• Jacobs University Bremen gGmbH Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • Anglia Ruskin University Featured Masters Courses
  • Swansea University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Ross University School of Veterinary Medicine Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of Southampton Featured Masters Courses
King’s College London Featured Masters Courses
FindA University Ltd Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
Imperial College London Featured Masters Courses
University of Pennsylvania Featured Masters Courses
"penetration" AND "testin…×
0 miles

Masters Degrees (Penetration Testing)

We have 32 Masters Degrees (Penetration Testing)

  • "penetration" AND "testing" ×
  • clear all
Showing 1 to 15 of 32
Order by 
This is a programme of study that involves networking, software development technologies and architectures for the design and management of modern distributed computer systems and networks. Read more
This is a programme of study that involves networking, software development technologies and architectures for the design and management of modern distributed computer systems and networks. The emphasis is on a software engineering approach based on sound modern software engineering project management methods, tools and techniques, which enable an integrated lifecycle systems development view.

The programme aims to provide students with the knowledge, skills and understanding required to allow them to contribute to the planning, design and management of modern network based computer systems. Students will gain the understanding of critical evaluation of existing technology options, future developments, protocols, architecture and tools needed to support the development and delivery of advanced network services. Upon successful completion of this Master's programme graduates are expected to be proficient in the development of new enterprise distributed and/or web-enabled systems, the integration of legacy systems into intranets or extranets, and advanced data and telecommunication technologies.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/csne

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
System Administration and Security (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Software Tools and Techniques (15 credits)
Clouds, Grids and Virtualisation (15 credits)
Mobile and Network Technologies (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Cyber Security (15 credits)
Enterprise Software Engineering Development (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
Enterprise Web Programming (15 credits)
Systems Development Management and Governance (15 credits)
Penetration Testing (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Network and Internet Technology and Design (15 credits)
Software Tools and Techniques (15 credits)
Clouds, Grids and Virtualisation (15 credits)

Students are required to choose 30 credits from this list of options.

System Administration and Security (15 credits)
Network Architectures and Services (15 credits)
Mobile and Network Technologies (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Network and Internet Technology and Design (15 credits)
Software Tools and Techniques (15 credits)
Clouds, Grids and Virtualisation (15 credits)

Students are required to choose 15 credits from this list of options.

System Administration and Security (15 credits)
Network Architectures and Services (15 credits)
Mobile and Network Technologies (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Cyber Security (15 credits)
Enterprise Software Engineering Development (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
Enterprise Web Programming (15 credits)
Systems Development Management and Governance (15 credits)
Penetration Testing (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Graduates from this programme are equipped for employment in industry commerce or education to work as independent consultants or within teams in diverse areas such as networking, business data communication and telecommunication, Internet and ecommerce applications, IT support, advanced research, teaching and training.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643961

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
IN BRIEF. You will develop  practical and real-world skills in all major areas of cyber security, cyber forensics, cyber warfare and cyber threat intelligence to fight against Advanced Persistent Threats (APTs). Read more

IN BRIEF:

  • You will develop  practical and real-world skills in all major areas of cyber security, cyber forensics, cyber warfare and cyber threat intelligence to fight against Advanced Persistent Threats (APTs)
  • You will prepare yourself to obtain professional security certifications such as CISSP and CCFP
  • You will be among the most employable people on the planet!
  • Part-time study option
  • International students can apply

COURSE SUMMARY

This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cyber security perspective.  

You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidences and present them in the court of law. You will use your knowledge of programming to analyse different malwares to determine how they work and how countermeasures can be developed. Only a small percentage of cyber security professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.

You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cyber security while you operate within a well-formed professional and ethical framework.

TEACHING

  • Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
  • Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
  • Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
  • Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
  • The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.

ASSESSMENT

  • Examination (25%) assesses your immediate response to  small or medium unseen problems
  • Coursework (40%) assesses your considered and in-depth response to a larger problem
  • Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.

CAREER PROSPECTS

Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.

LINKS WITH INDUSTRY

This course has contacts with local industry such as software companies (such as Web Applications UK), infrastructure providers (such as UKFast) and security consultants (such as KPMG). These companies will provide you with a real-world perspective to help you appreciate the barriers that exist and the compromises that must be made to manage conflicting demands (known as the C-I-A triad).

FURTHER STUDY

Your MSc project will need you to demonstrate “originality in the application of knowledge”. Given a suitable topic, this may be able to be developed into an area where you can undertake a higher research degree to demonstrate “an original contribution to knowledge” which is the target for a PhD. You will get a chance to learn about the research interests of the University’s research active staff in order to help you develop a suitable topic. This may be directly in a security field, or applications of other fields of computing such as artificial intelligence or big data in cyber security and cyber forensics.



Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This is to confirm this course will move from our Stafford Campus to Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
Today there are high level tools easily available to perform sophisticated attacks on computer and network systems. As a result computer network security is a very important consideration in every organisation using computer networks. Read more
Today there are high level tools easily available to perform sophisticated attacks on computer and network systems. As a result computer network security is a very important consideration in every organisation using computer networks. Without proper implementation, businesses could suffer financial losses. There are excellent opportunities in this area with excellent rewards. At present there are skills shortages globally in some areas of security which is an indicator of the demand for highly skilled security professionals.

The MSc in Computer Networks with Security aims to produce postgraduates with an advanced understanding of modern networks with the integrated need of security. The course aims to prepare the student with specialist knowledge and skillset in key areas such as threat analysis, network security systems, cryptography, cybersecurity, penetration testing, wireless security and information security. Students will develop skills to critically evaluate the threats and vulnerabilities of network systems and to implement and integrate security strategies. They will also be able to develop the ability to critically evaluate and implement principles and practices used in modern day cryptography used to secure data and communication in computer network systems. There will be an opportunity to explore current security tools used in penetration testing and get hands on experience at configuring enterprise level security appliances such as firewalls, intrusion detection systems and VPNs.

Course structure

Each MSc course consists of three learning modules (40 credits each) plus an individual project (60 credits). Each learning module consists of a short course of lectures and initial hands-on experience. This is followed by a period of independent study supported by a series of tutorials. During this time you complete an Independent Learning Package (ILP). The ILP is matched to the learning outcomes of the module. It can be either a large project or a series of small tasks depending on the needs of each module. Credits for each module are awarded following the submission of a completed ILP and its successful defence in a viva voce examination. This form of assessment develops your communication and personal skills and is highly relevant to the workplace. Overall, each learning module comprises approximately 400 hours of study.

The project counts for one third of the course and involves undertaking a substantial research or product development project. For part-time students, this can be linked to their employment. It is undertaken in two phases. In the first part, the project subject area is researched and a workplan developed. The second part involves the main research and development activity. In all, the project requires approximately 600 hours of work.

Further flexibility is provided within the structure of the courses in that you can study related topic areas by taking modules from other courses as options (pre-requisite knowledge and skills permitting). Prior to starting your course, you are sent a Course Information and Preparation Pack which provides information to give you a flying start.

MSc Computer Networks Suite of Courses

The MSc in Computer Networks has three distinct pathways:
-Security
-Communications
-Cloud Technologies

The course structure is quite flexible, affording industry-based students an opportunity to attend and accumulate module credits over an extended period of time. It also simultaneously serves the full-time student cohort which generally progresses through the MSc pathway in a single calendar year.

The MSc programmes are short course based and feature assessment through sequentially submitted result portfolios for the work packages, ie the ILPs. These are assigned immediately on each short course module where the students are able to concentrate their study efforts just on the most recently-taught subject material. This greatly promotes efficient focused learning. The individual oral examination administered for each ILP furnishes valuable experience in oral defence, and frees students from written examination burdens.

The technical tasks undertaken in ILPs, along with the required major project, thoroughly exercise the concepts covered in the course modules and give scope for originality and industry-relevant study. Team-working activities encouraged within modules, along with the all-oral individual examination regimen employed in this Networks MSc Suite, have proven solidly beneficial in refining the communication and employability-enhancing skills that are strongly valued by industry.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Read more
The award will provide the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in state of the art, purpose-built, online cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

Course content

This course builds upon our experience in successfully delivering distance learning modules to students from the MOD in our undergraduate courses. Throughout the course you will learn with a combination for synchronous and asynchronous delivery integrated with Blackboard, which will remain your main learning environment. You will also have an opportunity in achieving industry recognised certification in Certified Ethical hacking.

Our purpose-built, state of the art, online security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Read less
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics. Read more
MSc Systems and Cyber Security is perfect for those wishing to develop careers as system and cyber security professionals. It provides in-depth technical knowledge on all aspects of cyber security; from data-protection and encryption, to cyber threats and computer forensics.

Its focus on emerging and future technologies means that you'll be well-placed to succeed in a rapidly changing key IT industry. Demand for cyber security professionals is set to outstrip supply by one third by 2019, so employment prospects on completing this course are excellent.

All taught modules contain considerable input from industry experts from companies such as VISA, HP, ENISA, and IBM who will contribute through guest lectures and case studies. You'll have the opportunity to use our cyber security lab in order to develop and apply in-depth knowledge about security vulnerabilities, ethical hacking and penetration testing strategies.

The course is suitable for graduates from either computer science or information technology or similar.

Modules

Research methods and professional issues
Future internet technologies
Machine learning
Data protection and confidentiality
Systems and cyber threats: vulnerabilities and countermeasures
Security risk assessment
Computer forensics
MSc thesis

All modules are assessed by coursework.

Employability

Graduates from this course could go on to work as experts on ethical hacking and penetration testing or as cyber security professionals.

LSBU Employability Services

LSBU is committed to supporting you develop your employability and succeed in getting a job after you have graduated. Your qualification will certainly help, but in a competitive market you also need to work on your employability, and on your career search. Our Employability Service will support you in developing your skills, finding a job, interview techniques, work experience or an internship, and will help you assess what you need to do to get the job you want at the end of your course. LSBU offers a comprehensive Employability Service, with a range of initiatives to complement your studies, including:

• Direct engagement from employers who come in to interview and talk to students
• Job Shop and on-campus recruitment agencies to help your job search
• Mentoring and work shadowing schemes.

Read less
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. Read more
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. This MSc can lead to a career such as a network system administrator, security analyst, ethical hacker or a security consultant.

Why choose this course?

The MSc Cyber Security consists of two major parts: taught modules and an MSc project. Each taught module has an assigned number of credits (either 15 or 30). In order to obtain an MSc degree you must study and pass 120 credits of compulsory taught modules plus the project i.e. 180 credits in total.

[[Careers
Our masters programme is designed to give Computer Science graduates the specialist, up-to-date skills and knowledge sought after by employers, whether in business, industry, government or research. This particular course will prepare you for a career such as a software engineer, developer or project manager.

Teaching methods

Classes consist of lectures, small group seminars, and practical work in our well-equipped laboratories. We use modern, industry-standard software wherever possible. There are specialist facilities for networking and multimedia and a project laboratory especially for masters students. In addition to scheduled classes, you will be expected a significant amount of time in self-study, taking advantage of the extensive and up-to-date facilities. These include the Learning Resource Centres, open 24x7, with 1,500 computer workstations and wifi access, Studynet our versatile online study environment usable on and off campus, and open access to our labs.

Work Placement

This MSc is available with an optional one year industry placement. The 'with placement' programmes give you additional industrial experience by applying the skills you have learned throughout your studies.

This offers you the opportunity to work for one year in a highly professional and stimulating environment. You will be a full time employee in a company earning a salary and will learn new skills that can't be taught at University. During the placement, you will be able to gain further insight into industrial practice that you can take forward into your individual project.

We will provide excellent academic and personal support during both your academic and placement periods together with comprehensive careers guidance from our very experienced dedicated Careers and Placements Service.

Although the responsibility for finding a placement is with you, our Careers and Placements Service maintains a wide variety of employers who offer placement opportunities and organise special training sessions to help you secure a placement, from job application to the interview. Optional one-to-one consultations are also available.

In order to qualify for the placement period you must maintain an overall average pass mark of not less than 60% across all modules studied in semester ‘A’.

Structure

Core Modules
-Advanced Computer Science Masters Project
-Programming Paradigms

Optional
-Advanced Databases
-Artificial Life with Robotics
-Data Mining
-Digital Forensics
-Distributed Systems Security
-Human Computer Interaction: Principles and Practice
-Information Security, Management and Compliance
-Investigative Methods for Computer Science
-Measures and Models for Software Engineering
-Mobile Standards, Interfaces and Applications
-Multicast and Multimedia Networking
-Network System Administration
-Neural Networks and Machine Learning
-Penetration Testing
-Professional Issues
-Programming for Software Engineers
-Secure Systems Programming
-Software Engineering Practice and Experience
-Theory and Practice of Artificial Intelligence
-Wireless, Mobile and Ad-hoc Networking

Read less
In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. Read more

In recent years the number of companies that decided to invest in protecting against cyber attacks has increased by 33%. A recent report by the European Union plans to create almost 1 million jobs related to cybersecurity 2020. And in 2015 cybersecurity has been identified at the World Economic Forum as one of the major risks in the world economy.

Therefore, given the growing demand for skilled professionals, IMF Business School, Deloitte and the University Camilo Jose Cela, have developed this Master in Cybersecurity, who manages to accommodate the needs of stakeholders, opting for an online high-level training with the ease of do it from anywhere. It is the only fully online master market 60 ECTS and supported by a University Moreover, the best students will be selected by Deloitte to perform CyberSOC internship at Deloitte, with high rates of joining Deloitte after completion.

This Master enables you to:

  • Acquire the skills to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • Develop techniques and use tools to fully exploit your skills and knowledge to perform penetration testing to systems and networks.
  • Get a general and introductory vision to the world of cybersecurity, explaining the most important attacks and how to mitigate them.
  • Knowing the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • Assimilate enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Knowing the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • Perform developments in secure programming and improve your skills in security audit in the analysis and evaluation of the application source code.

Objectives

Get a comprehensive and thorough knowledge in disciplines such as Cyber ​​Intelligence, malware analysis, technical audits of systems and networks (ethical hacking), forensic analysis and management of security incidents, secure web application development and monitoring and correlation of security events (SIEM through technologies).

Students:

  • You get a general and introductory vision to the world of cybersecurity, knowing the most important attacks and how to mitigate them.
  • It will acquire the necessary steps to obtain, maintain and process digital evidence using specific procedures and tools capabilities.
  • It will develop technical skills and learn to use tools to fully exploit their skills and knowledge to perform penetration testing to systems and networks.
  • You know the world of reverse engineering and analysis of malicious code, assuming the processes to understand how files working at a low level in systems and networks.
  • He assimilated enough knowledge to manage and set clear security policies for mobile component of an information system.
  • Learn the basics of monitoring and correlation of security events through the study, development and interpretation of actual reports.
  • He will qualify as a developer in secure programming skills and improve security auditors in the analysis and evaluation of the application source code.

Methodology and Evaluation

Methodology

MFI offers a flexible methodology adapted to your needs, whatever your geographical location or time availability. This master can be studied under:

  • Online Methodology: All the agenda will be on hand from our virtual campus 24 hours a day, 7 days a week.
  • Distance methodology: have course material in book form.

All contents are fully updated and have great technical, easily understandable and with a clear practical vocation rigor. In addition, IMF offers you:

  • e-face tutoring staff (via forums, chat, phone, email).
  • Webinars.
  • Debates and discussion groups through forums and chats.
  • Self-assessment test.
  • Readings, case studies and documentation.

Evaluation

Continuous assessment as advances in the study of the Master.

Each module will be assessed by combining online and development of case examination; overcoming will free each subject.

Likewise, obtaining the titles of Master of IMF and Masters from the University Camilo Jose Cela, subject to overcoming the trials of each module (continuous assessment) without final examination, and conducting a Final Project Master.

Career prospects

Booming Sector

According to a recent report by the European Union, it is expected to create one million jobs in the area Cybersecurity 2020.

At the end of our master you will be ready to serve as:

  • Security Analyst
  • Malware analyst
  • forensic analyst
  • ethical hacker
  • Cyber ​​Intelligence expert and ciberfraude
  • Developers and analysts source
  • Cybersecurity consultant

Guaranteed internships in companies

IMF Business School, through its website and Employment Practices ensures students of the Masters in Cybersecurity, practices in companies. Query conditions.



Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
Computer and information security is a vital issue in today’s IT environment. This programme will provide you with the necessary skills to understand and apply specialised security knowledge in the identification and resolution of IT security threats facing modern organisations. Read more
Computer and information security is a vital issue in today’s IT environment. This programme will provide you with the necessary skills to understand and apply specialised security knowledge in the identification and resolution of IT security threats facing modern organisations. Develop a rounded view of key security domain topics such as security management and computer forensics, and gain the hands-on skills to confidently implement, configure and manage the tools you’ll face in practice.

Key features

-Be confident studying a degree accredited by BCS, The Chartered Institute for IT. The University has been awarded Academic Partner status by the Institute of Information Security Professionals (IISP), in recognition of the significant base of security-related expertise within the institution. This link encourages and enables a dialogue between academia and the wider community of security practitioners.
-Learn from research-active staff at the forefront of knowledge, conducting research within the Centre for Security, Communications and Network Research.
-Put your skills into practice in our high specification security, networking and digital forensic laboratories.
-Technology supported learning with free iPad mini and eBooks.
-Active Computer and Information Security Society (CISS) provide opportunities for networking, problem solving, speakers from industry as well as a valuable source of contacts.
-Build on the foundation which this course offers and take the opportunity to progress onto a research degree at MPhil or PhD level.
-Explore the option of completing the programme over two years with an integral work placement year.
-Benefit from the courses extensive links with major professional bodies and societies such as the BCS, ISACA, IFIP Technical Committee 11 and the Institute for Information Security Professionals (IISP).
-Take the opportunity to make career inroads through strong industrial links with major organisations such as Kaspersky Labs, Symantec, Orange, France-Telecom, and various UK government departments.
-Engage with the BCS South West branch programme, who hold many of their sessions at Plymouth University. The branch has a rich programme of events that contributes to broadening the knowledge and experience of the students.
-Continually under review to ensure all content is relevant and timely the programme has recently begun to offer AccessData Certification as a part of the cybercrime and investigation module, enabling you to achieve professional recognition as well as academic credit.

Course details

During your year of study you will gain an understanding of key topics such as security management, cryptography, network and system security, computer forensics, and protection in application scenarios. You'll also benefit from being taught a wide variety of hands-on skills, which enable you to implement, configure and manage many of the typical controls you will encounter in practice - including firewalls, intrusion detection systems, authentication and access mechanisms, and forensic case management tools. The project will enable you to explore and develop in-depth knowledge on a particular area of security. You'll become a subject expert and push the boundaries of the current understanding.

Core modules
-SEC501 Information Security Management and Governance
-SEC503 Intrusion Analysis and Incident Management
-BPIE500 Masters Stage 1 Placement Preparation
-PROJ513 MSc Project (September)
-SEC502 Network Security and Penetration Testing
-SEC505 Digital Forensic Investigation
-SEC504 Secure Systems Architectures and Mechanisms
-FTGS507 Professional and Research Skills with Entrepreneurship

Optional placement year
-BPIE501 Computing Masters Industrial Placement

Every postgraduate taught course has a detailed programme specification document describing the programme aims, the programme structure, the teaching and learning methods, the learning outcomes and the rules of assessment.

Read less
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies. Read more
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies.

This will be achieved by industry-led, research-informed, practice-based teaching and learning. Using industry-standard resources, you will apply the skills and knowledge gained to real-life project scenarios across industry, commerce and public sector.

The programme of study will include areas such as requirements capture, network design, evaluation, securing and optimisation, ranging from hardware configuration to protocol analysis and software definition. The programme will include research and scholarly activity in order to incorporate the latest thinking into the proposed solution.

What's covered in the course?

On this course, you will learn to:
-Critically evaluate and apply knowledge of advanced routing principles.
-Evaluate and apply advanced routing protocols for specific networking solutions.
-Evaluate a variety of routing techniques for a given network environment.
-Critically evaluate routing policy requirements for a network.
-Design and implement ethernet-based LANs. Ensuring security within the given environment.
-Apply mathematical analysis to use VLSM efficiently.
-Apply security considerations to the design and management of networks.
-Design/plan and implement LAN/WAN solutions which require switched hybrid.
-Critically assess SDN solutions in both the industry and research domains.
-Design an SDN-based network for a given system, identifying appropriate components and network structure.
-Implement an appropriate SDN controller to manage device configuration, and any other relevant network policies within an SDN network.
-Select, plan and implement an appropriate testing strategy to validate security requirements against a threat model.
-Critically evaluate the requirements for penetration testing, ethical hacking and effectively communicate security audit results to a variety of audiences.
-Design and conduct security assessment experiments to expose security vulnerabilities and to interpret, analyse and critically evaluate the resulting data to recommend remedial actions.
-Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within the organisation.

Why choose us?

-The Centre for Cloud Computing houses the Cisco Networking Academy, which has an international reputation for delivering high-quality teaching, training and support acrossEurope, the Middle East and Africa.
-In six purpose-built rooms, the Centre also houses £500,000 of computer networking and communications equipment, together with more than £200,000 of web-based equipment and bookable resources.
-The course provides opportunities for you to engage in advanced studies using problem-based learning and flipped curricula strategies. You will work in groups and on your own to deliver solutions to industry-related problems and scenarios.
-The unique combination of employer-led, research-informed technical knowledge and practical experience on industry-standard resources makes our graduates more employable and sought after.
-The course encourages critical thinking and problem solving, giving you the opportunities for research.

Course in depth

All the modules are practice-based and learning is carried out in the labs. Each 20-credit module will have two hours contact, and you are expected to undertake approximately six additional hours of learning, research and assessment preparation for each module.

Assessment is carried out through presentations (both group and individual), timed tests and exams, written reports, research activity and publication of findings, and practical-based time assessments.

At the start of the course, there will be a three-week, full-time induction tool kit, comprising of a review of CCNA and associated technologies.

The course also provides the base knowledge for students to undertake the CCNA certification, and with an additional boot camp to undertake the individual CCNP certification exams.

Modules
-Information Security 20 credits
-Software Defined Network Engineering 20 credits
-Advanced Networking Systems 20 credits
-Network Management 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods 20 credits
-Project and placement 60 credits

Enhancing your employability skills

The University is eager to recognise students have made the effort to gain industry experience and stand out from the typical graduate. Thus, we offer a range of options for you to get extra awards and recognition for your work in industry.

We also have our Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.

Read less

Show 10 15 30 per page



Cookie Policy    X