Overview

With the dramatic increase in high-profile cyber security incidents reported in the media, the demand for highly skilled security professionals is growing significantly as businesses across the globe seek to protect their networks and data. Our MSc Cyber Security provides you with a critical understanding of information governance and assurance, combined with technology risk management practices.

In addition to developing the key skills for handling security incidents, you will learn how to identify new and existing threats and the methods by which to reduce them.

Key facts

  • Develop key skills which are highly in demand by employers
  • Enhance your ability to handle and minimise security threats and incidents
  • Understand information governance and assurance
  • Upon successfully graduating, further build your skills and employability with one of the UK’s leading IT and project management training providers, QA with Professional Pathways
  • Also available as a part-time programme
Apply online Enquire now Download prospectus

Course information

Level of study: Postgraduate
Fee: £10,000 (UK/EU) £13,000 (2016/2017), £13,500 (2017/2018) (International)
Entry requirements: Minimum 2:2 (second class) honours degree or equivalent from a recognised university in a related subject
English language requirements: IELTS 6.5 (or above) with no single element below 5.5 or equivalent
Mode of study: Full-time classroom
Duration: 1 year
Assessment methods: Coursework and exams
Scholarship or bursaries: Available
Student finance: Available
Payment plan: Available
Starts: January, September
Next application deadline: 18 September 2017
About this course

What will I study?

The programme aims to provide you with advanced and specialist knowledge and skills in the field of cyber security. Your MSc Cyber Security will cover topics such as Information Governance and Security, Information Assurance and Risk Management, Wireless Networks and Security, Network Security and Ethical Hacking for Cyber Security. You will also develop your research and project management skills, in particular to support your preparation for your MSc project. In your final semester you will complete a major individual project, where you will receive one-to-one tuition and supervision from a relevant academic supervisor.

This project will provide you with a platform to undertake a substantial piece of individual research. To do this you will utilise appropriate advanced research, critical evaluation and synthesis techniques.

Ultimately, as a graduate of MSc Cyber Security you will be able to:

  • Demonstrate complex and specialised knowledge and skills in the field of cyber security
  • Appreciate innovations, advances and major issues at the frontiers of cyber security and their implications
  • Deal with complex issues both creatively and systematically, and show originality in tackling and solving problems
  • Use and evaluate a variety of software, tools and techniques relevant to cyber security practices
  • Work both individually and as a member of a team, recognising different team roles and multi-cultural environmental issues
  • Communicate balanced judgements effectively (in writing and verbally) at the appropriate business and technical level with users, management, customers and technical specialists, justifying work in the content of wider theories and practice, including when considering incomplete or ambiguous data
  • Critically understand computing systems in relation to cyber security issues
  • Act in a professional and ethical manner in the development and use of computing systems
  • Demonstrate professional attributes, including self-reflection, showing initiative, sound judgement, analytical ability, problem solving, the ability to conceptualise, theorise and research complex issues which advance understanding, and the ability to critically evaluate their own work and the work of others
  • Demonstrate the knowledge, skills and attributes to take leading roles within the computer science industry and will have developed highly transferrable skills that promote employability and lifelong learning
  • Satisfy the educational requirements of the BCS, The Chartered Institute for IT for professional membership

How will I be taught and assessed?

Throughout the course, you will be able to trial new approaches and processes in a safe environment, working on real-life scenarios and case studies.

You will be assessed using a mix of coursework and exams.

Technology Enhanced Learning (TEL) is embedded throughout the course with tools such as the ‘Blackboard’ eLearning Portal and electronic reading lists that will guide your preparation for seminars and independent research.

Significant emphasis is placed on developing your ability to complete a Masters degree.  As part of induction you will be made fully familiar with the learning resources and support available to you.  There will also be weekly academic support sessions designed to build your confidence and ability as a postgraduate learner.  You will also be allocated an individual guidance tutor at induction.  You will meet this tutor at regular intervals across your period of study.

Careers and further study

For those with high career aspirations, this programme can give you an extra edge in today’s competitive job market. Graduates from the programme will be equipped to work in a variety of careers in the IT industry or to progress to academic or research orientated careers. Job roles, including roles in leadership and management, could include working in, for example, software engineering, network design and management, network security, artificial intelligence or IT consultancy.

This programme will prepare you to meet the educational requirements of the BCS, The Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional.

Upon successfully completing your course, you may undertake further professional development and training through Professional Pathways programmes. This additional training is offered to our graduates for free, from our partner, QA and provides you with an excellent opportunity to undertake professional training at the end of your Masters from one of the UK’s leading corporate training providers, further enhancing your professional development and employability skills. Find out more about Professional Pathways and your eligibility.

Enquire now

Applicants should have the following:

Academic requirements

  • Minimum 2:2 (second class) honours degree or equivalent from a recognised university in a related subject

If you don’t meet the academic requirements

Applicants with non-standard prior learning and or relevant work experience and training are encouraged to apply. A CV (curriculum vitae) made up of prior work experience and training would need to be submitted for consideration by our faculty alongside the standard application.

If you don’t meet these entry requirements, you may be eligible to study our BSc (Hons) Applied Computing (Top-Up) programme which is also taught at our London Campus. Successful completion of this Top-Up degree with a minimum of a 2:2 award will give you entry on to this Masters programme.

English language requirements

Students require IELTS 6.5 (or above) with no single element below 5.5 or equivalent.

If you have IELTS 5.5 – 6.0, you may be eligible to join our Pre-Sessional English before starting this programme.

Enquire now

All modules on this course are core.

You will learn about the information governance and security principles that underpin the management of an organisation’s information assets. You will critically analyse the key concepts, theories, standards and frameworks of information governance and security, including risk management. This will enable you to evaluate an organisation’s current approach to information governance and security and to advise on the design and implementation of an appropriate strategy for managing an organisation’s information assets to meet legal, regulatory, organisational and/or societal needs for information governance and security. Topics include:

  • Key concepts and principles of information governance and security
  • Information governance, security, risk and business continuity frameworks and standards
  • Legislative and regulatory frameworks
  • Strategies, policy and procedures
  • Risk management and business continuity
  • Embedding information governance and security (incl. roles, responsibilities and culture)

The main objective of this module is to provide you with an in-depth coverage of the fundamental concepts, principles and technologies for network security. This module will provide you with a theoretical and practical understanding on two important aspects related to security namely, data security and network security. The module will cover a number of topics including cryptography, classical systems, IP protocol security, private and public-key cryptography, cryptographic protocols, hash functions, authentication, signature schemes, email and web security, viruses, and firewalls. The concepts introduced in lectures are reinforced with the help of extensive hands on laboratory workshops. You will also have the opportunity to develop practical networking skills by using Cisco IOS, configuration of firewalls, switches and routers. You will also explore the wider impact of security via a consideration of related legal, ethical and social issues.

This module is designed to be suitable for a variety of networking professional roles including those wishing to gain a deeper understanding of 802.11 protocols, security and enterprise deployment. Additionally, it is suitable for wireless network administrators and support or design staff requiring a greater understanding of the new technologies and applications of modern converged networks and delegates seeking Certified Wireless Network Associate (or similar) certification. You will study the following areas:

  • Enterprise wireless deployment elements and methodologies
  • Basic RF characteristics for mobile systems
  • 11 protocol operation and technologies
  • Wireless security issues and attack vulnerabilities

This module will provide you with an in-depth knowledge of the processes used in assuring the security of information during use, sharing, storage, transmission and disposal. It will cover the protection of the integrity, authenticity, availability and confidentiality of all classes of information. The module is designed to provide a comprehensive framework for ensuring the resilience of business activities during threats and disruptive events thus enabling the assessment of potential risks to the business which could result from disasters or emergency situations. A breakdown of the key areas of information risk assessment – context establishment, information risk assessment will be followed by the various elements of risk analysis and evaluation. An examination of the treatment of identified risks will be used to illustrate that mitigation is not the only option that organisations The last element of the module will explore the important aspect of communicating the result of the risk management process with key stakeholders.

You will develop an in-depth understanding of the different types of business interruptions – man-made, natural disasters and technology failures – and the potential damage / revenue losses that can result from them. It is crucial to perform regular disaster recovery testing exercises in order to prove that organisations can recover from catastrophic loss of data and facilities.

This module will enable you to develop a deep understanding of both theoretical and practical aspects of Ethical Hacking. An essential part of a modern organisation’s e-security. The module includes testing and analysis to determine vulnerabilities. Carrying out such work requires a special skill set, which crosses, legal issues, psychology, computer networks along with detailed understanding of system vulnerabilities and exploits. Additionally, you will be exposed to a collection of industry standard hacking tools and will learn how to apply these in an ethical manner to determine system vulnerabilities.

In this module you will learn about research and the processes involved in carrying out research and project management, and you will apply them to develop a master’s project proposal. This will include research approaches and methods of research, including literature searching, evaluation and review and project management tools and techniques. You will also consider relevant legal, ethical and social issues and good professional practice.

By the end of this module you will have constructed a project proposal which can be executed in a master’s project. This will contain a brief literature review justifying a research question, establish aims and objectives, and provide a plan of execution, using tools and techniques in project management, including an outline of deliverables (both artefacts and products).

The aim of this module is to enable you to undertake a substantial academic research project at Masters Level and present the results from this work in both written and oral forms. Your project itself will be a major piece of independent and original research centred at the forefront of your programme discipline within the wider sphere of the computer science and digital technologies field.

Enquire now

Tuition fees 2016/17

  • UK/EU students: £10,000
  • International students: £13,000

Tuition fees 2017/18

  • UK/EU students: £10,000
  • International students: £13,500

Scholarships and bursaries for international students

If you are an international student and choose to study the full-time programme, you will be eligible for either our programme bursary, or a country bursary, whichever is greater. High performing students may be eligible for an academic scholarship in addition.

Available programme bursary: £1,000

Alternatively, depending on the country you are from, you may be eligible for one of our country bursaries and/scholarships to help finance your studies.

All of our scholarships and bursaries are automatically applied when we process your application and our team will be able to confirm your eligibility.

Scholarships and bursaries

Payment plans for self-funded students

If you need to spread the cost of your tuition, you may be eligible for our payment plan.

Payment plans

Government Loan for Masters study

For the Academic Year 2016/17, the Government will be providing a Postgraduate Loan (PGL) up to the value of £10,000 for UK and EU students. If you enter either full-time or part-time postgraduate study after 1 August 2016, you could be eligible to receive this funding.

Postgraduate Loan

How to find out more

Enquire now to find out to find out more information about the course, studying with us, the application process, and to ask any other questions you may have.

Enquire now

How to apply

Once you’re ready to apply, you can apply online to study the MSc Cyber Security. This method allows you to upload your supporting documents at the time of application and automatically receive your student application number.

Apply online

We strongly recommend that you submit your application as early as possible to allow you to complete all of the preparations needed to study your programme. After receiving an offer it can take time to arrange your finances and apply for your visa (if required) and it is important that you arrive in good time to enrol onto your course. Please refer to the Dates and Fees page.

If you are unable to apply online, then you can download a PDF application form and email it to london.admissions@northumbria.ac.uk.

International students application form UK/EU students application form

Supporting documents

For us to assess your application in a timely manner, it is important that you provide us with the following documents:

  • Fully completed application form
  • Personal email address must be included on the application form
  • Transcripts and/or certificates (including a certified translation if not in English)
  • Passport – copy of personal details page
  • Proof of financial sponsorship if applicable
  • Reference
  • Confirmation of immigration history including copies of previous and current visas if applicable

You can check more information on how to apply here, including guidelines for the application forms.

testimonial image
testimonial image

“Northumbria University London constantly strive to improve on their successes and this is a noticeable feature on campus.”

Olasheni Ogunwende
MSc Business with International Management

Dates and fees
Dates and fees

Dates and fees

We run multiple start dates throughout the year depending on your chosen course. Check our application deadlines, tuition fees and details of the payment plans we offer here.

Why Northumbria University?
Why Northumbria University?

Why Northumbria University?

Northumbria University offers the complete student experience. As a university we have been nationally recognised for many of our achievements which is reflected in our notable alumni.

Quick contact