• Coventry University Featured Masters Courses
  • University of Derby Online Learning Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • Goldsmiths, University of London Featured Masters Courses
  • New College of the Humanities Featured Masters Courses
  • Cardiff University Featured Masters Courses
  • St Mary’s University, Twickenham Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
De Montfort University Featured Masters Courses
Coventry University Featured Masters Courses
University of Worcester Featured Masters Courses
Queen Mary University of London Featured Masters Courses
Loughborough University Featured Masters Courses
"theft"×
0 miles

Masters Degrees (Theft)

  • "theft" ×
  • clear all
Showing 1 to 10 of 10
Order by 
Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings. Read more

Why take this course?

Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings.

This course will enable you to develop your understanding and application of security issues and cybercrime for the purpose of forensic computing and investigation.

What will I experience?

On this course you can:

Learn how to investigate hacking, fraud and deception using a range of digital forensic tools
Practise identifying intruders' trails and suspected inappropriate use of internet applications in order to compile scientific evidence to prosecute
Manage a real-life computer engineering project using appropriate techniques for writing and reasoning about security policies

What opportunities might it lead to?

Many police investigations or civil disputes involve investigation of computer systems, mobile phones or other information devices, and there are an increasing number of UK companies that undertake investigations as consultants. You can expect to find career opportunities in such companies as well as in law enforcement and other services.

Accredited by BCS, The Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional (CITP). This course also partially meets the academic requirement for registration, either as a Chartered Scientist (CSci) or (on behalf of the Engineering Council) as a Chartered Engineer (CEng)*.

*On condition that the Master's Engineering Project is successfully completed.

Module Details

You will study four key topics which will collaboratively develop your knowledge and ability to carry out forensic IT investigations as well as an introduction on how to build protected specification software for data and other web applications. You will also get to build your own test system as part of your final project.

Here are the units you will study:

Computer Forensic Investigation and Cryptography: This unit covers the practical aspects of conducting a forensic investigation of digital evidence. In order for the students to develop a critical understanding of computer forensics, a holistic approach of the forensics investigation process is adopted, with a full investigation ‘life cycle’ from seizure of evidence through to giving evidence in court as an expert witness. We look at a range of tools, operating systems and devices.

Computer Security: The unit provides an introduction to computer security concepts and their practical application, in both closed and interconnected networks. Students are expected to both understand and be able to critically evaluate different approaches to securing complex computer systems.

Cybercrime Security and Risk Management: This unit provides opportunities for participants to develop skills and knowledge in the understanding of corporate cyber threats. Drawing upon a range of practical examples, students will examine how rapid technological development and expansion in access to the internet has impacted upon crime (e.g. how anonymity and unfounded trust encourage deception), mapping out the terrain of information technology, and identifying the emerging areas of cyber crime. Areas explored will include the crossing of established boundaries into spaces over which control has already been established such as cyber-intrusion and cyber-theft, but also 'new cyber crimes' in the form of virtual trespass, Denial of Service attacks, and the development of opportunities for offending in the context of social networking websites.

Master's Project: You will undertake either an engineering unit or a study project, during the summer period. The project offers students the opportunity to apply the taught material in the solution of a real-world problem directly related to their course. The engineering project usually involves building a piece of software to solve a problem. An example of the sort of thing you might do would be building a tool to address a specific forensics requirement. The study project usually involves undertaking a study of an IT domain relevant to forensics. To prepare for this the project includes a number of preparatory sessions, which contribute to part of your final mark.

Specialist optional units include:

Systems, Security and Data Analysis: The first part of the unit provides an overview of computer organisation, operating systems and network design, with a strong focus on security considerations and aspects relevant to computer and digital forensics. The early part of the unit will provide an introduction to relevant issues in system architecture and file system organisation. Threats to computer systems will be considered. The first half of the unit is concluded with studying in some depth current technologies for securing real computer networks. The second part of the unit deals with the important topic of data analytics.

Advanced Programming Skills for the Web: This unit draws together a number of system development skills, focusing on how they can be applied to the development specifically of web applications. Topics covered include web programming, connecting databases to web applications, software tools, testing and security.

Programme Assessment

You will be taught through a combination of practical exercises, simulations, lectures, guest lectures and formative assessments, and will be expected to use a wide range of on and offline learning tools.

You will encounter a range of assessment styles depending on the content and nature of the unit topic. This can include written assignments, presentations as well as group and individual lab-based assessments. However, the most significant assessment element is the final dissertation, which reports and reflects on your final project.

Student Destinations

On completing this course, you will be equipped to seek employment in the following areas: IT auditing, information security, independent investigation, Computer Emergency Response Teams (CERT) and law enforcement agencies. Some of our previous graduates have been successful in finding employment within high-tech crime units, commercial investigation and national security bodies, while others go on to further research study at PhD level.

This course will also appeal to already practising professionals in related areas such as law enforcement, system administration, corporate security, IS auditing or security analysis and management for the commercial sector.

Read less
Digital forensics and security are increasingly in the public eye. Read more

About the course

Digital forensics and security are increasingly in the public eye. Whether it is the theft of a laptop containing secret information, high profile hacking incidents, anti-terrorism operations or controversies surrounding lost data, it is impossible to ignore the importance and excitement surrounding digital forensics and security.

Developed and delivered in conjunction with 7Safe, this course provides you with knowledge of the very latest computer forensics and security principles, practices, tools and techniques, taught by a team of experienced and specialist staff in purpose-built computer forensics and security laboratories. If you are interested in a challenging career in one of the most rapidly expanding areas of computing then this is the course for you.

Most students embark on their MSc after successfully completing one or more 7Safe courses. On successful completion of the 7Safe hands-on training course, you are then eligible to apply to DMU for an academic top-up/assessment by distance learning. Taking the course in this way is normally a part-time pathway and you should expect to study for two-three years. However, you can register directly with DMU for the full degree and the university then manages your attendance and progression through the relevant 7Safe modules and academic assessments. Registering with DMU direct can therefore provide a full-time route through the course.

The full MSc course consists of eight modules (at 15 credits each) and an MSc Project/Dissertation (at 60 credits). Seven of the taught modules are delivered and assessed jointly by De Montfort University staff and 7Safe trainers with the eighth being a stand alone distance learning module that DMU is responsible for. The Project/Dissertation is delivered and assessed by DMU alone. Successful completion of the MSc gives students seven industry recognised professional certificates and the MSc.

Multiple start dates are available please contact the Admissions Team on the contact details below.

Read less
This course will help you develop excellent skills in 3D modelling and sculpting or computer games design theory and application. Read more
This course will help you develop excellent skills in 3D modelling and sculpting or computer games design theory and application.

The award has been designed along with our industry partners and delivers up-to-date content using industry standard software that meets current and future 3D games industry demands. It will allow you to develop and further your ability, building on knowledge and skills acquired in your first degree and expanding into areas related to computer games design.

It will enhance your abilities in research, problem-solving and management and you will apply knowledge and skills to solving complex design and 3D problems during your dissertation project. The award integrates current industry paradigms into both the assessment and research opportunities which aim to help you get into either the games industry or academia.

Course content

-Advanced Games Environment Design and Research
-Advanced Character Prototyping
-Advanced Vehicle and Weapon Prototyping
-Mobile Games Development
-Computer Games Design Dissertation

Graduate destinations

Our MSc graduates work in professional roles at top studios like Microsoft, Rare, Rockstar, Codemasters and Travellers Tales. Our students also go on to form their own companies.

We have students working on all sorts of games from indie kickstarter games like War for the Overworld to the latest Xbox One titles and massive hits like Grand Theft Auto 5.

Career Prospects: Character artist, Environment modeller, Vehicle artist, Game Designer, Producer, User Interface Artist.

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
The fascination of forensics combines with the complexity of computing in this stimulating course. Read more
The fascination of forensics combines with the complexity of computing in this stimulating course. A relatively new specialism, electronic security and digital forensics is an area of expertise that’s challenging and rapidly evolving- technology is constantly developing, and therefore so are the problems that go along with it.


Why study Electronic Security and Digital Forensics at Middlesex?

The smooth running of societies and economies is now dependent on the security of computer networks, and cyber crime, from fraud, identity theft and cyber stalking to terrorism and espionage, can affect anyone and is at the forefront of government policy. But many court cases have collapsed because of a lack of experts trained in the meticulous art of tracking down evidence. Our innovative course was created to meet the demand for skills in an area that’s chronically short of well-qualified graduates.

The course has a strong practical focus, with an emphasis on both in-depth technical and legal theory and hands-on project work. You’ll work in our specialist computer forensics laboratory in our award-winning technology centre, using the latest forensic software, including Forensic Toolkit version 5.0, Encase version 7.0 and Micro Systemation XRY Complete. You’ll also have the opportunity to achieve XRY Logical certification during the course.

Course highlights:

We have strong links with industry - we work with companies such as Microsoft and Siemens, and we are a Cisco local academy and a Xilinx university partner.
The course is accredited by the British Computer Society for Chartered IT Professional (CITP) status. This means that on graduation, you’ll have fulfilled the academic requirements for achieving those titles, though you’ll need to complete further professional development.
The course is led by Dr Carlisle George, a former barrister who has co-edited two books on regulatory issues in healthcare information. He is a member of the editorial board of the International Journal of Electronic Security and Digital Forensics and leads the university’s ALERT (Aspects of Law and Ethics Related to Technology) research group.
You’ll also improve your communication, teamwork, time-management, organisational, analytical and critical skills.

Read less
Our specialised MBA (Cyber Security) degree gives you the opportunity to not only develop your expertise in finance, marketing, leadership and other vital business areas, but also to learn about the growing field of cyber security. Read more
Our specialised MBA (Cyber Security) degree gives you the opportunity to not only develop your expertise in finance, marketing, leadership and other vital business areas, but also to learn about the growing field of cyber security. The modules include Cyber Security, Cybercrime and Cyber Security Management. You’ll study alongside MBA students from a variety of related disciplines and postgraduate students from courses in the computer sciences, providing you with an abundance of networking opportunities. Successfully complete the degree, and you’ll be ready to take on leadership of cyber security departments and organisations around the world.

More about this course

The London Met MBA (Cyber Security) gives you the opportunity to develop your understanding of key business functions as well as focus on cyber security. With increasingly sophisticated cyber attacks on both national governments and international corporations, this is a growing sector.

The modules on this course are related to accounting, marketing, leadership and other vital managerial functions within companies and organisations. They are designed to help you evolve into a successful leader in the business world.

The cyber security modules introduce you to the fundamentals of leadership and risk management within cyber security organisations, as well as specific challenges faced by all organisations, such as identity theft, scams, fraud and attacks on computer systems.

Our teaching staff and visiting academics, who you’ll meet both informally and formally through lectures and social events, are experts in areas including cybersecurity, management and leadership, ensuring you’ll develop the skills you need to steer a business to success.

You’ll collaborate alongside MBA students from a variety of professions and educational disciplines, such as specialist postgraduate computer science students. Your training will be supplemented with regular informal learning activities including the weekly student-led Business Breakfast, a monthly dinner, networking events, meetings with business leaders, entrepreneurs and consultants and lively charity fundraising events in the City.

We’ll provide regular coaching sessions to help improve your career potential, while you can also make use of our Careers and Employability Unit to help you find new roles for life after the MBA.

You’ll be assessed through individual and group work. This is likely to come in a variety of forms including reports, portfolios, presentations, videos, conferences and competitions, enabling you to develop the skills to master a multitude of situations in the world of cyber security.

Modular structure

Core modules:
-Accounting and Finance for Managers
-Leadership and Strategic Management
-People and Organisations: Principles and Practices in Global Contexts
-Marketing, Marketing Communications and Operations

Cyber security modules:
-Cyber Security Management
-Cybercrime and Cyber Security

Research-focused modules:
-Management Learning and Research
-Business Research Project

After the course

Graduates of the MBA may continue in their existing careers or choose to explore new opportunities. Recent graduates of our business related degrees are employed by companies including Oxademy, ALDI, Schwab Versand Hanau, Sapa, UBM plc, Carillion, Hanson Hispania SA, Triometric, BNP Paribas. They work in management roles in the fields of international sales, area management, business development and clients services.

Roles particularly relevant to the evolving field of cybersecurity management include application and security risk manager, security operations manager and information security manager.

Collaborative and international Llnks

The MBA programme has close links with ESoft, Sri Lanka’s largest education network and Islington College Nepal. London Met’s experience in delivering cultural variations of this MBA abroad means you’ll be learning from globally connected teaching staff in London.

Moving to one campus

Between 2016 and 2020 we're investing £125 million in the London Metropolitan University campus, moving all of our activity to our current Holloway campus in Islington, north London. This will mean the teaching location of some courses will change over time.

Whether you will be affected will depend on the duration of your course, when you start and your mode of study. The earliest moves affecting new students will be in September 2017. This may mean you begin your course at one location, but over the duration of the course you are relocated to one of our other campuses. Our intention is that no full-time student will change campus more than once during a course of typical duration.

All students will benefit from our move to one campus, which will allow us to develop state-of- the-art facilities, flexible teaching areas and stunning social spaces.

Read less
As our lives become increasingly digitised the scope and potential impact of cybercrime is becoming ever broader. Read more
As our lives become increasingly digitised the scope and potential impact of cybercrime is becoming ever broader. In both the business and personal worlds, cyber criminals have the ability to cause considerable harm from remote locations, with numerous industry reports1 estimating that the global cost of cybercrime has grown to rival that of the illegal drugs trade. From financial theft to child abuse, cybercrime can take many forms, and the need for skilled professionals capable of tackling these problems will only grow as smart, connected devices increasingly become the norm.

Read less
Security management is a rapidly growing profession, with companies under increasing pressure to combat regulatory and actual risks. Read more
Security management is a rapidly growing profession, with companies under increasing pressure to combat regulatory and actual risks. This distance learning course provides you with the skills and expertise to overcome these challenges through the insights of intelligence professionals, the police service and security studies.

More about this course

Taught via Informa’s online learning platform, this course allows you to set your own schedule and to fit your studies around work or other commitments.

But flexible distance learning doesn’t mean missing out on high-calibre tuition. This course is taught by leading experts in each of the relevant fields, who deliver their lectures via video and audio files and tutorial discussions.

Throughout this course, you’ll examine security threats such as cybercrime, corporate espionage and identity theft on both a theoretical and practical level. You’ll look at strategies to combat these risks and how they’re implemented.

You’ll also look at security on a broader scale, relating to terrorism, intelligence analysis and the domain of public protection. This will involve studying government agencies and law enforcement, and the way intelligence can be obtained and used.

To successfully complete the course you must pass each module. Assessment will incorporate essays and coursework, with the final year culminating in a dissertation.

To find out more about the PGCert portion of this course, please view this web-page: http://www.londonmet.ac.uk/courses/postgraduate/security-management-distance-learning---pg-cert/

To find out more about the PGDip portion of this course, please view this web-page:
http://www.londonmet.ac.uk/courses/postgraduate/security-management-distance-learning---pg-dip/

Modular structure

The MSc programme is comprised of seven modules. You can apply direct for the MSc level but also have the option to enrol at Postgraduate Diploma (PGDip) and Postgraduate Certificate (PG Cert) level as well.

The PGCert level is three modules of study, the PGDip comprises the same three modules plus three others and the MSc is all six modules plus a dissertation. If you enrol at one of the lower levels you also have the option of continuing your studies at the higher level on the same or future intakes. Further fees will apply.

The modules include:
-Security Studies
-Security Management
-International Financial Crime and Security
-Terrorism and Counter-Terrorism
-Intelligence Analysis
-Contemporary Issues in Crime, Safety and Security
-Security Management Dissertation

After the course

This course prepares you for a role working in the security and intelligence field, whether for diplomatic organisations or international companies. With the experience gained through your studies, you’ll be particularly suited to due diligence work.

Read less
The rapid expansion of the use of digital technology has been followed by a similar increase in computer-based crime. Read more
The rapid expansion of the use of digital technology has been followed by a similar increase in computer-based crime. This increase in criminal activity has led to a demand for qualified computer forensic analysts who can investigate digital technology based crime and uncover evidence that helps build a case against suspects. Forensic computer analysts may be involved in a range of investigations, such as online fraud, digital espionage, counter-terrorism, possession of illegal imagery and information theft.

A typical investigation would involve identifying and securing computer equipment, followed by the application of forensic methods and specialist computer programmes in pursuit of evidence. Tasks include recovering data from digital media, analysis of records to establish the location of a device, uncovering data trails, careful documentation of the investigation, presenting findings and acting as an expert witness in court.

You will be taught by an internationally recognised team from the University’s Information Security Research Group, and external speakers contribute to delivering the latest expertise and developments.

The University of South Wales are the only university in Wales to gain the prestigious provisional certification from GCHQ, the UK Government’s Communications HQ, for its Masters course in Computer Forensics.

See the website http://courses.southwales.ac.uk/courses/264-msc-computer-forensics

What you will study

- Computer Forensics and Crime Investigation
- Forensics Techniques and Data Recovery
- Computer Law
- Professional Skills Development
- Advanced Research Methods
- Project Management
- Security Management
- Research Project: an investigation of your choice, related to the course
- MSc Project: the development and evaluation of a significant application or task of your choice, related to the course

Learning and teaching methods

The course is delivered in four major blocks to offer an intensive but focused learning pattern, with two start points every year – February and September. Full-time students will typically spend 12 hours in classes each week. If you choose to study part-time, this is reduced to around six hours each week. You will study through lectures, tutorials, practical
sessions, seminars and projects.

Work Experience and Employment Prospects

You will have had the opportunity to develop skills that strongly relate to the role of a forensic computer analyst or an information security analyst. These include problem solving, a systematic approach to work and an awareness of security standards and legislation.

Graduates will be well equipped for employment, including working for the police, security services, commercial sector, or organisations that specialise in computer security.

Assessment methods

You will need to spend a significant amount of time working independently, reading and preparing for assessments. While the style of coursework may vary, research-style papers or essays of around 4,000 words in length are typical. You will also work on a significant research project and a major project of your choice, where strong independent thinking, critical analysis and project management skills will be important.

Facilities

We have a full range of high-specification computer labs and an ongoing investment programme to ensure that our facilities stay at the forefront of computing developments.

Read less
Digital technologies are no longer simply the domain of computer science. Rather, they are deeply political as well; cyber war, electoral fraud, intellectual property theft, even hacking of nuclear facilities, are all issues that challenge conventional approaches to global affairs. Read more
Digital technologies are no longer simply the domain of computer science. Rather, they are deeply political as well; cyber war, electoral fraud, intellectual property theft, even hacking of nuclear facilities, are all issues that challenge conventional approaches to global affairs.

Not only are academics struggling to comprehend what these technological changes mean for long standing concepts of war, peace, security, human rights and power, but policy makers and those in the private sector often feel they are lacking personnel with the appropriate background to help them in developing strategies, policies and guidelines that can prove effective in a rapidly changing information ecosystem.

Our MSc Global Politics and Digital Technologies Programme has been designed to fill this gap and to appeal to those who can see the connections between and across disciplines when considering the complex problems of the 21st century. We will support you to become an exceptional thinker with a solid and broad education in the background and contemporary debates around cyber security and Internet governance to appeal to future employers.

Your studies will take place in School of Law and Politics, but the underlying principle of this programme is to expand your horizons by embarking on some of the excellent optional modules that are on offer in other disciplines. We have a wealth of world class and highly relevant research and teaching expertise spread around the campus, meaning that you will enjoy innovation and flexibility in your learning environment.

You will engage with external partners in the form of guest lectures and work placements, as well as through joint research projects if applicable to your dissertation.

Read less

  • 1
Show 10 15 30 per page



Cookie Policy    X