• Regent’s University London Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • University of York Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • Swansea University Featured Masters Courses
King’s College London Featured Masters Courses
Cass Business School Featured Masters Courses
Queen Mary University of London Featured Masters Courses
FindA University Ltd Featured Masters Courses
University of Kent Featured Masters Courses
"wireless" AND "security"…×
0 miles

Masters Degrees (Wireless Security)

  • "wireless" AND "security" ×
  • clear all
Showing 1 to 15 of 87
Order by 
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail. Read more
The electronic handling of information is one of the defining technologies of our age. Enormous volumes of information are routinely stored and transmitted worldwide and most aspects of our daily lives would come to a halt should the information infrastructure fail.

However, with the benefits deriving from the ability to automatically manage so much information, come major threats to businesses, governments and individuals. These threats include possible fraud through information manipulation, deliberate damage to stored and transmitted information, and blackmail associated with the threat of damage.

The field of Information Security, namely the study of countermeasures to these real and serious threats, has grown up very rapidly in recent years. The subject embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed.

This advanced course is taught by the Information Security Group (ISG), and security experts from industry. It is designed to produce a comprehensive education in the technical, legal and commercial aspects of Information Security.

See the website https://www.royalholloway.ac.uk/isg/coursefinder/mscinformationsecurity.aspx

Why choose this course?

- This pioneering course was the first of its kind in the world. Our Information Security Group (ISG) was recognised in 1998 when the College was awarded a Queen’s Anniversary Prize for the ISG’s work. The citation read “This pioneering Group provides a unique national resource for the training of information security specialists and the development of highly secure communications and computer systems. It offers world-leading independent expertise in a field of crucial importance where trust and integrity are paramount.”

- As this course was the first of its kind, we consulted with more than 20 companies and Government departments to ascertain what they felt such a degree course should contain. Many of these organisations have maintained close links with the department and, in a typical year, you would benefit from lectures or seminars from up to 50 guest speakers.

- Having an offering that is up to date and relevant to potential employers is a key theme to all our activities. Therefore, in addition to our comprehensive syllabus and accompanying seminars, you will be offered some cutting-edge optional units.

- You will have access to virtualization software from the ISG Lab in which you can experiment with network security settings and concepts introduced in these units. As well as the general purpose lab, there is also a Penetration Testing Laboratory and the Smart Card Centre where specialist equipment and tools may be accessed for those who may be undertaking a practical project in these areas.

- The ISG also recognises the standing of the CISSP qualification in the workplace. As a result we have established an arrangement with (ISC)2 whereby you will attend an intensive two-day CISSP revision course at Royal Holloway and then sit the associated exam on campus.

- Our cryptographers have close links with Bletchley Park and many students visit that historic site during their studies.

Department research and industry highlights

The ISG is an interdisciplinary research group conducting internationally-leading research in all areas of information security:

- device and system security (including security of portable devices, smart cards, smart tokens and embedded systems)

- protection of evolving networks (including wireless, mobile, ad hoc and ubiquitous networks)

- trusted computing

- security infrastructure provision (including protection of critical national infrastructure and grid security)

- socio-technical studies in information security (including both organisational information security research and sociological research in the wider "Information Society" context)

- application security (including identity management and software security)

- fundamental security technologies (including cryptography, cryptographic protocols, and authentication technologies).

Our breadth of coverage, coupled with our size, distinguished educational and academic track record, and long-standing and deep engagement with industry, makes the ISG a unique research group in the UK.

On completion of the course graduates will have a solid foundation in:
- the essential concepts, methods and approaches of information security

- the main security issues in the development of digital business activities

- the technical, legal and commercial issues that need to be addressed when assessing the information security needs of an organisation

- the organisational and personal issues that need to be addressed when implementing information security within an organisation

- the potential sources of vulnerability within an information system and the possible implications of failing to counter these with adequate security controls

- the appropriate countermeasures to information security threats and the likely implications of their adoption

- the relevance and impact of new developments in information security threats, technologies and controls.

Assessment

Assessment is carried out by written examinations (in the four core and two elective units) and by completing the MSc Project.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different information security-related areas, including banking, telecommunications, large security consultancies, public utilities, and the retail sector. This taught Masters course also equips postgraduate students with a solid foundation for continued PhD studies.

How to apply

Applications for entry to all our full-time and postgraduate degrees (campus based courses) are made on the Royal Holloway admissions webpages https://www.royalholloway.ac.uk/studyhere/postgraduate/applying/howtoapply.aspx .

Read less
Cyber security is recognised as a priority for governments and large organisations throughout the world. Read more

About the course

Cyber security is recognised as a priority for governments and large organisations throughout the world. State sponsored cyber attacks are widely reported and whilst the responsibility for them is usually denied, what is far more certain is that cyber attacks on the national critical infrastructure and the theft of the intellectual property of large organisations are increasing and need protecting against. It is impossible to ignore the importance of cyber security.

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. If you are interested in a challenging and worthwhile career in a rapidly expanding and vitally important area of computing then this is the course for you.

Reasons to study:

• Taught by Industry Experts
developed and delivered in collaboration with cyber security professional from Deloitte and DMU teaching staff you will gain the knowledge and skills in the latest cyber security principles, practices and tools

• Purpose built Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in cyber security

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Industry placement opportunity
you can chose to undertake a yearlong placement opportunity gaining valuable experience and skills as well as networking opportunities to build your industry contacts

• Graduate prospects
employed as cyber security specialists in a range of roles within organisations including IBM, Deloitte, Airbus and BT

Course Structure

Modules

Semester 1 (September to January)

• Foundations of Cyber Security
• Cyber Threat Intelligence• Host and Network Security
• Penetration Testing and Incident Response

Semester 2 (February to May)

• Cyber Engineering
• Digital Forensics Principles and Practice
• Malware Analysis
• Legal, Ethical and Professional Practice

Third Semester (June to September)

• MSc Cyber Security Project/Dissertation

Teaching and Assessment

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects and laboratory-based assessments.

You will be taught and supported by experts in cyber security including staff from DMU's Cyber Security Centre, as well as professionals from Deloitte. We will need to expand on this later on when we can get more info from academics

Contact and learning hours

The time allocated to study is around 30 hours per week, carried out in block teaching.

Academic Expertise

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors. Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. Read more
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. It ensures that students have a basic understanding of the legal and regulatory requirements and the international standards pertaining to computer security in different nations.

Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.

At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.

The programme includes hands-on training in current forensic tools as used by the police. Students can therefore contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.

The availability of some courses is subject to satisfying constraints that may come into effect in the year of entry. In addition, some options are negotiable, indicating that a course selection will need to be approved prior to the student undertaking the requested option.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/cfsm

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Computer Crime and Forensics (15 credits)

Students are required to choose 15 credits from this list of options.

Requirements Analysis & Methods (15 credits)
Database Architectures and Administration (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Project Management (15 credits)
Network Architectures and Services (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students will be proficient in computer security and systems security and are in a position to follow careers in system development and administration where knowledge of security and forensics will be an asset or work in a range of specialist roles including: forensics investigators, security consultants or network management specialists.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643958

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. Read more
This programme is designed for graduates with a good first degree in computer science, information systems or other computing-related subjects, with some knowledge of computer networks from study at undergraduate level. It is suitable for both new graduates wishing to specialise in networking and computer security and IT professionals who wish to further their skills and move into this area. It covers relevant skills, software and hardware technologies, and the more theoretical studies that underpin everyday practice. In addition, it ensures that students have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

The programme also provides hands-on training in current industry-standard tools for implementing security (such as access control, authentication, encryption and key management). Graduates are therefore able to contribute quickly to the well-being of corporate IT and informational assets.

Though our short course centre opportunity may also be provided to study for the following professional qualifications: CISCO Certified Network Associate; Penetration Testing and Vulnerability Assessment.

Visit the website http://www2.gre.ac.uk/study/courses/pg/netsyst/ncss

Computing - Networking and Systems

Programmes for computer science or computer engineering graduates who wish to develop a specialism in computer systems and advanced software engineering or computer networks.

We offer specialist programmes with an emphasis on all aspects of networking some with extra content on wireless and mobile aspects. There are computer security and computer forensics programmes suitable for the practitioner who wishes to further their skills.

Some programmes concentrate on technical security, security policy management and legal compliance issues which can be excellent preparation for specialist professional exams with CISA (Certified Information Systems Auditor) and CISSP (Certified Information Systems Security Professional).

What you'll study

Full time
- Year 1:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)
Cyber Security (15 credits)
Audit and Security (15 credits)
System Administration and Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)
Network Architectures and Services (15 credits)
Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Part time
- Year 1:
Students are required to study the following compulsory courses.

Essential Professional and Academic Skills for Masters Students
English Language Support Course (for Postgraduate Students in the School of Computing and Mathematical Sciences)

Students are required to choose 30 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 30 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

- Year 2:
Students are required to study the following compulsory courses.

PG Project (CIS) (60 credits)

Students are required to choose 15 credits from this list of options.

Cyber Security (15 credits)
Managing IT Security and Risk (15 credits)
Network and Internet Technology and Design (15 credits)

Students are required to choose 15 credits from this list of options.

Audit and Security (15 credits)
System Administration and Security (15 credits)
Network Architectures and Services (15 credits)

Students are required to choose 15 credits from this list of options.

Mobile Application Development (15 credits)
Web and Intranet Content Management (15 credits)
Software Tools and Techniques (15 credits)

Students are required to choose 15 credits from this list of options.

Enterprise Web Programming (15 credits)
Computer Crime and Forensics (15 credits)
Penetration Testing (15 credits)
Mobile and Network Technologies (15 credits)

Fees and finance

Your time at university should be enjoyable and rewarding, and it is important that it is not spoilt by unnecessary financial worries. We recommend that you spend time planning your finances, both before coming to university and while you are here. We can offer advice on living costs and budgeting, as well as on awards, allowances and loans.

Assessment

Students are assessed through examinations, coursework and a project.

Professional recognition

This programme is accredited by the British Computer Society (BCS). On successful graduation from this degree, the student will have fulfilled the academic requirement for registration as a Chartered IT Professional (CITP) and partially fulfilled the education requirement for registration as a Chartered Engineer (CEng) or Chartered Scientist (CSci). For a full Chartered status there are additional requirements, including work experience. Please contact the BCS for further information. The programme also has accreditation from the European Quality Assurance Network for Informatics Education (EQANIE).

Career options

Upon successful completion of this programme, students are proficient in network, computer and systems security and are in a position to follow careers in these areas.

Find out about the teaching and learning outcomes here - http://www2.gre.ac.uk/?a=643954

Find out how to apply here - http://www2.gre.ac.uk/study/apply

Read less
Humber’s Wireless Telecommunications graduate certificate program prepares you with electronics, computer engineering, physics and telecommunications skills for work on the cutting-edge technologies in the wireless telecommunications industry. Read more
Humber’s Wireless Telecommunications graduate certificate program prepares you with electronics, computer engineering, physics and telecommunications skills for work on the cutting-edge technologies in the wireless telecommunications industry.

Students will become familiar with the infrastructure of communications systems and how to be successful in the communications industry. This wireless program focuses on three main outcomes: RF/optical test and measurement, networking, and troubleshooting a number of wireless telecommunications systems.You will learn to use engineering tools and equipment for testing of systems including LTE/UMTS/GSM drive test tools, spectrum analyzers, network analyzers, optical time domain reflectometers. You will also learn how to troubleshoot and configure local- and wide-area networks (LAN/WANs) at the device and at the protocol levels. Our courses cover additional networking topics relevant to telecom carriers such as MPLS, VPNs, QoS and VoIP. You will be prepared to understand the technology roadmap leading into Internet of Things (IoT), 5G and data center virtualization technologies.

This program is an established program with industry with over two decades of expertise. Students will have access to learn on some of the best equipment available. Curriculum is kept current with the collaboration of our industry partners in the wireless field. Students utilize the latest technologies in small classes taught by experienced faculty and industry leaders.

Course detail

Upon successful completion of the program, a graduate will:

• Analyze, test, measure and troubleshoot RF (radio frequency) signals, attenuation and antenna systems, and test and troubleshoot linear and non-linear circuit modules.
• Manage network performance issues and problems against user needs through the design, implementation, testing, and troubleshooting of a variety of current and relevant protocols.
• Build wired and/or wireless networks using design documentation, and measure the performance of both the wired and wireless networks’ components and the networks’ applications using basic and advanced network management tools and applications.
• Design, install and configure networks - implementing various network configurations using different standard protocols, and upgrade network hardware (e.g. workstations, servers, wireless access points, routers, switches, firewalls etc.) and related components and software according to the best practices in the industry.
• Monitor and evaluate network security issues and perform basic security audits on both wired and wireless networks.
• Utilize change control, issue documentation and problem escalation procedures and processes, generate and maintain “as-built” network documentation following industry best practices.
• Apply RF analog and digital circuit analysis and design concepts to analyze voice and data communication using different modulation techniques.
• Use simulation tools to mathematically model and solve RF (radio frequency) electrical and electronics networks which are essential components of telecommunications and wireless technologies.
• Install, or use existing, operating systems & its components and manage users, processes, memory management, peripheral devices, telecommunication, networking and security, and troubleshoot hardware and software components of computer and operating systems using system level commands and scripts.
• Assist in the design and development of a wide area of networks using a variety of network layer-one, layer-two and layer-three protocols, microwave communication links, and fiber optics links.
• Describe the infrastructures, components, and protocols of a wide range of wireless technologies.
• Develop the infrastructure required for VoIP transport through IP networks, and be able to configure VoIP clients such as IP telephones and soft phones.

Modules

Semester 1
• WLS 5000: Applied Electromagnetics
• WLS 5002: RF Technology
• WLS 5003: Telecommunication Systems
• WLS 5004: Data Networks
• WLS 5500: Microwave and Fibre Optics

Semester 2
• WLS 5501: Broadband Communications and Security
• WLS 5503: Mobile Technologies
• WLS 5505: Wireless Data Networks
• WLS 5506: LTE Core
• WLS 5507: Wireless Project and ITIL

Your Career

The Canadian wireless industry supports over 280,000 jobs with sector salary average more than Canada’s average salary. In addition, the international wireless telecommunications market is growing. There are numerous employment opportunities in the planning, developing, manufacturing, co-ordinating, implementing, maintaining and managing of telecommunications systems for businesses and government.

As the rate of technology adoption increases in Canadian industry, the Wireless Telecommunications program is preparing graduates for these new markets. A 2015-2019 labour market report by the Information and Communications Technology Council (ICTC) indicates that by 2019, over 182,000 critical ICT positions will be left unfilled.

Graduates of the program work at cell phone service providers, equipment manufacturers, in house information technology (IT) departments, sales departments, and specialized telecommunication and networking companies.

How to apply

Click here to apply: http://humber.ca/admissions/how-apply.html

Funding

For information on funding, please use the following link: http://humber.ca/admissions/financial-aid.html

Read less
Learn how to identify new and existing cyber threats and determine methods and processes to minimise attacks. Gain skills in a real-life business context, by cracking passwords and wireless networks and testing web applications for vulnerabilities and security breaches. Read more
Learn how to identify new and existing cyber threats and determine methods and processes to minimise attacks. Gain skills in a real-life business context, by cracking passwords and wireless networks and testing web applications for vulnerabilities and security breaches.

Cyber security is a priority for governments and organisations throughout the world. We’ll work together to explore how organisations and individuals can take action to protect themselves online from cyber-attacks.

We’ll begin by understanding networks and operating systems, how they work and the strengths and weaknesses of them. You’ll then think like a hacker, working from the inside out, as you recognise the threats to an organisation and its resources, and learn to implement and test secure systems.

Focusing on the strategic deployment and implementation of cyber security within an organisation, you’ll cover all aspects of cyber security including network security, computer security and information security.

You’ll apply your knowledge and skills hands-on in a real-life context, in our specialised lab, which is already equipped with tools such as Kali LInux, Wireshark, Nmap and Burp Suite. You’ll write your own Metasploit modules, automate social-engineering attacks, bypass antivirus software and turn access to one machine as you take total control of the enterprise.

You’ll gain skills in communicating information to higher levels of the corporation’s managers, giving you confidence to present your invaluable problem solving solutions and strategic security planning in any organisation.

We know there’s a worldwide shortage of skills graduates in cyber security, so you’ll be ahead of the game as you further your career and make a real impact on a society that is increasingly dependent on the internet and IT technology.

See the website http://www.anglia.ac.uk/study/postgraduate/cyber-security

Careers

The 2015 Global Information Security Workforce Study predicts that the global cyber security workforce shortage will reach 1.5 million by 2020, as demand outstrips supply. This means that there hasn't been a better time to join the cyber security sector.

Computer security is a fast developing area and your skills in computer, network and information security could see you working closely with lawyers, government, commercial organisations, the education sector and investigation agencies, as well as the finance and e-commerce sectors and national security organisations.

You’re also in the perfect position to continue your academic career and move up to our research degree Computer Science PhD.

Modules & assessment

Computer Networks
Operating Systems and Virtualisation
Secure Systems
Research Methods
Advanced Network Security Principles
Penetration Testing
Major Project

Assessment

We’ll asses your knowledge and understanding through a case study in which you’ll design, implement and test the security strategy of an organisation. You’ll also complete in-class tests, written assignments, software projects and presentations as part of the course.

Your faculty

The Faculty of Science & Technology is one of the largest of five faculties at Anglia Ruskin University. Whether you choose to study with us full- or part-time, on campus or at a distance, there’s an option whatever your level – from a foundation degree, to a BSc, MSc, PhD or professional doctorate.

Whichever course you pick, you’ll gain the theory and practical skills needed to progress with confidence. Join us and you could find yourself learning in the very latest laboratories or on field trips or work placements with well-known and respected companies. You may even have the opportunity to study abroad.

Everything we do in the faculty has a singular purpose: to provide a world-class environment to create, share and advance knowledge in science and technology fields. This is key to all of our futures.

Read less
This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs. Read more

About the course

This programme provides flexibility and a range of module choices to practitioners and relevant organisations in the telecom, consultancy and software/system engineering sectors, which enables them to tailor their training/education needs.

Cyber Technology MSc consists of four main themes; Cyber Security, Software Engineering, Digital Forensics, and Management. It can be studied by combining modules from all four themes allowing you to specialise in your chosen area of interest. You have the opportunity to choose mixed pathways, for example the choices of modules could lead to a degree in Cyber Security with Management.

Reasons to study:

• Develop skills required for a rapidly changing sector
gain the latest skills, techniques and knowledge required in one of the most exciting areas of computing

• Developed in conjunction with industry experts
modules are developed with Deloitte PLC, Airbus Group, BT and Rolls-Royce ensuring that you explore issues relevant to industry

• Dedicated Cyber Security Centre
access to our dedicated Computer Security and Forensics laboratories will give you the opportunity to work in industry standard facilities which will allow you to develop and enhance your skills in digital forensics

• Taught by expert academic staff
taught by expert staff within our Cyber Security Centre and Software Technology Research Laboratory who recognised leaders in the cyber security domain

• Specialise your learning to your area of interest
combine modules from across Cyber Security, Cyber Technology, Digital Forensics and Software Engineering, allowing you to tailor the course to your areas of interest

• Excellent career prospects
graduates are prepared for roles such as consultancy, software houses or project management within organisations that are cyber security specialists within law enforcement, government; in commercial IT departments and security consultancies

Teaching and Assessment

Each module is delivered over the duration of four full days. It targets both concepts and practical skills that are relevant to industry. A multiple choice (MC) test at the end of the course provides attendees feedback on their achievements and must be passed before continuation of the academic assessment through coursework.

Teaching methods include lectures, tutorials and laboratory work. A strong emphasis is given to real world problems. Assessment is by a combination of coursework, projects, multiple choice and laboratory-based assessments.

Contact and learning hours

You will normally attend 3 hours of timetabled taught sessions each week for each module undertaken during term time, for full time study this would be 12 hours per week during term time. You are expected to undertake around 24 further hours of independent study and assignments as required per week. Alternate study modes and entry points may change the timetabled session available, please contact us for details.

Academic Expertise

The programme is managed and delivered through our renowned Cyber Security Centre and Software Technology Research Laboratory.

The course teams within the Cyber Security Centre have unrivalled expertise in cyber security. The team includes former Chief Information Security Officers (CISOs) of large telecommunications companies, internet banks and cloud service providers, an ex-vice president of one of the largest cyber security companies in the world, information assurance specialists with extensive experience working in various UK defence organisations, leading digital forensics experts and respected government advisors.

Several of the team are regular media commentators on forensics and security. Professional input throughout the course will come from Deloitte and their cyber security professionals.

Facilities

The Cyber Security Laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with leaders in the industry, they are designed to meet the highest forensics and security standards.
The laboratories contain 65 high-spec, specially customised PCs configured with multiple operating systems, virtualisation and removable hard drives, as well as specialised servers, wired and wireless networking equipment and a wide variety of other hardware and software components.

Cyber Security Centre

The laboratories are also the base for our Cyber Security Centre (CSC), a multidisciplinary group of academics and industry experts who focus on a wide variety of cyber security and digital forensics issues. Their mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.

The laboratories play a vital role in the group's research and development work. Whether you are a first year undergraduate or a PhD student, within the laboratories you will be working with the latest tools and techniques at the forefront of computer forensics and security research.

To find out more

To learn more about this course and DMU, visit our website:
Postgraduate open days: http://www.dmu.ac.uk/study/postgraduate-study/open-evenings/postgraduate-open-days.aspx

Applying for a postgraduate course:
http://www.dmu.ac.uk/study/postgraduate-study/entry-criteria-and-how-to-apply/entry-criteria-and-how-to-apply.aspx

Funding for postgraduate students:
http://www.dmu.ac.uk/study/postgraduate-study/postgraduate-funding-2017-18/postgraduate-funding-2017-18.aspx

Read less
The issue of cyber security continues to be a major issue for both individuals and large corporations with a reported 117,339 incoming cyber-attacks every day (The Global State of Information Security Survey 2015). Read more
The issue of cyber security continues to be a major issue for both individuals and large corporations with a reported 117,339 incoming cyber-attacks every day (The Global State of Information Security Survey 2015).

For businesses it is no longer a question of if a cyber-attack will occur but rather when, and as such the demand for qualified IT security professionals has risen exponentially. Northumbria University’s part-time MSc Cyber Security has been designed to give you the skills to meet this increased demand, including how to handle security incidents, identify new and existing threats, and determining methods to minimise them.

Key facts

-Part-time Masters degree based in Central London
-Continue working while you study with lectures delivered on weekends spread throughout the 2 year course
-Build a critical understanding of governance and assurance, along with technology risk practices
-Learn how to handle security incidents, identify new and existing threats and determine methods to minimise them
-Undergraduate degree not essential for entry
-Also available as a full-time programme

What will I study?

Incidents of cyber-crime have increased in the UK by 48% from 2013-14 according to PwC’s Global State of Information Security Survey 2015, costing the UK up to £27bn a year. While their 2016 survey has reported a significant shift in the way organisations are taking action, including their willingness to invest in security.

Our MSc Cyber Security will teach you how to handle security incidents, identify new and existing threats and determine methods to minimise them. We will also provide an in-depth coverage of the fundamental concepts, principles and technologies for network security. Going beyond just theoretical theory, you will be given a practical understanding of governance and assurance, along with technology risk practices.

How will I be taught and assessed?

Our MSc Cyber Security is designed to allow you to fit your studies around your working life and is assessed through modular assignments, exams and a final dissertation. All taught lectures are delivered on a series of weekends spread throughout the 2 year programme.

Each module builds upon your understanding of information governance and assurance, along with technology risk management practices. You will study with a diverse group like-minded IT professionals, and will be able to trial new approaches and processes in a safe environment, working on real world scenarios and case studies.

We offer extensive student support in and outside of the classroom with a dedicated student support team based in London.

Modules

All modules on this course are core.
-Information Security and Governance
-Network Security
-Wireless Networks (from September 2016)
-Information Assurance and Risk Management
-Ethical Hacking for Cyber Security
-Research and Project Management
-Dissertation

Read less
This programme provides a broad coverage of computer networks, computer security and mobile device technologies. It looks in depth at some of the security issues that fixed and wireless networks are subject to, and the current solutions employed to address these problems. Read more
This programme provides a broad coverage of computer networks, computer security and mobile device technologies. It looks in depth at some of the security issues that fixed and wireless networks are subject to, and the current solutions employed to address these problems.

* This programme will be taught at the Canterbury campus*

Key benefits

- Work placement available

- In the Research Excellence Framework (REF) 2014, research by the School of Computing was ranked 12th in the UK for research intensity.

Visit the website: https://www.kent.ac.uk/courses/postgraduate/259/networks-security

Course detail

The Internet carries huge volumes of personal, business and financial data, much of which is accessed wirelessly through mobile devices. Security measures are increasingly essential to protect systems and data from attack (e.g. interception) and abuse (e.g. junk email). This course provides a broad coverage of computer networks, computer security and mobile device technologies. It looks in depth at some of the security issues that fixed and wireless networks are subject to and the current solutions employed to address these problems.

Purpose

This course will appeal to computing graduates seeking careers in the network or network security industries, or those who wish to carry on with this topic as an area of research. All taught Master's programmes at Canterbury are available with an optional industrial placement.

Format and assessment

Core modules for all students:

- Computer Security
- Networks and Network Security
- Advanced Network Security
- Mobile and Ubiquitous Computing
- Project Research
- Project and Dissertation

Assessment is through a mixture of written examinations and coursework, the relative weights of which vary according to the nature of the module. The final project is assessed by a dissertation, except for the MSc in IT Consultancy for which the practical consultancy work is assessed through a series of reports covering each of the projects undertaken.

How to apply: https://www.kent.ac.uk/courses/postgraduate/apply/

Why study at The University of Kent?

- Shortlisted for University of the Year 2015
- Kent has been ranked fifth out of 120 UK universities in a mock Teaching Excellence Framework (TEF) exercise modelled by Times Higher Education (THE).
- In the Research Excellence Framework (REF) 2014, Kent was ranked 17th* for research output and research intensity, in the Times Higher Education, outperforming 11 of the 24 Russell Group universities
- Over 96% of our postgraduate students who graduated in 2014 found a job or further study opportunity within six months.
Find out more: https://www.kent.ac.uk/courses/postgraduate/why/

Postgraduate scholarships and funding

We have a scholarship fund of over £9 million to support our taught and research students with their tuition fees and living costs. Find out more: https://www.kent.ac.uk/scholarships/postgraduate/

English language learning

If you need to improve your English before and during your postgraduate studies, Kent offers a range of modules and programmes in English for Academic Purposes (EAP). Find out more here: https://www.kent.ac.uk/courses/postgraduate/international/english.html

Read less
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies. Read more
Our MSc Data Networks and Security course will provide opportunities for you to engage in the design and implementation of secured and optimized communication network solutions, including SDN (Software Defined Networks and wireless technologies.

This will be achieved by industry-led, research-informed, practice-based teaching and learning. Using industry-standard resources, you will apply the skills and knowledge gained to real-life project scenarios across industry, commerce and public sector.

The programme of study will include areas such as requirements capture, network design, evaluation, securing and optimisation, ranging from hardware configuration to protocol analysis and software definition. The programme will include research and scholarly activity in order to incorporate the latest thinking into the proposed solution.

What's covered in the course?

On this course, you will learn to:
-Critically evaluate and apply knowledge of advanced routing principles.
-Evaluate and apply advanced routing protocols for specific networking solutions.
-Evaluate a variety of routing techniques for a given network environment.
-Critically evaluate routing policy requirements for a network.
-Design and implement ethernet-based LANs. Ensuring security within the given environment.
-Apply mathematical analysis to use VLSM efficiently.
-Apply security considerations to the design and management of networks.
-Design/plan and implement LAN/WAN solutions which require switched hybrid.
-Critically assess SDN solutions in both the industry and research domains.
-Design an SDN-based network for a given system, identifying appropriate components and network structure.
-Implement an appropriate SDN controller to manage device configuration, and any other relevant network policies within an SDN network.
-Select, plan and implement an appropriate testing strategy to validate security requirements against a threat model.
-Critically evaluate the requirements for penetration testing, ethical hacking and effectively communicate security audit results to a variety of audiences.
-Design and conduct security assessment experiments to expose security vulnerabilities and to interpret, analyse and critically evaluate the resulting data to recommend remedial actions.
-Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within the organisation.

Why choose us?

-The Centre for Cloud Computing houses the Cisco Networking Academy, which has an international reputation for delivering high-quality teaching, training and support acrossEurope, the Middle East and Africa.
-In six purpose-built rooms, the Centre also houses £500,000 of computer networking and communications equipment, together with more than £200,000 of web-based equipment and bookable resources.
-The course provides opportunities for you to engage in advanced studies using problem-based learning and flipped curricula strategies. You will work in groups and on your own to deliver solutions to industry-related problems and scenarios.
-The unique combination of employer-led, research-informed technical knowledge and practical experience on industry-standard resources makes our graduates more employable and sought after.
-The course encourages critical thinking and problem solving, giving you the opportunities for research.

Course in depth

All the modules are practice-based and learning is carried out in the labs. Each 20-credit module will have two hours contact, and you are expected to undertake approximately six additional hours of learning, research and assessment preparation for each module.

Assessment is carried out through presentations (both group and individual), timed tests and exams, written reports, research activity and publication of findings, and practical-based time assessments.

At the start of the course, there will be a three-week, full-time induction tool kit, comprising of a review of CCNA and associated technologies.

The course also provides the base knowledge for students to undertake the CCNA certification, and with an additional boot camp to undertake the individual CCNP certification exams.

Modules
-Information Security 20 credits
-Software Defined Network Engineering 20 credits
-Advanced Networking Systems 20 credits
-Network Management 20 credits
-Advanced Ethical Hacking 20 credits
-Research Methods 20 credits
-Project and placement 60 credits

Enhancing your employability skills

The University is eager to recognise students have made the effort to gain industry experience and stand out from the typical graduate. Thus, we offer a range of options for you to get extra awards and recognition for your work in industry.

We also have our Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.

Read less
With the dramatic increase in high-profile cyber security incidents reported in the media, the demand for highly skilled security professionals is growing significantly as businesses across the globe seek to protect their networks and data. Read more
With the dramatic increase in high-profile cyber security incidents reported in the media, the demand for highly skilled security professionals is growing significantly as businesses across the globe seek to protect their networks and data. Our MSc Cyber Security provides you with a critical understanding of information governance and assurance, combined with technology risk management practices.

In addition to developing the key skills for handling security incidents, you will learn how to identify new and existing threats and the methods by which to reduce them.

Key facts

-Develop key skills which are highly in demand by employers
-Enhance your ability to handle and minimise security threats and incidents
-Understand information governance and assurance
-Upon graduating, opt to join one of our Professional Pathways programmes, to further build your skills and employability with one of the -UK’s leading IT and project management training providers, QA.
-Also available as a part-time programme

What will I study?

This full-time course is taught at our London Campus where you will be taught by our experienced academics, guiding you as you analyse and evaluate the theories, principles and applications associated with the field. They will encourage you to question current approaches and processes in the fields of information and cyber security.

You will be introduced to key theoretical and practical aspects using real world scenarios and case studies and will be expected to investigate new approaches, processes and solutions in this fast-moving environment.

You will learn how to professionally, systematically and critically understand information governance and assurance along with technology risk management practices. The course will develop and enhance your ability to handle security incidents as well as identifying new and existing threats and determining methods to minimise them.

How will I be taught and assessed?]]
Throughout the course, you will be able to trial new approaches and processes in a safe environment, working on real-life scenarios and case studies.

You will be assessed using a mix of coursework and exams.

Careers and further study

Upon successfully completing your course, you may undertake further professional development and training through Professional Pathways programmes. This additional training is offered to our graduates for free, from our partner, QA and provides you with an excellent opportunity to undertake professional training at the end of your Masters from one of the UK’s leading corporate training providers, further enhancing your professional development and employability skills. Find out more about Professional Pathways and your eligibility. Find out more about the Pathways available and your eligibility - http://london.northumbria.ac.uk/why-northumbria/careers-and-employability/

Modules

All modules on this course are core.
-Information Security and Governance (20 credits)
-Network Security (20 credits)
-Wireless Networks (20 credits)
-Information Assurance and Risk Management (20 credits)
-Ethical Hacking for Cyber Security (20 credits)
-Research and Project Management (20 credits)
-Dissertation (60 credits)

Read less
This MSc has been designed to capture the essence of the rapidly developing fields of Embedded Microelectronics and Wireless Systems. Read more
This MSc has been designed to capture the essence of the rapidly developing fields of Embedded Microelectronics and Wireless Systems. It is suitable for a computer science or electrical/electronic engineering graduate who wishes to specialise in the high-speed technology of embedded microelectronics and wireless systems including mobile communications.

As a leading university we are committed to the advancement of embedded microelectronic systems. Research in the University is carried out in several faculty research centres such as Transport & Mobility, Manufacturing & Material Engineering and Cogents Lab, where advances in fields associated with embedded microelectronics and wireless systems include designing real-time wireless networks, the application of systems modelling, statistical and artificial intelligence techniques.

WHY CHOOSE THIS COURSE?

-Electrical and electronic research carried out in the Faculty is recognised as world-leading, 45% Internationally Excellent (RAE 2008)
-Excellent links with a number of industrial organisations enable access to the use of high-cost equipment for real-time investigations

WHAT WILL I LEARN?

The MSc in Embedded Microelectronics and Wireless Systems curriculum consists of a fixed menu of study and a substantial MSc project. Successful completion of both parts leads to the award of MSc in Embedded Microelectronics and Wireless Systems. Completion of the taught modules without a project leads to the award of a Postgraduate Diploma.

The mandatory modules are as follows:
-Digital System Design with VHDL
-Object Orientated Programming
-Digital Communications
-Digital Signal and Image Processing
-Robotics: Kinematics, Dynamics and Applications
-Embedded Operating Systems
-Wireless Intelligent Systems
-Microprocessor Applications
-Individual Project

Prospective students should be aware that most of the mandatory modules include an element of programming, usually in the C/C++ language.

HOW WILL THIS COURSE ENHANCE MY CAREER PROSPECTS?

Embedded Microelectronics and Wireless Systems are now ever-present in all aspects of technological life for example automotive, biotechnology, communications fixed and mobile networks, information technology, industrial electronics process control, security, and computer technology.

So much so that there is a demand for top graduates in the fields of embedded microelectronics and wireless systems to work either in their development or in the vast number of industries that employ these technologies.

Opportunities also exist to complete a PhD research degree upon completion of the master’s course. More information can be found on our Research page.

GLOBAL LEADERS PROGRAMME

Centre for Global Engagement logoTo prepare students for the challenges of the global employment market and to strengthen and develop their broader personal and professional skills Coventry University has developed a unique Global Leaders Programme.

The objectives of the programme, in which postgraduate and eligible undergraduate students can participate, is to provide practical career workshops and enable participants to experience different business cultures.

Read less
The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. Read more

Description

The course aims to provide students with the skills to design, implement and manage computer-based systems security, using software and networking technologies. This title also includes the basic, key elements of forensic computing: forensics and the legal and ethical issues involved in any digital investigation. Students will gain a broad understanding of the different levels of computer and network security together with the basic phases of a forensic investigation and of computing in general. They will examine wireless communication systems; networks; operating systems and interfacing socket programming; servers and their security implications; and the planning and implementation of network security management, including security, risk analysis and disaster recovery planning.

Units

- Advanced Computer Networks and Operating Systems
- Introduction to Computer Forensics and Security
- Advanced Network Security
- Cryptography and Encryption
- Masters Project

All course units combine with a flexible approach, which allows students to undertake practical project work while attending work placements. With one-third of the course project based, it may be possible to undertake yours in collaboration with an external organisation or within the School. The part-time route is especially suitable if you have industrial experience and wish to update your knowledge. Especially useful in the case of missed classes, the online virtual learning environment, Moodle, provides extensive access to lectures, course materials and assessment information. Assessment will be through coursework, examination and dissertation.

Career prospects

This course will equip you for a range of IT positions in the private and public sectors and is also a good foundation for further study. Our MSc graduates have entered a wide range of industries or gone onto PhDs, including in the School of Computing, Mathematics and Digital Technology.

Careers support is available from the moment you join us, throughout your time here, and for up to three years after the completion of your course. We have a range of services available through the School of Computing, Mathematics and Digital Technology and the University Careers Service including dedicated careers and employability advisors.

Professional Accreditation

The School is an educational affiliate of the British Computing Society – the Chartered Institute for IT in the UK (BCS), a member of the Oracle Academy and an Academy for the Computer Technology Industry Association (CompTIA). Many of the School’s degree programmes are accredited by BCS.

The School is also an academic partner of the Institute of Information Security Professionals who recognise our expertise in the field of information and cyber security. Mathematics degree courses are approved by the Institute of Mathematics and its Applications.

Read less
Distributed and networked computation is now the paradigm that underpins the software-enabled systems that are proliferating in the modern world, with huge impact in the economy and society, from the sensor and actuator networks that are now connecting cities, to cyberphysical systems, to patient-centred healthcare, to disaster-recovery systems. Read more
Distributed and networked computation is now the paradigm that underpins the software-enabled systems that are proliferating in the modern world, with huge impact in the economy and society, from the sensor and actuator networks that are now connecting cities, to cyberphysical systems, to patient-centred healthcare, to disaster-recovery systems.

This new Masters course will educate and train you in the fundamental principles, methods and techniques required for developing such systems. Given the number of elective modules offered, you will be able to acquire further skills in one or more of Cloud Computing, Data Analytics and Information Security.

Facilities include a laboratory where you can experiment with physical devices that can be interconnected in a network, and a cluster facility configured to run the Hadoop MapReduce stack.

A Year in Industry option is also available for this course.

See the website https://www.royalholloway.ac.uk/computerscience/coursefinder/msc-distributed-and-networked-systems.aspx

Why choose this course?

This course will develop a highly analytical approach to problem solving and a strong background in distributed and networked systems, fault-tolerance and data replication techniques, distributed coordination and time-synchronisation techniques (leader-election, consensus, and clock synchronisation), data communication protocols and software stacks for wireless, sensor, and ad hoc networking technologies in virtualisation, and cloud computing technologies.

The course develops an advanced understanding of principles of failure detection and monitoring, principles of scalable storage, and in particular NoSQL technology.

Students will acquire the ability to:
- apply well-founded principles to building reliable and scalable distributed systems
- analyse complex distributed systems in terms of their performance, reliability, and correctness
- design and implement middleware services for reliable communication in unreliable networks
- work with state-of-the-art wireless, sensor, and ad hoc networking technologies
- design and implement reliable data communication and storage solutions for wireless, sensor, and ad hoc networks
- detect sources of vulnerability in networks of connected devices and deploy the appropriate countermeasures to information security threats.
- enforce privacy in “smart” environments
- work with open source and cloud tools for scalable data storage (DynamoDB) and coordination (Zookeeper)
- work with modern network management technologies (Software-Defined Networking) and standards (OpenFlow)
- design custom-built application-driven networking topologies using OpenFlow, and other modern tools
- work with relational databases (SQL), non-relational databases (MongoDb), as well as with Hadoop/Pig scripting and other big data manipulation techniques.

Department research and industry highlights

Royal Holloway is recognised for its research excellence in Machine Learning, Information Security, and Global Ubiquitous Computing.
We work closely with companies such as Centrica (British Gas, Hive), Cognizant, Orange Labs (UK), the UK Cards Association, Transport for London and ITSO.
We host a Smart Card Centre and we are a GCHQ Academic Centre of Excellence in Cyber Security Research (ACE-CSR).

Course content and structure

You will take taught modules during Term One (October to December) and Term Two (January to March). Examinations are held in May. If you are in the Year-in-Industry pathway, you then take an industrial placement, after which you come back for your project/dissertation (12 weeks).

Core course units are:
Interconnected Devices
Advanced Distributed Systems
Wireless, Sensor and Actuator Networks
Individual Project

Elective course units are:

Computation with Data
Databases
Introduction to Information Security
Data Visualisation and Exploratory Analysis
Programming for Data Analysis
Semantic Web
Multi-agent Systems
Advanced Data Communications
Machine Learning
Concurrent and Parallel Programming
Large-Scale Data Storage and Programming
Data Analysis
On-line Machine Learning
Smart Cards, RFIDs and Embedded Systems Security
Network Security
Computer Security
Security Technologies
Security Testing
Software Security
Introduction to Cryptography

Assessment

Assessment is carried out by a variety of methods including coursework, practical projects and a dissertation.

Employability & career opportunities

Our graduates are highly employable and, in recent years, have entered many different [department]-related areas, including This taught masters course equips postgraduate students with the subject knowledge and expertise required to pursue a successful career, or provides a solid foundation for continued PhD studies.

Read less
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. Read more
This course considers current research and practice in cyber security. You will develop technical expertise and practical skills in the design, management and evaluation of secure systems, and in the use of tools and techniques for penetration testing and cyber defence. This MSc can lead to a career such as a network system administrator, security analyst, ethical hacker or a security consultant.

Why choose this course?

The MSc Cyber Security consists of two major parts: taught modules and an MSc project. Each taught module has an assigned number of credits (either 15 or 30). In order to obtain an MSc degree you must study and pass 120 credits of compulsory taught modules plus the project i.e. 180 credits in total.

[[Careers
Our masters programme is designed to give Computer Science graduates the specialist, up-to-date skills and knowledge sought after by employers, whether in business, industry, government or research. This particular course will prepare you for a career such as a software engineer, developer or project manager.

Teaching methods

Classes consist of lectures, small group seminars, and practical work in our well-equipped laboratories. We use modern, industry-standard software wherever possible. There are specialist facilities for networking and multimedia and a project laboratory especially for masters students. In addition to scheduled classes, you will be expected a significant amount of time in self-study, taking advantage of the extensive and up-to-date facilities. These include the Learning Resource Centres, open 24x7, with 1,500 computer workstations and wifi access, Studynet our versatile online study environment usable on and off campus, and open access to our labs.

Work Placement

This MSc is available with an optional one year industry placement. The 'with placement' programmes give you additional industrial experience by applying the skills you have learned throughout your studies.

This offers you the opportunity to work for one year in a highly professional and stimulating environment. You will be a full time employee in a company earning a salary and will learn new skills that can't be taught at University. During the placement, you will be able to gain further insight into industrial practice that you can take forward into your individual project.

We will provide excellent academic and personal support during both your academic and placement periods together with comprehensive careers guidance from our very experienced dedicated Careers and Placements Service.

Although the responsibility for finding a placement is with you, our Careers and Placements Service maintains a wide variety of employers who offer placement opportunities and organise special training sessions to help you secure a placement, from job application to the interview. Optional one-to-one consultations are also available.

In order to qualify for the placement period you must maintain an overall average pass mark of not less than 60% across all modules studied in semester ‘A’.

Structure

Core Modules
-Advanced Computer Science Masters Project
-Programming Paradigms

Optional
-Advanced Databases
-Artificial Life with Robotics
-Data Mining
-Digital Forensics
-Distributed Systems Security
-Human Computer Interaction: Principles and Practice
-Information Security, Management and Compliance
-Investigative Methods for Computer Science
-Measures and Models for Software Engineering
-Mobile Standards, Interfaces and Applications
-Multicast and Multimedia Networking
-Network System Administration
-Neural Networks and Machine Learning
-Penetration Testing
-Professional Issues
-Programming for Software Engineers
-Secure Systems Programming
-Software Engineering Practice and Experience
-Theory and Practice of Artificial Intelligence
-Wireless, Mobile and Ad-hoc Networking

Read less

Show 10 15 30 per page


Share this page:

Cookie Policy    X