Taught course

Network and Information Security

Kingston University · Computing and Information Systems

Entry requirements

Good honours degree or equivalent in a relevant subject, or substantial work experience.

Please note: each application is assessed on an individual basis and may be subject to additional requirements, such as undertaking short course(s), work experience and/or English language qualification(s).

Meeting particular minimum entry requirements does not automatically guarantee a place.

Months of entry

January, September

Course content

Computer network and information security is of increasing importance – new legislation, technologies, vulnerabilities and threats necessitate frequent system updates. This course aims to equip you with technical knowledge of current and emerging technologies and an understanding of the underlying theory of cryptography, networking and network security technologies.

You will learn to assess, plan, design and develop secure and reliable networks and systems. You can combine this course with management studies.

  • This course is accredited by BCS, The Chartered Institute for IT.
  • The course is taught in a specialist data communications lab with access to the latest networking and security equipment from vendors such as Cisco, Microsoft and Clavister. Current and emerging technology will also be demonstrated by representatives from industry.
  • You will have the option to work in one of our state-of-the-art research labs, called WMN (Wireless Multimedia and Networking). WMN is involved in EU and UK research collaborations and offers opportunities for advanced research and short-term research fellowships on completion of your MSc degree.

What will you study

You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

Core modules

Please note that this is an indicative list of modules and is not intended as a definitive list.

  • Cryptography and Applications
  • Network and Information Security
  • Data Communications
  • Project Dissertation
  • One option module

Option modules

  • Multimedia Communications

This module addresses the theory and practice of multimedia communication systems and networks, with a special focus on multimedia signals (audio, images and video) and relevant compression and transmission techniques.

  • Wireless Communications and Networks

This module addresses theory and practice of wireless communication systems and networks, including the most recent wireless communication standards. This module will focus on the propagation characteristics of wireless channels and the main techniques for efficient communication, including modulation and channel coding. Practical and useful knowledge of the wireless industry will be provided to include real-world wireless systems and networks covering wireless broadband systems and wireless sensor networks.

  • Mobile Security

This module will provide you with a comprehensive knowledge into the main areas of mobile computing and its security aspects. Mobile communication modalities will be covered, including 3G/4G communication networks, Wi-Fi and personal area networks, mobile privacy and ethical issues. The gained knowledge will be applied in different mobile computing business environments such as mobile healthcare (m-health), mobile commerce (m-commerce), mobile learning (m-learning) and mobile web services (m-WS). Mobile security assessment will be introduced in order to formulate appropriate security requirements.

Key management protocols in typically ad hoc, wireless and location-dynamic environments will be presented and analysed. Emerging topics such as the Internet of Things (IoT), mobile clouds and distributed social network security will also be discussed. The module also provides hands-on practical exposure to apps development in location and context aware environments.

Work placement scheme

Many postgraduate courses at Kingston University allow students to do a 12-month work placement as part of their course. The responsibility for finding the placement is with the student; we cannot guarantee the placement, just the opportunity to undertake it. As the work placement is an assessed part of the course, the work placement is covered by a student's tier 4 visa.

Information for international students

All non-UK applicants must meet our English language requirements. For this course it is Academic IELTS of 6.5 overall with 6.0 in Writing and 5.5 in Reading, Listening and Speaking. Read our full guidance about English language requirements, which includes details of other qualifications we'll consider: English language requirements at Kingston University

Fees and funding

Please see Network & Information Security / with Management Studies Masters (MSc): Fees and bursaries for further details.

Qualification and course duration


full time
12 months
part time
24-36 months

Course contact details

08448 547683/+44 (0)20 3308 9931