Overview
Application Timeline
Tuition
- Year 1
| Student categories | Study | |
|---|---|---|
| Full-time | Part-time | |
| England | £4,850 | £2,425 |
| Northern Ireland | £4,850 | £2,425 |
| Scotland | £4,850 | £2,425 |
| Wales | £4,850 | £2,425 |
| Channel Islands | £4,850 | N/A |
| EU | £26,700 | N/A |
| International | £26,700 | N/A |
Requirements
Language requirements information is currently unavailable.
Modules
Modules is currently unavailable
Please check back later for updates.
About
Importance of Digital Infrastructures
Digital infrastructures are essential to society, encompassing both traditional critical infrastructures (e.g., water, power) and emerging technologies (e.g., smart cities, Fintech).
Challenges in Cyber Security
Cyber security presents significant challenges due to:
- Increased interconnectivity and dependencies among infrastructures.
- Integration of legacy and contemporary systems, often with varying security levels.
- Complex supply chains with inconsistent security assurances.
Need for Skilled Professionals
There is a critical shortage of skilled cyber security professionals. PhD graduates are vital for:...
Subject Area Information
Computer and Information Security is a critical and expansive field that focuses on protecting computer systems, networks, and data from cyber threats and unauthorized access. This discipline encompasses a wide range of subjects, skills, and modules designed to equip students with the knowledge and expertise needed to safeguard digital information in various environments.
1. Introduction to Cybersecurity
2. Network Security
3. Cryptography
4. Ethical Hacking and Penetration Testing
5. Information Security Management
6. Secure Software Development
7. Digital Forensics
- Technical Proficiency
- Analytical Thinking
- Problem-Solving
- Ethical Judgment
- Communication
Career
Graduates of computer and information security programs can pursue a variety of careers, including roles that protect organizations from cyber threats and ensure the integrity of digital information.
Information Security Analyst
Protects an organization's computer systems and networks by monitoring for security breaches and implementing security measures.
Network Security Engineer
Designs and maintains secure network infrastructures to protect data during transmission.
Cybersecurity Consultant
Provides expert advice to organizations on how to improve their cybersecurity posture.
Penetration Tester (Ethical Hacker)
Conducts authorized simulated attacks to identify and fix security vulnerabilities.
Digital Forensics Investigator
Analyzes digital evidence to investigate cybercrimes and support legal proceedings.
Security Software Developer
Creates secure software applications and integrates security into the development process.
Chief Information Security Officer (CISO)
Oversees an organization's information security strategy and ensures compliance with security policies and regulations.
Similar courses
Contact
Enhance your academic journey with the help from our experts.
Contact
Enhance your academic journey with the help from our experts.

