• Swansea University Featured Masters Courses
  • Jacobs University Bremen gGmbH Featured Masters Courses
  • Ross University School of Veterinary Medicine Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • Anglia Ruskin University Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • University of Southampton Featured Masters Courses
King’s College London Featured Masters Courses
Queen Mary University of London Featured Masters Courses
Queen’s University Belfast Featured Masters Courses
University of Reading Featured Masters Courses
University of Glasgow Featured Masters Courses
"systems" AND "security"×
0 miles

Masters Degrees (Systems Security)

We have 607 Masters Degrees (Systems Security)

  • "systems" AND "security" ×
  • clear all
Showing 1 to 15 of 607
Order by 
Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development. Read more

Study computer and information systems security on a course that combines academic teaching, industry input and practical skills development.

The course has four main focuses

  • information security management
  • ethical hacking
  • system hardening
  • computer forensics

This course is ideal if you are already working in an information technology environment or if you wish to specialise in the field of information security. After successfully completing it, you gain industry-recognised certifications that will assist you in progressing further in this field.

You focus on both the technical and managerial aspects of information security. The technically-focused modules involve you exploring a range of systems, tools and techniques at the cutting edge of technology. The managerial-focused modules give you an appreciation of the role information security has in an organisation and how it can be implemented and managed.

On this course you

  • develop the knowledge, understanding and skills to work as a computing security professional.
  • learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications.
  • develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks.
  • develop the effective and appropriate communication skills you need to be a security professional.

Free training and certification exam

Thanks to our association with BSI Learning, you are entitled to attend the BSI ISO27001 Lead Auditor course and take the official exam which allows you to become accredited as a BSI certified lead auditor.

Our ethical hacking module is aligned with the CREST Practitioner Security Analyst (CPSA) syllabus providing graduates with industry recognised and desired skills.

BSI lead auditor qualification

• ISO27001 Lead Auditor

BSI courses are delivered by approved BSI trainers and qualified ISO27001 lead auditors. As part of the course you receive the same course material as the official BSI training courses.

Guest Speakers from industry

Due to our strong ties with industry we regularly have special guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry.

Ethical Hacking

In 2014 Sheffield Hallam hosted the North of England's first Ethical Hacking Conference Steelcon. This is set to be an annual event with 2015's event already booked.

Course structure

We developed this course along two main lines.

The first covers the principles and issues of security design concerning systems and systems integration, web and operating system based applications and communication networks.

The second addresses the methodologies and development of skills required to perform security assessments of complex information systems.

Semester one modules

  • Information security concepts and principles
  • Network security
  • Systems and application security
  • Web applications and e-commerce security

Semester two modules

  • BSI ISO27001 lead auditor
  • Group-based case study with capture the flag

Options

  • Computer forensics and incident response
  • Information security management
  • Incident handling and hacking techniques (ethical hacking)

Semester three modules

You study research methods and do a substantial research project leading to a dissertation.

Assessment

Group and individual coursework. You also do a range of

  • problem solving assignments
  • workshops
  • practical projects
  • research activities.

Employability

On this course, you gain the knowledge, skills and experience you need to work in many different positions, from technical to management roles.

The Institute of Information Security Professionals (IISP) has highlighted the following specialisms in the area.

Strategy, policy, governance

• strategist • policy manager • information technology services officer (ITSO) • department security officer (DSO) • chief information security officer (CISO)

Risk management, verification and compliance

• risk analyst • risk assessor • business information security officer • reviewer • auditor

Incident and threat management and response

• incident manager • threat manager • forensics (computer analyst, mobile and network analyst) • computer security incident response team (CSIRT) • attack investigator • malware analyst • penetration tester • disaster recovery • business continuity

Operations and security management

• network security officer • systems security officer • information security officer • crypto custodian • information manager

Engineering, architecture and design

• architect • designer • development • secure coding • software design and development • applications development • security tools • implementation

Education, training and awareness

• security programme manager

Research

• security researcher

Successful graduates of this course have gone on to work for companies such as HSBC, Citrix, and Price Waterhouse Coopers.



Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. Read more
As the use of information systems is now widespread in the lives of individuals, business and society, the security of computer systems is increasingly important. The significance of information security and the demand for relevant skills has been emphasised recently by high-profile incidents concerning the privacy of personal data and security of financial information.

This specialist MSc course focuses on the technical aspects of computer systems security and systems administration, particularly penetration testing. It is accredited by the Tiger Scheme and will give you exemption from some of its professional examinations.

You will be taught by an internationally recognised team from the University’s Information Security Research Group, and external speakers contribute to delivering the latest expertise and developments.

See the website http://courses.southwales.ac.uk/courses/254-msc-computer-systems-security

What you will study

Modules include:
- Network Security
- Practical Windows Security
- Practical UNIX Security
- Vulnerability Development
- Professional Skills Development
- Advanced Research Methods
- Project Management
- Research Project: an investigation of your choice, related to the course
- MSc Project: the development and evaluation of a significant application or task, related to the course

Learning and teaching methods

The course is delivered in four major blocks to offer an intensive but focused learning pattern, with two start points each year – February and September. Full-time students will typically spend 12 hours in classes each week. If you choose to study part-time, this is reduced to around six hours each week. You will study through lectures, tutorials, practical sessions, seminars and projects.

Work Experience and Employment Prospects

Career opportunities are excellent – the demand for specialists in this area continues to rise as companies become increasingly dependent on computers and the internet. On graduation, you will be equipped for careers that require in-depth knowledge of technical security issues. Potential roles include systems administrator, security penetration tester or information security consultant, and skills gained strongly relate to the roles of information security analyst and IT security co-ordinator.

With education to Masters level now the recognised professional level of competence, graduates will be better placed to pursue careers in industry, or continue their interest in computer systems security through research at PhD level.

Assessment methods

You will need to spend a significant amount of time working independently, reading and preparing for assessments. Assessment is primarily by coursework, varying from a research-style paper or essay to programming assignments. You will also work on a significant research project and a major project of your own choice, where strong independent thinking, critical analysis and project management skills will be important.

Facilities

We have a full range of high-specification computer labs and an ongoing investment programme to ensure that our facilities stay at the forefront of computing developments.

Read less
This course aims to provide you with the knowledge and skills required in the security of computer systems, and to ensure you have an understanding of both the principles and practices pertaining to computer systems, their potential weaknesses and how they can be managed to make them more secure. Read more
This course aims to provide you with the knowledge and skills required in the security of computer systems, and to ensure you have an understanding of both the principles and practices pertaining to computer systems, their potential weaknesses and how they can be managed to make them more secure.

The course will develop a comprehensive understanding of the underlying technologies and security mechanisms required in the production of secure systems, and provide you with the knowledge and understanding of the threats faced by operating systems, applications and networks and the appropriate countermeasures.

Through the understanding and evaluation of new threats to authentication, authorisation, confidentiality and privacy, the course will promote a professional attitude for those wishing to enter employment within the field of Computer Systems Security.

This course has been developed in consultation with industry practitioners and the School is linked with areas of government policy development and industry support in this field.

Read less
The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Read more

The 36-credit M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the US and beyond and the analysis of intelligence collection. The M.S. in National Security Affairs and International Relations is offered online worldwide.

National security affairs is one of the fastest growing professions with positions open in the public sector in the federal, state and local governments and in the private sector. This program is designed for professionals in the field seeking career advancement, those who aspire to enter the field, individuals in related professions, and those retired from the military and government seeking consulting and other positions. Examples of potential students include personnel in the military, federal, state and local governments, law enforcement, corporations, and academia, as well as recent college graduates.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes. 

M.S. in National Security Affairs and International Relations in the Department of History and Political Science is designed to provide students with theoretical, research, and applied skills in the emerging academic field of national security affairs. Students in this program will build a core understanding of critical issues informing the field of national security today, including the assessment and analysis of the threat of terrorism in the U.S. and beyond, and the analysis of intelligence collection. Students will also develop a deep understanding of the international context in which U.S. national security issues are shaped.

The program consists of a core of 7 courses (21 credits). Pedagogically, the program core focuses on building the critical analytical skills graduates need to succeed professionally and academically in the field of national security affairs. The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes.

Following completion of the program core, students must complete 15 credits of coursework from the list of available electives. The majority of the elective offerings were developed specifically for the national security and international relations program, with a small number drawn from closely related fields. The elective list contains both courses that emphasize domestic security and courses that have a broader international focus, resulting in sufficient breadth of subject matter to allow students to tailor their choices around particular academic or professional interests.

Students interested in Cyber Security can choose to take a specific concentration in this area. Students who choose this option must complete 9 credits from the Cyber Security concentration and 6 credits from the elective list. Before choosing this option, students must secure permission from the Department of History and Political Science. After a consultation, it will be determined whether the student can enter the Cyber Security concentration, or if additional foundation courses will be required in order to enter and successfully complete the concentration.

Core Courses (21 credits)

  • NSAM 5001 - Current Issues in National Security (3 credits)
  • NSAM 5003 - National Intelligence Collection and Analysis: Theory and Practice (3 credits)
  • NSAM 5004 - Border Protection and Military Issue (3 credits)
  • NSAM 5005 - Research and Evaluation in National Security Affairs (3 credits)
  • NSAM 5010 - US Foreign Policy and National Security (3 credits)
  • NSAM 5014 - Ethical Issues in National Security (3 credits)
  • NSAM 5016 - International Relations: Theory and Practice (3 credits)

Electives (15 credits)

  • NSAM 5002 - Terrorists and Terrorism: Theory and Practice (3 credits)
  • NSAM 5015 - Civil Liberties and National Security (3 credits)
  • NSAM 5020 - International Law and Institutions (3 credits)
  • NSAM 5030 - American Government and Domestic Security (3 credits)
  • NSAM 5040 - Cyber Conflict and Statecraft (3 credits)
  • DEM 5090 - Weapons of Mass Threat and Communicable Diseases (3 credits)
  • MHS 5314 - Bioterrorism and Weapons of Mass Destruction (3 credits)
  • NSAM 5502 - Directed Readings in National Security Affairs (3 credits)
  • NSAM 5650 - Economic Statecraft in National Security Affairs (3 credits)
  • NSAM 6130 - Practicum/Internship (3 credits)
  • NSAM 6690 - Special Topics in National Security Affairs and International Relations (3 credits)
  • NSAM 6700 - Directed Thesis in National Security Affairs and International Relations (6 credits)

Optional Cyber Security Concentration

  • MMIS 0683 - Fundamentals of Security Technologies (3 credits)
  • MMIS 0684 - Information Security Management (3 credits)
  • MMIS 0685 - Information Security Governance (3 credits)
  • MMIS 0686 - Information Systems Auditing (3 credits)
  • MMIS 0687 - Information Security Project (3 credits)

Practicum

In addition to successfully completing all course work, students must pass a tabletop examination to be awarded the M.S. in National Security Affairs and International Relations. When a student has completed all coursework, has maintained a minimum of 3.0 GPA with no "incomplete" grades, and is a "student in good standing" with no disciplinary actions pending or disciplinary tasks to complete, the student will be eligible to take the tabletop examination. The tabletop exam is an assessment of the student's ability to integrate the knowledge and skills gained through course work.The exam tests the student's written ability to critically analyze and apply conflict assessment, theory, and research methodology to hypothetical conflict situations. The exam also tests knowledge of material specific to the academic curriculum.



Read less
Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society. Read more

Protecting digital information from unauthorised access and use, and ensuring the resilience of the underlying network infrastructure and systems, are key challenges for the continued technological development of our society.

The science behind our Information Security MSc connects various disciplines; from computer science, electronic engineering and mathematics, to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.

Focused on key information security concepts, mechanisms and technologies, our programme examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

Programme structure

This programme is studied full-time over one academic year and part-time over three academic years. It consists of eight taught modules and a dissertation.

Example module listing

The following modules are indicative, reflecting the information available at the time of publication. Please note that not all modules described are compulsory and may be subject to teaching availability and/or student demand.

Educational aims of the programme

The programme will:

  • Provide students with advanced knowledge and understanding of information security theory and concepts
  • Teach foundations and methods from several information security disciplines such as data security, network security, cryptography, formal security analysis, secure systems and web applications, multimedia security, digital forensics, privacy-enhancing technologies, and human-centred security
  • Teach students to apply their knowledge of scientific methods and gained information security skills in practice through lab sessions and individual dissertation projects where students will be offered an opportunity to analyse, evaluate and interpret existing information security mechanisms and/or carry out their own research activities
  • Support students in carrying out their own scientific investigation under the guidance and advice of their supervisor. Students will be able to identify information security problems and find suitable information security protection mechanisms based on their skills and relevant literature sources

Programme learning outcomes

Knowledge and understanding

Students will gain:

  • Knowledge and understanding of the general information security aims and challenges
  • Knowledge and understanding of technical and mathematical concepts and mechanisms for the protection of digital data and information
  • Knowledge and understanding of technical concepts and mechanisms for securing network communications and infrastructures
  • Knowledge and understanding of technical concepts and mechanisms for digital forensics
  • Knowledge and understanding of technical concepts and mechanisms for the development of secure computing systems and applications
  • The ability to critically evaluate information security mechanisms and technologies with respect to their functionality, security properties and application challenges
  • The ability to implement or apply existing information security mechanisms and technologies in practice
  • The ability to design, develop and analyse secure systems and applications by taking into account both technical and non-technical perspectives
  • The ability to critically evaluate new ideas, develop own ideas and conduct supervised research in information security

Intellectual / cognitive skills

Students will leave the programme with the ability to:

  • Analyse and solve problems of technical nature under consideration of various risks and constraints
  • Make effective and efficient decisions in an environment of conflicting interests
  • Think strategically 
  • Synthesise and critically evaluate the work of others
  • Apply fundamental knowledge to investigate new and emerging technologies
  • Carry out an independent research investigation aiming to improve the state-of- the-art knowledge in the field

Professional practical skills

Students will gain the ability to:

  • Come up with technical solutions to a range of problems
  • Use concepts and theories to make judgements on the suitability of solutions, their advantages and disadvantages
  • Implement mechanisms and apply them in a wider context of more complex systems
  • Present their opinions and findings and to produce a high-quality report

Key / transferable skills

Students will have:

  • The ability to communicate concepts and results in a clear and effective manner
  • The time and resource management planning
  • The ability to work with available resources, to collect and analyse research-oriented material

Global opportunities

We often give our students the opportunity to acquire international experience during their degrees by taking advantage of our exchange agreements with overseas universities.

In addition to the hugely enjoyable and satisfying experience, time spent abroad adds a distinctive element to your CV.



Read less
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. Read more
Computer security is one of the key challenges in contemporary computing. You will gain critical knowledge within the cyber security and digital forensic domains, combining academic principles and industrial practice. The course is informed by current research in security and digital forensics, and is underpinned by our experience with external partners in law enforcement, financial institutions, and other knowledge transfer activities. Course specialisms include network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance, and host and mobile digital forensics. The specialisation you gain in the taught modules is further developed through an extensive research-based MSc dissertation project, leading towards a mastery of a subject area and enhancing your particular specialism.

This MSc is also one of a very small number of courses certified by GCHQ, recognising UK universities which are excellent in Cyber Security.

What you’ll learn

This course focuses on the areas of securing computer, network and communications systems, incident response, and the forensic investigation of digital devices and networks. Computer security is a growth industry, and is vital in modern computing environments. You will gain foundation knowledge in all the key areas of computing cyber security, both defensive and offensive, as well as post incident response. The digital forensic aspects of the course include network and computer forensics, allowing you to develop the knowledge required to conduct computer-related investigations across networks, systems, and other digital devices. Cyber security and digital forensics are becoming significant computing disciplines, with an acknowledged skill shortage coupled with growing employment opportunities.

Our industry informed course combines thorough coverage of academic theory aligned with extensive hands-on practical activities, supported by online and blended materials with virtualised lab environments that complement our on-campus specialist facilities.

The School of Computing has developed close ties with industry, law enforcement, and the public sector, through partnerships with organisations such as Cisco Systems, Guidance Software, Dell Secure Works, NCA, NCC, Police Scotland, and many others. The course benefits from this by including many guest lecturers by industry experts. Through the dedicated cyber security and forensic research group extensive cutting edge research is also carried out in key domains by an ever growing cohort of Phd students. The programme also has an affiliation with The Cyber Academy here at Edinburgh Napier, which integrates formally with a range of international initiatives including into a European Centre of Excellence, along with the EU-funded DFET project, which is building a world class virtualised infrastructure for Cyber Security teaching and training, with strong links into law enforcement industry and academia across the World.

Modules

• Host-Based Forensics
• Network Security
• Security Audit and Compliance
• e-Security
• Incident Response and Malware Analysis
• Computer Penetration Testing
• Dissertation

Study modules mentioned above are indicative only. Some changes may occur between now and the time that you study.

Careers

The continued growth in the current requirement for cyber security and digital forensics professionals means there are a wide range of careers which can be followed after graduating from the course, such as security consultant/analyst, penetration tester, network security analyst, forensic investigator, audit/compliance consultant, security certification engineer, incident response analyst, cisco security engineer/architect, sys admin, network engineer.

The programme develops a range of key skills currently needed in industry, covering areas such as network security, penetration testing, security monitoring, incident response, malware analysis, operating systems, network and computer forensics, virtualisation and malware analysis. Materials from many professional courses are integrated into the curriculum, towards helping students prepare for sought after professional certification such as Cisco Security Certifications, CISSP, and CREST.

Study mode

This is a full-time course studied over one year. It requires an intensive period of study, involving lectures, tutorials, laboratory sessions and independent study.As a full-time student you'll take three 20 credit modules per trimester for the first two trimesters, and then complete a Project.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-fulltime

This course is also available part-time, with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

This course is also available distance learning , with one or two modules studied per trimester.
http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-distance-learning-part-time

How to apply

http://www.napier.ac.uk/study-with-us/postgraduate/how-to-apply

Fees and Funding

We have lots of funding options available such as the postgraduate tuition fee loan for Scottish & EU students, specifics scholarships for students from North or South America, Asia and Africa, as well as bursaries & grants for those closer to home in England, Northern Ireland and Wales.

Please see our website for up-to-date information about fee and funding and what you could be eligible for.
http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding

Nothing should get in the way of furthering your education. Student Awards Agency Scotland (SAAS) awards funding for postgraduate courses, and could provide the help you need to continue your studies. Find out more: http://www.napier.ac.uk/study-with-us/postgraduate/fees-and-funding/saas-funded-courses

Information for International Students

For applications whose first language is not English, the following is generally required: minimum IELTS 6.0, with no individual component score of less than 5.5 or equivalent. We also offer a range of pre-sessional English language courses to help you meet the English language requirement prior to starting your masters programme. Please see our website for up-to-date information.
http://www.napier.ac.uk/study-with-us/international-students/english-language/english-language-requirements

Read less
Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. Read more

Aim

Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the MSc is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges.

This taught programme provides a strong foundational education in the core areas of cyber security and offers practical training in key software tools and programs. Applied practical skills will be developed further in specialised projects exploring leading edge issues in cyber security research.

The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen's University Belfast's Centre for Secure Information Technologies (CSIT).

CSIT is a GCHQ accredited Academic Centre of Excellence in Cyber Security Research and is the UK's largest university research lab in this field. CSIT is fast developing a reputation as a global innovation hub for cyber security and is influenced throughout by its strong history of commercial engagement with world leading companies including Infosys, Cisco, IBM, Thales, BAE Systems, McAfee, Roke, and Altera.

Programme Content

The MSc in Cyber Security is available in two options, lasting either 1 or 2 years:

The 1-year MSc consists of six taught modules (120 CATS points) and a 4-5 months practical project of a research nature/work placement (60 CATS points).

The 2-year MSc consists of six taught modules (120 CATS points) and a 12 months practical project of a research nature/work placement (60 CATS points).

One compulsory module and a choice of five from seven other modules as listed below:
• Applied Cryptography
• Computer Forensics
• Network Security and Monitoring
• Software Assurance
• Malware
• Media Security
• Intelligent Information Systems
• Ethical & Legal Issues in Cyber Security (Compulsory)

In any given year further specialist topics may be available for selection or listed topics may not be offered.

Assessment

Comprises written examination and coursework/lab work in six modules; and a dissertation on your research project (180 CATS points total).

Opportunities for Careers

Strong Industry Engagement
A key differentiator of our MSc programme will be the opportunity to closely engage with CSIT industry partners. The programme offers an enhanced education experience, including the facilitation of industrial internships and work placements with leading security professionals, as well as other commercially specified projects. Our Scholarships and Work Placements programme offers a significant opportunity for students to enhance career prospects by directly engaging with potential employers.

Opportunities for placements are being provided by the following companies: Austrian Institute of Technology (AIT), Facebook, IBM, McAfee, PwC, RepKnight, Roke, Thales, and United Technologies Research CEntre (UTRC).

Professional Skills Training
Students will be offered a range of personal development and transferable skills training to improve their professional skills and increase their employability. Courses will cover: project management, presentation skills, communication strategies, networking skills, public engagement and entrepreneurship. Invited seminars and special guest lectures from industrial and academic leaders offer students a chance to engage with leaders in the cyber security profession.

Careers
Our graduates have found that holding a prestigious MSc qualification from Queen's (one of the UK's top engineering schools) has significantly enhanced their job opportunities and employment prospects. With demand for cyber security experts growing at 12 times the rate of the overall job market, students can expect their career prospects to be enhanced significantly after graduation.

Our MSc in Cyber Security will prepare graduates for successful careers in secure systems development, security architecture development, network security, data analytics, and right up to board level positions such as Chief Information Security Officer (CISO). Prospects for research and academic career paths in cyber security will also be enhanced by the MSc.

Special Features

Work Placements and Scholarships Programme
A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security degree programme. These opportunities are being provided on a competitive basis by CSIT's industrial partners and others affiliated with the Work Placements and Scholarships Programme. Once accepted for this masters degree you will be eligible to apply for opportunities made available via the programme.

Funding

A number of scholarships, internships and work placement opportunities will be open to students accepted for enrolment on the MSc in Cyber Security course via our Work Placements and Scholarships Programme.

Scholarship Opportunities:
CSIT Scholarships (x2) – UK/EU
- Open to UK/EU applicants to the 1-year MSc in Cyber Security
- Only students who are graduating in 2014 with an Undergraduate course in relevant discipline areas are eligible to apply
- Scholarships cover fees and a paid summer internship at CSIT
- How to Apply: Eligible students who apply for the 1-year MSc in Cyber Security will automatically be considered for these scholarships.

GREAT Queen’s University Belfast Scholarships (x2) – India
- Open to India students
- Scholarship value: £1500
- For further information and how to apply see:
http://www.qub.ac.uk/home/StudyatQueens/InternationalStudents/InternationalScholarships/GREATQueensUniversityBelfastScholarships-India/

Full details and further announcements about our Scholarships and Work Placements programme are available at http://www.csit.qub.ac.uk/msc

Read less
The Master of European Social Security is a one-year advanced master's programme organised by KU Leuven's Faculty of Law dealing with the area of social security in its broadest sense, including cash benefit schemes, pensions and health care systems. Read more

The Master of European Social Security is a one-year advanced master's programme organised by KU Leuven's Faculty of Law dealing with the area of social security in its broadest sense, including cash benefit schemes, pensions and health care systems.

What is the Master of European Social Security all about?

The programme provides an in-depth study of social security and social protection from a legal, economical, sociological, administrative and philosophical perspective. In addition to being multidisciplinary, the curriculum contains a strong comparative and multinational component focusing on the provision of social protection rights across Europe. This gives you the opportunity to understand the many different approaches to social security that co-exist within our old continent. At the same time, you will gain a better understanding of your own national system. The programme also includes careful study of the role of international bodies such as the European Union.

As a student in the programme, you become part of an international network of experts in the field of social security. Students come from various European countries and beyond and have different academic backgrounds. The teaching staff consists of renowned professors from KU Leuven and other European universities specialising in various disciplines related to social security.

Structure

The programme comprises 60ECTS and starts with the summer school in August. The programme concludes the following academic year (July of next year).

The Master's programme is offered in two options:

  • a more practice-oriented track
  • a research-oriented track

The two tracks share 30 ECTS in common coursework and 30 ECTS in specialised, track-specific coursework.

Admission to the research-oriented track is based on your end results of the examinations organised at the end of the Executive Summer School and is subject to the decision of an Academic Selection Committee. Only a maximum of six students are admitted to this track every year.

The classes and workshops organised in Leuven (Belgium) are grouped into a limited number of weeks. Remaining coursework is completed via digital learning platform. The platform connects you to Europe's best lecturers who guide you through their specially designed course materials remotely.

This unique teaching platform offers the best of both worlds: an authentic university experience at one of Europe's foremost universities during your two stays on campus and the flexibility to complete the majority of the programme from home. Throughout the programme, you will be connected to a unique international network of universities and be in contact with teaching staff and fellow participants from all over Europe.

Is this the right programme for me?

The ideal prospective student should:

  • have a good knowledge of his/her own social security system and its workings;
  • be able to formulate research questions and carry out corresponding research in the area of social security;
  • have an open attitude toward other scientific disciplines and other national social security systems;
  • have good English language skills. (There are no special arrangements made for improving language skills during the programme.);
  • be able to collect relevant information about his/her own social security system and evaluate this information as to its quality and relevance for the research questions being dealt with;
  • be able to critically evaluate national social security research within his/her mono-discipline;
  • have the ability to form an opinion about social security issues, motivate it with scientific arguments and formulate it in a debate with others;
  • hold an appropriate degree in a social security-related discipline. (Very occasionally, students with an academic education in other disciplines but who possess long-term experience in an area of social security and research skills may be admitted the programme.)

While all prospective students should have knowledge of social security acquired by study, those with practical experience, e.g. experience working in a social security administration, are particularly valued. Some previous exposure to European social affairs and/or foreign social security systems is also helpful.

Objectives

The programme is a specialised, research-based education, dealing with the area of social security in its broadest sense. It provides the students with an in-depth study of social protection from a legal, economic, sociological and administrative perspective, confronting the students with the most recent research and several national backgrounds, thus stimulating individual reflection.

At the end of the programme the participants should be able to :

  • design and carry out individual research projects in the area of social security, as well as participate in the conception, execution and supervision of team research;
  • put their national/monodisciplinary approach in a broader perspective by including other disciplines and abandoning a merely national point of view;
  • recognise national and temporal contingencies from essential social security boundaries;
  • take up unfashionable positions if their research so demands;
  • take part in and position themselves on a good multidisciplinary and comparative basis in any debate concerning social security issues;
  • deliver results and opinions that contribute to the advancement of social security related research in Europe;
  • translate research results to the broader public;
  • make research results relevant for policy making; be able to translate questions from policy-makers into research questions, deal with them and explain the results to policy-makers.

Career perspectives

Graduates are professionally active in areas related to social security (social or private insurance institutions, social administrations, social and economic policy-makers).



Read less
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. Read more
The MSc Computer Networking and Cyber Security is designed for those wishing to pursue in a career Computer Networking and Cyber Security. In this course, you will develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and enhance and challenge your knowledge of computer networking and cyber security.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course, for example in networking, network security and cyber security, IT security, computer forensics. Careers range from the traditional network and network security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Read more
This course is designed for those wishing to develop the ability to design and manage robust networking and cyber security systems and at the same time, gain Cisco accreditation. Security of our systems is one of the most challenging topics of our time. The MSc provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT security laboratory, and an understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack. Guest speakers from industry will complement the teaching staff and work experience opportunities are available in a relevant working environment before you undertake your final project. This additional and crucial element will provide a unique student experience that will enhance your employability after graduation.

More about this course

This course offers a unique opportunity for students to blend networking technologies with Cyber Security and at the same time gain Cisco accreditation. Such a combination will attract employers increasingly seeking graduates and post graduates within this area. The practical 10 sessions will be housed in specialist laboratories including a specialist IT security laboratory. Guest speakers from industry will complement the teaching staff.

The Communications Technology group is one of the first in UK to be awarded the "Cisco Networking Academy" in 1998. The academy has been running short/evening courses in Cisco CCNA and CCNP certification since. These are two of the most prestigious vocational certifications valued by Networking and related industries. Some of the modules in both CCNA and CCNP are currently embedded in the above two existing MSc courses and students follow the relevant Cisco curriculum. The courses are supported by three major laboratories equipped with some of the most up to date Networking technology equipment and it is taught by qualified Cisco instructors.

Security of our systems is one of the most challenging topics of our time. There is an international consensus that the level of security skills will have to be increased in order to respond to the number and sophistication of threats we face. It is impossible to ignore the importance of cyber security which is recognised by governments, large and small organisations as a priority. Cyber Security provides knowledge of the very latest security principles, tools and techniques taught by specialist staff in a dedicated IT Security laboratory and understanding of the principles underpinning effective approaches to cyber defence in response to a cyber attack.

Although each of the modules taught in the above courses have a significant hands-on practical workshops the idea of introducing actual "Work Experience" in a relevant working environment is unique and we believe this additional and crucial element will provide a unique student experience that will help their employability after graduation. The course team will guarantee a paid employment opportunity for all students taking the Computer Networking and Security With Work Experience. The Cisco Academy manager has built a network of relevant employers in the past 15 years through the Networking Academy and its contacts. The academy has currently 18 smaller academies providing continuous technical and academic support as well as training their instructors according to Cisco’s regulations. These academies are mainly local and range from schools to technical colleges. It is hoped that students on this course will be able to be placed in these academies for their work experience part of the course.

A range of assessment methods is employed throughout the course. The method of assessment for each module is clearly described in the individual module guide which is made available to the students at the start of the semester. Every module has dedicated Web site providing students with comprehensive learning/teaching material including workshop exercises. Module leaders use this site regularly to communicate with their students including providing general feedback, guidelines on how to write technical report/effective presentations and keeping logbooks. Modules employ a combination of the following forms of assessments:
-Case study reports and presentations
-Laboratory workbooks/logbooks
-Unseen examinations
-Part seen examinations
-Individual vivas

Professional accreditation

This course offers a Cisco accreditation.

Modular structure

The modules listed below are for the academic year 2016/17 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 1 modules include:
-Cyber Security Management (core, 20 credits)
-Cybercrime and Cyber Security (core, 20 credits)
-MSc Project (core, 60 credits)
-Network Routing Protocols (core, 20 credits)
-Switched Networks (core, 20 credits)
-Work Experience (core, 20 credits)
-Digital Forensics (option, 20 credits)
-Hardening Network Infrastructure (option, 20 credits)
-Network Troubleshooting (option, 20 credits)
-Security Auditing and Penetration Testing (option, 20 credits)

After the course

The employment market has an abundance of posts which incorporate the key areas of this course:for example in Networking, Network Security and Cyber Security, IT Security, Computer Forensics. Careers range from the traditional Network and Network Security professionals to network design engineer, secured network developer, and marketing and technical support. There are many exciting graduate employment opportunities available including:
-Network Engineer
-Network Management
-Network Security and Cyber security Consultant
-Crime and Computer Forensic

[Moving to one campus]]
Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of-the-art facilities, flexible teaching areas and stunning social spaces.

Read less
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. Read more
The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

Degree information

Students develop an advanced knowledge of information security and an awareness of the context in which information security operates in terms of safety, environmental, social and economic aspects. They gain a wide range of intellectual, practical and transferable skills, enabling them to develop a flexible professional career in IT.

Students undertake modules to the value of 180 credits. The programme consists of four core modules (60 credits), four optional modules (60 credits) and a research project (60 credits).

Core modules
-Computer Security I
-Computer Security II
-Introduction to Cryptography
-Research in Information Security

Optional modules - students choose four of the following:
-Distributed Systems and Security
-People and Security
-Applied Cryptography
-Information Security Management
-Language Based Security
-Philosophy, Politics and Economics of Security and Privacy
-Malware
-Cryptanalysis
-Cybercrime
-Privacy Enhancing Technologies
-Relevant options from other MSc degree programmes

Dissertation/report
All MSc students undertake an independent research project which culminates in a dissertation (maximum length of 120 pages) and an oral presentation.

Teaching and learning
The programme is delivered through a combination of lectures, seminars, problem classes, tutorials, laboratory classes and projects. Assessment is through written examinations, presentations, vivas, tests, coursework, written reports, formal presentations and the research project.

Careers

UCL graduates are keenly sought by the world's leading organisations. UCL Computer Science graduates are particularly valued as a result of the department's strong international reputation, strong links with industry, and ideal location close to the City of London. Our graduates secure careers in a wide variety of organisations, e.g. with global IT consultancies, as IT analysts with City banks, or as IT specialists within manufacturing industries.

Top career destinations for this degree:
-Risk IT RTB Support Administrator, Lloyds Banking Group
-Technical Analyst, The Royal Bank of Scotland (RBS)
-IT Lead Developer, MOVE Guides
-Software Developer, Oracle
-Cisco Certified Network Associate (CCNA) Routing and Switching, Cisco

Employability
Some of the brightest alumni of the degree go on to careers in academia. The majority of our students take jobs in the software and consultancy industries, usually in a security-related role such as security standards compliance, secure software design or security consultancy. Students have the opportunity to do industrially based projects with companies such as BT and McAfee. The department is recognised as an academic centre of excellence on cyber security and further opportunities to expand both academic and industrial contacts occur through the ACE-CS guest lecture series integrated into the course.

Why study this degree at UCL?

UCL Computer Science is recognised as a world leader in teaching and research, and was one of the top-rated departments in the UK government's recent Research Excellence Framework.

This MSc is taught by academics who conduct world-leading research, most notably in cryptography and human-centred approaches to security, privacy and trust. Access to industry-led projects and guest lecturers from academia and industry will enhance post-graduation opportunities for careers in security-related research, or employment in cyber security roles. Students from the degree won the first UK Cyber Security Challenge in code cracking in 2013.

UCL's central London location enables students to enjoy the full benefits of life in a vibrant world city with easy access to excellent scientific and cultural centres.

Read less
The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology. Read more

Designed for

The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology.

It is suitable for those from a computer science or information technology education background. The programme is also able to cater for those with no formal studies in computer science but where significant interest in cyber security can instead be demonstrated.

The Course Provides:

1. Cyber Security in the UK has become a ‘tier 1’ priority alongside international terrorism and major national incidents. The serious threats emerging from the cyber-sphere are a recognised phenomenon worldwide and as such studies in cyber security are strategically important on a global scale.

2. Our goal for the MSc programme is to give focus to the strategic deployment and implementation of Cyber Security within an organization. We want to develop strategic thinkers who understand the Cyber threat to an organization and its resources and are able to build and support secure systems that support the strategic growth of a business.

3. The course covers all aspects of Cyber Security including network security, computer security and information security. You will learn the most important technical concepts of security—such as encryption, intrusion detection, penetration testing, access control, digital forensics and investigation, risk management, security governance and network security.

4. Alongside this, the course focuses on the business context so that students can progress their careers more rapidly through organisations and aim very particularly at management positions.

When you study the MSc Cyber Security and Management at Warwick, you will gain an unparalleded exposure to industry. All taught modules contain considerable input from industry experts who, through case studies and guest lectures, contribute to the design and delivery of material making for a vey rich learning environment.

An example of some of the companies involved in the CSM programme since it was launched in 2012 include HP, Amethyst Consulting, Deep Secure Ltd, Siskin Technology, SOCA (Serious Organised Crime Agency), CSC, VMware, OCSIA, Nottingham Police, Mozilla, Metropolitan Police, Kaspersky, Berwin Leighton Paisner, Telefonica, IBM, Blackstage Forensics, Derbyshire NHS Trust and Nettitude.

You will have additional opportunity to engage with industry through industry visits, conferences, and mentoring or advice from industry experts at key stages of your work.

Course Content

Students study nine taught modules as part of the programme of study.
Core Modules:
1. Security Architectures and Network Defence
2. Cryptosystems and Data Protection
3. Information Risk Management and Governance
4. Industrial Espionage and Counterfeiting
5. Digital Forensics

Elective Modules (3 from this list):
1. Cyber Intelligence and Operations
2. Cyber-Physical Systems
3. Enterprise Cyber Security
4. Globalisation and Outsourcing
5. Financial Analysis and Control Systems
6. Organisations, People and Performance
7. Leadership

A ninth module to be selected from the full list of WMG elective modules.

Learning Style

The taught component of the course is highly interactive and varied with a mixture of lectures, syndicate or group work, practical and lab based work, and technology enabled learning.
Class sizes are kept to a maximum of 30 students per class.
Module leaders are experts in their fields and are supported by external speakers working in organisations at the forefront of their fields.
Assessment is through Post Module Assignment based on the learning objectives of each respective module.
50% of the Masters credit is achieved through your individual project or dissertation, for which you will have close 1-1 supervision
Each module will usually be delivered in intensive one-week blocks so you are fully immersed in the subject area for that period. These one-week sessions are scheduled at intervals from October through to June.

After Your Graduate

Graduates can expect to go on to work within corporate information - security and technology teams, consultancies, government information-security departments, management tracks in information critical organisations and cyber security related research.

Read less

Show 10 15 30 per page



Cookie Policy    X