• Regent’s University London Featured Masters Courses
  • Jacobs University Featured Masters Courses
  • Centre for Digital Media Featured Masters Courses
  • University of Edinburgh Featured Masters Courses
  • University College London Featured Masters Courses
  • Ulster University Featured Masters Courses
  • University of Leeds Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
Manchester Metropolitan University Featured Masters Courses
Kingston University Featured Masters Courses
Kingston University Featured Masters Courses
University of Cambridge Featured Masters Courses
Newcastle University Featured Masters Courses

MSc Forensic Information Technology


Course Description

Why take this course?

Forensic information technology (FIT) is the scientific use or application of information technology (IT) in the generation and presentation of digital evidence to be used in courts, legal or other formal proceedings.

This course will enable you to develop your understanding and application of security issues and cybercrime for the purpose of forensic computing and investigation.

What will I experience?

On this course you can:

Learn how to investigate hacking, fraud and deception using a range of digital forensic tools
Practise identifying intruders' trails and suspected inappropriate use of internet applications in order to compile scientific evidence to prosecute
Manage a real-life computer engineering project using appropriate techniques for writing and reasoning about security policies

What opportunities might it lead to?

Many police investigations or civil disputes involve investigation of computer systems, mobile phones or other information devices, and there are an increasing number of UK companies that undertake investigations as consultants. You can expect to find career opportunities in such companies as well as in law enforcement and other services.

Accredited by BCS, The Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional (CITP). This course also partially meets the academic requirement for registration, either as a Chartered Scientist (CSci) or (on behalf of the Engineering Council) as a Chartered Engineer (CEng)*.

*On condition that the Master's Engineering Project is successfully completed.

Module Details

You will study four key topics which will collaboratively develop your knowledge and ability to carry out forensic IT investigations as well as an introduction on how to build protected specification software for data and other web applications. You will also get to build your own test system as part of your final project.

Here are the units you will study:

Computer Forensic Investigation and Cryptography: This unit covers the practical aspects of conducting a forensic investigation of digital evidence. In order for the students to develop a critical understanding of computer forensics, a holistic approach of the forensics investigation process is adopted, with a full investigation ‘life cycle’ from seizure of evidence through to giving evidence in court as an expert witness. We look at a range of tools, operating systems and devices.

Computer Security: The unit provides an introduction to computer security concepts and their practical application, in both closed and interconnected networks. Students are expected to both understand and be able to critically evaluate different approaches to securing complex computer systems.

Cybercrime Security and Risk Management: This unit provides opportunities for participants to develop skills and knowledge in the understanding of corporate cyber threats. Drawing upon a range of practical examples, students will examine how rapid technological development and expansion in access to the internet has impacted upon crime (e.g. how anonymity and unfounded trust encourage deception), mapping out the terrain of information technology, and identifying the emerging areas of cyber crime. Areas explored will include the crossing of established boundaries into spaces over which control has already been established such as cyber-intrusion and cyber-theft, but also 'new cyber crimes' in the form of virtual trespass, Denial of Service attacks, and the development of opportunities for offending in the context of social networking websites.

Master's Project: You will undertake either an engineering unit or a study project, during the summer period. The project offers students the opportunity to apply the taught material in the solution of a real-world problem directly related to their course. The engineering project usually involves building a piece of software to solve a problem. An example of the sort of thing you might do would be building a tool to address a specific forensics requirement. The study project usually involves undertaking a study of an IT domain relevant to forensics. To prepare for this the project includes a number of preparatory sessions, which contribute to part of your final mark.

Specialist optional units include:

Systems, Security and Data Analysis: The first part of the unit provides an overview of computer organisation, operating systems and network design, with a strong focus on security considerations and aspects relevant to computer and digital forensics. The early part of the unit will provide an introduction to relevant issues in system architecture and file system organisation. Threats to computer systems will be considered. The first half of the unit is concluded with studying in some depth current technologies for securing real computer networks. The second part of the unit deals with the important topic of data analytics.

Advanced Programming Skills for the Web: This unit draws together a number of system development skills, focusing on how they can be applied to the development specifically of web applications. Topics covered include web programming, connecting databases to web applications, software tools, testing and security.

Programme Assessment

You will be taught through a combination of practical exercises, simulations, lectures, guest lectures and formative assessments, and will be expected to use a wide range of on and offline learning tools.

You will encounter a range of assessment styles depending on the content and nature of the unit topic. This can include written assignments, presentations as well as group and individual lab-based assessments. However, the most significant assessment element is the final dissertation, which reports and reflects on your final project.

Student Destinations

On completing this course, you will be equipped to seek employment in the following areas: IT auditing, information security, independent investigation, Computer Emergency Response Teams (CERT) and law enforcement agencies. Some of our previous graduates have been successful in finding employment within high-tech crime units, commercial investigation and national security bodies, while others go on to further research study at PhD level.

This course will also appeal to already practising professionals in related areas such as law enforcement, system administration, corporate security, IS auditing or security analysis and management for the commercial sector.

Visit the MSc Forensic Information Technology page on the University of Portsmouth website for more details!

(Student Profile)

Michael Keen

193.jpg Michael Keen, is studying for an MSc in Forensic Information Technology. He was one of two students selected to work with the Metropolitan Police on their eCrime Project.
I have enjoyed this course so much I wish it was longer than a year. After completing my undergraduate degree at Portsmouth, I decided to stay on to do a Master’s because I wanted to learn more about the legal implications of computing issues.
I was selected by my department to work in collaboration with the Metropolitan Police to help design a centralised website for use by victims of computer crime and as a result I was invited to Scotland Yard to meet with the Head of eCrime.
I can now use the work I have done with the Met to help with my dissertation about personal security within information technology.
My course leaders are really passionate about their specialist areas and they have very good links with guest speakers. We’ve had visits from a former FBI agent who is now Chief Security Advisor at Microsoft, as well as speakers from the Federation Against Copyright Theft (FACT).
Portsmouth is a lovely place to live and it will be a shame to move away but I now feel really well-equipped to use my skills in business and with the IT industry growing as quickly as it is, I think my time at Portsmouth is going to make me a valuable addition to any company.


Scholarships

Entry Requirements

A second-class honours degree in a relevant subject, including Computer Sciences, Legal or Social Sciences, or equivalent professional experience and/or qualifications.English language proficiency at a minimum of IELTS band 6.0 with no component score below 5.5.

Email Enquiry

Recipient: University of Portsmouth
Insert previous message below for editing? 
You haven’t included a message. Providing a specific message means universities will take your enquiry more seriously and helps them provide the information you need.
Why not add a message here
* required field
Send a copy to me for my own records.
Email Sent

Share this page:

Cookie Policy    X