Computers are central to all aspects of our daily lives; as industries ranging from communications to banking have come to rely on them, the need for improved computer security has never been greater. This course focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimise it, and, how to extract and use digital information from a wide range of systems and devices. The course is structured so that all students cover the same introductory material, but then choose to specialise in either Cyber Security or Digital Forensics.
Students taking the course will gain an understanding of the nature of the security threats that face computer systems and the type of information that is stored on digital devices (and how it can be extracted from them). They will benefit from a broad and varied array of state'of'the'art technologies, including:
EnCase, FTK and open'source forensic tools, and a dedicated forensics computer laboratory
Specialist input from guest lecturers
Over 20 university computing laboratories providing access to Unix, Novell and NT servers, all supported by high'bandwidth networks
Specialist technicians to ensure you can get the most out of these technologies.
All students will take the core modules which are designed to give a comprehensive introduction to this specialist field. They will cover basic digital forensics and network security, and also cover computer system tools and the UNIX operating system. Dealing with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines) is also covered. You will then follow either the Cyber Security or Digital Forensics pathway within the course (though each lead to the same named degree: the pathways are simply opportunities to specialise within the field). In addition, all students will take a Research Methods module and complete a project module.
The course offers the opportunity to examine a variety of tools available on the open market, and the use of forensic tools to retrieve data from electronic sources. It will also consider the analysis of professional and ethical issues relating to computer security and forensics, and the development of professional competencies, such as report writing and presenting evidence in court.
Teaching methods include lab'based sessions, student'led tutorials and lectures by internal staff and guest speakers from industry. Our courses are offered by friendly, highly experienced staff, and benefit from the diverse specialist knowledge and skills within the departments of the Faculty. Assessments will be carried out mostly through practical or research'based course work.
|Duration & Attendance||Qualification||Tuition fees||Fee type|
- You are usually expected to have a good degree (generally an upper second class honours) in a computing-related discipline from a UK university or overseas equivalent. If your first degree does not have a strong computing element then your work experience and other qualifications may also be taken in to account.
- You should submit a statement of purpose with your application in which you present your key interests and career aspirations and how you believe the course can help you to achieve these, as well as the relevant qualities and experience you will bring to the course. You may be invited by the admissions tutor an informal interview.
- If your first language is not English, you should have an IELTS score of 6.0 overall, with a score of 6.0 in each element.