Overview
Application Timeline
Tuition
- Year 1
| Student categories | Study | |
|---|---|---|
| Full-time | Part-time | |
| England | £18,400 | £9,200 |
| Northern Ireland | £18,400 | £9,200 |
| Scotland | £18,400 | £9,200 |
| Wales | £18,400 | £9,200 |
| EU | £35,500 | N/A |
| International | £35,500 | N/A |
Requirements
Language requirements information is currently unavailable.
Modules
Modules is currently unavailable
Please check back later for updates.
About
Introduction
Recent advancements in software development, including continuous delivery, cloud computing, and open-source methodologies, have accelerated technological innovation. However, this evolution has also introduced new security threats and vulnerabilities, necessitating a greater demand for software security experts.
Current Landscape
- Modern software is integral to various sectors, including energy, finance, healthcare, and transportation.
- Increased complexity in software systems has led to heightened security risks.
- There is a global shortage of skilled software security professionals capable of addressing these challenges.
MSc...
Subject Area Information
Computer and Information Security is a critical and expansive field that focuses on protecting computer systems, networks, and data from cyber threats and unauthorized access. This discipline encompasses a wide range of subjects, skills, and modules designed to equip students with the knowledge and expertise needed to safeguard digital information in various environments.
1. Introduction to Cybersecurity
2. Network Security
3. Cryptography
4. Ethical Hacking and Penetration Testing
5. Information Security Management
6. Secure Software Development
7. Digital Forensics
- Technical Proficiency
- Analytical Thinking
- Problem-Solving
- Ethical Judgment
- Communication
Career
Graduates of computer and information security programs can pursue a variety of careers, including roles that protect organizations from cyber threats and ensure the integrity of digital information.
Information Security Analyst
Protects an organization's computer systems and networks by monitoring for security breaches and implementing security measures.
Network Security Engineer
Designs and maintains secure network infrastructures to protect data during transmission.
Cybersecurity Consultant
Provides expert advice to organizations on how to improve their cybersecurity posture.
Penetration Tester (Ethical Hacker)
Conducts authorized simulated attacks to identify and fix security vulnerabilities.
Digital Forensics Investigator
Analyzes digital evidence to investigate cybercrimes and support legal proceedings.
Security Software Developer
Creates secure software applications and integrates security into the development process.
Chief Information Security Officer (CISO)
Oversees an organization's information security strategy and ensures compliance with security policies and regulations.
Similar courses
Contact
Enhance your academic journey with the help from our experts.
Contact
Enhance your academic journey with the help from our experts.

