• University of Glasgow Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • St Mary’s University, Twickenham Featured Masters Courses
  • Coventry University Featured Masters Courses
  • New College of the Humanities Featured Masters Courses
De Montfort University Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
Queen Mary University of London Featured Masters Courses
University of Reading Featured Masters Courses
Northumbria University Featured Masters Courses
"physical" AND "security"…×
0 miles

Masters Degrees (Physical Security)

  • "physical" AND "security" ×
  • clear all
Showing 1 to 15 of 94
Order by 
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security. Read more
Our Masters in Information Security benefits from the internationally visible, high-quality research activity and multiple links with academia and industry of the Department of Computer Science and Surrey Centre for Cyber Security.

Our course is provisionally certified by GCHQ and taught by experts, and equips you with the theoretical grounding and hands-on experience demanded by the information-security sector.

PROGRAMME OVERVIEW

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Dissertation
-Information and Network Security
-Symmetric Cryptography
-Asymmetric Cryptography
-Information Security Management
-Multimedia Security and Digital Forensics
-Secure Systems and Applications
-Information Security for Business and Government
-Project Management and Business Strategy
-Database Systems
-Cloud Computing

EDUCATIONAL AIMS OF THE PROGRAMME

The programme will:
-Provide students with advanced knowledge and understanding of information security theory and concepts
-Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
-Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
-Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

PROGRAMME LEARNING OUTCOMES

Knowledge and understanding
-Knowledge and understanding of the general information security aims and challenges
-Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
-Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
-Knowledge and understanding of technical concepts and mechanisms for digital forensics
-Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
-The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
-The ability to implement or apply existing information security mechanisms and technologies in practice
-The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
-The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills
-Analyse and solve problems of technical nature under consideration of various risks and constraints
-Make effective and efficient decisions in an environment of conflicting interests
-Think strategically
-Synthesise and critically evaluate the work of others
-Apply fundamental knowledge to investigate new and emerging technologies
-Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills
-Come up with technical solutions to a range of problems
-Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
Implement mechanisms and apply them in a wider context of more complex systems
-Present their opinions and findings and to produce a high-quality report

Key / transferable skills
-The ability to communicate concepts and results in a clear and effective manner
-The time and resource management planning
-The ability to work with available resources, to collect and analyse research-oriented material

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology. Read more

Designed for

The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology.

It is suitable for those from a computer science or information technology education background. The programme is also able to cater for those with no formal studies in computer science but where significant interest in cyber security can instead be demonstrated.

The Course Provides:

1. Cyber Security in the UK has become a ‘tier 1’ priority alongside international terrorism and major national incidents. The serious threats emerging from the cyber-sphere are a recognised phenomenon worldwide and as such studies in cyber security are strategically important on a global scale.

2. Our goal for the MSc programme is to give focus to the strategic deployment and implementation of Cyber Security within an organization. We want to develop strategic thinkers who understand the Cyber threat to an organization and its resources and are able to build and support secure systems that support the strategic growth of a business.

3. The course covers all aspects of Cyber Security including network security, computer security and information security. You will learn the most important technical concepts of security—such as encryption, intrusion detection, penetration testing, access control, digital forensics and investigation, risk management, security governance and network security.

4. Alongside this, the course focuses on the business context so that students can progress their careers more rapidly through organisations and aim very particularly at management positions.

When you study the MSc Cyber Security and Management at Warwick, you will gain an unparalleded exposure to industry. All taught modules contain considerable input from industry experts who, through case studies and guest lectures, contribute to the design and delivery of material making for a vey rich learning environment.

An example of some of the companies involved in the CSM programme since it was launched in 2012 include HP, Amethyst Consulting, Deep Secure Ltd, Siskin Technology, SOCA (Serious Organised Crime Agency), CSC, VMware, OCSIA, Nottingham Police, Mozilla, Metropolitan Police, Kaspersky, Berwin Leighton Paisner, Telefonica, IBM, Blackstage Forensics, Derbyshire NHS Trust and Nettitude.

You will have additional opportunity to engage with industry through industry visits, conferences, and mentoring or advice from industry experts at key stages of your work.

Course Content

Students study nine taught modules as part of the programme of study.
Core Modules:
1. Security Architectures and Network Defence
2. Cryptosystems and Data Protection
3. Information Risk Management and Governance
4. Industrial Espionage and Counterfeiting
5. Digital Forensics

Elective Modules (3 from this list):
1. Cyber Intelligence and Operations
2. Cyber-Physical Systems
3. Enterprise Cyber Security
4. Globalisation and Outsourcing
5. Financial Analysis and Control Systems
6. Organisations, People and Performance
7. Leadership

A ninth module to be selected from the full list of WMG elective modules.

Learning Style

The taught component of the course is highly interactive and varied with a mixture of lectures, syndicate or group work, practical and lab based work, and technology enabled learning.
Class sizes are kept to a maximum of 30 students per class.
Module leaders are experts in their fields and are supported by external speakers working in organisations at the forefront of their fields.
Assessment is through Post Module Assignment based on the learning objectives of each respective module.
50% of the Masters credit is achieved through your individual project or dissertation, for which you will have close 1-1 supervision
Each module will usually be delivered in intensive one-week blocks so you are fully immersed in the subject area for that period. These one-week sessions are scheduled at intervals from October through to June.

After Your Graduate

Graduates can expect to go on to work within corporate information - security and technology teams, consultancies, government information-security departments, management tracks in information critical organisations and cyber security related research.

Read less
MSc IT Security helps you to develop your computing skills in the theory and practice of computer security and forensic technology. Read more
MSc IT Security helps you to develop your computing skills in the theory and practice of computer security and forensic technology. This requires an understanding of hardware, operating systems, communications software, attention to detail, creative problem-solving, investigative skills and an appreciation of computer threats and security counter-measures. You will also have the opportunity to work on a substantial project of your own choice. These skills can lead to a range of careers in systems management and computer security.

LEARNING ENVIRONMENT AND ASSESSMENT

The School of Physical Sciences and Computing provides an 'electronic learning' environment to facilitate flexible learning. This environment combines traditional face-to-face lecture/tutorial and practical sessions with additional, resource-rich, online materials allowing you to continue independent learning through a variety of approaches.

Assessment methods will include individual and group assignments, presentation, seminars and examinations.

LEARNING OUTCOMES & AIMS

We aim to explore the concept and principles of IT Security which will enable you to develop skills in critical evaluation and the tools and techniques that are used within IT Security and management. You will investigate the current trends and research that is relevant to IT Security which will enable you to develop a systematic approach to security policy and planning. You will plan, undertake and evaluate a substantial IT Security related project in which you will put into practice and develop your self-management, communication, critical evaluation and technical skills.

Our degree is designed to equip you with the theoretical knowledge and practical skills that are needed within industry.

OPPORTUNITIES

To enhance your work experience you will have an opportunity to undertake an industrial placement as part your MSc. This will extend your study time by six or twelve months depending on the length of the placement. Alternatively there are opportunities to choose an industry-based project.

The University will support you to seek employment as a security specialist. The skills developed by the course are also valuable in a range of computing environments.

There are opportunities to continue with your studies to MPhil or PhD.

FURTHER INFORMATION

As organisations become more dependent on sophisticated computers and communications to support their operations and to store valuable data, they become more vulnerable to IT-based attacks. The expertise of the information security professional is in managing corporate IT resources, protecting servers and computers, and tracking intruders on their networks. On this course you will learn about the tools and procedures that can be used to identify computer security weaknesses that could lead to the loss of sensitive computer data. You will develop the necessary skills to become an IT security problem-solver in order to meet the growing demand for specialists in this area.

You will develop transferable skills in evaluation of ideas and concepts, effective communication, synthesis of ideas and become a reflective practitioner. You will have the opportunity to plan and carry out a supervised project in the field of computer security or computer forensics.

Read less
The MSc in Cyber Security Engineering is designed for those wishing to develop a career as a cyber security professional. Cyberspace comprises the network of digital devices, used to store, modify and communicate information. Read more

Designed for

The MSc in Cyber Security Engineering is designed for those wishing to develop a career as a cyber security professional.

Cyber Security

Cyberspace comprises the network of digital devices, used to store, modify and communicate information. It is global, interactive and completely changes our environment. It extends beyond the Internet, mediating interaction between individuals and groups.
Our world is increasingly shaped by cyberspace. Opportunities for interaction are emerging in ways, only imagined by previous generations. As the influence of cyberspace in our lives continues to grow, so does the associated security risk.
As organisations worldwide harness the opportunities of cyberspace, they create huge demand for cyber security professionals. Cyber security professionals who can function at various strata within an organisation - server room, operations room, board room - you choose. Their task is beguilingly simple: enable the good and prevent the bad.

GCHQ Certification

GCHQ, the UK government's National Technical Authority for Information Assurance, identified the shortage of cyber professionals as a concern that needed to be addressed. Part of their strategy was to identify cyber security master's courses that would "... help prospective students make better informed decisions when looking for a highly valued cyber security qualification".

Course Content

You will study a broad range of cyber security topics. Some focus on technology, some on people, some on organisations. Insofar as possible, we seek to avoid teaching topics in silos of narrow expertise. Throughout, the practical application of insight is valued equally with abstract analytical skill. The following should give you a sense of the course content:
◾Cryptography
◾Counterfeiting
◾Risk
◾Digital forensics
◾Governance
◾Data protection
◾Network security
◾Intelligence
◾The enterprise cyber perspective
◾Security architecture
◾Industrial espionage
◾Cyber-physical systems
◾Standards and guidance
◾Cyber security research

Teaching Style

Tutors adopt their own distinctive style within their taught weeks. Most modules are taught by more than one tutor, which, together with the wide range of guest speakers, gives real breadth of insight into any topic. The external input is especially evident in the Enterprise Cyber Security module where colleagues from IBM make a substantial contribution to the week's activities.

After You Graduate

Graduates can expect rapid career progression in within a wide range of organisations relating to cyber security in a range of roles.

Read less
In today's environment, international security studies goes beyond the traditional security challenges such as military conflict and can include challenges to human, societal, economic and environmental security. Read more

Overview

In today's environment, international security studies goes beyond the traditional security challenges such as military conflict and can include challenges to human, societal, economic and environmental security. This degree explores the strategies being developed to respond to these security and intelligence threats. It covers a broad spectrum of traditional and non-traditional security issues examined from a regional and global context.

See the website http://courses.mq.edu.au/international/postgraduate/master/master-of-international-security-studies

Key benefits

- Gives you access to experts from around the world with practical experience in all levels of security
- Opportunity to undertake study in the workplace (external study mode), supervised and coordinated through web-based activities
- You may be able to complete an industry-focused internship depending on your academic performance
- Offers contemporary and rigorous academic study in security studies and intelligence analysis, as well as transnational crime, international law and political violence
- This degree can be combined with the Master of Policing, Intelligence and Counter Terrorism

Suitable for

Anyone with an interest or with experience in the areas of international relations, security, government, risk assessment or non-government organisations.

Recognition of prior learning

Course Duration
- 1.5 year program
Bachelor degree in a relevant discipline;
Bachelor degree in any discipline and work experience in a relevant area at a senior level;*
Bachelor degree in any discipline and Graduate Diploma in a relevant discipline.

- 1 year program
Work experience in a relevant field at senior level;*
Honours, Graduate Diploma, Masters (coursework) or Higher Degree Research in a relevant discipline.

- Relevant disciplines
Natural and Physical Sciences, Information Technology, Health, Banking, Finance and Related Fields, Society and Culture, Communication and Media Studies, Accounting, Business and Management, Business Management, Human Resource Management, Organisation Management, Industrial Relations, International Business, Pubic and Health Care Administration.

- Relevant areas
*Police Force, Defence Force, Public Service.
Level of seniority: Police - Senior Sergeant equivalent or above; Defence - Major, equivalent or above; Public Service APS 5 equivalent or above.
Knowledge must be equivalent to a Graduate Certificate or Graduate Diploma level, to be deemed by the Department on a case by case basis of assessment.

English language requirements

IELTS of 6.5 overall with minimum 6.0 in each band, or equivalent

All applicants for undergraduate or postgraduate coursework studies at Macquarie University are required to provide evidence of proficiency in English.
For more information see English Language Requirements. http://mq.edu.au/study/international/how_to_apply/english_language_requirements/

You may satisfy the English language requirements if you have completed:
- senior secondary studies equivalent to the NSW HSC
- one year of Australian or comparable tertiary study in a country of qualification

Careers

Career Opportunities
- advisers and analysts for private security agencies
- advisers and analysts to international organisations involved in security operations
- border protection agency officials strategists
- commentators and researchers for media outlets
- researchers for intelligence agencies

- Employers
Our graduates find employment with government and non-government employers who deal with state and international security issues.

See the website http://courses.mq.edu.au/international/postgraduate/master/master-of-international-security-studies

Read less
Individuals, governments and organizations now routinely connect their computers to the Internet to communicate, provide services, and access massive stores of shared information. Read more
Individuals, governments and organizations now routinely connect their computers to the Internet to communicate, provide services, and access massive stores of shared information. These on-line activities, many conducted beyond national boundaries, have opened up enormous opportunities for security attacks such as identity thefts, computer hackings, privacy breaches, technical sabotages, etc. Addressing security threats and attacks in this vast and complex distributed environment is an immensely challenging task.

The Computer Security pathway is centred round a core Security theme that introduces students to fundamental security topics that arise in the design, analysis, and implementation of networked and distributed systems. Subsidiary themes allow students to investigate broader areas in which they may apply their newly acquired skills. The pathway is designed for students who wish to specialize in the security aspect of the Information Technology field.

Teaching and learning

Computational thinking is becoming increasingly pervasive and is informing our understanding of phenomena across a range of areas; from engineering and physical sciences, to business and society. This is reflected in the way the Manchester course is taught, with students able to choose from an extremely broad range of units that not only cover core computer science topics, but that draw on our interdisciplinary research strengths in areas such as Medical and Health Sciences, Life Sciences and Humanities.

Coursework and assessment

Lectures and seminars are supported by practical exercises that impart skills as well as knowledge. These skills are augmented through an MSc project that enables students to put into practice the techniques they have been taught throughout the course.

Facilities

-Newly refurbished computing labs furnished with modern desktop computers
-Access to world leading academic staff
-Collaborative working labs complete with specialist computing and audio visual equipment to support group working
-Over 300 Computers in the School dedicated exclusively for the use of our students
-An Advanced Interfaces Laboratory to explore real time collaborative working
-A Nanotechnology Centre for the fabrication of new generation electronic devices
-An e-Science Centre and Access Grid facility for world wide collaboration over the internet
-Access to a range of Integrated Development Environments (IDEs)
-Specialist electronic system design and computer engineering tools

Career opportunities

The MSc in Advanced Computer Science has an excellent record of employment for its graduates. Opportunities exist in fields as diverse as finance, films and games, pharmaceuticals, healthcare, consumer products, and public services - virtually all areas of business and society. Manchester Computer Science MSc courses are considered among the best in the country and our graduates are actively targeted for the very top jobs in industry and academia.

Security plays a role in almost all areas where computers are being used, including, for example, finance, healthcare, consumer products, and public services. Thus students who have followed the Computer Security pathway will be ideally placed in any of these areas, especially in positions where they need to be aware of security issues and solutions.

We maintain close relationships with potential employers and run various activities throughout the year, including career fairs, guest lectures, and projects run jointly with partners from industry.

Accrediting organisations

This programme is CEng accredited and fulfills the educational requirements for registration as a Chartered Engineer when presented with CEng accredited Bachelors programme.

Read less
Cyber security is about designing systems that resist attack. As computers become ever more prevalent and ever more connected with each other, the opportunities for attackers become even greater, and the need to resist them becomes more urgent. Read more
Cyber security is about designing systems that resist attack. As computers become ever more prevalent and ever more connected with each other, the opportunities for attackers become even greater, and the need to resist them becomes more urgent. Computing infrastructure is now vital for communication, government, commerce, and control of our physical environment, and is a potential target of terrorist and criminal attacks. Graduates who understand the technologies that underpin products and practices to secure it will be in great demand.

This is a one-year full-time degree programme for graduates in a computing-related discipline. It will allow students to obtain the knowledge and expertise to evaluate, designand build secure computer systems, processes and people that are involved in cyber security. It covers the theory and practice of designing and building secure systems and gives you a firm grounding in cryptography, network security and secure programming, as well as optional modules in topics such as hardware and embedded system security, operating systems and incident management and forensics.

The programme also gives you practical experience with technologies and toolkits for building internet-based software. All students undertake a large, personally supervised project in the final months of the course.

Our curriculum has been developed with the involvement of key individuals in the cyber security industry. As well as advising us on the skills they seek when recruiting graduates, they also contribute directly to the MSc programme through guest lectures and project supervision. In recent years, we have had guest lecturers from Microsoft, Vodafone, Siemens, IBM and Hewlett Packard.

About the School of Computer Science

The School of Computer Science at University of Birmingham has consistently been ranked in the Top 10 in UK league tables and has regularly achieved high satisfaction scores in National Student Surveys. 95% of our students go into graduate employment (Destination of Leavers from Higher Education Survey 2014/15), and our School is ranked 8th nationally for research quality in the '2014 Research Excellence Framework'.
Our work is regularly presented in international conferences and journals, indicating the high standards we achieve in research. In 2008, the UK Funding Councils undertook a national assessment of the quality of research at British universities, the RAE. Among 81 submissions nationally for computer science, the School is equal 7th in the proportion of 4* awards, for research quality that is world-leading in terms of originality, significance and rigour.

Funding and Scholarships

There are many ways to finance your postgraduate study at the University of Birmingham. To see what funding and scholarships are available, please visit: http://www.birmingham.ac.uk/postgraduate/funding

Open Days

Explore postgraduate study at Birmingham at our on-campus open days.
Register to attend at: http://www.birmingham.ac.uk/postgraduate/visit

Virtual Open Days

If you can’t make it to one of our on-campus open days, our virtual open days run regularly throughout the year. For more information, please visit: http://www.pg.bham.ac.uk

Read less
Distributed and networked computation is now the paradigm that underpins the software-enabled systems that are proliferating in the modern world, with huge impact in the economy and society, from the sensor and actuator networks that are now connecting cities, to cyberphysical systems, to patient-centred healthcare, to disaster-recovery systems. Read more
Distributed and networked computation is now the paradigm that underpins the software-enabled systems that are proliferating in the modern world, with huge impact in the economy and society, from the sensor and actuator networks that are now connecting cities, to cyberphysical systems, to patient-centred healthcare, to disaster-recovery systems.

This new Masters course will educate and train you in the fundamental principles, methods and techniques required for developing such systems. Given the number of elective modules offered, you will be able to acquire further skills in one or more of Cloud Computing, Data Analytics and Information Security.

Facilities include a laboratory where you can experiment with physical devices that can be interconnected in a network, and a cluster facility configured to run the Hadoop MapReduce stack.

A Year in Industry option is also available for this course.

See the website https://www.royalholloway.ac.uk/computerscience/coursefinder/msc-distributed-and-networked-systems.aspx

Why choose this course?

This course will develop a highly analytical approach to problem solving and a strong background in distributed and networked systems, fault-tolerance and data replication techniques, distributed coordination and time-synchronisation techniques (leader-election, consensus, and clock synchronisation), data communication protocols and software stacks for wireless, sensor, and ad hoc networking technologies in virtualisation, and cloud computing technologies.

The course develops an advanced understanding of principles of failure detection and monitoring, principles of scalable storage, and in particular NoSQL technology.

Students will acquire the ability to:
- apply well-founded principles to building reliable and scalable distributed systems
- analyse complex distributed systems in terms of their performance, reliability, and correctness
- design and implement middleware services for reliable communication in unreliable networks
- work with state-of-the-art wireless, sensor, and ad hoc networking technologies
- design and implement reliable data communication and storage solutions for wireless, sensor, and ad hoc networks
- detect sources of vulnerability in networks of connected devices and deploy the appropriate countermeasures to information security threats.
- enforce privacy in “smart” environments
- work with open source and cloud tools for scalable data storage (DynamoDB) and coordination (Zookeeper)
- work with modern network management technologies (Software-Defined Networking) and standards (OpenFlow)
- design custom-built application-driven networking topologies using OpenFlow, and other modern tools
- work with relational databases (SQL), non-relational databases (MongoDb), as well as with Hadoop/Pig scripting and other big data manipulation techniques.

Department research and industry highlights

Royal Holloway is recognised for its research excellence in Machine Learning, Information Security, and Global Ubiquitous Computing.
We work closely with companies such as Centrica (British Gas, Hive), Cognizant, Orange Labs (UK), the UK Cards Association, Transport for London and ITSO.
We host a Smart Card Centre and we are a GCHQ Academic Centre of Excellence in Cyber Security Research (ACE-CSR).

Course content and structure

You will take taught modules during Term One (October to December) and Term Two (January to March). Examinations are held in May. If you are in the Year-in-Industry pathway, you then take an industrial placement, after which you come back for your project/dissertation (12 weeks).

Core course units are:
Interconnected Devices
Advanced Distributed Systems
Wireless, Sensor and Actuator Networks
Individual Project

Elective course units are:

Computation with Data
Databases
Introduction to Information Security
Data Visualisation and Exploratory Analysis
Programming for Data Analysis
Semantic Web
Multi-agent Systems
Advanced Data Communications
Machine Learning
Concurrent and Parallel Programming
Large-Scale Data Storage and Programming
Data Analysis
On-line Machine Learning
Smart Cards, RFIDs and Embedded Systems Security
Network Security
Computer Security
Security Technologies
Security Testing
Software Security
Introduction to Cryptography

Assessment

Assessment is carried out by a variety of methods including coursework, practical projects and a dissertation.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different [department]-related areas, including This taught masters course equips postgraduate students with the subject knowledge and expertise required to pursue a successful career, or provides a solid foundation for continued PhD studies.

Read less
Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. Read more

Aim

Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the MSc is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges.

This taught programme provides a strong foundational education in the core areas of cyber security and offers practical training in key software tools and programs. Applied practical skills will be developed further in specialised projects exploring leading edge issues in cyber security research.

The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen's University Belfast's Centre for Secure Information Technologies (CSIT).

CSIT is a GCHQ accredited Academic Centre of Excellence in Cyber Security Research and is the UK's largest university research lab in this field. CSIT is fast developing a reputation as a global innovation hub for cyber security and is influenced throughout by its strong history of commercial engagement with world leading companies including Infosys, Cisco, IBM, Thales, BAE Systems, McAfee, Roke, and Altera.

Programme Content

The MSc in Cyber Security is available in two options, lasting either 1 or 2 years:

The 1-year MSc consists of six taught modules (120 CATS points) and a 4-5 months practical project of a research nature/work placement (60 CATS points).

The 2-year MSc consists of six taught modules (120 CATS points) and a 12 months practical project of a research nature/work placement (60 CATS points).

One compulsory module and a choice of five from seven other modules as listed below:
• Applied Cryptography
• Computer Forensics
• Network Security and Monitoring
• Software Assurance
• Malware
• Media Security
• Intelligent Information Systems
• Ethical & Legal Issues in Cyber Security (Compulsory)

In any given year further specialist topics may be available for selection or listed topics may not be offered.

Assessment

Comprises written examination and coursework/lab work in six modules; and a dissertation on your research project (180 CATS points total).

Opportunities for Careers

Strong Industry Engagement
A key differentiator of our MSc programme will be the opportunity to closely engage with CSIT industry partners. The programme offers an enhanced education experience, including the facilitation of industrial internships and work placements with leading security professionals, as well as other commercially specified projects. Our Scholarships and Work Placements programme offers a significant opportunity for students to enhance career prospects by directly engaging with potential employers.

Opportunities for placements are being provided by the following companies: Austrian Institute of Technology (AIT), Facebook, IBM, McAfee, PwC, RepKnight, Roke, Thales, and United Technologies Research CEntre (UTRC).

Professional Skills Training
Students will be offered a range of personal development and transferable skills training to improve their professional skills and increase their employability. Courses will cover: project management, presentation skills, communication strategies, networking skills, public engagement and entrepreneurship. Invited seminars and special guest lectures from industrial and academic leaders offer students a chance to engage with leaders in the cyber security profession.

Careers
Our graduates have found that holding a prestigious MSc qualification from Queen's (one of the UK's top engineering schools) has significantly enhanced their job opportunities and employment prospects. With demand for cyber security experts growing at 12 times the rate of the overall job market, students can expect their career prospects to be enhanced significantly after graduation.

Our MSc in Cyber Security will prepare graduates for successful careers in secure systems development, security architecture development, network security, data analytics, and right up to board level positions such as Chief Information Security Officer (CISO). Prospects for research and academic career paths in cyber security will also be enhanced by the MSc.

Special Features

Work Placements and Scholarships Programme
A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security degree programme. These opportunities are being provided on a competitive basis by CSIT's industrial partners and others affiliated with the Work Placements and Scholarships Programme. Once accepted for this masters degree you will be eligible to apply for opportunities made available via the programme.

Funding

A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security course via our Work Placements and Scholarships Programme.

Scholarship Opportunities:
CSIT Scholarships (x2) – UK/EU
- Open to UK/EU applicants to the 1-year MSc in Cyber Security
- Only students who are graduating in 2014 with an Undergraduate course in relevant discipline areas are eligible to apply
- Scholarships cover fees and a paid summer internship at CSIT
- How to Apply: Eligible students who apply for the 1-year MSc in Cyber Security will automatically be considered for these scholarships.

GREAT Queen’s University Belfast Scholarships (x2) – India
- Open to India students
- Scholarship value: £1500
- For further information and how to apply see:
http://www.qub.ac.uk/home/StudyatQueens/InternationalStudents/InternationalScholarships/GREATQueensUniversityBelfastScholarships-India/

Full details and further announcements about our Scholarships and Work Placements programme are available at http://www.csit.qub.ac.uk/msc

Read less
This MA degree programme is designed for students who wish to explore the social dimensions of risk and resilience. Read more
This MA degree programme is designed for students who wish to explore the social dimensions of risk and resilience. The Department of Geography is especially well-suited to examine these in relation to security- and health-related risk, but students are encouraged to develop their thinking in relation to any aspect of risk, including, for example, climate risk and disaster risk reduction. For students interested in security-related risk, the MA programme offers in-depth and advanced understanding on geo-political security challenges and politics, including the ways in which they are governed increasingly through the prism of risk. The course responds to the growing realisation that many risks are being created through social processes bound to questions of security, including the ways that risk techniques are emerging and being employed as a means of securing uncertain futures. Since the 9/11 attacks in New York City and the 7/7 bombings in London, governments have become more concerned with terrorist threats to security. Surveillance has become more commonplace, preventing some risks while also creating new ones never before seen in society.

For students interested in health-related risk, the MA programme offers advanced training in research methods on the determinants of health and well-being, and their implications for health policy and service provision. Led in part by experts in population health from a social science and public health perspective, the MA programme responds to the observation that we often overlook the critical role played by communities in creating and managing risks, and that we need to develop new approaches to building community resilience. Students learn about the 'social determinants' associated with public health risks including unemployment and poverty. The socioeconomic impacts of financial crises, for example, have large implications for public health risk creating new challenges for research and governance. Students will be trained in both quantitative and qualitative methods to learn how to produce evidence relating to the wider determinants of health that is likely to benefit population health. Graduates from this programme will be well-suited to the needs of social and community work, to health professionals, and the pursuit of research degrees.

Course Structure

Students take the following core modules, and a selection of elective modules, which, when combined, add up to 180 credits:
Core Modules:
-Understanding Risk (30 credits)
-Risk Frontiers (15 credits)
-Fundamentals of Risk Research (15 credits)
-Dissertation by Research (or) Vocational Dissertation (60 credits)

Elective Modules available in previous years include:
-Hydrological Hazards (30 credits)
-Spatial and Temporal Dimensions of Hazard (30 credits)
-Social Dimensions of Risk and Resilience (30 credits)
-International Relations and Security in the Middle East (15 credits)
-Strategic Asia: Policy and Analysis (15 credits)
-European Security (15 credits)
-Social Policy and Society (30 credits)

Learning and Teaching

Understanding and managing risk is ultimately about choice. All elements of society, from individuals to governments, must make decisions – conscious or not – about the ways in which they perceive, interpret, balance, and mitigate risk. Risk permeates our day-to-day lives in ways that are now recognised to be much more complex than the hazard-vulnerability paradigm, which dominated risk research until the 1990s, recognised. A deeper understanding of the nature of risk, its emergence, and its interface and position within societies, has emphasised the need to take a much more complex view in which a general understanding of the ways in which risk is generated, experienced and managed needs to be combined with a specific understanding of particular science or policy areas.

The primary aim of this Masters programme is to equip students with a general understanding of risk; whilst simultaneously providing specific training in elements of risk-related research. This will be achieved through an interdisciplinary framework for understanding risk from a variety of perspectives. Students will learn theoretical and practical approaches to identifying and framing risk, as well as the underlying physical and social mechanisms that generate it. They will also examine the relationship of risk to knowledge and policy, and will be made aware of the array of advanced tools and techniques to assess the physical and social dimensions of risk under conditions of uncertainty. They will also be trained in the substance and methods associated with a range of science and policy areas, and be expected to demonstrate that they can combine their general training in risk with their specific understanding of the substance and method associated with the chosen area, through either a research-based or a vocational dissertation.

All students will undertake a suite of core modules (120 credits) which provide students with a range of skills and knowledge which result in a unique focus in risk combined with training in interdisciplinary research methods. These modules are: Understanding Risk, Fundamentals of Risk Research, Risk Frontiers and the Dissertation.

Students then also select a suite of elective modules (another 60 credits). Students can choose to receive specialised scientific training in:
-The social dimensions of risk and resilience
-Determinants of health and well-being, and their implications for health policy and service provision, and/or:
-A combination of approaches to risk.

Electives can be selected from:
-Social Dimensions of Risk and Resilience
-Strategic Asia
-European Security
-International Relations in the Middle East
-Social Policy and Society

Read less
Disaster Management is an inter disciplinary subject that draws upon a wide range of disciplines from ‘hard’ to ‘soft’ sciences. It is focused around complex political, social and economic activity and reflects the very heart of governance in a country. Read more
Disaster Management is an inter disciplinary subject that draws upon a wide range of disciplines from ‘hard’ to ‘soft’ sciences. It is focused around complex political, social and economic activity and reflects the very heart of governance in a country. Organisations of all sizes are required to assess ‘risk’ in both the physical (real world) and virtual (cyberspace) and to examine how socio-technical systems are made vulnerable by human factors interfacing with technology.

This qualification is designed to be delivered to an organisation's requirements. Dates, times and a venue can be mutually agreed. Participants have the option to take each unit as a separate CPD course and can choose whether to be assessed to accumulate academic credits leading to the award of Master of Science (MSc). Please contact the course administrator, Lauren Jarrad, for more information.

On the course, we cover best practice in crisis and disaster management, cyber security, information assurance and incident management planning, allowing you to reflect on your own work-based security events and incidents. Participants will develop practical policies and plans which can be applied and integrated within a sustainable economic framework.

Read less
Forensic science is a dynamic discipline that is crucial to the investigation of crime, the collection of evidence and intelligence, and in securing justice. Read more
Forensic science is a dynamic discipline that is crucial to the investigation of crime, the collection of evidence and intelligence, and in securing justice. This multidisciplinary MSc programme offers students a unique opportunity to gain forensic science skills and methods within a holistic crime science framework.

Degree information

Students will develop an understanding of the fundamental principles of crime and forensic science, together with the key conceptual and philosophical frameworks in this field. They will gain practical skills in crime scene investigation, experimental design and implementation, statistical analysis, data analysis and modelling, and will be able to evaluate the weight and applicability of forensic evidence for investigative and court purposes.

Students undertake modules to the value of 180 credits. The programme consists of five core modules (75 credits), three optional modules (45 credits) and a research dissertation (60 credits). An exit-only Postgraduate Diploma (120 credits) is offered.

Core modules
-Quantitative Methods
-Designing and Doing Research
-Understanding and Interpreting Forensic Evidence
-Foundations of Security and Crime Science
-Judicial Decision Making and Expert Evidence

Optional modules - students choose three of the following optional modules:
-Case Assessment and Interpretation for Forensic Scientists
-Fundamentals of Molecular Biology
-Information Security Management
-Forensic Archaeology
-Forensic Osteology
-Forensic Geoscience
-Frontiers in Experimental Physical Chemistry
-Judgment and Decision Making
-Practices of Crime Scene Investigation and Expert Testimony
-Structural Methods in Modern Chemistry

Dissertation/report
All students undertake an independent research project which culminates in a dissertation of 10,000 words.

Teaching and learning
The programme is delivered through lectures, seminars, tutorials, practical exercises and statistical and computer classes. Assessment is through coursework, examination and the dissertation.

Careers

Graduates of this programme will gain the skills necessary for a career in crime investigation, forensic science provision, consultancy, policymaking, and with public sector employers such as police forces, Home Office, and Ministry of Defence. They will also have gained the research tools necessary for a PhD or further doctoral research.

Employability
Graduates from this programme gain a solid understanding of the key principles of crime and forensic science, along with the ability to analyse problems and use appropriate scientific and professional skills to solve them. They can evaluate forensic evidence and their CSI training (developed and delivered with input from London-based police forces) gives them the edge over other applicants for crime scene investigation roles, if this is what they decide to do. They have the opportunity to learn specialist techniques in areas such as forensic archaeology and forensic geoscience, and are given a thorough grounding in academic research methods.

Each year we ask our graduates to tell us about their experience of the programme and their career after leaving UCL and we include some real-life graduate profiles on our website: http://www.ucl.ac.uk/scs/degree-programmes/postgraduate/graduate-profiles

Why study this degree at UCL?

This MSc will train graduates to think strategically and critically about crime and forensic science, equipping them with transferable skills suitable for a wide range of careers.

The UCL Jill Dando Institute of Security and Crime Science (JDI) brings together academics from across the physical sciences, social sciences and humanities. Our graduate students come from varied backgrounds; many are practitioners and are encouraged to share their professional experience.

Read less
This programme delivers a thorough grounding in current technologies and trends, offering comprehensive training in the fundamentals of the subject. Read more
This programme delivers a thorough grounding in current technologies and trends, offering comprehensive training in the fundamentals of the subject.

It combines high-quality education with rigorous intellectual challenges, enabling you to understand the principles of knowledge management, decision-making and design in process systems and business-information technologies.

PROGRAMME OVERVIEW

The MSc Information and Process Systems Engineering programme is aimed at graduates of traditional engineering, science and related disciplines.

Graduates from non-IT or related disciplines tend to be ill-prepared for the information and knowledge-related challenges and demands of today’s business environments.

We offer a wide selection of modules spanning process engineering, information systems, business and management. All taught modules are delivered by qualified experts in the topics and academic staff, assisted by specialist external lecturers.

PROGRAMME STRUCTURE

This programme is studied full-time over one academic year. Part-time students must study at least two taught technical modules per academic year. The programme consists of eight taught modules and a dissertation. The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.
-Information Security Management
-Optimisation and Decision-Making
-Process Modelling and Simulation
-Technology, Business and Research Seminars
-Database Systems
-Knowledge-Based Systems and Artificial Intelligence
-Process and Energy Integration
-Process Systems Design
-Supply Chain Management
-Biomass Processing Technology
-Process Safety and Operation Integrity
-Process and Energy Integration
-Transition to a Low Carbon Economy
-Dissertation

FACILITIES, EQUIPMENT AND ACADEMIC SUPPORT

Modules related to the different groups are taught by a total of six full-time members of staff and a number of visiting lecturers.

An extensive library is available for individual study. It stocks more than 85,000 printed books and e-books, and more than 1,400 (1,100 online) journal titles, all in the broad area of engineering. The library support can be extended further through inter-library loans.

As part of their learning experience, students have at their disposal a wide range of relevant software needed to support the programme material dissertation projects.

In recent years, this work included the design of various knowledge-based and business systems on the internet, the application of optimisation algorithms, and semantic web applications, as well as modelling of process systems.

Numerous laboratory facilities across the Faculty and the University are also available for those opting for technology-based projects, such as the process engineering facility, a control and robotics facility and signal processing labs.

The work related to the MSc dissertation can often be carried out in parallel with, and in support of, on-going research. In the past, several graduates have carried on their MSc research to a PhD programme.

RESEARCH

Process integration and systems analysis for sustainability of resources and energy efficiency are carried out within our well-established Centre for Process and Information Systems Engineering (PRISE).

CAREER PROSPECTS

Engineers and scientists are increasingly expected to have skills in information systems engineering and decision support systems alongside their main technical and/or scientific expertise.

Graduates of these programmes will be well prepared to help technology-intensive organisations make important decisions in respect of vast amounts of information, by adopting, combining, implementing and executing the right technologies.

EDUCATIONAL AIMS OF THE PROGRAMME

The primary aims are achieved through a balanced, multi-disciplinary curriculum with a core of information systems engineering modules and decision-making and process systems engineering modules as well as a flexible element by way of elective modules that permit students to pursue an element of specialisation relevant to their backgrounds, interests and/or career aspirations.

An integrated approach is taken so as to provide a coherent view that explores the interrelationships between the various components of the programme.

The programme draws on the stimulus of recent research activities in the Faculty of Engineering and Physical Sciences. The programme provides the students with the basis for developing their own approach to learning and personal development.

PROGRAMME LEARNING OUTCOMES

The programme provides opportunities for students to develop and demonstrate knowledge and understanding, skills, qualities and other attributes in the following areas:

Knowledge and understanding
-The sources, technologies, systems, performance, and applications in information and process engineering
-Approaches to the assessment of information and process technologies
-Decision making in complex systems
-Optimisation and operations research
-Technical systems modelling
-Databases and data protection
-Representation of design processes
-Systematic approaches to observing organisational data security processes
-Understanding research issues
-Literature studies and research planning
-Experimental planning
-Communication of research outcomes
-Design of decision-support systems
-Development of databases, ontologies and agent-based architectures
-Information technology and security
-Process modelling and simulation

Intellectual / cognitive skills
-Select, define and focus upon an issue at an appropriate level
-Collect and digest knowledge and information selectively and independently to support a particular scientific or engineering enquiry
-Develop and apply relevant and sound methodologies for analysing the issue, developing solutions, recommendations and logical conclusions, and for evaluating the results of own or other’s work

Professional practical skills
-Assess the available information and process and their interaction
-Design and select appropriate collection and storage, and optimise and evaluate system design
-Apply generic systems engineering methods such as conceptual design and optimization to facilitate the assessment and development of information, information security and process technologies and systems

Key / transferable skills
-Preparation and delivery of communication and presentation
-Report and essay writing
-Use of general and professional computing tools
-Collaborative working with team members
-Organizing and planning of work
-Research into new areas, particularly in the aspect of literature review and skills acquisition

GLOBAL OPPORTUNITIES

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.

Read less
Our Computer Science MPhil and PhD programme gives you an opportunity to make a unique contribution to computer science research. Read more
Our Computer Science MPhil and PhD programme gives you an opportunity to make a unique contribution to computer science research. Your research will be supported by an experienced computer scientist within a research group and with the support of a team of advisers.

Research supervision is available under our six research areas, reflecting our strengths, capabilities and critical mass.

Advanced Model-Based Engineering and Reasoning (AMBER)

The AMBER group aims to equip systems and software engineering practitioners with effective methods and tools for developing the most demanding computer systems. We do this by means of models with well-founded semantics. Such model-based engineering can help to detect optimal, or defective, designs long before commitment is made to implementations on real hardware.

Digital Interaction Group (DIG)

The Digital Interaction Group (DIG) is the leading academic research centre for human-computer interaction (HCI) and ubiquitous computing (Ubicomp) research outside of the USA. The group conducts research across a wide range of fundamental topics in HCI and Ubicomp, including:
-Interaction design methods, eg experience-centred and participatory design methods
-Interaction techniques and technologies
-Mobile and social computing
-Wearable computing
-Media computing
-Context-aware interaction
-Computational behaviour analysis

Applied research is conducted in partnership with the DIG’s many collaborators in domains including technology-enhanced learning, digital health, creative industries and sustainability. The group also hosts Newcastle University's cross-disciplinary EPSRC Centre for Doctoral Training in Digital Civics, which focusses on the use of digital technologies for innovation and delivery of community driven services. Each year the Centre awards 11 fully-funded four-year doctoral training studentships to Home/EU students.

Interdisciplinary Computing and Complex BioSystems (ICOS)

ICOS carries out research at the interface of computing science and complex biological systems. We seek to create the next generation of algorithms that provide innovative solutions to problems arising in natural or synthetic systems. We do this by leveraging our interdisciplinary expertise in machine intelligence, complex systems and computational biology and pursue collaborative activities with relevant stakeholders.

Scalable Computing

The Scalable Systems Group creates the enabling technology we need to deliver tomorrow's large-scale services. This includes work on:
-Scalable cloud computing
-Big data analytics
-Distributed algorithms
-Stochastic modelling
-Performance analysis
-Data provenance
-Concurrency
-Real-time simulation
-Video game technologies
-Green computing

Secure and Resilient Systems

The Secure and Resilient Systems group investigates fundamental concepts, development techniques, models, architectures and mechanisms that directly contribute to creating dependable and secure information systems, networks and infrastructures. We aim to target real-world challenges to the dependability and security of the next generation information systems, cyber-physical systems and critical infrastructures.

Teaching Innovation Group

The Teaching Innovation Group focusses on encouraging, fostering and pursuing innovation in teaching computing science. Through this group, your research will focus on pedagogy and you will apply your research to maximising the impact of innovative teaching practices, programmes and curricula in the School. Examples of innovation work within the group include:
-Teacher training and the national Computing at School initiative
-Outreach activities including visits to schools and hosting visits by schools
-Participation in national fora for teaching innovation
-Market research for new degree programmes
-Review of existing degree programmes
-Developing employability skills
-Maintaining links with industry
-Establishing teaching requirements for the move to Science Central

Research Excellence

Our research excellence in the School of Computing Science has been widely recognised through awards of large research grants. Recent examples include:
-Engineering and Physical Sciences Research Council (EPSRC), Centre for Doctoral Training in Cloud Computing for Big Data Doctoral Training Centre
-Engineering and Physical Sciences Research Council (EPSRC), Centre for Doctoral Training in Digital Civics
-Wellcome Trust and Engineering and Physical Sciences Research Council (EPSRC) Research Grant: a £10m project to look at novel treatment for epilepsy, confirming our track record in Systems Neuroscience and Neuroinformatics.

Accreditation

The School of Computing Science at Newcastle University is an accredited and a recognised Partner in the Network of Teaching Excellence in Computer Science.

Read less
The accredited Master of Science program in Computer Science is a two-year program that has been designed for international and German graduate students. Read more
The accredited Master of Science program in Computer Science is a two-year program that has been designed for international and German graduate students. The curriculum is very flexible. Students can compile their individual study plans based on their background and interests. It is also a very practical program. In addition to lectures and tutorials, students will complete two seminars, one or two projects and the master thesis.

In the beginning students will choose one or two key courses. Key courses are courses which introduce the students to the research areas represented at the Department of Computer Science. The following key courses are offered:

• Algorithm Theory
• Pattern Recognition
• Databases and Information Systems
• Software Engineering
• Artificial Intelligence
• Computer Architecture

After that, students can specialize in one of the following three areas:

• Cyber-Physical Systems
• Information Systems
• Cognitive Technical Systems

Here are some examples of subjects offered in the three specialization areas:

Cyber-Physical Systems:

• Cyber-Physical Systems – Discrete Models
• Cyber-Physical Systems – Hybrid Control
• Real Time Operation Systems and Reliability
• Verification of Embedded Systems
• Test and Reliability
• Decision Procedures
• Software Design, Modeling and Analysis in UML
• Formal Methods for Java
• Concurrency: Theory and Practice
• Compiler Construction
• Distributed Systems
• Constraint Satisfaction Problems
• Modal Logic
• Peer-to-Peer Networks
• Program Analysis
• Model Driven Engineering

Information Systems:

• Information Retrieval Data Models and Query Languages
• Peer-to-Peer Networks
• Distributed Storage
• Software Design, Modeling and Analysis in UML
• Security in Large-Scale Distributed Enterprises
• Machine Learning
• Efficient Route Planning
• Bioinformatics I
• Bioinformatics II
• Game Theory
• Knowledge Representation
• Distributed Systems

Cognitive Technical Systems:

• Computer Vision I
• Computer Vision II
• Statistical Pattern Recognition
• Mobile Robotics II
• Simulation in Computer Graphics
• Advanced Computer Graphics
• AI Planning
• Game Theory
• Knowledge Representation
• Constraint Satisfaction Problems
• Modal Logic
• Reinforcement Learning
• Machine Learning
• Mobile Robotics I

We believe that it is important for computer science students to get a basic knowledge in a field in which they might work after graduation. Therefore, our students have the opportunity to complete several courses and/or a project in one of the following application areas:

• Bioinformatics
• Educational Sciences
• Geosciences
• Cognitive Sciences
• Mathematics
• Medicine
• Meteorology
• Microsystems Engineering
• Physics
• Political Sciences
• Psychology
• Sociology
• Economics

In the last semester, students work on their master’s thesis. They are expected to tackle an actual research question in close cooperation with a professor and his/her staff.

Read less

Show 10 15 30 per page



Cookie Policy    X