This Cyber Security MSc prepares students for careers as cyber security specialists. The programme covers cyber security, forensics, and the application of Al for risk detection and threat forecasting. It addresses the growing threat of cyberattacks, equipping graduates to combat cybercrime. The curriculum emphasises security aspects, including information, network, and cyber security, alongside forensic analysis and risk management. Students learn intelligent security analytics, an Al field, for threat detection and prevention. Problem-based learning and preparation for industry certifications are core components.

This module introduces the essential principles, methods and techniques in AI. It covers a broad range of topics such as search, planning, logic, knowledge representation and inference. It discusses examples of intelligent systems and studies how to develop intelligent applications such as expert systems, natural language systems, and autonomous mobile and robotic systems.
Students will be offered lectures, which introduces the important concepts, explain the principles and techniques, and demonstrate how to apply them to solve problems in the related topics. The workshops will provide practical sessions to help students understand the content of the lectures and build the necessary skills to develop intelligent systems.
This module provides students with an in-depth appreciation of the Internet of Things (IoT) and Cloud Computing concepts, models, infrastructures, and capabilities. The module will place emphasis on modern system architecture and design, Autonomous Intelligent Systems (AIS), key wireless/mobile/sensor technologies, and issues of privacy and trust, in the development of Cloud-based IoT systems.
Practical work within the module will provide students with real, hands-on, experience of building a basic Internet of Things infrastructure that can access Cloud Computing services and the opportunity to develop their Python programming skills and abilities. Some basic knowledge of Python will be used throughout. Understanding of various Intelligent, wired, and wireless technologies could be an advantage.
The module is concerned with the study and application of tools and techniques that enable the protection of information and other resources of enterprise information systems. Increases in storage, manipulation, and transfer of data across computer networks requires effective encryption techniques. This module will provide insight into some of those techniques, algorithms and their development through history.
Part of the course is dedicated to the mathematics (number theory, finite fields and elliptic curves) relevant to cryptography with techniques developed using software such as Maple. The focus will also be on the analysis, design and implementation of tools and techniques that achieve the three goals of confidentiality, integrity and authenticity in security computing. Particular focus will be on the management framework that facilitate the accomplishment of the above three goals.
Importantly the module will address the ethical framework of information security, the issues around privacy and data protection and the rights of private citizens to access strong encryption. Throughout the module connections with other aspects of artificial intelligence and cybersecurity will be emphasised through the examples and case studies chosen.
This module seeks to provide students with a theoretical and practical systematic understanding of the cyber forensic practice covering a wide range of scenarios. Students will be provided with the knowledge to identify, extract, document, interpret and preserve IT assets as digital evidence, as well as analyse the root cause of security breaches. The module covers issues such as Cybercrime activities and their prosecution, Cyber evidence handling, forensic processes, and tools. In addition, this module covers legal and regulatory issues and aims to achieve the following learning aims:
This module seeks to provide students with a theoretical and practical systematic understanding of the cyber incident response and handling practice covering a wide range of scenarios. Incident response and threat-hunting activities are the keys to identifying and observing cyber incidents and malware indicators and patterns of activity to generate accurate threat intelligence that can be used to detect current and future intrusions.
Students will be provided with the knowledge and comprehensive understanding of incident response tactics and procedures. The module covers all aspects of cyber incident response starting with prevention, immediate response, mitigation and post-incident investigation to determine the root cause of security breaches.
This module addresses the growing demand for cybersecurity consultants and SOC analysts to monitor and maintain the security of public organisations and corporations. With a strong focus on virtualised environments that will allow students to act professionally within incident response and in malware/threat analysis. This module aims to achieve the following learning aims:
This module is designed to introduce principles underlying computer and network security auditing, securing, and penetration testing. It also introduces tools used to assess and validate the security posture of a network and its applications. This module will mainly employ experiential learning.
The students will learn through a series of theory-based lectures and associated practical classes and workshops based on each of the module’s topics. Students will develop their skills by applying their knowledge and techniques to discover vulnerabilities and develop exploits in a range of real-world scenarios. Directed and independent study activities will underpin the materials presented and provide opportunities for students to put theory into practice in real-world use cases.
There is extensive exposure to network/system threats and vulnerabilities. Students will assess the various security and configuration features required to secure networks and systems. This module also focuses on guiding students for further specialisation in vendor-neutral security certification programs such as GIAC, ISC, EC-Council, ISACA networking with industry experts and engaging in professional bodies such as BCS-ISSG.
The aim of the module is:
The module provides students with the experience of planning and bringing to fruition a major piece of individual work. Also, the module aims to encourage and reward individual inventiveness and application of effort through working on research or company/local government projects. The project is an exercise that may take a variety of forms depending on the nature of the project and the subject area. Particular students will be encouraged to carry out their projects for local companies or government departments.
Semester: Autumn/Spring/Summer
Prerequisites: all course specific core modules
Assessment: 100% coursework (project viva is compulsory for all students)
Prior knowledge: Understanding of research management, planning and LSEP issues
The module aims to encourage and reward individual inventiveness and application of effort. It also aims to allow students:


(The Times and Sunday Times Good University Guide 2024)

(The Times and Sunday Times Good University Guide 2024)

(The Times and Sunday Times Good University Guide 2024)

(Daily Mail University Guide 2024)

(Daily Mail University Guide 2024)

Click the button below to enroll in your desired course or request essential study materials effortlessly.
