• University of Edinburgh Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Imperial College London Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • University of York Featured Masters Courses
  • Regent’s University London Featured Masters Courses
De Montfort University Featured Masters Courses
University of Leeds Featured Masters Courses
Cardiff University Featured Masters Courses
University of Kent Featured Masters Courses
Aberdeen University Featured Masters Courses
"virtualization"×
0 miles

Masters Degrees (Virtualization)

  • "virtualization" ×
  • clear all
Showing 1 to 4 of 4
Order by 
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Humber’s Wireless Telecommunications graduate certificate program prepares you with electronics, computer engineering, physics and telecommunications skills for work on the cutting-edge technologies in the wireless telecommunications industry. Read more
Humber’s Wireless Telecommunications graduate certificate program prepares you with electronics, computer engineering, physics and telecommunications skills for work on the cutting-edge technologies in the wireless telecommunications industry.

Students will become familiar with the infrastructure of communications systems and how to be successful in the communications industry. This wireless program focuses on three main outcomes: RF/optical test and measurement, networking, and troubleshooting a number of wireless telecommunications systems.You will learn to use engineering tools and equipment for testing of systems including LTE/UMTS/GSM drive test tools, spectrum analyzers, network analyzers, optical time domain reflectometers. You will also learn how to troubleshoot and configure local- and wide-area networks (LAN/WANs) at the device and at the protocol levels. Our courses cover additional networking topics relevant to telecom carriers such as MPLS, VPNs, QoS and VoIP. You will be prepared to understand the technology roadmap leading into Internet of Things (IoT), 5G and data center virtualization technologies.

This program is an established program with industry with over two decades of expertise. Students will have access to learn on some of the best equipment available. Curriculum is kept current with the collaboration of our industry partners in the wireless field. Students utilize the latest technologies in small classes taught by experienced faculty and industry leaders.

Course detail

Upon successful completion of the program, a graduate will:

• Analyze, test, measure and troubleshoot RF (radio frequency) signals, attenuation and antenna systems, and test and troubleshoot linear and non-linear circuit modules.
• Manage network performance issues and problems against user needs through the design, implementation, testing, and troubleshooting of a variety of current and relevant protocols.
• Build wired and/or wireless networks using design documentation, and measure the performance of both the wired and wireless networks’ components and the networks’ applications using basic and advanced network management tools and applications.
• Design, install and configure networks - implementing various network configurations using different standard protocols, and upgrade network hardware (e.g. workstations, servers, wireless access points, routers, switches, firewalls etc.) and related components and software according to the best practices in the industry.
• Monitor and evaluate network security issues and perform basic security audits on both wired and wireless networks.
• Utilize change control, issue documentation and problem escalation procedures and processes, generate and maintain “as-built” network documentation following industry best practices.
• Apply RF analog and digital circuit analysis and design concepts to analyze voice and data communication using different modulation techniques.
• Use simulation tools to mathematically model and solve RF (radio frequency) electrical and electronics networks which are essential components of telecommunications and wireless technologies.
• Install, or use existing, operating systems & its components and manage users, processes, memory management, peripheral devices, telecommunication, networking and security, and troubleshoot hardware and software components of computer and operating systems using system level commands and scripts.
• Assist in the design and development of a wide area of networks using a variety of network layer-one, layer-two and layer-three protocols, microwave communication links, and fiber optics links.
• Describe the infrastructures, components, and protocols of a wide range of wireless technologies.
• Develop the infrastructure required for VoIP transport through IP networks, and be able to configure VoIP clients such as IP telephones and soft phones.

Modules

Semester 1
• WLS 5000: Applied Electromagnetics
• WLS 5002: RF Technology
• WLS 5003: Telecommunication Systems
• WLS 5004: Data Networks
• WLS 5500: Microwave and Fibre Optics

Semester 2
• WLS 5501: Broadband Communications and Security
• WLS 5503: Mobile Technologies
• WLS 5505: Wireless Data Networks
• WLS 5506: LTE Core
• WLS 5507: Wireless Project and ITIL

Your Career

The Canadian wireless industry supports over 280,000 jobs with sector salary average more than Canada’s average salary. In addition, the international wireless telecommunications market is growing. There are numerous employment opportunities in the planning, developing, manufacturing, co-ordinating, implementing, maintaining and managing of telecommunications systems for businesses and government.

As the rate of technology adoption increases in Canadian industry, the Wireless Telecommunications program is preparing graduates for these new markets. A 2015-2019 labour market report by the Information and Communications Technology Council (ICTC) indicates that by 2019, over 182,000 critical ICT positions will be left unfilled.

Graduates of the program work at cell phone service providers, equipment manufacturers, in house information technology (IT) departments, sales departments, and specialized telecommunication and networking companies.

How to apply

Click here to apply: http://humber.ca/admissions/how-apply.html

Funding

For information on funding, please use the following link: http://humber.ca/admissions/financial-aid.html

Read less

  • 1
Show 10 15 30 per page


Share this page:

Cookie Policy    X