About this course

What will I study?

Incidents of cyber-crime have increased in the UK by 48% from 2013-14 according to PwC’s Global State of Information Security Survey 2015, costing the UK up to £27bn a year. While their 2016 survey has reported a significant shift in the way organisations are taking action, including their willingness to invest in security.

Our MSc Cyber Security will teach you how to handle security incidents, identify new and existing threats and determine methods to minimise them. We will also provide an in-depth coverage of the fundamental concepts, principles and technologies for network security. Going beyond just theoretical theory, you will be given a practical understanding of governance and assurance, along with technology risk practices.

How will I be taught and assessed?

Our MSc Cyber Security is designed to allow you to fit your studies around your working life and is assessed through modular assignments, exams and a final dissertation. All taught lectures are delivered across 15 of weekends spread throughout the 2 year programme. This is based on 2 10am-4pm sessions over 15 weekends, you will also have an additional 6-hours of contact time through a workshop. You will also have 6-hours of contact time with your tutor as part of your final project, this can be on campus or online.

You will also be expected to engage in independent study, around 3-4 hours per week on average over the 2 years. This will be supported by your module tutor and will consist of pre-class reading preparation, research, assessment preparation, development and writing as well as skills development and online tests and quizzes.

Each module builds upon your understanding of information governance and assurance, along with technology risk management practices. You will study with a diverse group like-minded IT professionals, and will be able to trial new approaches and processes in a safe environment, working on real world scenarios and case studies.

Technology Enhanced Learning (TEL) is embedded throughout the course with tools such as the ‘Blackboard’ eLearning Portal and electronic reading lists that will guide your preparation for seminars and independent research.

We offer extensive student support in and outside of the classroom with a dedicated student support team based in London.

Careers and further study

Cyber security has become an increasingly recurring issue for businesses, governments and the public. Recent hacks include the US presidential election, Yahoo’s ‘biggest data breach in history’ and the continual release of information by WikiLeaks, the financial cost to business is estimated to be as high as $6 trillion by 2021. Given this, business and governments alike have significantly invested in their cyber security systems.

With all this investment, there are a plethora of career options following completion of this course, typical roles include:

  • Threat management & forensics
  • Risk analytics & management
  • Policy makers & Strategists
  • Operations & security management
  • Engineering, Architecture & Design
  • Chief Technology Officer
Enquire now

Applicants should have:

Standard entry requirements

  • Minimum 2:2 or above from a recognised university in a relevant field (IT/Computer Science/related field) or
  • Professional qualifications that are equivalent to an honours degree

Non-standard entry requirements

  • Relevant qualifications and/or work experience will be taken into consideration where the applicant has the judged potential to benefit from the programme. Requests will be considered on an individual basis by the Programme Leader and relevant module tutors where appropriate.
Enquire now

All modules on this course are core.

The aim of this module is to critically explore the governance, management and security principles that underpin the management of an organisation’s information assets. It will provide you with a comprehensive and in-depth knowledge and understanding of the key concepts, theories, standards and frameworks of information governance, information management and information security. Through the critical analysis of these principles and tools you will develop a solid practical foundation on which to evaluate a range of organisations’ approaches to information.

The main objective of this module is to provide an in-depth coverage of the fundamental concepts, principles and technologies for network security. This module will provide students with a theoretical and practical understanding on two important aspects related to security namely, data security and network security. The module will cover a number of topics including cryptography, classical systems, IP protocol security, private and public-key cryptography, cryptographic protocols, hash functions, authentication, signature schemes, email and web security, viruses, and firewalls.

This module is designed to be suitable for a variety of networking professional roles including those wishing to gain a deeper understanding of 802.11 protocols, security and enterprise deployment. You will study enterprise wireless deployment elements and methodologies. Basic RF characteristics for mobile systems. 802.11 protocol operation and technologies wireless security issues and attack vulnerabilities.

This module will provide students in-depth knowledge of the processes used in assuring the security of information during use, sharing, storage, transmission and disposal. It will cover the protection of the integrity, authenticity, availability and confidentiality of all classes of information. The module is designed to provide a comprehensive framework for ensuring the resilience of business activities during threats and disruptive events thus enabling the assessment of potential risks to the business which could result from disasters or emergency situations.

This module will enable learners to develop a deep understanding of both theoretical and practical aspects of Ethical Hacking. An essential part of a modern organisation’s e-security includes rigorous testing and analysis to determine vulnerabilities. Carrying out such work requires a special skill set, which crosses, legal issues, psychology, computer networks along with detailed understanding of system vulnerabilities and exploits. Additionally, you will be exposed to a collection of industry standard hacking tools and will learn how to apply these in an ethical manner to determine system vulnerabilities.

Throughout the world of science, engineering, technology and business, the ability to pursue research is seen as a requisite for continued career progression in the appropriate subject discipline. This module introduces students to the nature of research and the processes involved in carrying out research. General research approaches and methods for research will be introduced including literature searching, evaluation and reviewing. This general introduction will be followed by the inclusion of topics specifically designed to meet the requirements of the students’ programme of study.

The aim of this module is to enable you to undertake a substantial academic research project at Masters Level and present the results from this work in both written and oral forms. Your project itself will be a major piece of independent and original research centred at the forefront of your programme discipline within the wider sphere of the computer science and digital technologies field.

The aim of this unit is to provide learners with the experience of undertaking a substantial piece of research related to the modules studied. It will require you to develop, consolidate and apply your independent research, academic study and research project management skills to the investigation of a topic of your own choice that is relevant to your programme of study, your workplace or your future career aspirations

Enquire now

Tuition fee 2018/19: £7,650

Please note that your tuition fees do not include the cost of course books that you may choose to purchase, stationery, printing and photocopying, accommodation, living expenses, travel or any other extracurricular activities. As a Northumbria University London Campus student, you will have full access to our online digital library with over 400,000 e-books and 50,000 electronic journals.

The modules you will study do not require you to purchase additional textbooks although we recommend you allow an additional £200-250 for the duration of your studies should you choose to purchase any additional reading materials.

Payment plans

We offer an interest free monthly payment plan available to all self-funded students after payment of your deposit.

Government Loan for Masters study

For the Academic Year 2018/19, the Government will be providing a Postgraduate Loan (PGL) up to the value of £10,609 for UK and EU students. If you enter either full-time or part-time postgraduate study after the 1st of August 2016, you could be eligible to receive this funding.

Payment plans and PGL

Early Application Discounts

Our Early Application Discount is awarded to you when you submit your application and holding deposit, before the deadlines specified on our dates and fees page. The discount is applied to your remaining fees after you pay your full deposit. This discount cannot be used in conjunction with any other offer – please contact us for more details on eligibility.

Enquire now

How to find out more

Enquire now to find out more information about the course, studying with us, the application process, and to ask any other questions you may have.

Enquire now

How to apply

Once you’re ready to apply, you can apply online to study the part-time MSc Cyber Security programme. This method allows you to upload your supporting documents at the time of application and automatically receive your student application number.

Apply online

We strongly recommend that you submit your application as early as possible to allow you to complete all of the preparations needed to study your programme. Please refer to the Dates and Fees page.

Supporting documents

For us to assess your application in a timely manner, it is important that you provide us with the following documents:

  • Fully completed application form
  • Personal email address must be included on the application form
  • Transcripts and/or certificates (including a certified translation if not in English)
  • Passport – copy of personal details page
  • Proof of financial sponsorship if applicable
  • Details of two referees
  • Confirmation of immigration history including copies of previous and current visas if applicable
  • An attached CV is desirable

You can check more information on how to apply here, including guidelines for the application forms.

Quick contact

Please enter a valid telephone number
This field is required
This field is required
This field is required
This field is required