• Northumbria University Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • Aberystwyth University Featured Masters Courses
  • University of Bristol Featured Masters Courses

Postgrad LIVE! Study Fair

Birmingham | Bristol | Sheffield | Liverpool | Edinburgh

University of London International Programmes Featured Masters Courses
Nottingham Trent University Featured Masters Courses
Xi’an Jiaotong-Liverpool University Featured Masters Courses
King’s College London Featured Masters Courses
ETH Zürich Featured Masters Courses
"software" AND "security"…×
0 miles

Masters Degrees (Software Security)

We have 357 Masters Degrees (Software Security)

  • "software" AND "security" ×
  • clear all
Showing 1 to 15 of 357
Order by 
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more

The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

About this degree

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits.

The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules

  • Computer Security I (15 credits)
  • Computer Security II (15 credits)
  • Introduction to Cryptography (15 credits)
  • Research in Information Security (15 credits)

Optional modules

Students choose 60 credits from the following:

  • Applied Cryptography (15 credits)
  • Cryptanalysis (15 credits)
  • Cybercrime (15 credits)
  • Distributed Systems and Security (15 credits)
  • Information Security Management (15 credits)
  • Language Based Security (15 credits)
  • Malware (15 credits)
  • People and Security (15 credits)
  • Philosophy, Politics and Economics of Security and Privacy (15 credits)
  • Privacy Enhancing Technologies (15 credits)

Please note: the availability and delivery of optional modules may vary, depending on your selection.

Dissertation/report

All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning

The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Further information on modules and degree structure is available on the department website: Information Security MSc

Careers

UCL graduates are keenly sought after by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Recent career destinations for this degree

  • Information Security Expert, State Oil Company of Azerbaijan Republic
  • IT Risk and Cyber Security Associate, PwC
  • PhD Research Student in Computer Science, UCL
  • Security Engineer, Morgan Stanley
  • Technical Analyst, The Royal Bank of Scotland (RBS)

Employability

Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts arise through the ACE-CS guest lecture series integrated into the degree.

Careers data is taken from the ‘Destinations of Leavers from Higher Education’ survey undertaken by HESA looking at the destinations of UK and EU students in the 2013–2015 graduating cohorts six months after graduation.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research.

UCL received the highest percentage (96%) for quality of research in Computer Science and Informatics in the UK's most recent Research Excellence Framework (REF2014).

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. 

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Accreditation

Information Security has been successfully awarded full certification from the National Cyber Security Centre (NCSC). Students who wish to gain the certification with their degree need to choose COMPGA14 Information Security Management as one of their optional modules.

Research Excellence Framework (REF)

The Research Excellence Framework, or REF, is the system for assessing the quality of research in UK higher education institutions. The 2014 REF was carried out by the UK's higher education funding bodies, and the results used to allocate research funding from 2015/16.

The following REF score was awarded to the department: Computer Science

96% rated 4* (‘world-leading’) or 3* (‘internationally excellent’)

Learn more about the scope of UCL's research, and browse case studies, on our Research Impact website.



Read less
Course Overview. This masters degree course in Cyber Security is being offered by the School of Computing and Engineering and has been developed in response to a high demand for cyber security professionals with systematic understanding of the principles and technologies underpinning today's IT systems. Read more

Course Overview

This masters degree course in Cyber Security is being offered by the School of Computing and Engineering and has been developed in response to a high demand for cyber security professionals with systematic understanding of the principles and technologies underpinning today's IT systems.

The School of Computing and Engineering has partnered with leaders within the security industry to provide you with a course which will enable you to gain comprehensive knowledge and critical skills in computer security. This course will enable you to pursue a career as a cyber security professional in either the public or the private sector.

Why choose this course?

This course is offered with a 6 months internship. The internship on the course will allow you to gain first hand work experience within the industry, it will enable you to improve and acquire new skills. Throughout the internship you will be encourages to explore various career opportunities, network and work with others as part of a team. It will also enhance your understanding of the world and what constitutes professional practice in the workplace.

In today’s digital world cyber security plays an integral role, people trained in this field are greatly sought after and the course is designed to meet the huge market demand for cyber security professionals. Partnering with leading security industry, this course combines theory and practice, balancing cutting-edge security technologies and solutions with concepts and principles of cyber security.

The course aims to develop your ability to analyse the legal, social, ethical and professional issues involved in the human aspects of cyber security and be guided by the adoption of appropriate professional, ethical and legal practices. 

The course aims to develop your critical skills and techniques to appropriately solve typical cyber security problems, enabling you to choose from a range of security related jobs/roles in a rapidly evolving and diverse environment.

This course provides routes into a diverse range of career opportunities in the information and communications technology (ICT) industry and in organisations that are data and knowledge intensive. Employers require information security officers at all levels including:

  • Chief Information Security Officer
  • Network and Computer Security Engineers
  • Security Managers and Consultants
  • Penetration Testers
  • Cybersecurity Analysts
  • Security Investigators
  • Security Researchers.

You will have access to laboratories and dedicated ICT suites with specialist networks and software as well as excellent resources for study space and meetings.

Modules

  • Fundamentals of Cyber Security
  • Security Management
  • Network and Systems Security
  • Research Methods
  • Learning and Professional Development 
  • Employability Skills and Employment
  • Dissertation

Optional Modules:

  • Distributed Application Development 
  • Mobile Web Component Development 
  • Principles of Project Management 
  • Consultancy and Technical Innovation 
  • Security Operations and Assurance 
  • Data Architecture
  • Knowledge Management

Career and study progression

The security industry includes government and law enforcement as well as providers of equipment and services, such as the:

  • anti-virus, security software vendors (such as McAfee, Kaspersky, Symantec, Sophos)
  • network and computer vendors (such as Cisco, Juniper, Palo Alto, HP, Barracuda)
  • network and service providers (such as British Telecom, Vodafone, Rackspace, Amazon)
  • consultancies (such as KPMG, IBM, Fujitsu, HP)

The School of Computing and Engineering also has a growing research and enterprise culture with thirty PhD students as well as a diversity of research groups.

Outstanding graduates can continue their studies at the level of MPhil and PhD at UWL.

How to apply

Click the following link for information on how to apply to this course.

Scholarships and bursaries

Information about scholarships and bursaries can be found here.



Read less
Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. Read more

Aim

Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the MSc is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges.

This taught programme provides a strong foundational education in the core areas of cyber security and offers practical training in key software tools and programs. Applied practical skills will be developed further in specialised projects exploring leading edge issues in cyber security research.

The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen's University Belfast's Centre for Secure Information Technologies (CSIT).

CSIT is a GCHQ accredited Academic Centre of Excellence in Cyber Security Research and is the UK's largest university research lab in this field. CSIT is fast developing a reputation as a global innovation hub for cyber security and is influenced throughout by its strong history of commercial engagement with world leading companies including Infosys, Cisco, IBM, Thales, BAE Systems, McAfee, Roke, and Altera.

Programme Content

The MSc in Cyber Security is available in two options, lasting either 1 or 2 years:

The 1-year MSc consists of six taught modules (120 CATS points) and a 4-5 months practical project of a research nature/work placement (60 CATS points).

The 2-year MSc consists of six taught modules (120 CATS points) and a 12 months practical project of a research nature/work placement (60 CATS points).

One compulsory module and a choice of five from seven other modules as listed below:
• Applied Cryptography
• Computer Forensics
• Network Security and Monitoring
• Software Assurance
• Malware
• Media Security
• Intelligent Information Systems
• Ethical & Legal Issues in Cyber Security (Compulsory)

In any given year further specialist topics may be available for selection or listed topics may not be offered.

Assessment

Comprises written examination and coursework/lab work in six modules; and a dissertation on your research project (180 CATS points total).

Opportunities for Careers

Strong Industry Engagement
A key differentiator of our MSc programme will be the opportunity to closely engage with CSIT industry partners. The programme offers an enhanced education experience, including the facilitation of industrial internships and work placements with leading security professionals, as well as other commercially specified projects. Our Scholarships and Work Placements programme offers a significant opportunity for students to enhance career prospects by directly engaging with potential employers.

Opportunities for placements are being provided by the following companies: Austrian Institute of Technology (AIT), Facebook, IBM, McAfee, PwC, RepKnight, Roke, Thales, and United Technologies Research CEntre (UTRC).

Professional Skills Training
Students will be offered a range of personal development and transferable skills training to improve their professional skills and increase their employability. Courses will cover: project management, presentation skills, communication strategies, networking skills, public engagement and entrepreneurship. Invited seminars and special guest lectures from industrial and academic leaders offer students a chance to engage with leaders in the cyber security profession.

Careers
Our graduates have found that holding a prestigious MSc qualification from Queen's (one of the UK's top engineering schools) has significantly enhanced their job opportunities and employment prospects. With demand for cyber security experts growing at 12 times the rate of the overall job market, students can expect their career prospects to be enhanced significantly after graduation.

Our MSc in Cyber Security will prepare graduates for successful careers in secure systems development, security architecture development, network security, data analytics, and right up to board level positions such as Chief Information Security Officer (CISO). Prospects for research and academic career paths in cyber security will also be enhanced by the MSc.

Special Features

Work Placements and Scholarships Programme
A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security degree programme. These opportunities are being provided on a competitive basis by CSIT's industrial partners and others affiliated with the Work Placements and Scholarships Programme. Once accepted for this masters degree you will be eligible to apply for opportunities made available via the programme.

Funding

A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security course via our Work Placements and Scholarships Programme.

Scholarship Opportunities:
CSIT Scholarships (x2) – UK/EU
- Open to UK/EU applicants to the 1-year MSc in Cyber Security
- Only students who are graduating in 2014 with an Undergraduate course in relevant discipline areas are eligible to apply
- Scholarships cover fees and a paid summer internship at CSIT
- How to Apply: Eligible students who apply for the 1-year MSc in Cyber Security will automatically be considered for these scholarships.

GREAT Queen’s University Belfast Scholarships (x2) – India
- Open to India students
- Scholarship value: £1500
- For further information and how to apply see:
http://www.qub.ac.uk/home/StudyatQueens/InternationalStudents/InternationalScholarships/GREATQueensUniversityBelfastScholarships-India/

Full details and further announcements about our Scholarships and Work Placements programme are available at http://www.csit.qub.ac.uk/msc

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Our Software Systems Engineering (SSE) MSc provides an ideal foundation for PhD study. The UCL SSE group is regularly ranked in the top three groups in the world (Microsoft Academic Search), you will be taught by those who are setting the international agenda, and our research has been repeatedly rated as world-class. Read more

Our Software Systems Engineering (SSE) MSc provides an ideal foundation for PhD study. The UCL SSE group is regularly ranked in the top three groups in the world (Microsoft Academic Search), you will be taught by those who are setting the international agenda, and our research has been repeatedly rated as world-class. Fully-funded PhD scholarships are available for high-performing students.

About this degree

Students are trained in the principles and techniques of engineering large, complex software systems and gain the opportunity to apply these techniques in a realistic group project setting. The programme analyses current practice in software systems engineering, looking at the most significant trends, problems and results in complex software systems.

Students undertake modules to the value of 180 credits.

The programme consists of five core modules (75 credits), and either a group project (60 credits) or three research modules (90 credits) including a project. Students will be able to select between one and three modules (15 to 45 credits) from electives.

Core modules

  • Professional Practice (15 credits)
  • Requirements Engineering and Software Architecture (15 credits)
  • Software Abstractions and Systems Integration (15 credits)
  • Tools and Environments (15 credits)
  • Validation and Verification (15 credits)

Optional modules

Students must take either the Group Project in Software Systems Engineering (60 credits) with 45 credits from electives, or Research Methods, Project and Seminar in Software Engineering (90 credits) with 15 credits from electives.

  • Research Methods in Software Engineering (15 credits)
  • Research Project in Software Engineering (60 credits)
  • Research Seminar in Software Engineering (15 credits)
  • OR
  • Group Project in Software Systems Engineering (60 credits)

Please note: the availability and delivery of optional modules may vary, depending on your selection.

A list of acceptable elective modules is available on the UCL Computer Science webpage.

Dissertation/report

Most students participate in a group industrial project, generally in close collaboration with one of our industrial partners. 

Other students undertake either an individual or small-group research project, under the supervision of academics in UCL's Software Systems Engineering group.

Teaching and learning

The programme is delivered through a combination of lectures, written and laboratory exercises, and group project supervision. Student performance is assessed through written exercises with modelling notations, laboratory exercises with tools and environments, unseen examination papers, and a significant, comprehensive group project.

Further information on modules and degree structure is available on the department website: Software Systems Engineering MSc

Funding

The department typically does not hire postgraduate students on research or teaching assistantships because the students need to work full-time on their studies for the programme.

Four MSc Scholarships, worth £4000 each, are made available by UCL Computer Science to UK/EU offer holders with a record of excellent academic achievement. The closing date is 30 June 2018. For more information, please see the department pages.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.

Careers

This professionally oriented programme provides an ideal foundation for graduates who wish to pursue a career as a software architect or leader of software development organisations. It also provides an excellent introduction for those who want to pursue research in software systems engineering.

Graduates from UCL are keenly sought after by the world's leading organisations, and many progress in their careers to secure senior and influential positions. UCL Computer Science (UCL-CS) graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London.

Graduates have found positions at global companies such as Barclays and RBS.

Recent career destinations for this degree

  • Software Developer, BNP Paribas
  • Technology Analyst, Morgan Stanley
  • IT Consultant, OnTrack
  • Software Analyst and Designer, Nok Technology
  • Security Science, UCL

Employability

There is, throughout the world, a strong demand for software engineers with solid foundations covering not only the programming aspects of software development, but also aspects related to requirements engineering, software architectures, system integration, and testing.

Following graduation, our students are generally hired as software engineers or software architects, sometimes by companies they have engaged with in the context of their MSc project.

Careers data is taken from the ‘Destinations of Leavers from Higher Education’ survey undertaken by HESA looking at the destinations of UK and EU students in the 2013–2015 graduating cohorts six months after graduation.

Why study this degree at UCL?

UCL Computer Science is recognised as a world-leader in teaching and research.

UCL received the highest percentage (96%) for quality of research in Computer Science and Informatics in the UK's most recent Research Excellence Framework (REF2014).

Our Master's programmes have some of the highest employment rates and starting salaries, with graduates entering a wide variety of industries from entertainment to finance.

We take an experimental approach to our subject and place a high value on our extensive range of industrial collaborations. In the recent past, students have worked on projects and coursework in collaboration with Microsoft, IBM, JP Morgan, Citigroup and BNP Paribas.

Accreditation:

CITPFL - Accredited by BCS. CEng (partial fulfilment) - Accreditation by the BCS.



Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs. Read more

About the course

This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs.

Cyber Technology MSc consists of four main themes; Cyber Security, Software Engineering, Digital Forensics, and Management. It can be studied by combining modules from all four themes allowing you to specialise in your chosen area of interest. You have the opportunity to choose mixed pathways, for example the choices of modules could lead to a degree in Cyber Security with Management.

Reasons to study:

• Develop skills required for a rapidly changing sector
gain the latest skills, techniques and knowledge required in one of the most exciting areas of computing

• Developed in conjunction with industry experts
modules are developed with Deloitte PLC, Airbus Group, BT and Rolls-Royce ensuring that you explore issues relevant to industry

• Dedicated Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in digital forensics

• Taught by expert academic staff
taught by expert staff within our Cyber Security Centre and Software Technology Research Laboratory who recognised leaders in the cyber security domain

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Excellent career prospects
graduates are prepared for roles such as consultancy, software houses or project management within organisations that are cyber security specialists within law enforcement, government; in commercial IT departments and security consultancies

Teaching and Assessment

Each module is delivered over the duration of four full days. It targets both concepts and practical skills that are relevant to industry. A multiple choice (MC) test at the end of the course provides attendees feedback on their achievements and must be passed before continuation of the academic assessment through coursework.

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects, multiple choice and laboratory-based assessments.

Contact and learning hours

You will normally attend 3 hours of timetabled taught sessions each week for each module undertaken during term time, for full time study this would be 12 hours per week during term time. You are expected to undertake around 24 further hours of independent study and assignments as required per week. Alternate study modes and entry points may change the timetabled session available, please contact us for details.

Academic Expertise

The programme is managed and delivered through our renowned Cyber Security Centre and Software Technology Research Laboratory.

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex-vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors.

Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Learning how to design high-level software that guarantees safety and correctness while still being in control of its complexity. Read more

Learning how to design high-level software that guarantees safety and correctness while still being in control of its complexity.

Software plays a role in almost every aspect of our daily lives and in every organisation anywhere in the world. It can often be a crucial key to their success. Well-structured software that is attuned to an organisation’s needs and future plans can be cost effective, improve efficiency, offer better services and be innovative. Many companies, in every branch out there, are therefore looking for highly skilled software specialists. Graduates of the Master’s specialisation in Software Science will have no trouble finding a job.

Producing software is not merely a technological enterprise but a deeply scientific and creative one as well. Modern cars drive on 20 million lines of code. How do we develop all this software and control its complexity? How do we ensure correctness of software on which the lives in a speeding car literally depend on? This specialisation goes far beyond basic code writing. It’s about analysing and testing code in order to improve it as well as simplify it.

Why study Software Science at Radboud University?

- Although not the only focus, our programme puts a lot of emphasis on embedded software and functional programming.

- We teach a unique range of software analysis techniques and application down to practical/commercial use in industry.

- This specialisation builds on the strong international reputation of the Institute for Computing and Information Sciences (iCIS) in areas such as model based and virtual product development, advanced programming, and domain specific languages. We also closely collaborate with the Embedded Systems Institute.

- Our approach is pragmatic as well as theoretical. As an academic, we don’t just expect you to understand and make use of the appropriate tools, but also to program and develop your own.

- For your Master’s research we have a large number of companies like Philips, ASML and NXP offering projects. There are always more projects than students.

- Thanks to free electives students can branch out to other Computing Science domain at Radboud University such as security, machine learning or more in-depth mathematical foundations of computer science.

- The job opportunities are excellent: some of our students get offered jobs before they’ve even graduated and almost all of our graduates have positions within six months after graduating.

See the website http://www.ru.nl/masters/softwarescience

Admission requirements for international students

1. A completed Bachelor's degree in Computing Science or related area

In order to get admission to this Master’s you will need a completed Bachelor’s degree in Computing Sciences or a related discipline.

2. A proficiency in English

In order to take part in the programme, you need to have fluency in English, both written and spoken. Non-native speakers of English without a Dutch Bachelor's degree or VWO diploma need one of the following:

- TOEFL score of >575 (paper based) or >232 (computer based) or >90 (internet based)

- IELTS score of >6.5

- Cambridge Certificate of Advanced English (CAE) or Certificate of Proficiency in English (CPE), with a mark of C or higher

Career prospects

Writing good software is a highly creative process, which requires the ability to approach problems in entirely novel ways through computational thinking. Besides creativity, a professional software scientist also has fine problem-solving, analytical, programming, and communication skills. By combining software programming, model-checking techniques and human intellect, software scientists can make a real difference to help and improve the devices that govern such a large part of our lives.

The job perspective for our graduates is excellent. Industry desperately needs software science specialists at an academic level, and thus our graduates have no difficulty in find an interesting and challenging job. Several of our graduates decide to go for a PhD and stay at a university, but most of our students go for a career in industry. They then typically either find a job at a larger company as consultant or programmer, or they start up their own software company.

Examples of companies where our graduates end up include the big Dutch high-tech companies such as Océ, ASML, Vanderlande and Philips, ICT service providers such as Topicus and Info Support and companies started by Radboud graduates, like AIA and GX.

Our research in this field

The Master’s programme in Computing Sciences is offered in close collaboration with the research Institute for Computing and Information Sciences (iCIS). Research at iCIS is organised in three different research sections:

- Model Based System Development

- Digital Security

- Intelligent Systems

The Software Science specialisation builds on the strong international reputation of iCIS in areas such model based and virtual product development, advanced programming, and domain specific languages.

Research project and internship

For your research project, you may choose to do your internship at:

- A company

---- SME, such as as Océ, Vanderlande, Clarity or GX

---- multinational, such as the Philips, ASML, NXP, Logica or Reed Business Media

- A governmental institute, such as the (Dutch) Tax Authorities or the European Space Agency.

- Any department at Radboud University or another university with issues regarding software, like studying new techniques for loop bound analysis, the relation between classical logic and computational systems, or e-mail extension for iTasks.

- One of the iCIS departments, specialising on different aspects of Software Science.

- Abroad, under supervision of researchers from other universities that we collaborate with. For instance, exploring a new technique for automata learning at Uppsala University in Sweden, or verifying the correctness of Erlang refactoring transformations at the Eötvös Loránd University (ELTE) in Budapest, Hungary.

See the website http://www.ru.nl/masters/softwarescience

Radboud University Master's Open Day 10 March 2018



Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
With the proliferation of mobile and pervasive devices with network capability, along with widespread popularity of the Internet, more and more users and application providers expect services to be available anytime and anywhere. Read more
With the proliferation of mobile and pervasive devices with network capability, along with widespread popularity of the Internet, more and more users and application providers expect services to be available anytime and anywhere.

The Master of Networks and Security (MNS) gives you the skills to manage and administer computer networks and security, and prepares you for a career in network administration or network management, or as a systems analyst, systems designer, data communications specialist, or network security engineer or administrator.

As a network and security professional, your specialised skills will always be in high demand, as well as highly rewarded.

The MNS expands your knowledge of how to design, deploy and maintain networks and application services, by combining theory with practice. You explore issues faced both by users and application providers, and devise possible solutions.

The MNS caters to students from a variety of backgrounds by including preparatory IT units. However, if you already have a degree in IT or engineering, you may accelerate your study with an exemption from these preparatory units, or perhaps choose to take further networks and security electives.

The advanced studies of an MNS include a range of topics, from network structure, design, quality of service and protocols, to information, software and network security.

The course emphasises the principles and management of computer networks and the security technologies upon which organisations rely. You will learn how to evaluate the security needs of an organisation's infrastructure and create plans to protect it against potential attacks and security breaches.

In your final semester, you may take part in an Industry Experience program, working in a small team with industry mentors to develop entrepreneurial IT solutions. Or you may undertake a minor-thesis research project, investigating cutting-edge problems in networks and security under the supervision of internationally recognised researchers.

High-achieving students who complete the research component may progress to further research study.Graduates may be eligible for Australian Computer Society (ACS) professional membership.

Visit the website http://www.study.monash/courses/find-a-course/2016/networks-and-security-c6002?domestic=true

Overview

With the proliferation of mobile and pervasive devices with network capability and the popularity and the availability of Internet, more and more users and application providers are seeking and providing services with the access and delivery paradigm of anytime and anywhere. In order to harness such rapidly changing technology, one needs to have clear understanding, knowledge and experience that transcends these technologies in order to able to design, deploy and maintain networks and application services. This course not only provides an in-depth knowledge on the principles of these technologies, but also explores issues that are faced both by the users and the application providers, and provides possible solutions. The theory is interrelated with the practice which makes this course unique.

Course Structure

The course is structured in three parts, A, B and C. All students complete Part B (core studies). Depending upon prior qualifications, you may receive credit for Part A Foundations for advanced networks and security studies or Part C Advanced practice or a combination of the two.

Note that if you are eligible for credit for prior studies you may elect not to receive the credit.

PART A. Foundations for advanced networks and security studies
These studies will provide an orientation to the field of networks and security at graduate level. They are intended for students whose previous qualification is not in a cognate field.

PART B. Core Master's study
These studies draw on best practices within the broad realm of IT networks and security theory and practice. You will gain an understanding of information and computer security and IT project management principles. Your study will focus on your choice of units within Networks and Security.

PART C. Advanced practice
The focus of these studies is professional or scholarly work that can contribute to a portfolio of professional development. You have two options.

The first option is a research pathway including a thesis. Students wishing to use this Masters course as a pathway to a higher degree by research should take this first option.

The second option is a program of coursework involving advanced study and an Industry experience studio project.

Students admitted to the course, who have a recognised honours degree in a discipline cognate to networks and security, will receive credit for Part C, however, should they wish to complete a 24 point research project as part of the course they should consult with the course coordinator.

For more information visit the faculty website - http://www.study.monash/media/links/faculty-websites/information-technology

Find out how to apply here - http://www.study.monash/courses/find-a-course/2016/networks-and-security-c6002?domestic=true#making-the-application

Read less

Show 10 15 30 per page



Cookie Policy    X