Course overview
Digital innovation continues to push the boundaries of what is possible within growing companies across all sectors of the globe. However, innovation also unearths vulnerabilities, and our MSc Applied Cyber Security course provides you with the tools and skills needed to make informed, critical decisions when implementing cybersecurity solutions for complex real-world problems.
Designed with future facing learning in mind, you learn the fundamentals of software for digital innovation, big data and business intelligence, and agile development. You also explore professional, ethical, security and social implications of cyber security and acquire a range of practical, professional and transferable skills, including the ability to:
- apply advanced, in-depth knowledge of complex cyber security concepts
- analyse and synthesise information at a postgraduate research level
- make informed, critical decisions when applying cybersecurity solutions to complex real-world problems
- analyse and transform data, helping you influence organisational decisions and strategy
- develop strong technical and interpersonal skills to make an immediate impact on major cybersecurity projects
- understand the professional, ethical and legal responsibilities while providing the technical skills needed for immediate impact in your field.
Alongside this qualification, you have the opportunity to gain Microsoft, Adobe and Amazon Web Services (AWS) certifications. This course is ideal for those looking to take the next step in their academic and professional careers.
* Subject to University approval
Course details
Course structure
Core modules
You undertake a major, in-depth, individual study in an aspect of your course. Normally computing master’s projects are drawn from commercial, industrial or research-based problem areas. The project involves you in researching and investigating aspects of your area of study and then producing a major deliverable, for example software package or tool, design, web-site and research findings. You also critically evaluate your major deliverable, including obtaining third party evaluation where appropriate.
The major deliverable(s) are presented via a poster display, and also via a product demonstration or a conference-type presentation of the research and findings. The research, project process and evaluation is reported via a paper in the style of a specified academic conference or journal paper. The written report, the major deliverable and your presentation of the product are assessed.
The project management process affords supported opportunities for goal setting, reflection and critical evaluation of achievement.
Cyber Risk and Vulnerability Management
You explore cyber security risk assessment and guidance models, practices, tools and techniques to address threats or vulnerabilities. You also look at how to identify common threats and vulnerabilities using appropriate tools and techniques.
Cyber Security and Network Foundations
You learn the essential building blocks of computer networks and cyber security. You also look at how networks are designed, current trends in how we use them, the growing need for mobile connectivity, the challenges around bandwidth, and the ethical questions that come with network design.
You explore what is increasingly recognised as one of the most important areas and greatest threats of cybersecurity - the human being. Criminals are increasingly targeting people as an easy way to access a computer system, this is summed up in a famous quote by a well-known writer on cybersecurity, Bruce Schneier ‘Only amateurs attack machines; professionals target people’.
You explore what these types of cybersecurity threats are and what steps individuals and organisations can take to mitigate against them.
You explore the key legal issues to consider if you are anticipating a career in the IT industry. Key topics include introduction to the English legal system, intellectual property rights, computer crime, computer contracts and liability, privacy and data protection. You apply the legal principles studied to realistic scenarios and case studies from the real-world.
Mobile Systems and Cyber Security
You gain a thorough understanding of the concepts and technologies used in modern mobile devices such as phones, tablets and laptops. You learn about the hardware used by mobile devices and the networking technologies that allow them to communicate with each other and the outside world. You also explore data compression techniques and security. You attend a series of lectures, tutorials and seminars.
You cover theoretical concepts including cryptography and cyber security models alongside the practical issues of cyber attacks and countermeasures. You study topics in access control, symmetric and public key cryptography protocols, digital signatures, authentication protocols, wireless network and security, firewall, network security attacks, penetration testing, intrusion detection and access control lists.
Modules offered may vary.
How you learn
You learn concepts and methods through lectures, labs and tutorials using case studies and examples. Lectures include presentations from industry guest speakers. Critical reflection is key to successful problem solving and essential to the creative process. You develop reflective practice at an advanced level, then test and assess solutions against criteria through research.
Expect blended delivery of learning material, with a mix of face-to-face and online learning.
How you are assessed
You are assessed on your subject-specific knowledge, cognitive and intellectual skills and transferable skills applicable to the workplace. The assessments include assignments, tests, case studies, presentations, a research proposal and a literature review, and a dissertation. The assessments may include individual or group essays or reports. The assessment criteria, where appropriate, include assessment of presentation skills and report writing.
Entry requirements
A UK bachelor’s honours degree (2.2 minimum) or equivalent overseas qualification.
For general information please see our overview of entry requirements
International applicants can find out what qualifications they need by visiting our international country pages.
Employability
Career opportunities
The MSc Applied Cyber Security course lends itself to a wide range of professional opportunities and job roles throughout this field for those either just beginning their journey or those who want to build on this qualification using the skills and experience they already have in this area.
Early career roles include:
- Cyber Security Analyst/Consultant
- Information Securities Officer
- Incident Response Analyst
- Vulnerability Analyst.
- Security Architect
- Cloud Security Engineer
- Governance, Risk & Compliance (GRC) Specialist
- Identity and Access Management (IAM) Analyst.
Information for international applicants
Qualifications
International applicants - find out what qualifications you need by selecting your country below.
Select your country:
Useful information
Visit our international pages for useful information for non-UK students and applicants.