Course overview
Our MSc Cyber Security gives you a critical understanding of information governance and assurance, combined with technology risk management practices. You learn how to explore the threat landscape and develop countermeasures for cyber security attacks. You also study security for the Internet of Things (IoT) and the security concepts and technologies used in mobile devices.
You work in industry standard network studios that have an isolated network to use to support your learning. Studios also have a dedicated server room, enabling you to test the level of security on the networks you build. This course not only covers technical skill development, it also identifies the issues surrounding the often neglected weakest link in security systems – people. You explore a range of topics from Hacking the Human, IT Ethics and Law, through to IoT, Mobile and Systems Security. You develop your understanding of technology, cryptography, infrastructure, and the human impact on security.
There are three routes you can choose from to gain an MSc Cyber Security:
- full-time - 1 year (September start) or 16 months (January start, including 1 summer break) or 1 year (May start)
- full-time with advanced practice - 20 months (September start, including 1 summer break) or 2 years (January start, including 2 summer breaks) or 20 months (May start, including 1 summer break)
- part-time - 2 years.
Course details
Course structure
Core modules
You undertake a major, in-depth, individual study in an aspect of your course. Normally computing master’s projects are drawn from commercial, industrial or research-based problem areas. The project involves you in researching and investigating aspects of your area of study and then producing a major deliverable, for example software package or tool, design, web-site and research findings. You also critically evaluate your major deliverable, including obtaining third party evaluation where appropriate.
The major deliverable(s) are presented via a poster display, and also via a product demonstration or a conference-type presentation of the research and findings. The research, project process and evaluation is reported via a paper in the style of a specified academic conference or journal paper. The written report, the major deliverable and your presentation of the product are assessed.
The project management process affords supported opportunities for goal setting, reflection and critical evaluation of achievement.
Cyber Risk and Vulnerability Management
You explore cyber security risk assessment and guidance models, practices, tools and techniques to address threats or vulnerabilities. You also look at how to identify common threats and vulnerabilities using appropriate tools and techniques.
You explore ethical hacking practices to identify and mitigate security vulnerabilities, gaining hands-on experience with techniques including penetration testing, attack vectors and models and vulnerability analysis . You assess how AI can be used for both offensive and defensive security purposes.
You explore what is increasingly recognised as one of the most important areas and greatest threats of cybersecurity - the human being. Criminals are increasingly targeting people as an easy way to access a computer system, this is summed up in a famous quote by a well-known writer on cybersecurity, Bruce Schneier ‘Only amateurs attack machines; professionals target people’.
You explore what these types of cybersecurity threats are and what steps individuals and organisations can take to mitigate against them.
Assessment is a case study, exploring cybersecurity event involving issues of human behaviour. You produce a 4000 - 5000 word report identifying and discussing these issues and proposing some solutions for future prevention.
You explore the key legal issues to consider if you are anticipating a career in the IT industry. Key topics include introduction to the English legal system, intellectual property rights, computer crime, computer contracts and liability, privacy and data protection. You apply the legal principles studied to realistic scenarios and case studies from the real-world.
You are assessed through a continuous assessment which explores a current IT or computing issue from a legal and ethical point of view in the form of a mini investigative report.
Mobile Systems and Cyber Security
You gain a thorough understanding of the concepts and technologies used in modern mobile devices such as phones, PDAs and laptops. You learn about the hardware used by mobile devices and the networking technologies that allow them to communicate with each other and the outside world. You also explore data compression techniques and security. You attend a series of lectures, tutorials and seminars.
You are assessed by a 100% ICA. You work individually researching an agreed topic and produce a research report (4,000 words).
You cover theoretical concepts including cryptography and cyber security models alongside the practical issues of cyber attacks and countermeasures. You study topics in access control, symmetric and public key cryptography protocols, digital signatures, authentication protocols, wireless network and security, firewall, network security attacks, penetration testing, intrusion detection and access control lists.
Advanced practice (2 year full-time MSc only)
The internship options are:
Vocational: spend one semester working full-time in industry or on placement in the University. We have close links with a range of national and international companies who could offer you the chance to develop your knowledge and professional skills in the workplace through an internship. Although we cannot guarantee internships, we will provide you with practical support and advice on how to find and secure your own internship position. A vocational internship is a great way to gain work experience and give your CV a competitive edge.
Research: develop your research and academic skills by undertaking a research internship within the University. Experience working as part of a research team in an academic setting. Ideal for those who are interested in a career in research or academia.
Modules offered may vary.
How you learn
You learn about concepts and methods primarily through keynote lectures and tutorials using case studies and examples. Lectures include presentations from guest speakers from industry. Critical reflection is key to successful problem solving and essential to the creative process. You develop your own reflective practice at an advanced level, then test and assess your solutions against criteria that you develop in the light of your research.
How you are assessed
The programme assessment strategy has been designed to assess your subject specific knowledge, cognitive and intellectual skills and transferable skills applicable to the workplace. The strategy ensures that you are provided with formative assessment opportunities throughout the programme which support your summative assessments. The assessments will include assignments, tests, case studies, presentations, research proposal and literature review, and the production of a dissertation. The assessments may include individual or group essays or reports. The assessment criteria, where appropriate, will include assessment of presentation skills and report writing.
Entry requirements
You will normally have a first degree in related discipline (2.2 minimum) or relevant experience or equivalent qualifications. Relevant disciplines include artificial intelligence, computer forensics, computer science, computer security, computing, cyber security, data science, digital forensics, games programming, information technology, software engineering.
In addition, international students will require IELTS 6.0 or equivalent.
For general information please see our overview of entry requirements
International applicants can find out what qualifications they need by visiting Your Country
Employability
Career opportunities
We prepare you for a career in industry. In addition to your taught classes, we create opportunities for you to meet and network with our industry partners through events such as our ExpoSeries, which showcases student work to industry. ExpoTees is the pinnacle of the ExpoSeries with over 100 businesses from across the UK coming to the campus to meet our exceptional students, with a view to recruitment.
Graduates can expect to find employment in one of the increasing number of sectors needing data science specialists, such as the defence industry, financial industry, telecommunications, and health sector.
Information for international applicants
Qualifications
International applicants - find out what qualifications you need by selecting your country below.
Select your country:
Useful information
Visit our international pages for useful information for non-UK students and applicants.