Start Immediately
-
Study Hours Per Module
150 Hours
-
-
Delivery
Online
-
Modality
Self Paced
About the programme
The MSc Computer Science with Cyber Security programme will provide you with insight into how critical cyber security is to a business and its customers. As the use of more digital and online technologies continue to grow and expand, it is important to gain the knowledge on how to prepare and protect systems from vulnerabilities and impacts. This programme will provide you with the knowledge of key industry tools, techniques, strategies, and processes used to reduce and prevent unwanted activity such as cyber-attacks and data breaches.
The modules in this programme will focus on how to keep information systems and networks safe in any industry such as in a variety of business, healthcare agencies, government agencies, and in personal environment to reduce risk of expose of confidential information. After completing the programme, you will be able to understand overall cyber security concepts that can be researched recommended to keep systems and environments safe.
The three specialisation courses in this program are (1) Computer and Digital Forensics, (2) Cryptography and (3) End-Point Security.
Programme Modules
Programme Overview
This module is designed for students to develop a comprehensive understanding of research in computer science. The module examines the concepts and theories underlying research, as well as the practice of research. The module has an applied focus. The readings and assignments are designed to identify a feasible research topic and develop a research proposal for an academic project or dissertation. How research problems and questions may be identified, and the process of achieving thoughtful, effective and efficient research design are examined.
The importance of the literature review and how it can be carried out for optimal effectiveness in research are investigated. In addition, the module provides an overview of research methodologies and methods and the techniques of the research process. The philosophical and epistemological assumptions underpinning the research approaches and methodologies, as well as their role in determining the design and implementation of the research, are studied. Besides these aspects, the ethical aspects of research are also addressed.
Programme Overview
This module is a continuation of Research Methods for Computer Science I in which the student will complete the project or dissertation presented in the first module.
Programme Overview
You will learn how to analyse and design computer algorithms and data structures. The focus will be on methods for evaluating algorithm efficiency and implementation of various data objects, programming styles, and performance expectations. Course topics will include key areas required to understand algorithmic design patterns, such as data concepts, arrays, stacks, queues, trees, and graphs. You will apply these concepts to create effective programs and solve problems in coding design. In addition, you will learn the importance of enhancing the performance of a program to ensure it is optimised and reusable for overall growth.
Programme Overview
You will learn about the legal impact of computer activity such as computer crime, intellectual property, privacy issues, risks, and vulnerabilities. Topics explored will be in key areas such as malware analysis, network forensics, operating systems, and mobile device forensics. You will gain knowledge of various topologies, protocols, and tools that are used in performing a forensic analysis. In addition, you will learn how criminal justice, government, private agencies, and law enforcement use computer forensics evidence to track, locate and extract digital information needed for legal investigations. Additional topics covered include researching computer forensic analyst skills through course exercises to understand what tasks and skills are required.
Programme Overview
You will learn how to evaluate a new solution by determining the appropriate computer architectural design to implement for a software program. The core topics focus on understanding critical hardware and software functionality needed to ensure a solution can be designed that will meet the requirements for usability, performance, and support expectations of the program. In addition, you will learn strategies for making architectural decisions critical for successful implementations.
Programme Overview
You will study key security concepts, security issues and procedures in computer and mobile networks. Topics covered will include learning about the various types of security such as the security of LANs, WANs, databases, and network operating systems. You will analyse threats to computer networks by exploring designs of network infrastructure, potential security flaws, risk assessment and mitigation, and security concepts that impact various communication networks. You will develop knowledge to determine what network security capabilities are needed in architecture and how to apply them based on different situations. As a result, you will get a comprehensive understanding of when to use network intrusion detection and forensics technologies, cryptographic and authentication systems, access control mechanisms, internet routing and other protocols.
Programme Overview
You will learn the fundamentals and mathematical methods that are central to cryptography. Topics covered will include details on various concepts such as asymmetric and symmetric cryptography, public-key encryption, message integrity, hash functions, block-cypher design and analysis, number theory and digital signatures for secure communication. In addition, you will gain knowledge of how these concepts can be implemented and secured by creating algorithms to encrypt information and other security measures for overall efficiency. At the end of the course, you will understand how to analyse commonly used cryptographic primitives, types of attacks, and cryptographic protocols for computer security systems by exploring different solutions and architectures.
Programme Overview
You will learn the fundamentals of data warehousing and data mining. You will gain a deeper understanding of how data mining is used through hands-on experience in various areas such as big data analysis, prediction, classification, identification, clustering, and association. In addition, you will learn how data mining and databases work hand-in-hand from a user perspective in various data modelling, statistical analysis, designing schemas, querying databases, and manipulating databases. By the end of the course, you will understand key strategies on how to apply data mining technology to real-world applications, evaluate trends, and optimal design solutions.
Programme Overview
You will learn how to control endpoint risk to confidential information and data. You will become aware of events that may occur to prevent hacking by securing how the end user may access an application such as from a mobile device, laptop, servers, and other devices. In addition, you will understand various end-point security software components such as protective web browsing security, data encryption and classification, loT security, block phishing, and other safeguard practices to prevent threats. As a result, you will be able to understand how end-point security setup on a network reduces access to personal identifiable information (PII), banking accounts, classified data, intellectual property, and other sensitive information.
Programme Overview
You will gain foundational knowledge on the importance of machine learning in artificial intelligence and explore modern algorithms in machine learning, focusing on practical applications to understand how to structure data into models that can be created and utilised. Throughout the course, there will be a core emphasis on how to understand the components needed when using data and information to develop such as software libraries, regression, classification, mixture models, neural networks, deep learning, ensemble methods and reinforcement learning. In addition, you will have knowledge of machine learning techniques and how they can be applied in various processes and real-world solutions.
Programme Overview
You will examine the overall core aspects of operating systems design and implementation. Key topics include developing knowledge of operating systems by reviewing different types of OS to understand system concepts (process and memory management, process coordination, device drivers, file systems, starvation/deadlock), functionalities of files system management (such as log-structured file systems, distributed file systems, memory-based file systems), user interface, programs and implementation approaches and steps. In addition, you will utilise case studies to understand design approaches on how operating system types (batch, time-sharing/multitask, distributed, network, mobile, Microsoft windows, Apple iOS, Linux, etc.) may be used in a particular solution scenario and how they impact coding decisions.
Programme Overview
You will learn concepts of programming languages and design considerations to consider in implementing a solution. Key areas include learning about different types of programming languages, such as multiple programming paradigms, including functional and object-oriented programming like C++, Java, JavaScript, C#, and Python. You will gain foundational knowledge and concepts to incorporate the appropriate functionality, such as stack and heap, from a scalability and performance perspective when making software development design decisions for a solution. In addition, you will learn about software and application frameworks and various add-on components to ensure you are making a full design decision.
Get Enrolled
Start the application process here. You have the option to either pay for your degree in full at the start, or pay per module.
The information below is required for social login
Login to your Account
JOIN FOR FREE
Let’s begin with setting up your account to keep track of your progress