• Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of Surrey Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • University of Northampton Featured Masters Courses
  • Northumbria University Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • Birmingham City University Featured Masters Courses
King’s College London Featured Masters Courses
Cranfield University Featured Masters Courses
EURECOM Featured Masters Courses
Imperial College London Featured Masters Courses
University of Birmingham Featured Masters Courses
"penetration" AND "testin…×
0 miles

Masters Degrees (Penetration Testing)

We have 33 Masters Degrees (Penetration Testing)

  • "penetration" AND "testing" ×
  • clear all
Showing 1 to 15 of 33
Order by 
IN BRIEF. You will develop  practical and real-world skills in all major areas of cyber security, cyber forensics, cyber warfare and cyber threat intelligence to fight against Advanced Persistent Threats (APTs). Read more

IN BRIEF:

  • You will develop  practical and real-world skills in all major areas of cyber security, cyber forensics, cyber warfare and cyber threat intelligence to fight against Advanced Persistent Threats (APTs)
  • You will prepare yourself to obtain professional security certifications such as CISSP and CCFP
  • You will be among the most employable people on the planet!
  • Part-time study option
  • International students can apply

COURSE SUMMARY

This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cyber security perspective.  

You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidences and present them in the court of law. You will use your knowledge of programming to analyse different malwares to determine how they work and how countermeasures can be developed. Only a small percentage of cyber security professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.

You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cyber security while you operate within a well-formed professional and ethical framework.

TEACHING

  • Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
  • Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
  • Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
  • Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
  • The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.

ASSESSMENT

  • Examination (25%) assesses your immediate response to  small or medium unseen problems
  • Coursework (40%) assesses your considered and in-depth response to a larger problem
  • Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.

CAREER PROSPECTS

Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.

LINKS WITH INDUSTRY

This course has contacts with local industry such as software companies (such as Web Applications UK), infrastructure providers (such as UKFast) and security consultants (such as KPMG). These companies will provide you with a real-world perspective to help you appreciate the barriers that exist and the compromises that must be made to manage conflicting demands (known as the C-I-A triad).

FURTHER STUDY

Your MSc project will need you to demonstrate “originality in the application of knowledge”. Given a suitable topic, this may be able to be developed into an area where you can undertake a higher research degree to demonstrate “an original contribution to knowledge” which is the target for a PhD. You will get a chance to learn about the research interests of the University’s research active staff in order to help you develop a suitable topic. This may be directly in a security field, or applications of other fields of computing such as artificial intelligence or big data in cyber security and cyber forensics.



Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. Read more

On the MSc in Cyber Security course at Swansea University your studies will include themes including cryptography, blockchain, cryptocurrencies, the security and privacy of personal data, cyberterrorism, cybercrime and mobile security to name but a few. In the Cyber Security course, Swansea Computer Science takes a holistic and interdisciplinary approach, bringing together modules on diverse topics such as penetration testing, formal modelling, information security management, cryptography and AI in order to equip our students with a suitable mindset for a career in cyber security. The department's cyber security lab provides the perfect backdrop for exploring the security landscape, allowing Cyber Security students and staff to carry out experiments in network security, mobile security, and to explore threats and defence mechanisms in the context of the Internet of Things.

Key Features of the MSc in Cyber Security

  • We are top in the UK for career prospects [Guardian University Guide 2018]
  • 5th in the UK overall [Guardian University Guide 2018]
  • 7th  in the UK for student satisfaction with 98% [National Student Survey 2016]
  • We are in the UK Top 10 for teaching quality [Times & Sunday Times University Guide 2017]
  • 12th in the UK overall and Top in Wales [Times & Sunday Times University Guide 2017]
  • 91.9% in graduate employment or further study six months after leaving University [DHLE Survey 2016]
  • UK TOP 20 for Research Excellence [Research Excellence Framework 2014]
  • Our Project Fair allows students to present their work to local industry
  • Strong links with industry
  • £31m Computational Foundry for computer and mathematical sciences will provide the most up-to-date and high quality teaching facilities featuring world-leading experimental set-ups, devices and prototypes to accelerate innovation and ensure students will be ready for exciting and successful careers. (From September 2018)
  • Top University in Wales [Times & Sunday Times University Guide 2017]

Our increasingly connected world presents continual new and serious security threats. From privacy violations (hacking, monitoring communications, leaking sensitive data, stealing and publishing private information) through to the drugs trade, sex trafficking and terrorism, Computer Science can provide the techniques required for mitigating such risks, in order to provide secure, reliable and trustworthy systems.

Taught component: The MSc in Cyber Security offers a range of modules, taught by internationally renowned researchers and covering topics such as: Cryptography and Network Security, Penetration Testing, Information Security Management, Embedded Systems Modelling and Verification Techniques, Web Application Development, Blockchain, Cryptocurrencies and Smart Contracts, Advanced Topics: AI and Cyber Security Invention and Innovation in Computing.

Dissertation component: A further four months duration is spent undertaking a substantial research project (60 credits), which will involve using and exploring cutting edge techniques for specifying, developing, verifying and accessing systems against security criteria. Cyber Security Students will benefit from our broad range of industrial partners and internationally leading research expertise.

Possible Future Pathways: Cyber Threat Analyst - Penetration Tester PhD Researcher - Data Security Analyst Secure Web Developer - Verification Engineer.

Modules

Modules on the Cyber Security course may include:

  • Information Security Management
  • Computer Science Project Research Methods
  • Critical Systems
  • IT-Security: Cryptography and Network Security
  • Security Vulnerabilities and Penetration Testing
  • Invention and Innovation in Computing
  • Blockchain, Cryptocurrencies and Smart Contracts
  • Advanced Topics: Artificial Intelligence and Cyber Security
  • Web Application Development
  • Embedded System Design

Facilities for MSc in Cyber Security

The Department is well equipped for teaching, and is continually upgrading its laboratories to ensure equipment is up-to-date – equipment is never more than three years old, and rarely more than two. Currently, students use three fully networked laboratories: one, running Windows; another running Linux; and a project laboratory, containing specialised equipment. These laboratories support a wide range of software, including the programming languages Java, C# and the .net framework, C, C++, Haskell and Prolog among many; integrated programme development environments such as Visual Studio and Netbeans; the widely-used Microsoft Office package; web access tools; and many special purpose software tools including graphical rendering and image manipulation tools; expert system production tools; concurrent system modelling tools; World Wide Web authoring tools; and databases.

As part of our expansion, we are building the Computational Foundry on our Bay Campus for computer and mathematical sciences. As a student on the MSc in Cyber Security, you will study at the Bay Campus in the new Computational Foundry, a dedicated £32 million building for computational studies, providing the latest labs, resources and ecosystems for world leading, interdisciplinary research.

Careers for MSc in Cyber Security Graduates

All Computer Science courses including the MSc in Cyber Security will provide you the transferable skills and knowledge to help you take advantage of the excellent employment and career development prospects in an ever growing and changing computing and ICT industry.

94% of our Postgraduate Taught Graduates were in professional level work or study [DLHE 14/15].

Jobs include:

  • Software Engineer: Motorola Solutions
  • Change Coordinator: Logica
  • Software Developer/Engineer: NS Technology
  • Workflow Developer: Irwin Mitchell
  • IT Developer: Crimsan Consultants
  • Consultant: Crimsan Consultants
  • Programmer: Evil Twin Artworks
  • Web Developer & Web Support: VSI Thinking
  • Software Developer: Wireless Innovations
  • Associate Business Application Analyst: CDC Software
  • Software Developer: OpenBet Technologies
  • Technical Support Consultant: Alterian
  • Programming: Rock It
  • Software Developer: BMJ Group


Read less
This is a programme of study that involves networking, software development technologies and architectures for the design and management of modern distributed computer systems and networks. Read more

This is a programme of study that involves networking, software development technologies and architectures for the design and management of modern distributed computer systems and networks. The emphasis is on a software engineering approach based on sound modern software engineering project management methods, tools and techniques, which enable an integrated lifecycle systems development view.

The programme aims to provide students with the knowledge, skills and understanding required to allow them to contribute to the planning, design and management of modern network based computer systems. Students will gain the understanding of critical evaluation of existing technology options, future developments, protocols, architecture and tools needed to support the development and delivery of advanced network services. Upon successful completion of this Master's programme graduates are expected to be proficient in the development of new enterprise distributed and/or web-enabled systems, the integration of legacy systems into intranets or extranets, and advanced data and telecommunication technologies.

Through our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Full time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Part time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Year 2

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Careers

Graduates from this programme are equipped for employment in industry commerce or education to work as independent consultants or within teams in diverse areas such as networking, business data communication and telecommunication, Internet and e-commerce applications, IT support, advanced research, teaching and training.



Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more

This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Through our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Full time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Part time

Year 1

Students are required to study the following compulsory courses.

Students are required to choose 30 credits from this list of options.

Students are required to choose 30 credits from this list of options.

Year 2

Students are required to study the following compulsory courses.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Students are required to choose 15 credits from this list of options.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Careers

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.



Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. Read more
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. This MSc can lead to a career such as a network system administrator, security analyst, ethical hacker or a security consultant.

Why choose this course?

The MSc Cyber Security consists of two major parts: taught modules and an MSc project. Each taught module has an assigned number of credits (either 15 or 30). In order to obtain an MSc degree you must study and pass 120 credits of compulsory taught modules plus the project i.e. 180 credits in total.

[[Careers
Our masters programme is designed to give Computer Science graduates the specialist, up-to-date skills and knowledge sought after by employers, whether in business, industry, government or research. This particular course will prepare you for a career such as a software engineer, developer or project manager.

Teaching methods

Classes consist of lectures, small group seminars, and practical work in our well-equipped laboratories. We use modern, industry-standard software wherever possible. There are specialist facilities for networking and multimedia and a project laboratory especially for masters students. In addition to scheduled classes, you will be expected a significant amount of time in self-study, taking advantage of the extensive and up-to-date facilities. These include the Learning Resource Centres, open 24x7, with 1,500 computer workstations and wifi access, Studynet our versatile online study environment usable on and off campus, and open access to our labs.

Work Placement

This MSc is available with an optional one year industry placement. The 'with placement' programmes give you additional industrial experience by applying the skills you have learned throughout your studies.

This offers you the opportunity to work for one year in a highly professional and stimulating environment. You will be a full time employee in a company earning a salary and will learn new skills that can't be taught at University. During the placement, you will be able to gain further insight into industrial practice that you can take forward into your individual project.

We will provide excellent academic and personal support during both your academic and placement periods together with comprehensive careers guidance from our very experienced dedicated Careers and Placements Service.

Although the responsibility for finding a placement is with you, our Careers and Placements Service maintains a wide variety of employers who offer placement opportunities and organise special training sessions to help you secure a placement, from job application to the interview. Optional one-to-one consultations are also available.

In order to qualify for the placement period you must maintain an overall average pass mark of not less than 60% across all modules studied in semester ‘A’.

Structure

Core Modules
-Advanced Computer Science Masters Project
-Programming Paradigms

Optional
-Advanced Databases
-Artificial Life with Robotics
-Data Mining
-Digital Forensics
-Distributed Systems Security
-Human Computer Interaction: Principles and Practice
-Information Security, Management and Compliance
-Investigative Methods for Computer Science
-Measures and Models for Software Engineering
-Mobile Standards, Interfaces and Applications
-Multicast and Multimedia Networking
-Network System Administration
-Neural Networks and Machine Learning
-Penetration Testing
-Professional Issues
-Programming for Software Engineers
-Secure Systems Programming
-Software Engineering Practice and Experience
-Theory and Practice of Artificial Intelligence
-Wireless, Mobile and Ad-hoc Networking

Read less
In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. Read more

In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. And in 2015 cybersecurity has been identified at the World Economic Forum as one of the major risks in the world economy.

Therefore, given the growing demand for skilled professionals, IMF Business School, Deloitte and the University Camilo Jose Cela, have developed this Master in Cybersecurity, who manages to accommodate the needs of stakeholders, opting for an online high-level training with the ease of do it from anywhere. It is the only fully online master market 60 ECTS and supported by a University Moreover, the best students will be selected by Deloitte to perform CyberSOC internship at Deloitte, with high rates of joining Deloitte after completion.

This Master enables you to:

  • Acquire the skills to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • Develop techniques and use tools to fully exploit your skills and knowledge to perform penetration testing to systems and networks.
  • Get a general and introductory vision to the world of cybersecurity, explaining the most important attacks and how to mitigate them.
  • Knowing the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • Assimilate enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Knowing the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • Perform developments in secure programming and improve your skills in security audit in the analysis and evaluation of the application source code.

Objectives

Get a comprehensive and thorough knowledge in disciplines such as Cyber ​​Intelligence, malware analysis, technical audits of systems and networks (ethical hacking), forensic analysis and management of security incidents, secure web application development and monitoring and correlation of security events (SIEM through technologies).

Students:

  • You get a general and introductory vision to the world of cybersecurity, knowing the most important attacks and how to mitigate them.
  • It will acquire the necessary steps to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • It will develop technical skills and learn to use tools to fully exploit their skills and knowledge to perform penetration testing to systems and networks.
  • You know the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • He assimilated enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Learn the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • He will qualify as a developer in secure programming skills and improve security auditors in the analysis and evaluation of the application source code.

Methodology and Evaluation

Methodology

MFI offers a flexible methodology adapted to your needs, whatever your geographical location or time availability. This master can be studied under:

  • Online Methodology: All the agenda will be on hand from our virtual campus 24 hours a day, 7 days a week.
  • Distance methodology: have course material in book form.

All contents are fully updated and have great technical, easily understandable and with a clear practical vocation rigor. In addition, IMF offers you:

  • e-face tutoring staff (via forums, chat, phone, email).
  • Webinars.
  • Debates and discussion groups through forums and chats.
  • Self-assessment test.
  • Readings, case studies and documentation.

Evaluation

Continuous assessment as advances in the study of the Master.

Each module will be assessed by combining online and development of case examination; overcoming will free each subject.

Likewise, obtaining the titles of Master of IMF and Masters from the University Camilo Jose Cela, subject to overcoming the trials of each module (continuous assessment) without final examination, and conducting a Final Project Master.

Career prospects

Booming Sector

According to a recent report by the European Union, it is expected to create one million jobs in the area Cybersecurity 2020.

At the end of our master you will be ready to serve as:

  • Security Analyst
  • Malware analyst
  • forensic analyst
  • ethical hacker
  • Cyber ​​Intelligence expert and ciberfraude
  • Developers and analysts source
  • Cybersecurity consultant

Guaranteed internships in companies

IMF Business School, through its website and Employment Practices ensures students of the Masters in Cybersecurity, practices in companies. Query conditions.



Read less
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies. Read more
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies.

This will be achieved by industry-led, research-informed, practice-based teaching and learning. Using industry-standard resources, you will apply the skills and knowledge gained to real-life project scenarios across industry, commerce and public sector.

The programme of study will include areas such as requirements capture, network design, evaluation, securing and optimisation, ranging from hardware configuration to protocol analysis and software definition. The programme will include research and scholarly activity in order to incorporate the latest thinking into the proposed solution.

What's covered in the course?

On this course, you will learn to:
-Critically evaluate and apply knowledge of advanced routing principles.
-Evaluate and apply advanced routing protocols for specific networking solutions.
-Evaluate a variety of routing techniques for a given network environment.
-Critically evaluate routing policy requirements for a network.
-Design and implement ethernet-based LANs. Ensuring security within the given environment.
-Apply mathematical analysis to use VLSM efficiently.
-Apply security considerations to the design and management of networks.
-Design/plan and implement LAN/WAN solutions which require switched hybrid.
-Critically assess SDN solutions in both the industry and research domains.
-Design an SDN-based network for a given system, identifying appropriate components and network structure.
-Implement an appropriate SDN controller to manage device configuration, and any other relevant network policies within an SDN network.
-Select, plan and implement an appropriate testing strategy to validate security requirements against a threat model.
-Critically evaluate the requirements for penetration testing, ethical hacking and effectively communicate security audit results to a variety of audiences.
-Design and conduct security assessment experiments to expose security vulnerabilities and to interpret, analyse and critically evaluate the resulting data to recommend remedial actions.
-Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within the organisation.

Why choose us?

-The Centre for Cloud Computing houses the Cisco Networking Academy, which has an international reputation for delivering high-quality teaching, training and support acrossEurope, the Middle East and Africa.
-In six purpose-built rooms, the Centre also houses £500,000 of computer networking and communications equipment, together with more than £200,000 of web-based equipment and bookable resources.
-The course provides opportunities for you to engage in advanced studies using problem-based learning and flipped curricula strategies. You will work in groups and on your own to deliver solutions to industry-related problems and scenarios.
-The unique combination of employer-led, research-informed technical knowledge and practical experience on industry-standard resources makes our graduates more employable and sought after.
-The course encourages critical thinking and problem solving, giving you the opportunities for research.

Course in depth

All the modules are practice-based and learning is carried out in the labs. Each 20-credit module will have two hours contact, and you are expected to undertake approximately six additional hours of learning, research and assessment preparation for each module.

Assessment is carried out through presentations (both group and individual), timed tests and exams, written reports, research activity and publication of findings, and practical-based time assessments.

At the start of the course, there will be a three-week, full-time induction tool kit, comprising of a review of CCNA and associated technologies.

The course also provides the base knowledge for students to undertake the CCNA certification, and with an additional boot camp to undertake the individual CCNP certification exams.

Modules
-Information Security 20 credits
-Software Defined Network Engineering 20 credits
-Advanced Networking Systems 20 credits
-Network Management 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods 20 credits
-Project and placement 60 credits

Enhancing your employability skills

The University is eager to recognise students have made the effort to gain industry experience and stand out from the typical graduate. Thus, we offer a range of options for you to get extra awards and recognition for your work in industry.

We also have our Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.

Read less
Interest in computer security is booming. From whistle-blower Edward Snowden to the NHS ransomware attack, the increase in cybercrime has led to a strong demand for security experts in this area. Read more

Interest in computer security is booming. From whistle-blower Edward Snowden to the NHS ransomware attack, the increase in cybercrime has led to a strong demand for security experts in this area. This online course will teach you how to protect and safeguard the information stored on digital devices around the world.

With an in-depth focus on penetration testing and the implementation of defensive measures, your course will enhance your existing computing knowledge and develop your security expertise. We will teach you how to break systems in order to tighten their security and stop others from breaking into them, and you will develop new methods to protect a company's security.

You will gain hands-on experience in a Virtual Learning Environment. Connecting to a remote machine from your PC or laptop, you will discover how to 'hack' and defend machines in order to test their security using safe and legal training procedures.

Research Excellence Framework 2014

Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Core modules

  • Principles of Digital Security
  • Incident Response & Investigation
  • Network Security, Firewalls & Virtual Private Networks
  • Hacker Techniques, Tools & Incident Handling
  • Security Strategies for Web Applications & Social Networks
  • Research Practice
  • Project Management
  • Dissertation

Job prospects

Whether you are already in computing and looking to move into security or you are a student who has just finished a computing-related degree, this course will give you the skills to protect the information held by businesses across every sector, giving your career global potential. Your future roles could include penetration tester (system, network, web, and application), security architect, malware analyst, security analyst or security auditor.

  • Penetration tester (System, network, web, application)
  • Security architect
  • Malware analyst
  • Director of security


Read less
The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Read more

The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. Whilst these technologies bring us untold benefits, they also expose businesses, governments and individuals to repeated threats, such as fraud through data manipulation, deliberate sabotage and blackmail. As a result, businesses, governments and individuals around the world rely on the expertise and innovations of information security specialists, without which global communications systems would grind to a halt.

Want to join this expanding field and learn from the very best? Our flagship Information Security programme was the first of its kind in the world. It is certified by GCHQ, the UK Government Communications Headquarters, and taught by academics and industrial partners in one of the largest and most established Information Security Groups in the world. We are a UK Academic Centre of Excellence for cyber security research, and an Engineering and Physical Sciences Research Council (EPSRC) Centre for Doctoral Training in cyber security. We work closely with industry, and much of our curriculum and research is informed and audited by the industry itself. Our teachers are specialists in the field, with backgrounds in computer science, engineering, mathematics, statistics and the social sciences.

Our broad curriculum encompasses cryptography, fraud detection, system security, network security, device security and the study of how security itself should be managed. You will learn about the technical, legal and commercial aspects of the industry and have the chance to complete a supervised dissertation on a topic of your choice. In a typical year you could benefit from lectures and seminars given by as many as 50 different guest speakers. You will also have access to our virtualisation software, for experimenting with network security settings and ideas, as well as to our Penetration Testing Laboratory and industry-sponsored Smart Card Centre.

We offer a friendly, supportive learning environment and you will have a dedicated personal adviser to guide you through your studies. The skills you gain will open up a range of high-level career options and provide a solid foundation if you wish to progress to a PhD. Our graduates are in demand for their cutting-edge grasp of the field as well as their technical expertise and transferrable skills such as data handling, analysis, problem solving and research. The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

  • Join a world-class Information Security Group, recognised as an Academic Centre of Excellence by the UK Government.
  • Learn from an interdisciplinary team of renowned information security specialists who are involved in pioneering research in the field.
  • Benefit from our close ties with the information security industry.
  • Enjoy the flexibility to tailor your degree to your particular interests and complete a supervised research project of your own.

The programme can be completed in one year full-time, two years part-time, three to seven years through Continuous Professional Development (CPD), or two to four years through distance learning.

Course structure

Core modules

  • Security Management
  • Introduction to Cryptography and Security Mechanisms
  • Project
  • Network Security
  • Computer Security (Operating Systems)
  • Security Technologies
  • Secure Business Architectures

Optional modules

In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.

  • Legal and Regulatory Aspects of Information Security
  • Advanced Cryptography
  • Database Security
  • Cyber Crime
  • Smart Cards, RFIDs and Embedded Systems Security
  • Software Security
  • Digital Forensics
  • Security Testing - Theory and Practice
  • Cyber Security

Teaching & assessment

We use a range of teaching methods, including seminars, lectures and practical lab work. There is a strong focus on small group teaching. The programme has a flexible, modular structure, combining a sueprvised dissertation and mandatory courses that together make up 120 of the 180 credits required to pass, with a range of optional modules on specialist topics, worth 20 credits each.

During your studies you will be invited to attend an intensive, two-day revision course to prepare for the Certified Information Systems Security Professional (CISSP) exams, which you will then be able to sit on campus, through an established arrangement with (ISC)2.

Assessment is through a combination of end-of-year examinations sat in May or June and the written dissertation, which has to be submitted in September.

Your future career

By the end of this programme you will possess the knowledge and skills to pursue a career as a cyber security professional, and an ideal basis for moving on to further postgraduate research if you prefer. You will have an advanced knowledge and understanding of the latest breakthroughs and techniques, as well as key challenges and opportunities in the field. This programme will also give you valuable transferable skills such as advanced IT skills, data handling, analysis, research, communication, problem solving, time management, adaptability and self-motivation.

Our graduates are highly employable and in recent years they have gone on to forge successful careers in a wide range of sectors, including: banking, telecommunications, security consultancies, the civil service, public utilities and the retail sector.

You will be assigned a personal advisor to guide you through your studies and advise you on further postgraduate opportunities. The campus Careers team will be on hand to offer advice and guidance on your chosen career and the University of London Careers Advisory Service runs regular sessions on finding summer internships or vacation employment and securing employment after graduation.



Read less
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. Read more
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. The significance of information security and the demand for relevant skills has been emphasised recently by high-profile incidents concerning the privacy of personal data and security of financial information.

This specialist MSc course focuses on the technical aspects of computer systems security and systems administration, particularly penetration testing. It is accredited by the Tiger Scheme and will give you exemption from some of its professional examinations.

You will be taught by an internationally recognised team from the University’s Information Security Research Group, and external speakers contribute to delivering the latest expertise and developments.

See the website http://courses.southwales.ac.uk/courses/254-msc-computer-systems-security

What you will study

Modules include:
- Network Security
- Practical Windows Security
- Practical UNIX Security
- Vulnerability Development
- Professional Skills Development
- Advanced Research Methods
- Project Management
- Research Project: an investigation of your choice, related to the course
- MSc Project: the development and evaluation of a significant application or task, related to the course

Learning and teaching methods

The course is delivered in four major blocks to offer an intensive but focused learning pattern, with two start points each year – February and September. Full-time students will typically spend 12 hours in classes each week. If you choose to study part-time, this is reduced to around six hours each week. You will study through lectures, tutorials, practical sessions, seminars and projects.

Work Experience and Employment Prospects

Career opportunities are excellent – the demand for specialists in this area continues to rise as companies become increasingly dependent on computers and the internet. On graduation, you will be equipped for careers that require in-depth knowledge of technical security issues. Potential roles include systems administrator, security penetration tester or information security consultant, and skills gained strongly relate to the roles of information security analyst and IT security co-ordinator.

With education to Masters level now the recognised professional level of competence, graduates will be better placed to pursue careers in industry, or continue their interest in computer systems security through research at PhD level.

Assessment methods

You will need to spend a significant amount of time working independently, reading and preparing for assessments. Assessment is primarily by coursework, varying from a research-style paper or essay to programming assignments. You will also work on a significant research project and a major project of your own choice, where strong independent thinking, critical analysis and project management skills will be important.

Facilities

We have a full range of high-specification computer labs and an ongoing investment programme to ensure that our facilities stay at the forefront of computing developments.

Read less

Show 10 15 30 per page



Cookie Policy    X