

Same Courses as Offered in the UK

Powerful Alumni Network

Align to 2030 Skill Set

Faculty of Industry Experts

UGC Recognised

Access to Talent Hub
Why study this course at NEXT?
- A globally recognized Master’s qualification
- World-class learning resources comprising carefully curated modules and structure.
- Expert lecture panel comprising CEOs and Senior industry leaders
- Flexible Lecture delivery options for busy individuals

Key facts

University:
London Metropolitan University

Intakes :
Feb | Jun | Oct
Intake size - 16

Mode of Delivery :
Weekend Classes

Modules :
6 Modules + Dissertation

Faculty :
School of Computing and Digital Media

Duration :
12 Months

Kavindi De Silva
BA (Hons) Business Administration (Top-up)
Global Events at Space Hero Ltd

Sachini Dissanayake
MSc Aviation Management
Lead Aircraft Mechanic
Emirates Airline Colombo station
I must mention the incredible group of friends I made who were working in various divisions of various airlines from all over the world. Never thought I could expand my network so fast!
The master’s program is a great opportunity for a girl working in a male-dominated field in a country like Sri Lanka, to learn not just theoretical knowledge, but also skills for personal development and facing upcoming challenges.
This programme helped me to improve my skills professionally and personally, I always cherished memories that were created at the NEXT campus. "

Yenushka Aponsu
MSc Aviation Management
First Officer
Trans Maldives Airways
The lectures were well versed in their modules and went beyond the module and structures to provide useful insights. The module structures and assignments were also supplied well in advance which was beneficial for me as a student working overseas and hence helped me plan. Overall, it was a great experience and, I would recommend it to anyone interested in pursuing a Master‘s in Aviation Management. "
The MSc in Cyber Security is the perfect choice for those looking to launch or advance their career in the digital industry as a cyber security specialist. This comprehensive program covers key aspects of cyber security and forensics, providing hands-on experience with both open-source and licensed security tools.
Throughout the course, you’ll explore how artificial intelligence can be applied to detect threats, prevent cybercrime, and anticipate illegal activities. You’ll also gain practical experience using industry-standard software and working with external organizations to apply your skills in real-world scenarios.
Language of instruction and assessment: English
*Course subject to approval
This module seeks to provide students with a theoretical and practical systematic understanding of the cyber forensic practice covering a wide range of scenarios. Students will be provided with the knowledge to identify, extract, document, interpret and preserve IT assets as digital evidence, as well as analyse the root cause of security breaches. The module covers issues such as Cybercrime activities and their prosecution, Cyber evidence handling, forensic processes, and tools.
This module seeks to provide students with a theoretical and practical systematic understanding of the cyber incident response and handling practice covering a wide range of scenarios. Incident response and threat-hunting activities are the keys to identifying and observing cyber incidents and malware indicators and patterns of activity to generate accurate threat intelligence that can be used to detect current and future intrusions. Students will be provided with the knowledge and comprehensive understanding of incident response tactics and procedures. The module covers all aspects of cyber incident response starting with prevention, immediate response, mitigation and post-incident investigation to determine the root cause of security breaches. This module addresses the growing demand for cybersecurity consultants and SOC analysts to monitor and maintain the security of public organisations and corporations. With a strong focus on virtualised environments that will allow students to act professionally within incident response and in malware/threat analysis.
This module is designed to introduce principles underlying computer and network security auditing, securing, and penetration testing. It also introduces tools used to assess and validate the security posture of a network and its applications. This module will mainly employ experiential learning. The students will learn through a series of theory-based lectures and associated practical classes and workshops based on each of the module’s topics. Students will develop their skills by applying their knowledge and techniques to discover vulnerabilities and develop exploits in a range of real-world scenarios. Directed and independent study activities will underpin the materials presented and provide opportunities for students to put theory into practice in real-world use cases.
The module is concerned with the study and application of tools and techniques that enable the protection of information and other resources of enterprise information systems. Increases in storage, manipulation, and transfer of data across computer networks requires effective encryption techniques. This module will provide insight into some of those techniques, algorithms and their development through history. Part of the course is dedicated to the mathematics (number theory, finite fields and elliptic curves) relevant to cryptography with techniques developed using software such as Maple. The focus will also be on the analysis, design and implementation of tools and techniques that achieve the three goals of confidentiality, integrity and authenticity in security computing. Particular focus will be on the management framework that facilitate the accomplishment of the above three goals. Importantly the module will address the ethical framework of information security, the issues around privacy and data protection and the rights of private citizens to access strong encryption. Throughout the module connections with other aspects of artificial intelligence and cybersecurity will be emphasised through the examples and case studies chosen.
The module provides students with the experience of planning and bringing to fruition a major piece of individual work. Also, the module aims to encourage and reward individual inventiveness and application of effort through working on research or company/local government projects. The project is an exercise that may take a variety of forms depending on the nature of the project and the subject area. Particular students will be encouraged to carry out their projects for local companies or government departments.
This module provides a broad introduction to cybercrime and cyber security evolution. The module examines the relationship between advances in Internet-based and digital technologies, and their criminal exploitation within cyberspace. It examines a wide range of cyber threats, attacks and risks, and the strategies employed to mitigate these, including the laws that are in place to protect and prevent online crimes/cybercrimes. The module provides essential coverage of the principles and concepts underpinning cybercrime and cyber security, maintaining focus on the identification, examinations and assessment of the key threats, attacks and risks, and in areas related to legal, ethical, social and professional issues.
This module focuses on various aspects of Cybersecurity Management and deals mainly with the protection of information assets over the cyber space by concerted measures. This module aims to provide students with an appreciation of the benefits Cybersecurity Management provides within a business environment and over cyber space. This includes the choice and application of appropriate risk assessment and risk control techniques, the understanding of security standards & procedures, coupled with the application of cybersecurity technology & security measures in a business setting.
This module introduces the essential principles, methods and techniques in AI. It covers a broad range of topics such as search, planning, logic, knowledge representation and inference. It discusses examples of intelligent systems and studies how to develop intelligent applications such as expert systems, natural language systems, and autonomous mobile and robotic systems. Students will be offered lectures, which introduces the important concepts, explain the principles and techniques, and demonstrate how to apply them to solve problems in the related topics. The workshops will provide practical sessions to help students understand the content of the lectures and build the necessary skills to develop intelligent systems.
This module provides students with an in-depth appreciation of the Internet of Things (IoT) and Cloud Computing concepts, models, infrastructures, and capabilities. The module will place emphasis on modern system architecture and design, Autonomous Intelligent Systems (AIS), key wireless/mobile/sensor technologies, and issues of privacy and trust, in the development of Cloud-based IoT systems. Practical work within the module will provide students with real, hands-on, experience of building a basic Internet of Things infrastructure that can access Cloud Computing services and the opportunity to develop their Python programming skills and abilities. Some basic knowledge of Python will be used throughout.
You’ll be assessed using a variety of methods, including individual and group presentations, coursework, examinations, mini-projects and assessments.
- UK Honour’s Degree or equivalent with a 2nd class lower or better, in a related area
- Applicants with relevant professional experience will also be considered.
- Other applications will be considered by the University on a case-by-case basis. Please contact our team of Education Advisors for other eligibility options.