MSc Cyber SecurityCyber Security is the practice of defending computers, networks and data from malicious attacks. It is one of the biggest threats to global security and graduates with advanced-level skills and knowledge are high demand by employers. This innovative new online course helps you build a critical understanding of technological threats and weaknesses across digital platforms in a range of contexts. You build the essential skillset necessary to assess threat, manage security technologies and understand the legal, social and political implications of cyber threats. Further course details can be found here Pricing options: Computing Masters Project (60 credits) / CIS4055-N / TU OnlineDescriptionThis module provides students with the opportunity to undertake a major, in-depth, individual study in an aspect of computing, IT, computer science or digital technology. Normally the Masters project will be drawn from commercial, industrial or research-based problem areas. Cyber Risk and Vulnerability Management (20 credits) / CIS4068-N / TU OnlineDescriptionYou explore cyber security risk assessment and guidance models, practices, tools and techniques to address threats or vulnerabilities. You also look at how to identify common threats and vulnerabilities using appropriate tools and techniques. Hacking the Human (20 credits) / CIS4012-N / TU OnlineDescriptionThis module will explore what is increasingly recognised as one of the most important areas and greatest threats of cybersecurity; that of the human being. Criminals are increasingly targeting people as an easy way to access a computer system, this is summed up in a famous quote by Bruce Schneier (a well-known writer on cybersecurity) - “Only amateurs attack machines; professionals target people”. IoT Security (20 credits) / CIS4019-N / TU OnlineDescriptionThere has been a rapid growth within the field of the Internet of Things (IoT). IoT is applied in environmental monitoring, smart homes, industrial controls and digital cities. IoT incorporates various techniques, including wireless sensor networks, embedded systems, ubiquitous computing, and machine learning that involve unique IoT devices with a distinct set of security risks. You explore the important concepts in IoT - the use of Internet technologies to access and interact with objects in the physical world. You also develop the capability to understand potential security risks and produce security architecture of IoT systems. This includes IoT architecture, IoT operating systems and platforms, low power communications, IoT data analysis, IoT security and identity recognition. You also gain experience of practical skills required for the programming of IoT devices. IT Ethics and Law (20 credits) / CIS4013-N / TU OnlineDescriptionThis module will introduce the key legal issues that students anticipating a career in the IT industry (in its broadest definition) should be aware of. Key topics will include introduction to the English Legal System, intellectual property rights, computer crime, computer contracts and liability, privacy and data protection etc. Students will be encouraged to apply the legal principles studied to realistic scenarios and case studies from the real-world. Mobile Systems and Cyber Security (20 credits) / CIS4071-N / TU OnlineDescriptionYou gain a thorough understanding of the concepts and technologies used in modern mobile devices such as phones, PDAs and laptops. You learn about the hardware used by mobile devices and the networking technologies that allow them to communicate with each other and the outside world. You also explore data compression techniques and security. You attend a series of lectures, tutorials and seminars. Network and Systems Security (20 credits) / CIS4069-N / TU OnlineDescriptionYou cover theoretical concepts including cryptography and cyber security models alongside the practical issues of cyber attacks and countermeasures. You study topics in access control, symmetric and public key cryptography protocols, digital signatures, authentication protocols, wireless network and security, firewall, network security attacks, penetration testing, intrusion detection and access control lists. |