Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.
Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies and resources, including:
- A dedicated forensics computer laboratory.
- Over 30 computing laboratories with an extensive range of specialist and other software providing access to Linux/UNIX, Windows and Mac OS, all supported by high-bandwidth networks.
- Access to a range of free software titles through a number of academic initiatives for use on home computers for educational and personal purposes.
- Specialist technicians to ensure you can get the most out of these technologies.
The following modules are indicative of what you will study on this course. For more details on course structure and modules, and how you will be taught and assessed, see the Programme Specification document.Core modules
- Cyber Security Evidence and Procedure
- Fundamentals of Security Technology
- Internet Security
- Research Methods and Professional Practice
- Cyber Security and Forensics Project
- Advanced Computer Forensics
- Computer System Tools
- Data Recovery and Analysis
- Cyber Security Applications
- Cyber Security Threats and Countermeasures
- Risk Management
You are usually expected to have a good degree (generally an upper second class honours) in a computing-related discipline from a UK university or overseas equivalent. If your first degree does not have a strong computing element then your work experience and other qualifications may also be taken in to account.
You should submit a statement of purpose with your application in which you present your key interests and career aspirations and how you believe the course can help you to achieve these, as well as the relevant qualities and experience you will bring to the course. You may be invited by the admissions tutor an informal interview.
If your first language is not English, you should have an IELTS score of 6.0 overall, with a score of 6.0 in each element
The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:
- Researcher in Applied Cryptography
- Researcher in Network/Computer Security
- IT Security Engineer
- Computer Security Incident Responder
- Source Code Auditor
- IT Security Operations Specialist
- Cyber Security Manager
- Information Security Analyst
- Information Security Consultant
- Information Security Assurance Officer
- Information Security Assurance Analyst
- Information Security Risk Officer
- Security Officer
- Penetration Tester (also known as Ethical Hacker)
- Vulnerability Assessor
- Computer Forensics Analyst
- Anti-Piracy/Content Protection Analyst
About the School
The University of Westminster is a dynamic international education institution with a distinguished 175-year history. With three campuses in central London (Cavendish, Marylebone and Regent) and one i ... Read More