- Part-time 2-5 years
- £15,050 GBP (total tuition fee)
£1,254.17 GBP (price per program)
- 9 programs
- Start dates
- 21 Jan 2019 (apply by 21 Jan 2019)
13 May 2019 (apply by 13 May 2019)
16 Sep 2019 (apply by 16 Sep 2019)
What do I need to apply?
An applicant will normally be expected to possess at least one of the following:
a minimum of a second class honours degree in a relevant subject such as computer science, mathematics, physics or engineering;
a relevant professional qualification of an equivalent level;
a lower qualification plus appropriate and relevant experience at a professional level; or
satisfactory independent evidence of working for several years in a position that would normally be occupied by an honours graduate, in a relevant area (such as the IT sector), which would lead to gaining benefit from the degree.
What are the learning outcomes?
A student who successfully completes the degree will have achieved the following learning outcomes:
demonstrated a critical awareness of the legal frameworks, ethical and professional issues of cyber security;
performed systematic risk assessment, identification and analysis in accordance with international standards and demonstrated an ability to deal with complex issues;
demonstrated a comprehensive understanding of network and information systems secure communication technologies and protocols and their application to contemporary Internet-based solutions and technologies;
evaluated and justified a suitable methodology and tools for vulnerability assessment of systems and organisations;
conducted and reported on an ethically-based security audit and test to a professional standard, recommending and specifying suitable countermeasures;
demonstrated a thorough understanding of the theoretical concepts and implementation of current security frameworks and architectures, as well as cryptographic protocols and algorithms.
be able to assess systems’ security requirements and apply secure design methodology and formal methods in systems design, implementation and testing;
applied appropriate technological solutions and processes in the detection, management and investigation of information security incidents, and documented a digital investigation from a legal and professional standpoint;
demonstrated a critical awareness of current issues and new technologies in cyber security which are informed by leading edge research and/or practice in the field;
extrapolated from existing research, scholarship and/or fieldwork findings to identify new or revised approaches to practice; and
conducted rigorous research/formal inquiry into cyber security issues that require familiarity with a range of technologies, research sources and appropriate methodologies, and for such to inform the overall learning process.
Try a free taster course
An Introduction to Cryptography
Learn flexibly and pay as you go
You can pay for each program in the degree as you go, making it possible to gain a qualification in a flexible and affordable way.