL databases and explore how their integral model of entities and relations create new forms of governance and aid in the performance of different scales of power
-Build simple telephony systems while taking inspiration from early/current data networks and their relationship to cultural change, resource wars and political insurrection
-Explore systematic failure within computation by exploring hacking and security issues such as creating fork bombs, doing penetration testing and reviewing the need for cryptography post-Snowden

We actively work with cultural theory in a world with computation as a central pillar. The Digital Culture Unit in the Centre for Cultural Studies, under whose auspices this programme is run, has been a pioneer of practice-led theory. This method pursues a form of working on projects that at the same time undertakes research and writing that incorporates contemporary cultural theory, philosophy and cultural studies. The Masters, therefore, is also ideal for students with primarily theoretical interests who wish to ground these with concrete knowledge and experience.

Building on the Digital Culture Unit's research excellence in software studies, media philosophy and digital art, students will learn to employ cutting edge research and practice-based methodologies to enhance their own skill set. The programme gives you the opportunity to develop critical and speculative theoretical and practice-based research on the ways computational media technologies are embedded in the technical, cultural, aesthetic, and political structures of society and how we interact with them. The applications of such work are highly diverse. The degree helps students to prepare for or to create a bridge towards a critical career in the cultural, creative, educational, analytical, and computational sectors.

Skills

You'll develop skills in:

Theoretical and practice-based research methodologies
Software and hardware production including basic electronics, programming, networking, telephony, relational database analyses
Group working skills
Event planning and production

Careers

The programme helps students to prepare for a critical career in the cultural, creative, educational, analytical, computational sectors.

Find out more about employability at Goldsmiths.

What our alumni are doing now

-Joao Wilbert (2008/9) has a background in web design and is now a Creative Technologist working at Google Creative Labs. http://www.jhwilbert.com
-Maria Beatrice Fazi (2008/9) has a BA in Philosophy and is now completing her PhD on Computation and Aesthetics at the Centre for Cultural Studies.
-Lisa Baldini (2010/11) is a New York based curator. In 2012 she has curated Code of Contingency.
-Loes Borges (2010/11) has a BA in Media and Cultural Studies and is now lab manager at the Digital Art Lab in Zoetermeer, (NL). http://www.loesbogers.com
-Tom Keene (2011/12) has a BA in Fine Arts and is now collaborating with Furtherfield, London-based media arts organisation, co-director of Brixton Remakery, a community-led recycling initiative. http://www.theanthillsocial.co.uk
-Marcos Chitelet (2011/12) has a BA in Design and is co-founder of the design agency DID, as well as political web platform Sentidos Comunes, and FaceEnergy, a start-up developing projects on energy efficiency for the city of Santiago, Chile.

Prizes and awards

In 2011, Alexandra Sofie Joensoon and Cliff Hemmet – both students from the MA – won a prestigious prize at the media arts festival Ars Electronica. Alex and Cliff created a low cost DIY telephony server together with sex workers activist group X-talk. Today the project is a platform for critical reflection on how communication practices and structures are materialised in the sex industry.

Funding

Please visit http://www.gold.ac.uk/pg/fees-funding/ for details.

Read less

Show 10 15 30 per page


Share this page:

Cookie Policy    X