• Goldsmiths, University of London Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • New College of the Humanities Featured Masters Courses
  • Coventry University Featured Masters Courses
  • St Mary’s University, Twickenham Featured Masters Courses
London School of Hygiene & Tropical Medicine Featured Masters Courses
Coventry University Featured Masters Courses
University of Hertfordshire Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
FindA University Ltd Featured Masters Courses
"software" AND "security"…×
0 miles

Masters Degrees (Software Security)

  • "software" AND "security" ×
  • clear all
Showing 1 to 15 of 357
Order by 
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. Read more

Aim

Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the MSc is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges.

This taught programme provides a strong foundational education in the core areas of cyber security and offers practical training in key software tools and programs. Applied practical skills will be developed further in specialised projects exploring leading edge issues in cyber security research.

The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen's University Belfast's Centre for Secure Information Technologies (CSIT).

CSIT is a GCHQ accredited Academic Centre of Excellence in Cyber Security Research and is the UK's largest university research lab in this field. CSIT is fast developing a reputation as a global innovation hub for cyber security and is influenced throughout by its strong history of commercial engagement with world leading companies including Infosys, Cisco, IBM, Thales, BAE Systems, McAfee, Roke, and Altera.

Programme Content

The MSc in Cyber Security is available in two options, lasting either 1 or 2 years:

The 1-year MSc consists of six taught modules (120 CATS points) and a 4-5 months practical project of a research nature/work placement (60 CATS points).

The 2-year MSc consists of six taught modules (120 CATS points) and a 12 months practical project of a research nature/work placement (60 CATS points).

One compulsory module and a choice of five from seven other modules as listed below:
• Applied Cryptography
• Computer Forensics
• Network Security and Monitoring
• Software Assurance
• Malware
• Media Security
• Intelligent Information Systems
• Ethical & Legal Issues in Cyber Security (Compulsory)

In any given year further specialist topics may be available for selection or listed topics may not be offered.

Assessment

Comprises written examination and coursework/lab work in six modules; and a dissertation on your research project (180 CATS points total).

Opportunities for Careers

Strong Industry Engagement
A key differentiator of our MSc programme will be the opportunity to closely engage with CSIT industry partners. The programme offers an enhanced education experience, including the facilitation of industrial internships and work placements with leading security professionals, as well as other commercially specified projects. Our Scholarships and Work Placements programme offers a significant opportunity for students to enhance career prospects by directly engaging with potential employers.

Opportunities for placements are being provided by the following companies: Austrian Institute of Technology (AIT), Facebook, IBM, McAfee, PwC, RepKnight, Roke, Thales, and United Technologies Research CEntre (UTRC).

Professional Skills Training
Students will be offered a range of personal development and transferable skills training to improve their professional skills and increase their employability. Courses will cover: project management, presentation skills, communication strategies, networking skills, public engagement and entrepreneurship. Invited seminars and special guest lectures from industrial and academic leaders offer students a chance to engage with leaders in the cyber security profession.

Careers
Our graduates have found that holding a prestigious MSc qualification from Queen's (one of the UK's top engineering schools) has significantly enhanced their job opportunities and employment prospects. With demand for cyber security experts growing at 12 times the rate of the overall job market, students can expect their career prospects to be enhanced significantly after graduation.

Our MSc in Cyber Security will prepare graduates for successful careers in secure systems development, security architecture development, network security, data analytics, and right up to board level positions such as Chief Information Security Officer (CISO). Prospects for research and academic career paths in cyber security will also be enhanced by the MSc.

Special Features

Work Placements and Scholarships Programme
A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security degree programme. These opportunities are being provided on a competitive basis by CSIT's industrial partners and others affiliated with the Work Placements and Scholarships Programme. Once accepted for this masters degree you will be eligible to apply for opportunities made available via the programme.

Funding

A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security course via our Work Placements and Scholarships Programme.

Scholarship Opportunities:
CSIT Scholarships (x2) – UK/EU
- Open to UK/EU applicants to the 1-year MSc in Cyber Security
- Only students who are graduating in 2014 with an Undergraduate course in relevant discipline areas are eligible to apply
- Scholarships cover fees and a paid summer internship at CSIT
- How to Apply: Eligible students who apply for the 1-year MSc in Cyber Security will automatically be considered for these scholarships.

GREAT Queen’s University Belfast Scholarships (x2) – India
- Open to India students
- Scholarship value: £1500
- For further information and how to apply see:
http://www.qub.ac.uk/home/StudyatQueens/InternationalStudents/InternationalScholarships/GREATQueensUniversityBelfastScholarships-India/

Full details and further announcements about our Scholarships and Work Placements programme are available at http://www.csit.qub.ac.uk/msc

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Our Software Systems Engineering (SSE) MSc provides an ideal foundation for PhD study. The UCL SSE group is regularly ranked in the top three groups in the world (Microsoft Academic Search), you will be taught by those who are setting the international agenda, and our research has been repeatedly rated as world-class. Read more
Our Software Systems Engineering (SSE) MSc provides an ideal foundation for PhD study. The UCL SSE group is regularly ranked in the top three groups in the world (Microsoft Academic Search), you will be taught by those who are setting the international agenda, and our research has been repeatedly rated as world-class. Fully-funded PhD scholarships are available for high-performing students.

Degree information

Students are trained in the principles and techniques of engineering large, complex software systems and gain the opportunity to apply these techniques in a realistic group project setting. The programme analyses current practice in software systems engineering, looking at the most significant trends, problems and results in complex software systems.

Students undertake modules to the value of 180 credits.

The programme consists of five core modules (75 credits), three optional modules (45 credits) and a group project (60 credits).

Core modules
-Requirements Engineering and Software Architecture
-Software Abstractions and Systems Integration
-Validation and Verification
-Tools and Environments
-Professional Practice

Optional modules
-People and Security
-Networked Systems
-Language Based Security
-Distributed Systems and Security
-Supervised Learning
-Research Seminar in Software Engineering

Dissertation/report
Most students participate in a group industrial project, generally in close collaboration with one of our industsrial partners.

Other students undertake either an individual or small-group research project, under the supervision of academics in UCL Software Systems Engineering group.

Teaching and learning
The programme is delivered through a combination of lectures, written and laboratory exercises, and group project supervision. Student performance is assessed through written exercises with modelling notations, laboratory exercises with tools and environments, unseen examination papers, and a significant, comprehensive group project.

Careers

This professionally oriented programme provides an ideal foundation for graduates who wish to pursue a career as a software architect or leader of software development organisations. It also provides an excellent introduction for those who want to pursue research in software systems engineering.

Graduates from UCL are keenly sought by the world's leading organisations, and many progress in their careers to secure senior and influential positions. UCL Computer Science (UCL-CS) graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London.

Graduates have found positions at global companies such as Barclays and RBS.

Top career destinations for this degree:
-IT Consultant, OnTrack
-Software Analyst and Designer, Nok Technology
-Software Engineer, Accenture
-Software Engineer, Orange
-Security Science, UCL

Employability
There is, throughout the world, a strong demand for software engineers with solid foundations covering not only the programming aspects of software development, but also aspects related to requirements engineering, software architectures, system integration, and testing. Many surveys rank software engineering positions as among the best jobs in the world.

Following graduation, our students are generally hired as software engineers or software architects, sometimes by companies they have engaged with in the context of their MSc project.

Why study this degree at UCL?

UCL Computer Science is recognised as a world-leader in teaching and research, and was one of the top-rated departments in the country according to the UK government's recent research assessment exercise.

Our Master's programmes have some of the highest employment rates and starting salaries, with graduates entering a wide variety of industries from entertainment to finance.

We take an experimental approach to our subject and place a high value on our extensive range of industrial collaborations. In the recent past, students have worked on projects and coursework in collaboration with Microsoft, IBM, JP Morgan, Citigroup and BNP Paribas.

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

Degree information

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits. The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules
-Computer Security I
-Computer Security II
-Introduction to Cryptography
-Research in Information Security

Optional modules - students choose four of the following:
-Distributed Systems and Security
-People and Security
-Applied Cryptography
-Information Security Management
-Language Based Security
-Philosophy, Politics and Economics of Security and Privacy
-Malware
-Cryptanalysis
-Cybercrime
-Privacy Enhancing Technologies
-Relevant options from other MSc degree programmes

Dissertation/report
All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning
The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Careers

UCL graduates are keenly sought by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Top career destinations for this degree:
-Risk IT RTB Support Administrator, Lloyds Banking Group
-Technical Analyst, The Royal Bank of Scotland (RBS)
-IT Lead Developer, MOVE Guides
-Software Developer, Oracle
-Cisco Certified Network Associate (CCNA) Routing and Switching, Cisco

Employability
Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts occur through the ACE-CS guest lecture series integrated into the course.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research, and was one of the top-rated departments in the UK government's recent Research Excellence Framework.

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. Students from the degree won the first UK Cyber Security Challenge in code cracking in 2013.

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Read less
You will take eight Assessed Modules plus an Individual Project carried out in the department. Six of the modules cover core Software Engineering methods, practices and tools, and are compulsory. Read more
You will take eight Assessed Modules plus an Individual Project carried out in the department. Six of the modules cover core Software Engineering methods, practices and tools, and are compulsory. For the remaining two modules, you will be able to choose from Natural Language Processing, Topics in Privacy & Security, Evolutionary Computation, Concurrent & Real-Time Programming, and Functional Programming Technology.

Software Engineering has become a crucial discipline in the functioning of the modern world. Information systems, communications, transport, manufacturing and services all require well-engineered and reliable software. The focus of our MSc in Software Engineering is automated and large-scale software engineering, so the course will equip you to deal with the types of systems widely found in industry.

The MSc is a full-time, one-year course for those with some experience or background in Software Engineering. You will learn up-to-date theory and practice in the core areas of Software Engineering, and the main methods and tools used in industry. The course also covers model-driven engineering, service-oriented architectures, software architectures and user-centred design. You will gain a thorough understanding of techniques and practices of software management, including measurement and testing. This in-depth understanding of the role of software in commercial organisations will enable you to develop and maintain large-scale software systems.

You will gain a thorough understanding of techniques and practices of software management, including measurement and testing. These techniques will allow you to understand the role of software in commercial organisations and you will be able to develop and maintain these large scale systems.

Course Aims
When you graduate, you will be able to apply advanced Software Engineering techniques to analyse systems and design solutions, particularly in a commercial context. You will have experience of using state-of-the-art Software Engineering tool suites (e.g., Eclipse and Epsilon). You will also understand the human factors in Software Engineering, and will be able to design systems taking into account the needs of users.

Your individual project gives you the chance to specialise in a specific area of Software Engineering, as you will undertake independent research and apply your results to develop a real solution – an application, tool or technique.

On graduation, you will be equipped to design and maintain large systems in a wide range of industries, or to pursue an academic research career in Software Engineering.

Learning Outcomes
A thorough grounding and practical experience in the use of state-of-the-art techniques for developing software-based systems.
An in-depth understanding of the principles underpinning these techniques, so as to make sound judgements throughout the systems and software engineering life cycle.

Project

Team Project
You are taught a broad range of project management skills, which you will directly apply to a medium-sized software project that is conducted in small student teams.

Individual Project
The course concludes with your individual project. You may choose a topic among the many offered by the academic staff, or you may propose your own topic. Some recent topics were:
-Air Traffic Control application using PostgreSQL
-Automated Development of Graphical Editors built atop Graphiti
-Multi-Agent Reinforcement Learning: Conquest of Mars
-Natural Disaster Planning - A System of Systems Analysis
-Reinforcement Learning for Mobile Cognitive Radio Agents
-Simulation-based Hazard Analysis for Autonomous Robots
-Study of Business Processes in a Complex Enterprise System
-Using heuristics for Monte Carlo Tree Search

Careers

Here at York, we're really proud of the fact that more than 97% of our postgraduate students go on to employment or further study within six months of graduating from York. We think the reason for this is that our courses prepare our students for life in the workplace through our collaboration with industry to ensure that what we are teaching is useful for employers.

Our postgraduate taught courses are specifically designed to meet the needs of industry, and the thorough grounding we provide, alongside the skills you learn from undertaking a Masters degree, will stand you in good stead in the workplace.

Read less
This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs. Read more

About the course

This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs.

Cyber Technology MSc consists of four main themes; Cyber Security, Software Engineering, Digital Forensics, and Management. It can be studied by combining modules from all four themes allowing you to specialise in your chosen area of interest. You have the opportunity to choose mixed pathways, for example the choices of modules could lead to a degree in Cyber Security with Management.

Reasons to study:

• Develop skills required for a rapidly changing sector
gain the latest skills, techniques and knowledge required in one of the most exciting areas of computing

• Developed in conjunction with industry experts
modules are developed with Deloitte PLC, Airbus Group, BT and Rolls-Royce ensuring that you explore issues relevant to industry

• Dedicated Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in digital forensics

• Taught by expert academic staff
taught by expert staff within our Cyber Security Centre and Software Technology Research Laboratory who recognised leaders in the cyber security domain

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Excellent career prospects
graduates are prepared for roles such as consultancy, software houses or project management within organisations that are cyber security specialists within law enforcement, government; in commercial IT departments and security consultancies

Teaching and Assessment

Each module is delivered over the duration of four full days. It targets both concepts and practical skills that are relevant to industry. A multiple choice (MC) test at the end of the course provides attendees feedback on their achievements and must be passed before continuation of the academic assessment through coursework.

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects, multiple choice and laboratory-based assessments.

Contact and learning hours

You will normally attend 3 hours of timetabled taught sessions each week for each module undertaken during term time, for full time study this would be 12 hours per week during term time. You are expected to undertake around 24 further hours of independent study and assignments as required per week. Alternate study modes and entry points may change the timetabled session available, please contact us for details.

Academic Expertise

The programme is managed and delivered through our renowned Cyber Security Centre and Software Technology Research Laboratory.

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex-vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors.

Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Learning how to design high-level software that guarantees safety and correctness while still being in control of its complexity. Read more
Learning how to design high-level software that guarantees safety and correctness while still being in control of its complexity.

Software plays a role in almost every aspect of our daily lives and in every organisation anywhere in the world. It can often be a crucial key to their success. Well-structured software that is attuned to an organisation’s needs and future plans can be cost effective, improve efficiency, offer better services and be innovative. Many companies, in every branch out there, are therefore looking for highly skilled software specialists. Graduates of the Master’s specialisation in Software Science will have no trouble finding a job.

Producing software is not merely a technological enterprise but a deeply scientific and creative one as well. Modern cars drive on 20 million lines of code. How do we develop all this software and control its complexity? How do we ensure correctness of software on which the lives in a speeding car literally depend on? This specialisation goes far beyond basic code writing. It’s about analysing and testing code in order to improve it as well as simplify it.

Why study Software Science at Radboud University?

- Although not the only focus, our programme puts a lot of emphasis on embedded software and functional programming.
- We teach a unique range of software analysis techniques and application down to practical/commercial use in industry.
- This specialisation builds on the strong international reputation of the Institute for Computing and Information Sciences (iCIS) in areas such as model based and virtual product development, advanced programming, and domain specific languages. We also closely collaborate with the Embedded Systems Institute.
- Our approach is pragmatic as well as theoretical. As an academic, we don’t just expect you to understand and make use of the appropriate tools, but also to program and develop your own.
- For your Master’s research we have a large number of companies like Philips, ASML and NXP offering projects. There are always more projects than students.
- Thanks to free electives students can branch out to other Computing Science domain at Radboud University such as security, machine learning or more in-depth mathematical foundations of computer science.
- The job opportunities are excellent: some of our students get offered jobs before they’ve even graduated and almost all of our graduates have positions within six months after graduating.

See the website http://www.ru.nl/masters/softwarescience

Admission requirements for international students

1. A completed Bachelor's degree in Computing Science or related area
In order to get admission to this Master’s you will need a completed Bachelor’s degree in Computing Sciences or a related discipline.
2. A proficiency in English
In order to take part in the programme, you need to have fluency in English, both written and spoken. Non-native speakers of English without a Dutch Bachelor's degree or VWO diploma need one of the following:
- TOEFL score of >575 (paper based) or >232 (computer based) or >90 (internet based)
- IELTS score of >6.5
- Cambridge Certificate of Advanced English (CAE) or Certificate of Proficiency in English (CPE), with a mark of C or higher

Career prospects

Writing good software is a highly creative process, which requires the ability to approach problems in entirely novel ways through computational thinking. Besides creativity, a professional software scientist also has fine problem-solving, analytical, programming, and communication skills. By combining software programming, model-checking techniques and human intellect, software scientists can make a real difference to help and improve the devices that govern such a large part of our lives.

The job perspective for our graduates is excellent. Industry desperately needs software science specialists at an academic level, and thus our graduates have no difficulty in find an interesting and challenging job. Several of our graduates decide to go for a PhD and stay at a university, but most of our students go for a career in industry. They then typically either find a job at a larger company as consultant or programmer, or they start up their own software company.

Examples of companies where our graduates end up include the big Dutch high-tech companies such as Océ, ASML, Vanderlande and Philips, ICT service providers such as Topicus and Info Support and companies started by Radboud graduates, like AIA and GX.

Our research in this field

The Master’s programme in Computing Sciences is offered in close collaboration with the research Institute for Computing and Information Sciences (iCIS). Research at iCIS is organised in three different research sections:
- Model Based System Development
- Digital Security
- Intelligent Systems

The Software Science specialisation builds on the strong international reputation of iCIS in areas such model based and virtual product development, advanced programming, and domain specific languages.

Research project and internship

For your research project, you may choose to do your internship at:
- A company
---- SME, such as as Océ, Vanderlande, Clarity or GX
---- multinational, such as the Philips, ASML, NXP, Logica or Reed Business Media
- A governmental institute, such as the (Dutch) Tax Authorities or the European Space Agency.
- Any department at Radboud University or another university with issues regarding software, like studying new techniques for loop bound analysis, the relation between classical logic and computational systems, or e-mail extension for iTasks.
- One of the iCIS departments, specialising on different aspects of Software Science.
- Abroad, under supervision of researchers from other universities that we collaborate with. For instance, exploring a new technique for automata learning at Uppsala University in Sweden, or verifying the correctness of Erlang refactoring transformations at the Eötvös Loránd University (ELTE) in Budapest, Hungary.

See the website http://www.ru.nl/masters/softwarescience

Read less
Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed. Read more

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering. The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives, from:
-Advanced Computer Forensics
-Web Server and Application Security Audits
-Mobile Device Forensics
-Information Security Risk Management
-Sensor and SCADA Security
-Computer System Security
-Computer Viruses and Malicious Software
-Network Security
-Covert Communications
-Information Security Policy and Law
-Information Assurance Fundamentals
-Secure Data Management
-Secure Coding
-Foundations of Cryptography
-Foundations of Security Measurement and Evaluation
-Foundations of Intelligent Security Systems
-Advanced Cryptography
-Hardware and Software Design for Cryptographic Applications

Curriculum

Thesis/project/capstone course options differ in course sequence, see the website for a particular course's module information.

Other admission requirements

-Have a minimum grade point average equivalent to a 3.0/4.0.
-Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
-Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and complete a graduate application.
-International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.
-Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average. A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options:
Students may pursue the degree on a full-time basis, on-campus only.

Faculty:
The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit:
University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Read less
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Read more
This sandwich course will provide knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, able to use ‘information’ as a defensive or offensive weapon.

Today, Cyber-Operators are required to have an ‘enriched’ background drawing elements of practical experience from fields as diverse as sociology, psychology, networks and network security, computer science and computer security, information management and information security, software engineering and reverse engineering, and of course, the law.

We have a diverse number of placements with companies from the security industry, high tech crime units and government organisations.

In January 2014 Staffordshire University announced exciting plans to create one main city campus in Stoke-on-Trent. This course will be based at our Stoke-on-Trent Campus from Summer 2016.

Course content

Throughout the course you will be invited to attend guest lectures, the guest will also be delivering workshops and conducting seminars with the students. Our visiting tutors are national and international security experts.

You will also have an opportunity to achieve industry recognised certification in Certified Ethical hacking.

Our purpose-built state of the art security laboratory offers each student a unique experience in enhancing your skills and knowledge in Cyber Security. As a result of winning a recent £5 million STEM bid, you will benefit from state of the art hardware resources, which will enhance your learning.

You will gain:
-Sound understanding of the computer science.
-Sound understanding of TCP-IP networks, the TCP-IP suite and its supporting protocols.
-Sound understanding and practical knowledge of digital forensics incidence response.
-Understanding and practical knowledge of managing information at all levels.
-Practical knowledge of the different types of computer crime.
-Ability to use with competency cyber-security toolkits.
-Ability to follow strict policies and procedures with meticulous record keeping.
-Good understanding of people and their motivational catalysts.
-Knowledge of evidence law and legal procedures.
-Ability to write reports on technical issues in a non-technical manner.
-Ability to address large audiences in a formal manner and affect their decision making process.

Core Modules
-Computer Security – Low Level
-Cyber Operations
-Malware analysis and Reverse Engineering
-Research Methods
-Operating Systems Security
-Digital Forensics & Incidence Response

Option Modules*
-Network Security with CISCO
-Network Security
-Penetration Testing
-Computer Security – High Level

*If you have CCNA certification (or an equivalent CISCO background), there will be the option of doing Network Security with the CISCO curriculum. Those of you who are not CCNA certified (or without an equivalent CISCO background), will do a less practical module of similar learning outcomes. After Teaching Block 2 you will have an option, again based on your prior knowledge on ethical hacking (and/or background, qualifications), for doing either Computer Security – High Level, which focuses on ethical hacking, or a more technical module on Penetration Testing.

Graduate destinations

The award will provide you with the knowledge of the latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built cyber security laboratories. Graduates will be Cyber-operators, equipped with the skills to work in the security industry.

Read less
With the proliferation of mobile and pervasive devices with network capability, along with widespread popularity of the Internet, more and more users and application providers expect services to be available anytime and anywhere. Read more
With the proliferation of mobile and pervasive devices with network capability, along with widespread popularity of the Internet, more and more users and application providers expect services to be available anytime and anywhere.

The Master of Networks and Security (MNS) gives you the skills to manage and administer computer networks and security, and prepares you for a career in network administration or network management, or as a systems analyst, systems designer, data communications specialist, or network security engineer or administrator.

As a network and security professional, your specialised skills will always be in high demand, as well as highly rewarded.

The MNS expands your knowledge of how to design, deploy and maintain networks and application services, by combining theory with practice. You explore issues faced both by users and application providers, and devise possible solutions.

The MNS caters to students from a variety of backgrounds by including preparatory IT units. However, if you already have a degree in IT or engineering, you may accelerate your study with an exemption from these preparatory units, or perhaps choose to take further networks and security electives.

The advanced studies of an MNS include a range of topics, from network structure, design, quality of service and protocols, to information, software and network security.

The course emphasises the principles and management of computer networks and the security technologies upon which organisations rely. You will learn how to evaluate the security needs of an organisation's infrastructure and create plans to protect it against potential attacks and security breaches.

In your final semester, you may take part in an Industry Experience program, working in a small team with industry mentors to develop entrepreneurial IT solutions. Or you may undertake a minor-thesis research project, investigating cutting-edge problems in networks and security under the supervision of internationally recognised researchers.

High-achieving students who complete the research component may progress to further research study.Graduates may be eligible for Australian Computer Society (ACS) professional membership.

Visit the website http://www.study.monash/courses/find-a-course/2016/networks-and-security-c6002?domestic=true

Overview

With the proliferation of mobile and pervasive devices with network capability and the popularity and the availability of Internet, more and more users and application providers are seeking and providing services with the access and delivery paradigm of anytime and anywhere. In order to harness such rapidly changing technology, one needs to have clear understanding, knowledge and experience that transcends these technologies in order to able to design, deploy and maintain networks and application services. This course not only provides an in-depth knowledge on the principles of these technologies, but also explores issues that are faced both by the users and the application providers, and provides possible solutions. The theory is interrelated with the practice which makes this course unique.

Course Structure

The course is structured in three parts, A, B and C. All students complete Part B (core studies). Depending upon prior qualifications, you may receive credit for Part A Foundations for advanced networks and security studies or Part C Advanced practice or a combination of the two.

Note that if you are eligible for credit for prior studies you may elect not to receive the credit.

PART A. Foundations for advanced networks and security studies
These studies will provide an orientation to the field of networks and security at graduate level. They are intended for students whose previous qualification is not in a cognate field.

PART B. Core Master's study
These studies draw on best practices within the broad realm of IT networks and security theory and practice. You will gain an understanding of information and computer security and IT project management principles. Your study will focus on your choice of units within Networks and Security.

PART C. Advanced practice
The focus of these studies is professional or scholarly work that can contribute to a portfolio of professional development. You have two options.

The first option is a research pathway including a thesis. Students wishing to use this Masters course as a pathway to a higher degree by research should take this first option.

The second option is a program of coursework involving advanced study and an Industry experience studio project.

Students admitted to the course, who have a recognised honours degree in a discipline cognate to networks and security, will receive credit for Part C, however, should they wish to complete a 24 point research project as part of the course they should consult with the course coordinator.

For more information visit the faculty website - http://www.study.monash/media/links/faculty-websites/information-technology

Find out how to apply here - http://www.study.monash/courses/find-a-course/2016/networks-and-security-c6002?domestic=true#making-the-application

Read less
Modern devices often rely on data that is distributed across multiple computers, whether closely located or more distant. Read more

Overview

Modern devices often rely on data that is distributed across multiple computers, whether closely located or more distant. Developing software for such systems offers many benefits, but it also poses new challenges to be overcome, particularly in guaranteeing the security and robustness of the communication between devices.

The MSc at Hull is designed to enable you to overcome those challenges. It prepares you to exploit the extraordinary potential of distributed systems, both in terms of storage capacity and processing power, whilst being aware of the unique constraints and security problems they introduce. You will have access to cutting-edge equipment and facilities, and you will finish with a much greater understanding of how software development needs to adapt to the unique environment of a distributed system. These skills and knowledge are highly sought-after in an industry that is increasingly adopting new distributed technology, such as cloud-based solutions.

The course begins in September each year and lasts twelve months. There are two trimesters of taught modules, followed by an individual dissertation project during the third trimester. There is an option to take an extra trimester – either immediately before or after the dissertation – gaining industrial experience through a module based in SEED, our software development unit working with commercial clients and software. This is unique to Hull.

The Department of Computer Science creates an excellent experience for students, with a supportive student community. We have an international reputation for our research activities, with a strong record of industrial and public grant funding. We are also affiliated with Microsoft’s DreamSpark programme, which allows you to access the latest Microsoft operating systems and development software for home use. Once registered with the department, you can download the software free of charge.

Industrial Experience

There is the option to take an Industrial Experience variant, with the opportunity to extend the period of study by a trimester, to gain experience of working alongside commercial software developers within a commercial software development facility on site (SEED), promoting real-world applications of the advanced concepts met in the course.

Study

The MSc Computer Science (Security and Distributed Computing) programme supports students with various levels of computing and programming practice experience, with material that supports the transition into the postgraduate environment. There is also suitable content on professional skills and the importance of ethics for practising computer scientists.
As a route into research, the programme supports the development of postgraduate technical skills, alongside critical research, analysis and planning activities.
In lectures you’ll benefit from a range of techniques, from interpreting complex ideas through interactive discussions, to live programming or other problem-solving demonstrations.
Core modules
• Oriented Design and Development Using C++
• Component-based Architecture
• Network Security
• Development Project
• Distributed Applications
• Trustworthy Computing
Optional modules
• Computer Science Software Development Practice (pass/fail module)
• Dissertation (There is the option of taking this module either in trimester 3 or trimester 4, depending on whether you take the Industrial Experience module.)
• The Industrial Experience optional 60-credit single trimester module allows students to gain significant commercial experience.

Teaching and learning

We place a strong emphasis on practical laboratory sessions. This will significantly develop your core computer science skills, and enhance your employability through exposure to commercial projects.
As teamwork plays a key role in commercial software development and has great value as an employable skill, group work is used in a number of modules.

Assessment

Practical coursework is the main form of assessment, and you will design, build and test software solutions to a variety of problems. This is complemented by written coursework.
The largest assessment is the dissertation, which is based on the work done in the third trimester (or fourth, depending on your option choices) and documented in a report of up to 20,000 words.

Careers

The MSc Computer Science (Security and Distributed Computing) is designed to open up pathways to postgraduate research, as well as careers in a wide range of areas within your discipline. The industrial placement option will enable you to practise your skills and knowledge of computer science ‘in situ’, giving you a useful insight and advantage when it comes to starting your career.
We have a range of inspirational extra-curricular activities including the Three Thing Game, Imagine Cup Worldwide Software Development Challenge, Really Useful Seminars and Global Game Jam. They are designed to boost your CV and employability, and taking part costs very little.

Our graduates typically gain roles including: Applications Developer, Business Systems Analyst, Computer Analyst, Computer Programmer, Computer Operations Manager, Data Management Analyst, Database Assistant, Developer Support Engineer, Games Programmer, Games Programmer (Engine design), Information Manager, IT Design, IT Systems Manager, IT Technician, IT user Support, Mobile Developer, Operations Director, Software Designer, Software Developer, Software Engineer, Solutions Developer, Systems Engineer, Technical Sales, Technical Specialist, Web Developer.

Read less

Show 10 15 30 per page



Cookie Policy    X