Cyber Security

Bachelor's degree

In Telford

Price on request

Description

  • Type

    Bachelor's degree

  • Location

    Telford

  • Duration

    1 Year

The exponential increase in mobile devices, converged applications and Cloud technologies, initiatives such as Bring your Own Device (BYOD) / Choose Your Own Device (CYOD) and the advent of digital information technologies, has increased the proliferation of threats in our vibrant and active cyber-physical-natural environment diluting further its perimeter. Our cyberspace is constantly increasing its size almost linearly to its value recognising Cyber Security as a global response to the challenges posed by constantly evolving systems which are harder to secure. The MSc Cyber Security seeks to address the increasing demand for Cyber Security related domains in both academic, vocational qualifications and projection for an increased shortage of Cyber Security professionals in the industry. The course has been designed by a team of leading experts, researchers and trainers in the field and gives the opportunity to the students to be exposed to cutting-edge technologies, tools and techniques in cyber exploitation and defence.

Students also have full access to a dedicated Virtual Security Operations Centre (VSoC) established in close collaboration with the industry in a blended programme that amalgamates Governance, Risk and Compliance (GRC) and technical skills required by Cyber Security Professionals. The MSc Cyber security is one of the few courses in the UK to internally host such a platform available to students as part of their course and personal development in the field of Information security.

Facilities

Location

Start date

Telford (Shropshire)
See map
Level 3 Southwater One, Southwater Sqare, Southwater Way, TF3 4JG

Start date

On request

About this course

The educational aims of the course with regards to knowledge and skills gained are:
You will enhance critical understanding and synthesis skills with regards to security processes, techniques and methodologies around cyber security in a blended learning environment with strong hands-on explication using cutting-edge software and hardware. The course will cover cyber defence elements and state-of-the-art in exploitation techniques, threats and security risks in both targeted and multi-stage cyber-attacks in the cyberspace.
You should be able to identify and mitigate security violations across the cyberspace with a strong emphasis on Governance, Risk and Compliance (GRC) frameworks and standards; and the importance of automation and orchestration of security operations in highly volatile and sensitive environments to develop better and more efficient security controls.
You will be exposed to formalised security principles and protocols and expand your ability and capabilities in strong system administration and modelling of threat landscapes in a variety of different organisational contexts. Since this programme has been developed concerning the requirements of cyber security professional bodies, it aims to produce postgraduates with subject-specific and transferable knowledge and skills suited to a career in the cyber security industry or other related IT disciplines.

A lower second honours degree in Computer Science or equivalent.
A Postgraduate Certificate in Computer Science or a related subject with a minimum of grade 50% in all modules.
Alternatively:
Evidence of industrial certifications in Information security such as CISSP, CEH, BCS will also be considered for suitable candidates with a minimum of 3 years working experience in related industries. An interview process will also be utilised to verify suitability for the course for candidates with non-standard academic backgrounds but with demonstrable industry experience in the field.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Industry
  • Access

Course programme

What happens on the course?

You will undertake a wide range of learning activities including:

  • Computer-based learning
  • Supported learning using the University VLE (CANVAS) as a learning tool, for
  • information and interactive communications
  • Lectures
  • Tutorials (smaller group/one-to-one)
  • Workshops
  • Case studies
  • Structured laboratory exercises
  • Individual structured assignment-based learning
  • Directed study
  • Individual or group exercises
  • Research project investigations

Assessment methods will include:

  • Written reports
  • Essays
  • Literature reviews
  • Exams
  • Presentations

Students will also have the opportunity to engage in formative assessment throughout the course, especially during exercises in the practise sessions where their tutors will give feedback on progress and performance for each of the tasks allocated. Access to cutting-edge software and hardware will be given including incident orchestration and management via a dedicated industry-accreditated Virtual security operation Centre (VSoC) hosted internally. The assessment strategy for this course is designed around a holistic evaluation on knowledge and skills acquired with a strong emphasis on the requirements for this mode of delivery and diverse skills, background and expectations of the target audience. All assessments used in the course are in perfect alignment with University requirements, regulations and policies. Coursework assignments typically incorporate formative feedback so that students can gain an insight into whether their work is meeting the necessary thresholds and focus on meaningful remarks to improve both their performance and understanding in the subject matter. The assessment strategy has been designed with strong influence by the requirements and needs of the audience in FT/PT mode of delivery for this course. Students will also get the opportunity to be engaged in guest lectures from leading experts in the area and be taught by active researchers and trainers in all modules as part of the programme.

Cyber Security

Price on request