Overview
Application Timeline
Tuition
- Year 1
| Student categories | Study | |
|---|---|---|
| Full-time | Part-time | |
| England | £10,150 | £5,100 |
| Northern Ireland | £10,150 | £5,100 |
| Scotland | £10,150 | £5,100 |
| Wales | £10,150 | £5,100 |
| EU | £21,950 | £11,000 |
| International | £21,950 | £11,000 |
Requirements
Language requirements information is currently unavailable.
Modules
Information Security Management
CoreComputer Science Project Research Methods
CoreCritical Systems
Core
About
Program Overview
The MSc in Cyber Security at Swansea University addresses critical issues in modern technology, including:
- Security and privacy of personal data
- Cyberterrorism
- Cybercrime
- Mobile security
Interdisciplinary Approach
This program adopts a holistic and interdisciplinary approach, incorporating modules on:
- Penetration testing
- Formal modelling
- Information security management
- Cryptography
- Artificial intelligence
Facilities
The course is supported by the state-of-the-art £32.5m Computational Foundry, which includes:
- Vision and Biometric Lab
- Maker Lab
- TechHealth Lab
- Theory Lab
- Cyber Security/Networking Lab
- User Lab
- Visualisation
Subject Area Information
Computer and Information Security is a critical and expansive field that focuses on protecting computer systems, networks, and data from cyber threats and unauthorized access. This discipline encompasses a wide range of subjects, skills, and modules designed to equip students with the knowledge and expertise needed to safeguard digital information in various environments.
1. Introduction to Cybersecurity
2. Network Security
3. Cryptography
4. Ethical Hacking and Penetration Testing
5. Information Security Management
6. Secure Software Development
7. Digital Forensics
- Technical Proficiency
- Analytical Thinking
- Problem-Solving
- Ethical Judgment
- Communication
Career
Graduates of computer and information security programs can pursue a variety of careers, including roles that protect organizations from cyber threats and ensure the integrity of digital information.
Information Security Analyst
Protects an organization's computer systems and networks by monitoring for security breaches and implementing security measures.
Network Security Engineer
Designs and maintains secure network infrastructures to protect data during transmission.
Cybersecurity Consultant
Provides expert advice to organizations on how to improve their cybersecurity posture.
Penetration Tester (Ethical Hacker)
Conducts authorized simulated attacks to identify and fix security vulnerabilities.
Digital Forensics Investigator
Analyzes digital evidence to investigate cybercrimes and support legal proceedings.
Security Software Developer
Creates secure software applications and integrates security into the development process.
Chief Information Security Officer (CISO)
Oversees an organization's information security strategy and ensures compliance with security policies and regulations.
Similar courses
Contact
Enhance your academic journey with the help from our experts.
Contact
Enhance your academic journey with the help from our experts.

