Honours degree or an equivalent qualification in a computing discipline, or an unclassified degree in computing plus professional experience within the field of computing.
Months of entry
Information and communication technology are essential in the modern world, but as the number and sophistication of security grows we face increasingly frightening possible scenarios. This has led to an increasing requirement for people with understanding of the depth of security implications that come with such technology and the highest standards of professionalism and grasp of the associated legal and ethical considerations.
The MSc in Cyber Security provides students with the knowledge and necessary skillset in several core areas of cyber security. The programme aims to provide a comprehensive and deep understanding of the security principles as well as the practical techniques used in solving security problems and addressing relevant issues.
WHY CHOOSE THIS COURSE?
Students on the course can benefit from a combination of practical experience, theoretical exploration and investigation of the legal and ethical frameworks that apply to professions in cyber security.
The course makes use of our specialist labs for networking and cyber security, each with 42 seats and a range of equipment from RF scanners and smart-card readers to forensics workstations, plus access to our high-powered virtual network services.
Students will be given the opportunity for ACE accreditation while on the course, subject to passing the assessment.
WHAT WILL I LEARN?
The subjects on the course include:
Ethical Hacking. A practical approach to testing security and also one of the best ways to learn the finer points of how systems are constructed is through penetration testing. The course encourages students to explore in a safe environment and provides a number of carefully constructed scenarios and challenges as well as the opportunity to take part in international competitions with our CTF (Capture the Flag) team, the Ethical Slackers.
Network Security. A fundamental aspect of security is the architecture of communication and the course makes use of our specialist labs and equipment to give people as much hands-on experience as possible to help make the theory understandable.
Incident Response. Security is essential, but no matter how much time and money is spent on it, breaches happen. New vulnerabilities and attack vectors are discovered regularly and it’s critical that an organisation knows how to respond once a breach occurs.
Digital Data Acquisition, Recovery and Analysis. Data recovery and analysis covers a wide range of activities, from log analysis to identify misuse or data exfiltration to gathering evidence suitable for prosecution and even the most basic tasks of recovering from system failure.
Secure Design and Development. As well how to build systems from off-the-shelf components securely, analyse and breach systems, the course covers the ways in which software is designed and built to be secure. From formal methods to code review, we examine how industry tackles the problem of insecure software.
Cryptography. It’s obvious that secure communication is underpinned by cryptography, but it is also essential in areas such as proof of identity and ownership; escrow; password storage and more.
Security of Emerging Connected Systems. The Internet of Things (IoT) is a term we see more often than ever now, and it refers to the tide of devices that are interconnected and tapped into the Internet that we have in our homes and workplaces. Manufacturers of consumer electronics are fast converting their products to become “smart”, often without understanding the security implications that software developers in traditional firms hopefully do. A number of interesting security vulnerabilities have come to light recently and the expectation is that this will grow rapidly. Outside of the home, the industrial application of connected devices is just starting to become more commonplace and the security issues of IoT are about to become problematic there, too.
Students can investigate specialisms on the course, such as Automotive Cybersecurity, Digital Security Risk and Audit Management or Cyber Security Management and Leadership.
Every student on the course conducts a Cyber Security Individual Project, with a course team member as their supervisor. Projects cover the whole range of the subject area.
HOW WILL THIS COURSE BE TAUGHT?
The course is taught using a mixture of lectures, seminars and labs. We make use of virtualisation to allow students to work on a range of operating systems and experience networks of interacting systems. The specialist networking and security labs are used to provide a secure environment for exploration and experimentation.
HOW WILL I BE ASSESSED?
Assessment will be by a mixture of individual and group work, tests, quizzes, presentations, exams and reports.
Information for international students
Click here for information for international students.