- Part-time 2-5 years
- £15,800 GBP (total tuition fee)
£1,316.66 GBP (price per program)
- 9 programs
- Start dates
- 16 Sep 2019 (apply by 20 Sep 2019)
20 Jan 2020 (apply by 24 Jan 2020)
18 May 2020 (apply by 22 May 2020)
What do I need to apply?
An applicant will normally be expected to possess at least one of the following:
a minimum of a second class honours degree in a relevant subject such as computer science, mathematics, physics or engineering;
a relevant professional qualification of an equivalent level;
a lower qualification plus appropriate and relevant experience at a professional level; or
satisfactory independent evidence of working for several years in a position that would normally be occupied by an honours graduate, in a relevant area (such as the IT sector), which would lead to gaining benefit from the degree.
How much will it cost?
September 2019 start: £15,800
January 2020 start: £15,800
May 2020 start: £15,800
What are the learning outcomes?
A student who successfully completes the degree will have achieved the following learning outcomes:
demonstrated a critical awareness of the legal frameworks, ethical and professional issues of cyber security;
performed systematic risk assessment, identification and analysis in accordance with international standards and demonstrated an ability to deal with complex issues;
demonstrated a comprehensive understanding of network and information systems secure communication technologies and protocols and their application to contemporary Internet-based solutions and technologies;
evaluated and justified a suitable methodology and tools for vulnerability assessment of systems and organisations;
conducted and reported on an ethically-based security audit and test to a professional standard, recommending and specifying suitable countermeasures;
demonstrated a thorough understanding of the theoretical concepts and implementation of current security frameworks and architectures, as well as cryptographic protocols and algorithms.
be able to assess systems’ security requirements and apply secure design methodology and formal methods in systems design, implementation and testing;
applied appropriate technological solutions and processes in the detection, management and investigation of information security incidents, and documented a digital investigation from a legal and professional standpoint;
demonstrated a critical awareness of current issues and new technologies in cyber security which are informed by leading edge research and/or practice in the field;
extrapolated from existing research, scholarship and/or fieldwork findings to identify new or revised approaches to practice; and
conducted rigorous research/formal inquiry into cyber security issues that require familiarity with a range of technologies, research sources and appropriate methodologies, and for such to inform the overall learning process.
Programs on this degree
|Cryptography||16 Sep 2019|
|Digital Data Acquisition, Recovery and Analysis||16 Sep 2019|
|Incident Response||16 Sep 2019|
|Network Security||16 Sep 2019|
|Secure Design and Development|
|Automotive Cyber Security|
|Cyber Security Individual Project|
|Security of Emerging Connected Systems|