• University of Leeds Featured Masters Courses
  • Swansea University Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Leeds Beckett University Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University of Glasgow Featured Masters Courses
  • University of York Featured Masters Courses
  • Regent’s University London Featured Masters Courses
De Montfort University Featured Masters Courses
University of St Andrews Featured Masters Courses
Cardiff University Featured Masters Courses
Anglia Ruskin University Featured Masters Courses
University of Leeds Featured Masters Courses

MSc Cyber Security


Course Description

The MSc in Cybersecurity seeks to address the increasing demand in cybersecurity related domains in both academic vocational qualifications and projection for an increased shortage of cybersecurity professionals in the industry.

The programme is delivered by a dedicated team of cybersecurity experts and active researchers in the area and gives also the opportunity to acquire certain units from the programme as dedicated credit-based short courses outside the normal MSc route.

Using cutting edge and leading teaching and training techniques the course helps the candidates to realise the unique complexity and challenges associated with cybersecurity in a highly dynamic and constantly evolving threat landscape in a blended programme that amalgamates both management and hands-on skills required by cybersecurity professionals.

The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills.

The systematic application of teaching and learning methods with the GIS goals and clear references made to the University’s employability framework should further help students to develop their career prospects throughout the programme.

Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

Visit the website: https://www.beds.ac.uk/howtoapply/courses/postgraduate/next-year/cyber-security#entry

Course detail

Areas of study include:
• Cyber threat intelligence
• Ethical Hacking
• Network Security
• Information Governance and Compliance
• Research methodologies and project management
• Tactical and strategic cybersecurity management
• MSc thesis in cybersecurity

Modules

• Cyber Defence (Ptbm) (CIS098-6) Compulsory
• Information Governance And Compliance (Ptbm) (CIS102-6) Compulsory
• Msc Project - Cyber Security (CIS106-6) Compulsory
• Research Methodologies And Project Management (Ptbm) (CIS099-6) Compulsory
• Tactical And Strategic Cybersecurity Management (Ptbm) (CIS097-6) Compulsory

Assessment

The assessment strategy used is predominantly written assessments with only two (2) formal invigilated examinations throughout the course. The method used will depend on the nature of the subject matter being taught in each of the units, where the most appropriate method is chosen and analysed (See UIFs). Students will also have the opportunity to engage into formative assessment throughout the course, especially during exercises in the practical sessions where feedback on progress and performance will be given by their tutors for each of the tasks allocated.

The assessment strategy for this course is designed around a holistic evaluation on knowledge and skills acquired with strong emphasis on the requirements for this mode of delivery and diverse skills, background and expectations of the target audience. All assessments used in the course are in perfect alignment with University requirements, regulations and policies. Coursework assignments typically incorporate formative feedback so that students can gain an insight into whether their work is meeting the necessary thresholds and focus on meaningful remarks to improve both their performance and understanding in the subject matter. The assessment strategy has been designed with strong influence by the requirements and needs of the audience in PT mode of delivery for this course.

Careers

The Careers Service is there to support you throughout the duration of your study and beyond. The curriculum gives you skills that are valuable for a career within Information Security but it is also relevant for a much wider range of applications. The diverse skillset around management of security as delivered in the course will equip you with a meaningful GRC knowledge and relevant experience to excel your career prospects. This is quite prominent due to the problem recruiters have to get hold off security managers with these skills. The systematic application of teaching and learning methods with the GIS goals and clear references made to the Universitys employability framework should further help students to develop their career prospects throughout the programme. Interactive sessions in the form of demos will also be delivered by the teaching staff and guest speakers to further leverage understanding and stimulate attention towards relevant and pragmatic issues in the area.

The unit `Research Methodologies and Project Management in particular requires you to work in a team so as to apply a current project management methodology that embraces all of these knowledge areas in an integrated way while going through the stages of planning, execution and project control; you will work as part of a team, take responsibility and make autonomous decisions that impact on the project team performance.

In addition and somewhat complementary the final project fosters independent and autonomous study: typically derived from your own ideas, in collaboration with a dedicated member of the teaching staff as project supervisor. That gives the ability to initiate discussion and project ideas that enrich the academic context in your studies and provide the foundations for a solid, relevant and strong project delivered at the end of your course.

Funding

For information on available funding, please follow the link: https://www.beds.ac.uk/howtoapply/money/scholarships/pg

How to apply

For information on how to apply, please follow the link: https://www.beds.ac.uk/howtoapply/course/applicationform

Visit the MSc Cyber Security page on the University of Bedfordshire website for more details!

Entry Requirements

This course is subject to approval. Entry requirements will be confirmed once the course is validated.Applicants should have a UK honours degree or equivalent in computer science, networking, security, or engineering.Applicants without a degree may be granted entry on the basis of their previous industrial work experience. Such work experience should be at least three years and applicants will be interviewed to verify suitability for the course.

Email Enquiry

Recipient: University of Bedfordshire

Insert previous message below for editing? 
You haven’t included a message. Providing a specific message means universities will take your enquiry more seriously and helps them provide the information you need.
Why not add a message here
* required field
Send a copy to me for my own records.

Your enquiry has been emailed successfully



Share this page:

Cookie Policy    X