Collaborating with other students and industry professionals, you develop an understanding of technological threats and weaknesses across digital platforms. And you build the skillset to assess threats, manage cyber security technologies and understand the legal, social and political impact of cyber threats.
Your industry relevant skills enable you to:
- understand the risks faced by business and how to mitigate them
- develop innovative approaches to protect networks
- understand the role of the human factor in cyber security.
You undertake a major, in-depth, individual study in an aspect of your course. Normally computing master’s projects are drawn from commercial, industrial or research-based problem areas. The project involves you in researching and investigating aspects of your area of study and then producing a major deliverable, for example software package or tool, design, web-site and research findings. You also critically evaluate your major deliverable, including obtaining third party evaluation where appropriate.
The major deliverable(s) are presented via a poster display, and also via a product demonstration or a conference-type presentation of the research and findings. The research, project process and evaluation is reported via a paper in the style of a specified academic conference or journal paper. The written report, the major deliverable and your presentation of the product are assessed.
The project management process affords supported opportunities for goal setting, reflection and critical evaluation of achievement.
You explore cyber security risk assessment and guidance models, practices, tools and techniques to address threats or vulnerabilities. You also look at how to identify common threats and vulnerabilities using appropriate tools and techniques.
Study the foundations of computer networks and cyber security. You explore network design principles, trends in network usage, the demand for mobile solutions, the bandwidth divide and ethical issues in network design.
You explore what is increasingly recognised as one of the most important areas and greatest threats of cybersecurity - the human being. Criminals are increasingly targeting people as an easy way to access a computer system, this is summed up in a famous quote by a well-known writer on cybersecurity, Bruce Schneier ‘Only amateurs attack machines; professionals target people’.
You explore what these types of cybersecurity threats are and what steps individuals and organisations can take to mitigate against them.
Assessment is a case study, exploring cybersecurity event involving issues of human behaviour. You produce a 4000 - 5000 word report identifying and discussing these issues and proposing some solutions for future prevention.
You explore the key legal issues to consider if you are anticipating a career in the IT industry. Key topics include introduction to the English legal system, intellectual property rights, computer crime, computer contracts and liability, privacy and data protection. You apply the legal principles studied to realistic scenarios and case studies from the real-world.
You are assessed through a continuous assessment which explores a current IT or computing issue from a legal and ethical point of view in the form of a mini investigative report.
You gain a thorough understanding of the concepts and technologies used in modern mobile devices such as phones, PDAs and laptops. You learn about the hardware used by mobile devices and the networking technologies that allow them to communicate with each other and the outside world. You also explore data compression techniques and security. You attend a series of lectures, tutorials and seminars.
You are assessed by a 100% ICA. You work individually researching an agreed topic and produce a research report (4,000 words).
You cover theoretical concepts including cryptography and cyber security models alongside the practical issues of cyber attacks and countermeasures. You study topics in access control, symmetric and public key cryptography protocols, digital signatures, authentication protocols, wireless network and security, firewall, network security attacks, penetration testing, intrusion detection and access control lists.
Modules offered may vary.
How you learn
Using our online learning environment, you are supported by tutors who have worked in the field, and work collaboratively with other students to develop your technical skills and knowledge.
You work on case studies from our industry partners, providing you with experience on real-world scenarios.
How you are assessed
Your subject specific knowledge, cognitive and intellectual skills, and transferable skills are assessed through group essays, reports, case studies, presentations, a research proposal and literature review, and a dissertation.
A UK bachelor’s honours degree (2.2 minimum) or equivalent overseas qualification.
International students require IELTS 6.0 or equivalent.
For general information please see our overview of entry requirements
You are prepared for a career in cyber security in roles such as a security architect, risk assessor, security engineer, or an IT security manager.
Our virtual learning environment (VLE) is the platform you use to access your online course
Teesside University online learning courses are delivered through the Brightspace Learning Environment.
Here are some of the benefits.
- You can use it on your smartphone, tablet and computer.
- And you can use it anytime, so that you can plan your learning to fit your own schedule.
- It's easy to use and navigate.
- Modules are set out by topics and themes. You can use the progress bar to understand where you are in your modules, and appreciate your achievements.
- We support you to become familiar with your VLE, helping you to start learning quickly.
- You get feedback, help and guidance from tutors throughout your course through the VLE, and you can ask questions at any time.
- Our tutors use a live activity feed to keep you updated about your course.
- You can create a student profile, collaborate with other students and take part in online discussion forums.