Overview
Application Timeline
Tuition
- Year 1
| Student categories | Study | |
|---|---|---|
| Full-time | Part-time | |
| England | £18,400 | £6,133 |
| Northern Ireland | £18,400 | £6,133 |
| Scotland | £18,400 | £6,133 |
| Wales | £18,400 | £6,133 |
| Channel Islands | £18,400 | £6,133 |
| EU | £35,500 | N/A |
| International | £35,500 | N/A |
Requirements
Language requirements information is currently unavailable.
Modules
Modules is currently unavailable
Please check back later for updates.
About
Introduction
Digital technologies are essential for economic growth but also introduce new cyber risks. There is a global need for innovative solutions to address cyber threats, particularly in critical infrastructures such as energy, finance, healthcare, and smart transportation.
Importance of Cyber Security
The security of critical infrastructures is crucial, as their disruption can lead to significant societal impacts and financial losses. The shortage of cyber security professionals exacerbates the challenge, especially in specialized areas related to critical infrastructures.
Program Overview
The MSc program is grounded in rigorous...
Subject Area Information
Computer and Information Security is a critical and expansive field that focuses on protecting computer systems, networks, and data from cyber threats and unauthorized access. This discipline encompasses a wide range of subjects, skills, and modules designed to equip students with the knowledge and expertise needed to safeguard digital information in various environments.
1. Introduction to Cybersecurity
2. Network Security
3. Cryptography
4. Ethical Hacking and Penetration Testing
5. Information Security Management
6. Secure Software Development
7. Digital Forensics
- Technical Proficiency
- Analytical Thinking
- Problem-Solving
- Ethical Judgment
- Communication
Career
Graduates of computer and information security programs can pursue a variety of careers, including roles that protect organizations from cyber threats and ensure the integrity of digital information.
Information Security Analyst
Protects an organization's computer systems and networks by monitoring for security breaches and implementing security measures.
Network Security Engineer
Designs and maintains secure network infrastructures to protect data during transmission.
Cybersecurity Consultant
Provides expert advice to organizations on how to improve their cybersecurity posture.
Penetration Tester (Ethical Hacker)
Conducts authorized simulated attacks to identify and fix security vulnerabilities.
Digital Forensics Investigator
Analyzes digital evidence to investigate cybercrimes and support legal proceedings.
Security Software Developer
Creates secure software applications and integrates security into the development process.
Chief Information Security Officer (CISO)
Oversees an organization's information security strategy and ensures compliance with security policies and regulations.
Similar courses
Contact
Enhance your academic journey with the help from our experts.
Contact
Enhance your academic journey with the help from our experts.

