- You will developpractical and real-world skills in all major areas of cyber security, cyber forensics, cyber warfare and cyber threat intelligence to fight against Advanced Persistent Threats (APTs)
- You will prepare yourself to obtain professional security certifications such as CISSP and CCFP
- You will be among the most employable people on the planet!
- Part-time study option
- International students can apply
This course builds on your previous knowledge of computer science and Information Technology (IT) and aims to provide you with an in-depth specialism in the fields of cybersecurity, cyber threat intelligence and digital forensics. You will gain advanced and in-depth knowledge of penetration testing, cyber forensics, malware reverse engineering and software vulnerability and will exploit research using a very hands-on approach. You will gain practical and real-world skills in all major areas of cyber security including penetration testing, digital forensics, cyber warfare and threat intelligence. Moreover, you will learn how to apply your skills in analysis, testing and maintenance of software systems or enterprise networks from a cybersecurity perspective.
You will use your penetration testing and vulnerability assessment skills in finding weaknesses in existing devices and applications and to advise developers or network administrators to secure their application or environment. Your cyber forensics skills can be used to identify, collect, preserve and analyse a wide range of digital evidence and present them in the court of law. You will use your knowledge of programming to analyse different malware to determine how they work and how countermeasures can be developed. Only a small percentage of cybersecurity professionals are capable of analysing advanced persistent threats and are capable of understanding and managing malware campaigns. Finally, your cyber threat intelligence knowledge and skills will help you to strategically fight against organised cyber crimes, understand and analyse cyber warfare activities and propose appropriate defensive and offensive mechanisms to reduce or eliminate those risks.
You will have close and active contact with industry experts with the opportunity to attend regular industry guest lecture programs in cybersecurity while you operate within a well-formed professional and ethical framework.
This course contains five modules as follows:
Cyber Forensics and Malware Investigation
You will develop the skills, methodologies and processes to conduct in-depth computer and network investigation, including malware analysis and reversing techniques. This module provides early preparation for you to complete the Certified Cyber Forensics Professional (CCFP) exam.
Information Security in Practice
You will study threats to information security, technologies used to detect and combat them, and techniques and tools used to manage and investigate incidents. This module prepares you to complete the Certified Information Systems Security Professional (CISSP) exam.
Penetration Testing and Exploit Development
You will study network and host-based penetration testing tools and techniques and methods for vulnerability detection, exploiting development and countermeasures. This course provides the information needed in order to obtain ethical hacking and exploit development certifications.
Cyber Threat Intelligence
You will study techniques for detecting, responding to and defeating organised cyber crimes and cyberwar activities, analysing successful and unsuccessful advanced persistent threats and malware campaigns.
You will work under the direction of an academic supervisor to research a suitable problem and to develop and evaluate a solution that demonstrates originality in the application of your knowledge.
The minimum entry requirement is a 2.2 honours in Computer Science or other related computing discipline with knowledge of programming and networking. Other applicants with a strong cyber security background are welcome to apply and will be considered on a case-by-case basis.
Accreditation of Prior Learning (APL)
We welcome applications from students who may not have formal/traditional entry criteria but who have relevant experience or the ability to pursue the course successfully.
The Accreditation of Prior Learning (APL) process could help you to make your work and life experience count. The APL process can be used for entry onto courses or to give you exemptions from parts of your course.
Two forms of APL may be used for entry: the Accreditation of Prior Certificated Learning (APCL) or the Accreditation of Prior Experiential Learning (APEL).
English Language Requirements
International applicants will be required to show a proficiency in English. An IELTS score of 6.5 (no element below 5.5) is proof of this.
Suitable for graduates of a computing subject that includes programming and networking, and who love to go down to a low level to discover how things work.
- Full-time: £7,560
- Part-time: £1,260 per 30 credit module
- Full-time International: £13,860. Part time £6,930
You should also consider further costs which may include books, stationery, printing, binding and general subsistence on trips and visits.
- Projects and assignments enable you to apply what you have learned to a realistic problem; to develop independent learning skills; to demonstrate an ability make decisions in uncertain situations; and to develop your ability to compare and contrast alternative technologies.
- Group activities in class are used to develop your team working and professional skills (though all assessment is individual).
- Supervised work in computer laboratories is used to put into practice principles you have covered in supporting lectures.
- Research skills are integral to the program, and you will be required to critique examples of work and then carry out your own research-based investigations in our assignments.
- The issue of professionalism and ethics is woven in throughout the programme, and issues must be identified and addressed as part of all assignments and projects.
- Examination (25%) assesses your immediate response tosmall or medium unseen problems
- Coursework (40%) assesses your considered and in-depth response to a larger problem
- Project (35%) assesses your ability to work independently, to plan a significant activity and, in carrying out the plan, to demonstrate originality in the application of your knowledge.
Graduates from this course can work in a wide variety of technical security roles within business, banking, software, networking, government, consultancy, etc. This would include roles such as malware analyzer, penetration tester, information security manager, security consultant, forensics investigator or security programmer. There is a significant worldwide skills shortage in this area, particularly for graduates with the in-depth technical knowledge and skills that are developed by this course.
Links with Industry
This course has contacts with local industry such as software companies (such as Web Applications UK), infrastructure providers (such as UKFast) and security consultants (such as KPMG). These companies will provide you with a real-world perspective to help you appreciate the barriers that exist and the compromises that must be made to manage conflicting demands (known as the C-I-A triad).
Your MSc project will need you to demonstrate “originality in the application of knowledge”. Given a suitable topic, this may be able to be developed into an area where you can undertake a higher research degree to demonstrate “an original contribution to knowledge” which is the target for a PhD. You will get a chance to learn about the research interests of the University’s research active staff in order to help you develop a suitable topic. This may be directly in a security field, or applications of other fields of computing such as artificial intelligence or big data in cyber security and cyber forensics.
A specialised security laboratory is provided where computers can be wired independently of the University’s normal network infrastructure, allowing a safe environment where you can experiment with exploits, attacks and defences.You will be required to address ethical issues and to accept a higher degree of network monitoring in order to show you take these ethical responsibilities very seriously.
This school offers programs in:
Last updated April 10, 2018