he course aims to equip students for professional careers in cyber security. It provides a practical understanding of the issues relating to the design, analysis and implementation of modern secure IT systems. This course is suitable for all students with a background in ICT and who want to specialise in cyber security. The course builds skills that are necessary to tackle modern secure systems in an industry context. It develops an appreciation of commercial and open source cyber security equipment, software and services based on industry standard technologies.
Teaching consists of lectures, seminars and laboratory work to provide a basis for the intensive individual study you need to undertake to maximise your achievements and the potential outcomes from taking the course. This course consists of the following
Modules:
Optional Modules:
Fundamentals of Cyber Security
This module provides an introduction to key techniques and technologies used in cyber security. The security landscape is discussed with emphasis on the CIA of security which leads into cryptography which is the basis of confidentiality, integrity and authentication systems. The module covers symmetric and asymmetric encryption, steganography, principles of cryptanalysis, message confidentiality, message authentication, security protocols and security in distributed systems as well as the application of cryptographic techniques to authentication and identity management.
Security Management
This module provides an introduction to assuring the security of systems, networks, data and user identities, which is an essential aspect of organisation and information systems. New threats are emerging as digital technologies permeate into most aspects of work and social life and in transactions between parties opening potential for fraud, deception and corruption.
Network and Systems Security
This module provides an introduction to network and systems security by firstly discussing security threats, vulnerabilities and attack patterns. This leads onto firewalls, intrusion detection and protection systems for networks and computer systems through to security management, such as Security Information and Event Management (SIEM) systems. Topics also include anti-virus systems, system hardening and security testing.
Research Methods
This module gives you the skills to acquire and distil knowledge, preparing you to carry out applied research in the area of cyber security, and in computing in general. You will learn to use appropriate research methodologies and tools to support your research ideas.
Learning and Professional Development
This is a preparatory module for all students enrolling on the master courses. Learning and Professional Development (LPD) is designed to orientate new master students and especially international students to masters level study.
Employability Skills and Employment
This additional learning support module aims to provide students with an opportunity to prepare for employment and further develop skills proportionate with postgraduate study and industry requirements in preparation for a professional career.
Dissertation
With this module, you have the opportunity to carry out an original piece of research, adding to existing knowledge and demonstrating an ability to select, define and focus on an issue at an appropriate level. You will also develop and apply relevant methodologies to analyse your topic areas, and to develop recommendations and logical conclusions in the context of existing work in the area.
Distributed Application Development (option)
In this module, you will learn how to apply software engineering skills, using mainly Java as the programming language, to develop distributed applications. You will cover both Java programming and distributed application architecture content. There is a particular focus on emerging technologies, such as service orientated architectures and business process management toolsets.
Mobile Web Component Development (option)
This module introduces the concepts and techniques required to support Component Based Development for Mobile Web. Modern distributed architectures rely increasingly on the use of software components to construct and deploy applications. This module describes the conceptual framework underpinning application assembly from components and outlines the supporting software processes. Students are provided with practical experience in modelling component specifications as well as an indication of future development in this area.
Principles of Project Management (option)
The aim of this module is to introduce you to the fundamental concepts, principles and techniques needed for effective project management. It will cover the roles, responsibilities and competencies of those involved in dynamic project-based environments, how these relate to effective project management, and the methodological factors that can be used for selecting, defining, planning, controlling, monitoring and delivering projects.
Consultancy and Technological Innovation (option)
This module gives you the skills to understand, and work in, the complex multi-sourced environment that supports business change, applying global technologies to a real-life case study using programme management concepts. Focusing on the strategic management of leading-edge technology, you will examine the organisational structure of IT, including systems integrators and consultancy, and gain an overview of the IT consulting world, its principles and practice.
Security Operations and Assurance (option)
This module provides an introduction to security operations and assurance of systems, networks, data and user identities, which is an essential aspect of organisation and information systems. This module provides an introduction to security operations and assurance of systems, networks, data and user identities, which is an essential aspect of organisation and information systems.
Data Architecture (option)
Data Architecture describes how Big Data is processed, stored, and utilised in an information system. The aim of this module is to cover some of the developments in the broad range of Big Data problems. The module will give a student hands on experience with various types of large-scale data and information handling, and start by providing a solid understanding of the underlying technologies.
Knowledge Management (option)
In this module, you will explore the widely accepted theories and frameworks for knowledge management - and their application in technologies and learning organisations. On completion, you will understand the way knowledge from these diverse disciplines is used within the development of Decision Support Systems (DSS). Knowledge management techniques can be widely used in cyber security to analyse log files through to the creation of situational awareness systems.