• Aberystwyth University Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • University of Bristol Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Northumbria University Featured Masters Courses

Postgrad LIVE! Study Fair

Birmingham | Bristol | Sheffield | Liverpool | Edinburgh

University of Hertfordshire Featured Masters Courses
University of Cambridge Featured Masters Courses
Cass Business School Featured Masters Courses
Imperial College London Featured Masters Courses
London School of Economics and Political Science Featured Masters Courses
"system" AND "security"×
0 miles

Masters Degrees (System Security)

We have 377 Masters Degrees (System Security)

  • "system" AND "security" ×
  • clear all
Showing 1 to 15 of 377
Order by 
Visit our website for more information on fees, scholarships, postgraduate loans and other funding options to study International Security and Development (Extended) at Swansea University - 'Welsh University of the Year 2017' (Times and Sunday Times Good University Guide 2017). Read more

Visit our website for more information on fees, scholarships, postgraduate loans and other funding options to study International Security and Development (Extended) at Swansea University - 'Welsh University of the Year 2017' (Times and Sunday Times Good University Guide 2017).

The MA in International Security and Development introduces students to issues and debates within International Security. This includes coverage of both ‘traditional’ security issues such as war and conflict and ‘non-traditional’ issues such as economic security, environmental security, health, identity and migration.

Key Features of MA in International Security and Development

Issues of security, violence and conflict have become central to international politics and to development policy and discourse. In order to comprehend the modern world, a full appreciation of the realities of conflict and violence, has become essential.

Drawing on the Department’s expertise in the field of security, International Security and Development students are also provided with an advanced introduction to key approaches in the study of security including realism, securitization theory, feminist approaches, critical theory and poststructuralism.

Students enrolled on the MA in International Security and Development benefit from the College of Arts and Humanities' Graduate Centre. The Graduate Centre fosters and supports individual and collaborative research activity of international excellence and offers a vibrant and supportive environment for students pursuing postgraduate research and taught masters study including those in International Security and Development. The Centre provides postgraduate training to enhance academic and professional development and facilitates participation in seminar programmes, workshops and international conferences.

The full-time International Security and Development course structure is split across the year with three modules taken in each academic semester (a total of six modules) and then a dissertation over the summer. Students study four compulsory modules, the research module and one optional module. The dissertation is written on a specialist research topic of the student's choosing.

Part-time study in MA in International Security and Development is available.

The Extended MA (EMA) in International Security and Development is a 240-credit postgraduate qualification that is equivalent to 120 ECTS (European Credit Transfer System) and is thus a recognised Masters qualification throughout the European Union. The EMA is a standard UK MA plus an additional 60 credits (30 ECTS) and this additional coursework is undertaken in one semester at a partner institution overseas. The EMA in International Security and Development is therefore not only an EU recognised postgraduate qualification it also adds a study abroad experience thus enhancing the qualification’s employability credentials.

The partner institution for EMA International Security and Development is the Department of International and Area Studies at The University of Oklahoma. The Department of International and Area Studies is an exciting and rapidly growing academic unit within the University of Oklahoma. It has approximately twenty faculty members and, critically for this EMA in International Security and Development, their expertise lie within the fields of security and development. The University of Oklahoma Norman Campus is located approximately 20 minutes south of Oklahoma City on a breathtaking campus. Created in 1890 The University of Oklahoma enrols more than 30,000 students, it has achieved the Carnegie Foundation’s highest tier of research activity classification, and is ranked in the top 400 universities in the world according to the Times Higher rankings.

MA in International Security and Development Programme Aims

- To develop advanced knowledge and understanding of International Security and Development.

- To develop critical, theoretical and analytical skills, improve written and oral communication skills.

- To acquire research skills in International Security and Development.

Modules

Modules on the MA in International Security and Development typically include:

• Violence, Conflict and Development

• Critical Security

• International Security in the Asia Pacific

• Civil Society and International Development

• Approaches to International Relations

• War, Identity and Society

• Governance: From State Formation to Global Governance

• War in Space

• State of Africa

• Human Rights and Humanitarian Intervention

• Rights Based Approaches to Development

Who should Apply?

Students interested in International Security and Development, from a politics, international relations, development studies, law, humanities, social science, international business or related background. Students interested in preparation for postgraduate research, MPhil or PhD, or who wish to develop skills and knowledge related to International Security and Development.

Careers

Career expectations are excellent for International Security and Development graduates. MA in International Security and Development degree holders may move on to doctoral study or enter employment sectors such as the diplomatic corps, the armed forces, intelligence and risk analysis, relief and humanitarian organisations, law and finance, government and politics and international business.

Research Interests

The following research groups at Swansea provide a distinct international and multi-disciplinary forum for the advancement of the

study of international security and development including:

• International Relations & Security

• Development Studies

• Cultural Political Economy

• Policy and Governance

• International Communication

Regular research seminars and lectures are run through these groups and also through the Research Institute for Arts and Humanities (RIAH) which students are encouraged to attend.

Student Quote

“I am now in my fourth year at Swansea University and can honestly say that I have enjoyed every moment. My undergraduate years were so good that I choose to stay on for another year to complete my Masters in International Security and Development and this is a decision I certainly do not regret. I feel like my degree has provided me with the tools needed to thrive in the world of employment, and the MA in International Security and Development I am now studying towards will only improve my chances of getting a high end job.”

Chris Harber, International Security and Development, MA



Read less
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World. The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. Read more
This Masters course provides you with the professional skills for practising Cyber Security in the Digital World.

Who is it for?

The course is designed for those who wish to extend their capability for an accelerated early career in cyber/information security. It will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security.

The course would suit students who have completed a first degree in a computing subject (e.g. computer science, business computing) or a numerate subject (e.g. applied mathematics, engineering, physics) if that covered a significant computing component.

Objectives

The primary objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
-In semester 1, you become an ethical hacker. You are challenged to identify flaws in computer system by breaking its crypto components and retrieve sensitive information of an e-commerce company.
-In semester 2 you become an investigator. You are challenged to analyse network traffic, logs and detect attacks in a company's network. It is essential to trace hackers and bring them to justice with concrete proofs and reporting.

Academic facilities

The Department of Computer Science has invested in the design and implementation of a virtual laboratory (CybSec) for the purpose and needs of the cyber security course. In particular, CybSec is a virtual networked lab where hacking, penetration testing, malware analysis, security monitoring are taking place in a controlled and isolated environment without violating City's IT Policy. In addition, the security analysis of practical cryptosystems requires high computational power and resources that are used for code breaking. CybSec lab supports our teaching efforts and enhances our research strengths.

Placements

You will be offered the opportunity to complete up to six months of professional experience as part of your degree.

Our longstanding internship scheme gives you the chance to apply the knowledge and skills gained from your taught modules within a real business environment. An internship also provides you with professional development opportunities that enhance your technical skills and business knowledge.

Internships delivered by City, University of London offer an exceptional opportunity to help you stand out in the competitive IT industry job market. The structure of the course extends the period for dissertation submission to January, allowing you to work full-time for up to six months. You will be supported by our outstanding Professional Liaison Unit (PLU) should you wish to consider undertaking this route.

The Cyber Security programme also offers internships in collaboration with our alliance of companies in security related jobs.

Teaching and learning

The MSc in Cyber Security is a one year full-time course. On completion of eight taught modules and an individual project you will be awarded a Master of Science (MSc) degree.

The teaching and learning methods used are such that the levels of both specialisation of content and autonomy of learning increase as you progress through the programme. This progress will be guided by active researchers in cyber security, culminating in an individual project, an original piece of research, conducted largely independently with appropriate academic supervision.

The standard format is that taught modules are delivered through a series of 20 hours of lectures and 10 hours of tutorials/laboratory sessions.

Lectures are normally used to:
-Present and explain the theoretical concepts underpinning a particular subject
-Highlight the most significant aspects of a module's syllabus
-Indicate additional topics and resources for private study.

Tutorials are used to help you develop skills in applying the concepts covered in the lectures of the relevant module, normally in practical problem solving contexts. Laboratory sessions serve a similar purpose as the tutorials but their strategy is to demonstrate application of concepts and techniques through the use of state-of-the-art software development tools and environments.

You will be expected to undertake independent study and do substantial coursework assignments for each module, amounting approximately to 120 hours per module. The coursework takes many forms, including programs, theoretical work, and essays, and is primarily formative, but also contributes to module assessment.

Coursework will be used in a coherent manner across all of the security specific modules to ensure that you will also get appropriate hands-on operational experience of relevant aspects of cyber-security, including testing and analysis. Some of this course work may be organised in ways that shadow larger scale exercises, such as the Cyber-Security Challenge. The individual project (full-time) is carried out over the summer period, and if done without a placement, lasts approximately 14 weeks or 600 hours. If undertaken within an industrial or research placement, the project period extends to up to six months.

Modules

This course covers core areas of masters level computer science, such as research methods and scientific presentation and analysis skills.

It will enable you to specialise in some aspects of the area of cyber security with modules such as cryptography, network security, information security management, security audit and certification. You will engage with researchers to develop your scientific knowledge and skills. We offer options within the programme that allows you to develop your expertise in cyber crime, digital forensics, socio-technical aspects of security.

There are in total eight taught modules; six core and two elective modules with a full time individual project completed over the summer. You will choose electives to tailor the programme to your chosen career path.

In particular, the project component gives you an opportunity to carry out an extended piece of work at the cutting edge of games technology under the supervision of one of our specialist academic and research staff. Internship-based projects are also available.

Core modules
-Information security management
-Network security
-Security auditing and certification
-Cryptography
-Readings in Computer Science
-Research methods and professional issues
-Individual project (June to September or December)

Elective modules
-Digital forensics
-Cyber crime
-Sociotechnical systems security
-Advanced algorithms and data structures
-Data visualisation

Career prospects

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security.

The course is designed for those who wish to extend their capability for an accelerated early career in cyber security.

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more

The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

About this degree

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits.

The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules

  • Computer Security I (15 credits)
  • Computer Security II (15 credits)
  • Introduction to Cryptography (15 credits)
  • Research in Information Security (15 credits)

Optional modules

Students choose 60 credits from the following:

  • Applied Cryptography (15 credits)
  • Cryptanalysis (15 credits)
  • Cybercrime (15 credits)
  • Distributed Systems and Security (15 credits)
  • Information Security Management (15 credits)
  • Language Based Security (15 credits)
  • Malware (15 credits)
  • People and Security (15 credits)
  • Philosophy, Politics and Economics of Security and Privacy (15 credits)
  • Privacy Enhancing Technologies (15 credits)

Please note: the availability and delivery of optional modules may vary, depending on your selection.

Dissertation/report

All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning

The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Further information on modules and degree structure is available on the department website: Information Security MSc

Careers

UCL graduates are keenly sought after by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Recent career destinations for this degree

  • Information Security Expert, State Oil Company of Azerbaijan Republic
  • IT Risk and Cyber Security Associate, PwC
  • PhD Research Student in Computer Science, UCL
  • Security Engineer, Morgan Stanley
  • Technical Analyst, The Royal Bank of Scotland (RBS)

Employability

Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts arise through the ACE-CS guest lecture series integrated into the degree.

Careers data is taken from the ‘Destinations of Leavers from Higher Education’ survey undertaken by HESA looking at the destinations of UK and EU students in the 2013–2015 graduating cohorts six months after graduation.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research.

UCL received the highest percentage (96%) for quality of research in Computer Science and Informatics in the UK's most recent Research Excellence Framework (REF2014).

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. 

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Accreditation

Information Security has been successfully awarded full certification from the National Cyber Security Centre (NCSC). Students who wish to gain the certification with their degree need to choose COMPGA14 Information Security Management as one of their optional modules.

Research Excellence Framework (REF)

The Research Excellence Framework, or REF, is the system for assessing the quality of research in UK higher education institutions. The 2014 REF was carried out by the UK's higher education funding bodies, and the results used to allocate research funding from 2015/16.

The following REF score was awarded to the department: Computer Science

96% rated 4* (‘world-leading’) or 3* (‘internationally excellent’)

Learn more about the scope of UCL's research, and browse case studies, on our Research Impact website.



Read less
The Master of European Social Security is a one-year advanced master's programme organised by KU Leuven's Faculty of Law dealing with the area of social security in its broadest sense, including cash benefit schemes, pensions and health care systems. Read more

The Master of European Social Security is a one-year advanced master's programme organised by KU Leuven's Faculty of Law dealing with the area of social security in its broadest sense, including cash benefit schemes, pensions and health care systems.

What is the Master of European Social Security all about?

The programme provides an in-depth study of social security and social protection from a legal, economical, sociological, administrative and philosophical perspective. In addition to being multidisciplinary, the curriculum contains a strong comparative and multinational component focusing on the provision of social protection rights across Europe. This gives you the opportunity to understand the many different approaches to social security that co-exist within our old continent. At the same time, you will gain a better understanding of your own national system. The programme also includes careful study of the role of international bodies such as the European Union.

As a student in the programme, you become part of an international network of experts in the field of social security. Students come from various European countries and beyond and have different academic backgrounds. The teaching staff consists of renowned professors from KU Leuven and other European universities specialising in various disciplines related to social security.

Structure

The programme comprises 60ECTS and starts with the summer school in August. The programme concludes the following academic year (July of next year).

The Master's programme is offered in two options:

  • a more practice-oriented track
  • a research-oriented track

The two tracks share 30 ECTS in common coursework and 30 ECTS in specialised, track-specific coursework.

Admission to the research-oriented track is based on your end results of the examinations organised at the end of the Executive Summer School and is subject to the decision of an Academic Selection Committee. Only a maximum of six students are admitted to this track every year.

The classes and workshops organised in Leuven (Belgium) are grouped into a limited number of weeks. Remaining coursework is completed via digital learning platform. The platform connects you to Europe's best lecturers who guide you through their specially designed course materials remotely.

This unique teaching platform offers the best of both worlds: an authentic university experience at one of Europe's foremost universities during your two stays on campus and the flexibility to complete the majority of the programme from home. Throughout the programme, you will be connected to a unique international network of universities and be in contact with teaching staff and fellow participants from all over Europe.

Is this the right programme for me?

The ideal prospective student should:

  • have a good knowledge of his/her own social security system and its workings;
  • be able to formulate research questions and carry out corresponding research in the area of social security;
  • have an open attitude toward other scientific disciplines and other national social security systems;
  • have good English language skills. (There are no special arrangements made for improving language skills during the programme.);
  • be able to collect relevant information about his/her own social security system and evaluate this information as to its quality and relevance for the research questions being dealt with;
  • be able to critically evaluate national social security research within his/her mono-discipline;
  • have the ability to form an opinion about social security issues, motivate it with scientific arguments and formulate it in a debate with others;
  • hold an appropriate degree in a social security-related discipline. (Very occasionally, students with an academic education in other disciplines but who possess long-term experience in an area of social security and research skills may be admitted the programme.)

While all prospective students should have knowledge of social security acquired by study, those with practical experience, e.g. experience working in a social security administration, are particularly valued. Some previous exposure to European social affairs and/or foreign social security systems is also helpful.

Objectives

The programme is a specialised, research-based education, dealing with the area of social security in its broadest sense. It provides the students with an in-depth study of social protection from a legal, economic, sociological and administrative perspective, confronting the students with the most recent research and several national backgrounds, thus stimulating individual reflection.

At the end of the programme the participants should be able to :

  • design and carry out individual research projects in the area of social security, as well as participate in the conception, execution and supervision of team research;
  • put their national/monodisciplinary approach in a broader perspective by including other disciplines and abandoning a merely national point of view;
  • recognise national and temporal contingencies from essential social security boundaries;
  • take up unfashionable positions if their research so demands;
  • take part in and position themselves on a good multidisciplinary and comparative basis in any debate concerning social security issues;
  • deliver results and opinions that contribute to the advancement of social security related research in Europe;
  • translate research results to the broader public;
  • make research results relevant for policy making; be able to translate questions from policy-makers into research questions, deal with them and explain the results to policy-makers.

Career perspectives

Graduates are professionally active in areas related to social security (social or private insurance institutions, social administrations, social and economic policy-makers).



Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area. Read more
Interest in computer security is booming - from whistle-blower Edward Snowden to the News of the World phone-hacking scandal, the increase in cybercrime has led to a demand for experts in this area.

That's why we've designed this online course - it's your opportunity to learn how to protect and safeguard the information stored on digital devices around the world.

You will gain hands-on experience in a virtual environment, learning how to hack into machines to test their security in a safe and legal system, connecting to a remote machine from your PC or laptop.

Our course will take your existing computing knowledge and develop your security expertise, with in-depth focus on penetration testing and ethical hacking. We'll teach you how to break systems in order to tighten the security and stop others from breaking into them, and develop new ways of protecting a company's security.

You will also study other key areas of computer security such as authentication, access control, malware, vulnerabilities, secure coding, sandboxing and virtualisation.

- Research Excellence Framework 2014: our University demonstrated strength in five emerging areas of research which it entered into the assessment for the first time, including computer science.

Visit the website http://courses.leedsbeckett.ac.uk/computer_security

Mature Applicants

Our University welcomes applications from mature applicants who demonstrate academic potential. We usually require some evidence of recent academic study, for example completion of an access course, however recent relevant work experience may also be considered. Please note that for some of our professional courses all applicants will need to meet the specified entry criteria and in these cases work experience cannot be considered in lieu.

If you wish to apply through this route you should refer to our University Recognition of Prior Learning policy that is available on our website (http://www.leedsbeckett.ac.uk/studenthub/recognition-of-prior-learning.htm).

Please note that all applicants to our University are required to meet our standard English language requirement of GCSE grade C or equivalent, variations to this will be listed on the individual course entry requirements.

Careers

Whether you are already in computing and looking to move more into security, or a student who has just finished a computing related degree, our course will give you the skills to protect the information held by businesses across every sector, giving your career global potential.

Computer security is essential in enabling the protection and trust required for business and society to effectively operate. As a graduate who can devise, develop, manage, and implement computer security, your expertise will be in demand.

- Penetration tester (System, network, web, application)
- Security architect
- Malware analyst
- Director of security

Careers advice:
The dedicated Jobs and Careers team offers expert advice and a host of resources to help you choose and gain employment. Whether you're in your first or final year, you can speak to members of staff from our Careers Office who can offer you advice from writing a CV to searching for jobs.

Find out how to apply here - https://www.leedsbeckett.ac.uk/employability/jobs-careers-support.htm

Course Benefits

To successfully protect organisations you're going to learn how to hack into machines, introduce viruses, and break systems. However, for legal, ethical, and moral reasons we don't want you doing this on your own machines. That's why we provide you with a learning environment that will allow you to connect to a remote machine, providing you with a virtual environment to practise what you learn.

This is a course that can be studied from the comfort of your own home. It is taught entirely online, providing you with practical scenarios in which you can role-play as an IT security professional.

A virtual learning environment is provided which will host all the relevant material for the course and, where appropriate, weekly online lectures or tutorials will be given.

Resources via our Library Online will also be available to you, such as online journals and ebooks.

Modules

Research Practice
Develop the skills required in order to carry out Masters level research successfully, and to reflect on your own development.

Dissertation
An opportunity to engage in research in a subject area that is of particular interest to you and relevant to the course.

Project Management
Develop your ability to initiate, plan, execute, manage, and sign off a project.

Principles of Digital Security
Build your knowledge of security schemes and techniques for protecting and confining users, programs, systems, and networks.

Hacker Techniques Tools & Incident Handling
Examine the landscape, key terms, and concepts that security professionals need to know about hackers and computer criminals who break into networks, steal information, and corrupt data.

Security Strategies for Web Applications and Social Networks
Learn security monitoring techniques, methods for recovering from security breaches, and investigation methods to identify the specifics of what has occurred.

Network Security, Firewalls and VPN?s
A comprehensive look at the major business challenges and threats that are introduced when an organisation's network is connected to the internet.

Facilities

- Library
Our libraries are two of the only university libraries in the UK open 24/7 every day of the year. However you like to study, the libraries have got you covered with group study, silent study, extensive e-learning resources and PC suites.

- Broadcasting Place
Broadcasting Place provides students with creative and contemporary learning environments, is packed with the latest technology and is a focal point for new and innovative thinking in the city.

Find out how to apply here - http://www.leedsbeckett.ac.uk/postgraduate/how-to-apply/

Read less
International Security (IS) is a field of study concerned with questions about war and peace, life and death, safety and survival. Read more

International Security (IS) is a field of study concerned with questions about war and peace, life and death, safety and survival. Traditionally its terrain has focused on concerns about the stability of the states’ system, the use of force, nuclear proliferation, military strategy, intelligence and the distribution of resources. Today, however, concerns about climate change, migration, poverty, health, privatisation, organised crime and international terrorism are also on the agenda. The MA in International Security at the University of Warwick is one of the most comprehensive international security graduate programmes in the country taught by staff at the cutting edge of international security research.

Programme content

The MA core module ‘Concepts and Theories of International Security’ provides a comprehensive grounding in the main theoretical approaches within the field of international security, using these to explore the most pressing issues on the international security agenda . Through emphasising the engagement between ‘traditional’ and ‘critical’ approaches to security the module is designed to foster critical and reflective thinking by encouraging students to ask more fundamental questions about international security such as:

  • What does security mean?
  • Whose security are we talking about?
  • Which issues should be considered security issues?
  • What role does security play in contemporary political life?
  • Can security be achieved, and how, in both practical and philosophical terms?

Students on the MA in International Security are in turn able to choose from a broad range of cutting edge modules with a diverse thematic and geographic focus. PAIS has further supported students on the MA programme to organise a series of Graduate Conferences on International Security, while the Department also regularly hosts high profile speakers and organises public debates through its International Security research group.



Read less
An increasing number of organisations store, manipulate and communicate valuable and confidential information electronically. However, a number of threats compromise the security of this information. Read more
An increasing number of organisations store, manipulate and communicate valuable and confidential information electronically. However, a number of threats compromise the security of this information.

The MSc Information and Network Security aims to produce computing specialists who are able to design and maintain secure information systems and networks.

Visit the website: http://www.rgu.ac.uk/computing/study-options/part-time-learning/information-and-network-security

Course detail

This course is designed to satisfy the demands of industry and IT providers for software developers and computing practitioners who:

• know the legal requirements of information security and are able to implement current information security standards;
• are proficient in the use of state-of-the-art principles, techniques, tools and methodologies for& the design, implementation and maintenance of secure information systems;
• are able to design and maintain secure computer networks;
• can safely recover an information system or network from a successful security attack.

Modules

- Computer Security
- Database Security
- System Programming and Security
- Network Management (CISCO CCNA)
- Network Security
- Web System Development
- Professional Development and Research Skills
- Project

Format

Throughout the course, content is complemented by practical work, allowing you to support your theoretical development by providing real-life simulation. You will be taught through a mixture of lectures, tutorials, labs and external speakers. You will also be supported through our online virtual learning environment where you can access a wide variety of resources and other support materials.

The course will include industry sessions.

The individual project provides an opportunity for applying specialist knowledge together with analytic, problem-solving, managerial and communication skills to a particular area of interest within the secure information systems and networks. Working with the full support and guidance of an allocated project supervisor, you will be given the opportunity to propose, plan, specify, develop, evaluate, and present a substantial project.

Placements and accreditations

Students who perform particularly well during their first semester of studies will be invited to apply for a 45-week internship.

Careers

The course prepares you for a career in information and network security. Job openings include: IT security engineer, information and data security analyst, network manager, IT security developer, IT risk and fraud specialist and e-business security analyst.

Aberdeen is home to many multinational oil and gas companies and associated suppliers such as mainstream software houses, IT providers to major oil-related companies, specialist software consultancies, and venture capital start-ups.

The university is involved in a number of commercial collaborations on a local, national and international scale with organisations such as BP, British Geological Survey, Wood Group PSN, Accenture, WIPRO and many Aberdeen-based software development companies.

The course also prepares students for research careers by providing the skills necessary of an effective researcher. Suitable MSc graduates may continue to PhD programmes within the school.

How to apply

To find out how to apply, use the following link: http://www.rgu.ac.uk/applyonline

Funding

For information on funding, including loans, scholarships and Disabled Students Allowance (DSA) please click the following link: http://www.rgu.ac.uk/future-students/finance-and-scholarships/financial-support/uk-students/postgraduate-students/postgraduate-students/

Read less
Intelligence issues in the context of the global security framework are a vital component of the global agenda, with an ever-widening range of threats emerging and mutating across the globe. Read more
Intelligence issues in the context of the global security framework are a vital component of the global agenda, with an ever-widening range of threats emerging and mutating across the globe. This distance learning course is taught in partnership with Informa via their online learning platform. It will not only equip you to analyse these types of problems but will also help you to grasp the important inter-disciplinary links with international relations. These skills will open up countless career opportunities and enable you to engage with institutions and individuals central to this area.

More about this course

More than ever before, national governments, international agencies and major corporations recognise the need for personnel with a strong grasp of intelligence and security issues who can also demonstrate exceptional skills of research and analysis. This postgraduate intelligence and security studies distance learning programme is taught in partnership with Informa via their online learning platform. It will equip you to analyse these types of problems and help you to place them in the context of broader military, strategic and political considerations.

You will gain a solid academic grounding in the fields of security studies, terrorism and intelligence and you'll gain critical thinking skills needed to make sense of the ever-changing global security agenda. These skills will enable you to engage with institutions and individuals central to this area.

During your studies you'll explore emerging paradigms within intelligence studies, security and security studies and analyse justifications for the increasing ‘securitisation’ of social life. You'll have the opportunity to assess important security and intelligence events and issues of the twentieth and twenty-first centuries and connect the conceptual basis of the discipline to some of the practical issues facing the international system.

You'll also review some of the emerging security threats and issues pertaining to law enforcement, government agencies and the private sector. These include a critical view of threats from terrorism, organised crime, radicalisation and intelligence failures and an assessment of security strategies such as horizon scanning.

To successfully complete the course you must pass each module. Assessment will incorporate coursework, online examinations, research assignments and essays. You'll be expected to participate in the virtual learning environment with tutors and fellow students.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Contemporary Issues in Crime, Safety and Security (core, 20 credits)
-History of Intelligence: Successes and Failures (core, 20 credits)
-Intelligence Analysis (core, 20 credits)
-International Financial Crime and Security (core, 20 credits)
-Security Studies (core, 20 credits)
-Security Studies Dissertation (core, 60 credits)
-Terrorism and Counter Terrorism (core, 20 credits)

After the course

The course is of special benefit to anyone wishing to work for a public, private or international organisation.

Typical career destinations might include the security sector, the military, local and public services, journalism or positions within institutions such as the European Union or the United Nations. In addition to this, the course is particularly valuable if you're interested in policy issues.

It is ideal for those whose career plans will involve dealing with international security affairs and would benefit from a solid academic grounding in the field.

Read less
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. Read more
Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies, including:
-EnCase, FTK and open-source forensic tools, and a dedicated forensics computer laboratory
-Specialist input from guest lecturers
-Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high-bandwidth networks
-Specialist technicians to ensure you can get the most out of these technologies

Course content

All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.

The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.

Teaching methods include lab-based sessions, student-led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research-based course work.

Modules

The following modules are indicative of what you will study on this course.
-COMPUTER FORENSICS FUNDAMENTALS
-COMPUTER SYSTEM TOOLS
-EVIDENCE AND PROCEDURE
-NETWORK SECURITY
-POSTGRADUATE PROJECT MODULE
-RESEARCH METHODS

Digital Forensics pathway
-DATA RECOVERY AND ANALYSIS
-ADVANCED COMPUTER FORENSICS

Cyber Security pathway
-CYBER SECURITY
-THREATS AND COUNTERMEASURES

Associated careers

Depending on their chosen pathway graduates of the course are expected to find employment as information security/senior security officers and related cyber security roles or more technical roles investigating threats and safeguarding digital assets their life-cycle. Such roles will range from supporting industry, the public sector in general and the police and law enforcement agencies specifically, while some may focus more on researching new security threats and countermeasures. Additional also arrive for a supportive alumni community, including graduates with work experience who use their new skills and qualification to progress their career to more senior posts.

Read less
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. Read more
Information Technology is a strategic resource within any business and is critical to the survival and success of an organisation and should therefore be carefully managed. A key issue in IT strategy is Information Security, which is becoming more critical with the interconnection of systems through the Internet and the sharing of resources with business partners, clients and customers.

This Masters degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management.

You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.

What will I study?

You will study security from two perspectives: the concepts of computer and network security, together with a systemic approach to information security management. The programme of study is informed by ISO27000 legal compliance requirements and professional body knowledge requirements of ISACA (Information Systems Audit and Control Association), ITIL (Information Technology Infrastructure Library) and the Information Systems Security Certification Consortium (ISC)2. The study of computer forensics enables further specialisation.

IT Management is approached from a strategic and risk-based perspective, and includes business continuity and project management. A recent technology development that could have radical impact in both security and IT management is cloud computing, and the course provides an option to enable you to develop a sound understanding of the related issues and technology. Professional, ethical and contemporary issues in computing and research methods are also integrated into the programme.

How will I study?

The course is delivered primarily as taught modules. Each module typically involves a 3-hour face-to-face seminar every week for 12 weeks. You will study three modules each semester on the full-time programme, requiring attendance two days per week. For part-time students, modules are scheduled to enable evening study over two years.

Learning and teaching involves a variety of techniques, including lectures, case studies, problem-based learning, guest lectures from industry experts, student-led seminars and technology-enhanced learning (e.g. Virtual Learning Environment, wiki). Classes are highly interactive, with practical application of concepts a key factor, as well as cases drawn from real-life. The MSc Information Security and IT Management is designed around small groups so you can be sure that you will have plenty of individual discussion with your tutors.

How will I be assessed?

Throughout the programme we will assess your vocational capability, academic critical thinking and intellectual development. Coursework, case studies, problem-solving exercises and exams may be used. You may be assessed individually or in a group.

Who will be teaching me?

You will be taught by highly qualified, experienced and enthusiastic academics who are research-active and regularly engage within the wider business and academic environment. Staff specialise in particular subjects so you will benefit from a wide range of knowledge and experience.

What are my career prospects?

The MSc in Information Security and IT Management will provide you with the skills and knowledge to develop your interests as an IT security professional and IT manager. As organisations become ever more dependent on IT, there are increasing opportunities for specialist positions related to security. The course provides knowledge and skills which underpin Information Systems Security Certification Consortium or (ISC)2 and ISACA certifications.

Read less
This course is available full-time over one year, or part-time over three years. It is made up of 8 assessed modules taught in week-long blocks and an individual project module. Read more
This course is available full-time over one year, or part-time over three years.

It is made up of 8 assessed modules taught in week-long blocks and an individual project module.

This course is suitable for those with a Computer Science related degree and is for those students who already possess a strong computer science, software engineering or information technology background.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face.

Our new MSc in Cyber Security is a forward-looking course that gives you the skills and knowledge you need in the core areas of cyber security. It emphasises the important technical material that will help you make effective cyber security decisions, and addresses issues such as:
-Identity
-Trust and reputation
-Cryptography
-Network security
-Malware and intrusion detection
-Risk management
-Development of high assurance systems

If you are looking to follow a career in industry or government, this course will provide you with a broad education in cyber security, that allows you to make technically informed principled decisions. This course will also prepare you if you are seeking a research career in cyber security - a research skills module is a mandatory part of the course.

It has been designed for students who already possess a strong computer science, software engineering or information technology background who want to broaden their knowledge about the specific challenges in cyber security and of possible solutions to those challenges.

Course structure
The MSc in Cyber Security is offered as a one-year full-time course, or can be taken part-time over three years.

The first half of the course is taken up by taught modules. Each module comprises a mix of lectures, problem classes and practical classes, plus a personal study time. In the second half of the course, students undertake an individual research project under the supervision of a member of staff.

Course aims
-To educate students in the theories, principles, practices and technologies of cyber security.
-To provide the knowledge and understanding of the principles underpinning effective approaches to cyberdefence.

Learning outcomes
When you graduate from the MSc in Cyber Security, you will have developed a detailed understanding of the fundamental aspects of cyber security. The course emphasises the important technical material that must be understood in order to make effective cyber security decision making.

You will understand extant threats to current and emerging system types, and understand and be familiar with a range of technologies that can be brought to bear to reduce risks.

This course will equip you for a career in industry or government, particularly in strategic cyber security decision making, or if you are seeking a research career in this area.

Project

The dissertation project undertaken by students over the summer is carried out individually, supervised by a member of academic staff. It may involve working with an external organisation. Students are also encouraged to work with academic staff to create projects of interest to them.

All projects are vetted to ensure suitability for the MSc. Provided academic criteria are met, there is considerable flexibility in the choice of cyber security topics for the project. Though many projects may follow naturally from the taught material, projects may also investigate suitably challenging topics outside that material.

The outputs from this module are a project dissertation together with a conference paper length summary of the work.

Projects are worth 5/9 of the total mark for the MSc.

Read less
As you work towards your Master of Cyber Security (MCS), you'll develop a thorough understanding of the technical, legal, policy and management aspects of cyber security. Read more

As you work towards your Master of Cyber Security (MCS), you'll develop a thorough understanding of the technical, legal, policy and management aspects of cyber security. You'll learn about cloud computing technologies and computer infrastructure, as well as the law relating to cyber security.

You'll gain skills relating to detecting security breaches, preventative security and offensive security. This includes computer system penetration testing. You'll learn how to think innovatively and develop the ability to apply your knowledge so you can work at an advanced level as a professional in cyber security.

When you study cyber security at Waikato, you'll have the opportunity to work with, and learn from award-winning cyber security experts such as Dr Ryan Ko.  Our academics also have strong international connections with industry and government, such as the National Cyber Policy Office and INTERPOL.

Course Structure

For students with an undergraduate degree, this degree requires a total of 180 points consisting of 75 points of compulsory 500 level taught papers, a 60 point dissertation, and another 45 points of appropriate 500 level taught papers. Students with an honours degree or a postgraduate diploma are required to do the compulsory taught papers and the 60 point dissertation.

* Students are to choose at least one from the following three Infrastructure papers (15 points):

(a) COMP501 Topics in Operating Systems

(b) COMP513 Topics in Computer Networks

(c) COMP514 Carrier and ISP Networks

**45 points of appropriate 500 level computer science papers.

***Capable students may opt for COMP593 Computer Science Thesis (90 points) as an alternative to COMP592, subject to the Dean's approval. This will result in 15 points remaining for a relevant 500 level paper, on top of the compulsory 15 point Infrastructure paper

Computing facilities at Waikato

The computing facilities at the University of Waikato are among the best in New Zealand. You'll have 24 hour access to computer labs running the latest industry standard software.

The University of Waikato is also home to New Zealand’s first cyber security lab, where the Cybersecurity Researchers of Waikato (CROW) operate from – the creators of the annual New Zealand Cyber Security Challenge.

Build a successful career

Demand for trained professionals in cyber security is increasing globally at 3.5 times the rate of the overall job market. Once you've completed your training in this area, you'll be qualified to do a number of different types of roles in an industry with a 'near zero' unemployment rate.

Our graduates are in high demand and most of our alumni work in the top public and private organisations in New Zealand and internationally – like Sjoerd de Feijter, who is now a Junior Software Engineer for multinational corporation Gallagher.

Career opportunities

  • Chief Information Security Officer
  • Entrepreneurs of new security products and service
  • Penetration Testers/ Security Assessment Consultants
  • IT Security Consultant


Read less

Show 10 15 30 per page



Cookie Policy    X