Cyber Security – MSc

Cyber Security – MSc

Specialism
Certification
MSc
Qualification level
MSc
Location
Bradford
Study type
Classroom
Duration
1 year full time, 2 years part time
Price
View website

About the course

Course content

The main goal of MSc Cyber Security is to prepare professionally trained graduates for industry. It has been designed to offer graduates the opportunity to develop a deeper understanding of cyber security as a discipline. The focus within this programme on the principles, technologies and practices of cyber security helps you to gain the appropriate skills for future PhD studies and research careers as well as to become competent practitioners. The programme comprises particular developments in security with a firm base in academic research and also offers the opportunity for you to study selected topics in advanced computer science.

Included in the programme is the opportunity to enhance industry relevant skills with study in ISO27001 Lead Implementer and Ethical Hacking. These skill areas were highlighted by past alumni and industry practitioners for inclusion in the programme. Therefore, you have the opportunity to gain additional qualifications in: Certified ISO/IEC 27001 Lead Implementer; and CEH v8 Ethical Hacking.

This programme meets a continued growing demand for specialists in this area by offering a way for individuals in current employment with relevant industry experience as well as recent graduates to study and enhance and develop their skills. The MSc Cyber Security programme will therefore draw graduates wishing to enhance their undergraduate studies in computing with advanced study of security to equip them for senior positions with responsibility for the IT technical and management based security of an organisation. In addition, the programme encourages those with relevant industry skills to specialise in cyber security or refine and develop their existing expertise. 

Professional accreditation

This course is accredited by the British Computer Society.

It is also provisionally certified by GCHQ.

Our ISO 27001 Lead Auditor Training is Certified by the Professional Evaluation and Certification Board (PECB).

What you will study

The MSc programme in Cyber Security is intended to respond to current academic challenges provided by increasing reliance on computers and networks for core business activity and to meet commercial needs for employees who are able.

Core Modules

  • Business Systems Security
  • Networks and Protocols
  • Foundations of Cryptography (PG)
  • Internet Security and Protocols
  • ISO27000 Framework (Information Security Management System)
  • Ethical Hacking
  • Dissertation

Learning and assessment

The programme includes innovative and active learning methods. Throughout your programme, we make use of case studies so that you can apply your theoretical understanding to real-world issues. In this way, abstract concepts are brought to life through practical activities. We also use methods associated with the “flipped classroom” where content is outside the classroom leaving more time and space for activities and active learning within tutorial and lecture sessions.

Career prospects

The course is designed to equip graduates for senior positions with responsibility for the IT-based security of an organisation.

The University is committed to helping students develop and enhance employability and this is an integral part of many programmes. Specialist support is available throughout the course from Career and Employability Services including help to find part-time work while studying, placements, vacation work and graduate vacancies. Students are encouraged to access this support at an early stage and to use the extensive resources on the Careers website.

Discussing options with specialist advisers helps to clarify plans through exploring options and refining skills of job-hunting. In most of our programmes there is direct input by Career Development Advisers into the curriculum or through specially arranged workshops.

Contact the course provider: