Skip to main content
Postgraduate study
Cyber Security

Cyber Security MSc

Cyber security relates to the technologies, processes and controls that are designed to protect systems, networks and data from cyber attacks. Graduates who understand the practices that underpin secure computer systems are in great and ever-growing demand.

 

Course overview

Accredited

Our MSc Cyber Security gives you a critical understanding of information governance and assurance, combined with technology risk management practices. You learn how to explore the threat landscape and develop countermeasures for cyber security attacks. You also study security for the Internet of Things (IoT) and the security concepts and technologies used in mobile devices.

You work in industry standard network studios that have an isolated network to use to support your learning. Studios also have a dedicated server room, enabling you to test the level of security on the networks you build. This course not only covers technical skill development, it also identifies the issues surrounding the often neglected weakest link in security systems – people. You explore a range of topics from Hacking the Human, IT Ethics and Law, through to IoT, Mobile and Systems Security. You develop your understanding of technology, cryptography, infrastructure, and the human impact on security.

There are three routes you can choose from to gain an MSc Cyber Security:

  • full-time - 2 years with advanced practice (September and January start)
  • full-time - 1 year (September start) or 16 months (January start)
  • part-time - 2 years.

Download pdf Order prospectus

 

Course details

Course structure

Core modules

Computing Masters Project

You undertake a major, in-depth, individual study in an aspect of your course. Normally computing master’s projects are drawn from commercial, industrial or research-based problem areas. The project involves you in researching and investigating aspects of your area of study and then producing a major deliverable, for example software package or tool, design, web-site and research findings. You also critically evaluate your major deliverable, including obtaining third party evaluation where appropriate.

The major deliverable(s) are presented via a poster display, and also via a product demonstration or a conference-type presentation of the research and findings. The research, project process and evaluation is reported via a paper in the style of a specified academic conference or journal paper. The written report, the major deliverable and your presentation of the product are assessed.

The project management process affords supported opportunities for goal setting, reflection and critical evaluation of achievement.

Cyber Risk and Vulnerability Management

You explore cyber security risk assessment and guidance models, practices, tools and techniques to address threats or vulnerabilities. You also look at how to identify common threats and vulnerabilities using appropriate tools and techniques.

Hacking the Human

You explore what is increasingly recognised as one of the most important areas and greatest threats of cybersecurity - the human being. Criminals are increasingly targeting people as an easy way to access a computer system, this is summed up in a famous quote by a well-known writer on cybersecurity, Bruce Schneier ‘Only amateurs attack machines; professionals target people’.

You explore what these types of cybersecurity threats are and what steps individuals and organisations can take to mitigate against them.

Assessment is a case study, exploring cybersecurity event involving issues of human behaviour. You produce a 4000 - 5000 word report identifying and discussing these issues and proposing some solutions for future prevention.

IoT Security

There has been a rapid growth within the field of the Internet of Things (IoT). IoT is applied in environmental monitoring, smart homes, industrial controls and digital cities. IoT incorporates various techniques, including wireless sensor networks, embedded systems, ubiquitous computing, and machine learning that involve unique IoT devices with a distinct set of security risks.

You explore the important concepts in IoT - the use of Internet technologies to access and interact with objects in the physical world. You also develop the capability to understand potential security risks and produce security architecture of IoT systems. This incudes IoT architecture, IoT operating systems and platforms, low power communications, IoT data analysis, IoT security and identity recognition. You also gain experience of practical skills required for the programming of IoT devices.

Assessment is through 100% continuous assessment where you build a project, which addresses challenges in the IoT security area.

IT Ethics and Law

You explore the key legal issues to consider if you are anticipating a career in the IT industry. Key topics include introduction to the English legal system, intellectual property rights, computer crime, computer contracts and liability, privacy and data protection. You apply the legal principles studied to realistic scenarios and case studies from the real-world.

You are assessed through a continuous assessment which explores a current IT or computing issue from a legal and ethical point of view in the form of a mini investigative report.

Mobile Systems and Cyber Security

You gain a thorough understanding of the concepts and technologies used in modern mobile devices such as phones, PDAs and laptops. You learn about the hardware used by mobile devices and the networking technologies that allow them to communicate with each other and the outside world. You also explore data compression techniques and security. You attend a series of lectures, tutorials and seminars.

You are assessed by a 100% ICA. You work individually researching an agreed topic and produce a research report (4,000 words).

Network and Systems Security

You cover theoretical concepts including cryptography and cyber security models alongside the practical issues of cyber attacks and countermeasures. You study topics in access control, symmetric and public key cryptography protocols, digital signatures, authentication protocols, wireless network and security, firewall, network security attacks, penetration testing, intrusion detection and access control lists.

 

Advanced practice (2 year full-time MSc only)

Internship

The internship options are:

Vocational: spend one semester working full-time in industry or on placement in the University. We have close links with a range of national and international companies who could offer you the chance to develop your knowledge and professional skills in the workplace through an internship. Although we cannot guarantee internships, we will provide you with practical support and advice on how to find and secure your own internship position. A vocational internship is a great way to gain work experience and give your CV a competitive edge.

Research: develop your research and academic skills by undertaking a research internship within the University. Experience working as part of a research team in an academic setting. Ideal for those who are interested in a career in research or academia.


 

Modules offered may vary.

 

How you learn

You learn about concepts and methods primarily through keynote lectures and tutorials using case studies and examples. Lectures include presentations from guest speakers from industry. Critical reflection is key to successful problem solving and essential to the creative process. You develop your own reflective practice at an advanced level, then test and assess your solutions against criteria that you develop in the light of your research.

How you are assessed

The programme assessment strategy has been designed to assess your subject specific knowledge, cognitive and intellectual skills and transferable skills applicable to the workplace. The strategy ensures that you are provided with formative assessment opportunities throughout the programme which support your summative assessments. The assessments will include assignments, tests, case studies, presentations, research proposal and literature review, and the production of a dissertation. The assessments may include individual or group essays or reports. The assessment criteria, where appropriate, will include assessment of presentation skills and report writing.

 

Entry requirements

You will normally have a first degree in related discipline (2.2 minimum) or relevant experience or equivalent qualifications. Relevant disciplines include artificial intelligence, computer forensics, computer science, computer security, computing, cyber security, data science, digital forensics, games programming, information technology, software engineering.

In addition, international students will require IELTS 6.0 or equivalent.

For general information please see our overview of entry requirements

International applicants can find out what qualifications they need by visiting Your Country

 

Employability

Career opportunities

We prepare you for a career in industry. In addition to your taught classes, we create opportunities for you to meet and network with our industry partners through events such as our ExpoSeries, which showcases student work to industry. ExpoTees is the pinnacle of the ExpoSeries with over 100 businesses from across the UK coming to the campus to meet our exceptional students, with a view to recruitment.

Graduates can expect to find employment in one of the increasing number of sectors needing data science specialists, such as the defence industry, financial industry, telecommunications, and health sector.

 

Information for international applicants

Qualifications

International applicants - find out what qualifications you need by selecting your country below.

Select your country:
  
 

Useful information

Visit our international pages for useful information for non-UK students and applicants.

Talk to us

Talk to an international student enrolment adviser

 
 

Professional accreditation

bcs Accredited Degree

This degree is accredited by the British Computer Society (BCS). Accreditation entitles you to professional membership of the BCS, which is key for becoming a Chartered IT Professional. Some employers recruit preferentially from accredited degrees, and it is more likely to be recognised internationally.

Full-time

2024/25 entry

Fee for UK applicants
£7,365 a year

£4,770 a year with advanced practice

More details about our fees

Fee for international applicants
£17,000 a year

£10,000 a year with advanced practice

More details about our fees for international applicants

  • Length: within 1 year (September start), 16 months (January start) or 2 years with advanced practice (September or January start)
  • Start date: September or January
  • Semester dates

Apply now (full-time)

 

Part-time

2024/25 entry

Fee for UK applicants
£820 for each 20 credits

More details about our fees

Apply now (part-time)

Apply now (part-time)

 

Choose Teesside

 
 

Get in touch

UK students

Email: scedtadmissions@tees.ac.uk

Telephone: 01642 738801


Online chat (general enquiries)

International students

Email: internationalenquiries@tees.ac.uk

Telephone: +44 (0) 1642 738900


More international contacts

 

Open days and events

Go to top menu