Description

Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.

Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state-of-the-art technologies and resources, including:

  •  a dedicated forensics computer laboratory
  • Over 30 computing laboratories with an extensive range of specialist and other software providing access to Linux/UNIX, Windows and Mac OS, all supported by high-bandwidth networks.
  • Access to a range of free software titles through a number of academic initiatives for use on home computers for educational and personal purposes.
  • Specialist technicians to ensure you can get the most out of these technologies.

Study Details:

MSc 1 year full-time, 2 years part-time

Module Details:

Core modules

Digital Forensics pathway

Cyber Security Pathway

Programme Funding

There are a variety of funding options for postgraduate students, including loans, grants and scholarships.

Student Destinations

The course has two pathways, namely Cyber Security, and Forensics that can provide you with all the necessary skills for the following jobs:

  • Researcher in Applied Cryptography;
  • Researcher in Network/Computer Security;
  • IT Security Engineer;
  • Computer Security Incident Responder;
  • Source Code Auditor;
  • IT Security Operations Specialist;
  • Cyber Security Manager;
  • Information Security Analyst;
  • Information Security Consultant;
  • Information Security Assurance Officer;
  • Information Security Assurance Analyst;
  • Information Security Risk Officer;
  • Security Officer;
  • Penetration Tester (also known as Ethical Hacker);
  • Vulnerability Assessor;
  • Computer Forensics Analyst;
  • Anti-Piracy/Content Protection Analyst;

Fees

For fees and funding options please visit website to find out more

Entry Requirements

A minimum of a lower second class honours degree (2:2) in a computing-related discipline. If your first degree does not have a strong computing element then your work experience and other qualifications may also be taken into account.

Please see our website for how to apply

Visit Website Request Information Add to Compare List

Key Information

Please see our website for how to apply


Visit Website
Request Information
Add to Compare List

University Hub

University of Westminster

More Information
.