Skip to main content
Postgraduate study
Applied Cyber Security (Online)

Applied Cyber Security (Online) MSc

Cyber attacks are one of the biggest threats to global security and there is a high demand for specialist skills in this field. This conversion course prepares you for a career in this field.

 

Course overview

Collaborating with other students and industry professionals, you develop an understanding of technological threats and weaknesses across digital platforms. And you build the skillset to assess threats, manage cyber security technologies and understand the legal, social and political impact of cyber threats.

Your industry relevant skills enable you to:

  • understand the risks faced by business and how to mitigate them
  • develop innovative approaches to protect networks
  • understand the role of the human factor in cyber security.

Download pdf

 

Course details

Course structure

Core modules

Computing Masters Project

You undertake a major, in-depth, individual study in an aspect of your course. Normally computing master’s projects are drawn from commercial, industrial or research-based problem areas. The project involves you in researching and investigating aspects of your area of study and then producing a major deliverable, for example software package or tool, design, web-site and research findings. You also critically evaluate your major deliverable, including obtaining third party evaluation where appropriate.

The major deliverable(s) are presented via a poster display, and also via a product demonstration or a conference-type presentation of the research and findings. The research, project process and evaluation is reported via a paper in the style of a specified academic conference or journal paper. The written report, the major deliverable and your presentation of the product are assessed.

The project management process affords supported opportunities for goal setting, reflection and critical evaluation of achievement.

Cyber Risk and Vulnerability Management

You explore cyber security risk assessment and guidance models, practices, tools and techniques to address threats or vulnerabilities. You also look at how to identify common threats and vulnerabilities using appropriate tools and techniques.

Cyber Security and Network Foundations

Study the foundations of computer networks and cyber security. You explore network design principles, trends in network usage, the demand for mobile solutions, the bandwidth divide and ethical issues in network design.

Hacking the Human

You explore what is increasingly recognised as one of the most important areas and greatest threats of cybersecurity - the human being. Criminals are increasingly targeting people as an easy way to access a computer system, this is summed up in a famous quote by a well-known writer on cybersecurity, Bruce Schneier ‘Only amateurs attack machines; professionals target people’.

You explore what these types of cybersecurity threats are and what steps individuals and organisations can take to mitigate against them.

Assessment is a case study, exploring cybersecurity event involving issues of human behaviour. You produce a 4000 - 5000 word report identifying and discussing these issues and proposing some solutions for future prevention.

IT Ethics and Law

You explore the key legal issues to consider if you are anticipating a career in the IT industry. Key topics include introduction to the English legal system, intellectual property rights, computer crime, computer contracts and liability, privacy and data protection. You apply the legal principles studied to realistic scenarios and case studies from the real-world.

You are assessed through a continuous assessment which explores a current IT or computing issue from a legal and ethical point of view in the form of a mini investigative report.

Mobile Systems and Cyber Security

You gain a thorough understanding of the concepts and technologies used in modern mobile devices such as phones, PDAs and laptops. You learn about the hardware used by mobile devices and the networking technologies that allow them to communicate with each other and the outside world. You also explore data compression techniques and security. You attend a series of lectures, tutorials and seminars.

You are assessed by a 100% ICA. You work individually researching an agreed topic and produce a research report (4,000 words).

Network and Systems Security

You cover theoretical concepts including cryptography and cyber security models alongside the practical issues of cyber attacks and countermeasures. You study topics in access control, symmetric and public key cryptography protocols, digital signatures, authentication protocols, wireless network and security, firewall, network security attacks, penetration testing, intrusion detection and access control lists.

 

Modules offered may vary.

 

How you learn

Using our online learning environment, you are supported by tutors who have worked in the field, and work collaboratively with other students to develop your technical skills and knowledge.

You work on case studies from our industry partners, providing you with experience on real-world scenarios.

How you are assessed

Your subject specific knowledge, cognitive and intellectual skills, and transferable skills are assessed through group essays, reports, case studies, presentations, a research proposal and literature review, and a dissertation.

 

Entry requirements

A UK bachelor’s honours degree (2.2 minimum) or equivalent overseas qualification.

International students require IELTS 6.0 or equivalent.

For general information please see our overview of entry requirements

 

Employability

Career opportunities

You are prepared for a career in cyber security in roles such as a security architect, risk assessor, security engineer, or an IT security manager.

 

Learning platform

Our virtual learning environment (VLE) is the platform you use to access your online course

 

Teesside University online learning courses are delivered through the Brightspace Learning Environment.

Here are some of the benefits.

  • You can use it on your smartphone, tablet and computer.
  • And you can use it anytime, so that you can plan your learning to fit your own schedule.
  • It's easy to use and navigate.
  • Modules are set out by topics and themes. You can use the progress bar to understand where you are in your modules, and appreciate your achievements.
  • We support you to become familiar with your VLE, helping you to start learning quickly.
  • You get feedback, help and guidance from tutors throughout your course through the VLE, and you can ask questions at any time.
  • Our tutors use a live activity feed to keep you updated about your course.
  • You can create a student profile, collaborate with other students and take part in online discussion forums.

Software requirements

 
 

Online learning

Online learning allows you to get a university-level qualification from the comfort of your own home or workplace. You'll have access to all of the world-class teaching and support that Teesside University has to offer, but all of your lectures, tutorials and assessments will take place online.

Find out more

University of the Year

Teesside University was named University of the Year at the Edufuturists Awards 2022.

Full-time

  • Not available full-time
 

Part-time

2025-26 entry

Fee for all applicants
£930 for each 20 credits

£8,370 in total. Not eligible for any fee discounts

More details about our fees

  • Length: 2 years
  • Attendance: 100% online
  • Start date: September
  • Semester dates

Apply now (part-time)

Apply now (part-time)

Enquire now

 

Choose Teesside

 
 

Get in touch

Contact us

Email: onlinelearning@tees.ac.uk

Telephone: 01642 738801


Online chat (general enquiries)

 

Open days and events

Sat

18

Jan

Postgraduate open day

9.00am - 3.00pm

On campus


Book now

Go to top menu