The demand for cyber security specialists continues to grow; it is required to cover not only an ever-increasing amount of continually connected IoT devices, sensors and applications, but also the management of security processors, procedures and staff. This course offers an ideal balance between both the managerial competencies required for continual career development and the technical skills needed to confidently design and delivery technical solutions.
This course also includes the BSI ISO 27001 Lead Auditor training certification, the cost of which is included.
- Develop the knowledge, understanding and skills to work as computing security professional.
- Explore a range of cutting-edge systems, tools and techniques in the new state of the art cyber labs
- Gain an appreciation of the role information security has in an organisation and how it can be implemented and managed.
- Attain professional accreditation for your career — BSI ISO27001 Lead Auditor certification.
This course is ideal if you are already working in an IT environment, or wish to specialise in information security.
Due to our strong ties with industry, we regularly have guest speakers. Recent speakers have included industry professionals from Mozilla, South Yorkshire Police, RSA and Blackberry. In 2014 Sheffield Hallam University hosted the North of England's first Ethical Hacking Conference - Steel Con, which is now an annual event.
Learning and teaching involve lectures, seminars and practical tutorial sessions in small groups. You will learn about complex networks, systems and applications. The four main focuses of the course are information security management, ethical hacking, system hardening and computer forensics.
- A good level of general education with good analytical skills
- An ambition to develop to a high level in the area of information security
- A degree 2.2 or above in computing or a closely-related discipline
If English is not your first language you typically need an IELTS 6.0 score with a minimum of 5.5 in all other skills or equivalent.
You can find out more about the country-specific qualifications we accept on our international qualifications page.
This course prepares you for a career in:
- strategy and policy
- information technology
- computer security incident response (CSIRT)
- disaster recovery
- incident and risk management
- business continuity
- applications development
- Secure Network design
- Ethical Hacking and penetration testing
- Information security officer
- SEIM solution senior analyst
Previous graduates of this course have gone on to work for
- Price Waterhouse Coopers
Your chance to work on a project you are passionate about. Undertake in-depth research and experimental design to investigate a problem area of your choice. You will be allocated a supervisor that is a specialist in your area, who will guide you through the dissertation and research process.
Information Security Concepts And Principles
Covers the key principles of cyber security building around confidentiality, Integrity and Availability. We will cover cryptography, PKI, blockchain and project management.
Modern information systems rely on the use and integration of numerous communication technologies and protocols. Designing a secure communication infrastructure is a complex and challenging task which requires knowledge of basic and advanced security principles, secure communication protocols, and a wide variety of technologies. The ability to perform a network security assessment is crucial and also instrumental to a good design. In order to carry out such an assessment, you must be able to choose and apply appropriate tools and methodologies.
Systems and Application Security
Covers the principles of Linux and operating system hardening, as well as elements of OWASP top 10. Understand the underlying security issues common to many systems and applications, penetration testing tools and Authorisation Management
The overall aim of the module is to ensure students understand the key concepts of Web application vulnerabilities and security threats and develop the skills to test and protect vulnerable Web applications. By engaging successfully with this module a student will be able to select and explain the security issues with regards to Web-based applications, technologies and protocols and evaluate methods and technologies.
Incident Handling and Hacking techniques
This module focuses on red team elements of cyber security, building methods taught in other modules to bring you to a more advanced level.
Research Principles And Practice
For CyFor cyber security to grow and evolve just as science has enabled us to understand the universe, create the Internet, prevent and treat diseases, it is necessary to start focusing our Cyber Security research on more scientific methods. This module aims at providing an introduction into what it means to execute science in the context of cyber security research by following rigorous and established methods.
Information Security Management
Building towards the creation of an effective Information security Management System (ISMS). Key areas covered are policy development, risk and asset management, risk treatment plans, incident response and disaster recovery.
Standard Based Security Audit And Assessment
This course is delivered in house by our BSI accredited trainer. You will develop the competencies required to understand, communicate and implement the ISO 27001 standard. These modules will also d also develop your communication, presentation and team working skills to work as professional auditors. This is an exciting opportunity to progress and excel your career in security management and compliance using a world-renowned framework.
Duration and fees
- Start date: September
- Duration: 12 months
- EU students 2019/20 academic year £7,200
- International students 2019/20 academic year £13,500
- Deadline: request info