• University of Edinburgh Featured Masters Courses
  • Jacobs University Featured Masters Courses
  • FindA University Ltd Featured Masters Courses
  • Xi’an Jiaotong-Liverpool University Featured Masters Courses
  • Ulster University Featured Masters Courses
  • University of Cambridge Featured Masters Courses
  • Swansea University Featured Masters Courses
  • University of Leeds Featured Masters Courses
Ross University School of Veterinary Medicine Featured Masters Courses
University of St Andrews Featured Masters Courses
Xi’an Jiaotong-Liverpool University Featured Masters Courses
University of Northampton Featured Masters Courses
University of Manchester Featured Masters Courses

MSc Cyber Security, Threat Intelligence and Forenciscs

Course Description

This course builds on your previous knowledge of computer science and Information Technology (IT), and aims to provide you with an in-depth specialism in the fields of cyber security, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cyber security perspective.

Key benefits

• We welcome applications from students who may not have formal/traditional entry criteria but who have relevant experience or the ability to pursue the course successfully.

• The Accreditation of Prior Learning (APL) process could help you to make your work and life experience count. The APL process can be used for entry onto courses or to give you exemptions from parts of your course.

• Two forms of APL may be used for entry: the Accreditation of Prior Certificated Learning (APCL) or the Accreditation of Prior Experiential Learning (APEL).

Visit the website: http://www.salford.ac.uk/pgt-courses/cyber-security,-threat-intelligence-and-forensics

Course detail

You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidences and present them in the court of law. You will use your knowledge of programming to analyse different malwares to determine how they work and how countermeasures can be developed. Only a small percentage of cyber security professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.

You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cyber security while you operate within a well-formed professional and ethical framework.

Suitable For

Suitable for graduates of a computing subject that includes programming and networking, and who love go down to a low level to discover how things work.


• Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
• Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
• Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
• The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.


• Cyber Forensics and Malware Investigation
• Information Security in Practice
• Penetration Testing and Exploit Development
• Cyber Threat Intelligence
• Project


• Examination (20%) assesses your immediate response to small or medium unseen problems
• Coursework (45%) assesses your considered and in-depth response to a larger problem
• Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.

Career Prospects

Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.

How to apply: http://www.salford.ac.uk/study/postgraduate/applying

Visit the MSc Cyber Security, Threat Intelligence and Forenciscs page on the University of Salford website for more details!

Entry Requirements

Applicants to this course must have a minimum of a second class undergraduate honours degree in Computer Science or other related computing discipline with knowledge of programming and networking.

Email Enquiry

Recipient: University of Salford
Insert previous message below for editing? 
You haven’t included a message. Providing a specific message means universities will take your enquiry more seriously and helps them provide the information you need.
Why not add a message here
* required field
Send a copy to me for my own records.
Email Sent

Share this page:

Cookie Policy    X