Learnstone logo
Computer Forensics and Cyber Security banner
University of Greenwich logo

Computer Forensics and Cyber Security

Computing, Engineering and Technology

Taught

MSc

  • Overview
  • Application Timeline
  • Tuition
  • Requirements
  • Modules
  • About
  • Subject Area Information
  • Career
  • Similar courses

Overview

The Master's in Computer Forensics and Cyber Security program provides students with essential knowledge and practical skills in cybercrime, digital forensics, and network security. It is designed for both newcomers and practitioners, emphasizing modern tools and methodologies. The course is accredited by professional bodies and includes hands-on training with current forensic tools.

Application Timeline

  1. September 1, 2025
    Start date
  2. January 1, 2026
    Start date
  3. April 9, 2026
    Today

Tuition

Whole course
Student categories Study
Full-time Part-time
EU£18,700£18,700
England£11,325£11,325
Northern Ireland£11,325£11,325
Scotland£11,325£11,325
Wales£11,325£11,325
International£18,700£18,700

Requirements

Entry Requirements:
Language Requirements

Language requirements information is currently unavailable.

Modules

Modules is currently unavailable

Please check back later for updates.

About

This program covers essential aspects of cybercrime, forensic methods, and computer technology.

Course Overview

The Computer Forensics and Cyber Security course equips students with knowledge of the latest technologies and best practices for protecting digital infrastructures, including:

  • Enterprise networks
  • Internet of Things (IoT) environments

Students will learn modern tools and methodologies for digital forensics investigations, from evidence collection to analysis and expert witness roles.

Target Audience

This course is designed for:

  • Newcomers to computer security and forensics
  • Practitioners seeking to enhance their skills

It covers...

Subject Area Information

Computer forensics, also known as digital forensics, is a specialized field within cybersecurity that focuses on the identification, preservation, analysis, and presentation of digital evidence. This discipline is crucial for investigating cybercrimes, data breaches, and other illegal activities involving digital devices and networks.

Typical Course Structure
  • 1. Introduction to Computer Forensics

  • 2. Digital Evidence and Cybercrime

  • 3. Forensic Tools and Techniques

  • 4. Network Forensics

  • 5. Mobile Device Forensics

  • 6. Incident Response and Management

  • 7. Legal and Ethical Issues in Digital Forensics

Typical Skills Acquired
  • Understanding of forensic methodologies
  • Familiarity with legal and ethical considerations
  • Basic investigative techniques
  • Ability to identify and categorize digital evidence
  • Understanding of cybercrime typologies
  • Knowledge of legal frameworks
  • Proficiency in using forensic tools
  • Data extraction and analysis skills
  • Ability to create forensic images of digital devices
  • Network monitoring
  • Packet analysis
  • Ability to trace network intrusions
  • Mobile data extraction
  • Understanding of mobile operating systems
  • Analysis of mobile applications
  • Incident response planning
  • Crisis management
  • Post-incident reporting
  • Understanding of legal procedures
  • Ethical decision-making
  • Knowledge of privacy laws

Career

Upon completing courses in computer forensics, students can pursue various career paths in the digital investigation and cybersecurity landscape.

Potential Professions
  • Digital Forensic Analyst

    Specializes in examining digital devices to uncover evidence of cybercrimes.

  • Cybersecurity Consultant

    Provides expert advice on protecting digital assets and responding to cyber incidents.

  • Incident Response Specialist

    Focuses on managing and mitigating the impact of cybersecurity incidents.

  • Law Enforcement Officer

    Works within police departments or federal agencies to investigate cybercrimes.

  • Information Security Manager

    Oversees an organization's information security strategy and ensures compliance with legal standards.

Similar courses

Contact

Loading map...
30, Park Row, London, SE10 9LS
Get expert guidance

Enhance your academic journey with the help from our experts.

Contact

Loading map...
30, Park Row, London, SE10 9LS
Get expert guidance

Enhance your academic journey with the help from our experts.

© 2022-2026 Learnstone