Course summary

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies and resources, including:

  • a dedicated forensics computer laboratory
  • Over 30 computing laboratories with an extensive range of specialist and other software providing access to Linux/UNIX, Windows and Mac OS, all supported by high-bandwidth networks.
  • Access to a range of free software titles through a number of academic initiatives for use on home computers for educational and personal purposes.
  • Specialist technicians to ensure you can get the most out of these technologies.

Course structure

The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the Programme Specification document.

Core modules

  • Cyber Security Evidence and Procedure
  • Fundamentals of Security Technology
  • Internet Security
  • Research Methods and Professional Practice
  • Cyber Security and Forensics Project

Digital Forensics pathway

  • Advanced Computer Forensics
  • Computer System Tools
  • Data Recovery and Analysis

Cyber Security Pathway

  • Cyber Security Applications
  • Cyber Security Threats and Countermeasures
  • Risk Management

Entry Requirements

You are usually expected to have a good degree (generally an upper second class honours) in a computing-related discipline from a UK university or overseas equivalent. If your first degree does not have a strong computing element then your work experience and other qualifications may also be taken in to account.

You should submit a statement of purpose with your application in which you present your key interests and career aspirations and how you believe the course can help you to achieve these, as well as the relevant qualities and experience you will bring to the course. You may be invited by the admissions tutor an informal interview.

If your first language is not English, you should have an IELTS score of 6.0 overall, with a score of 6.0 in each element

Careers

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;

Program taught in:
English

See 57 more programs offered by University of Westminster »

Last updated February 7, 2019
This course is Campus based
Start Date
Sept. 2019
Duration
1 year
Full-time
Price
13,500 GBP
international - UK/EU: £9,000 (per academic year)
Deadline
By locations
By date
Start Date
Sept. 2019
End Date
Application deadline

Sept. 2019

Location
Application deadline
End Date