Network security is a rapidly evolving sector of industry. The MSc Cyber Security and Pen Testing programme is designed to meet the demands imposed by the changing corporate needs in networking and the concurrent challenges in network security. Security extends beyond the technical sphere of activity to include strategic, organisational and managerial remits across the enterprise. Developing policies, strategies and working plans to address network security, minimise security breaches incidence, mitigate its damage and shorten recovery time are essential elements for the enterprise.
Graduates of the programme will be equipped with professional and employable skills and attributes such as:
The programme is comprised of eight compulsory modules over two semesters. Amongst these, you will have the opportunity to undertake an individual project with a supervisor with specialist knowledge of their field. The programme has two 30 credit modules, four 15 credit modules and one zero credit module. Students must pass all taught modules in order to progress to the dissertation stage. Each module will have 3 contact hours per week, usually with 12 workshops/seminars and 12 laboratory sessions timetabled over 24 weeks for full-time students.
This module provides students with a systematic understanding of the concepts, protocols and standards for computer networks and internetworking, used in current and future communication infrastructures. It is essential in today’s market of networking to provide students with critical insights and practical experiences of essential tools used for monitoring, managing and evaluating computer networks for them to be better network managers, network administrators or network engineers with both problem solving and practical skills such as selecting and configuring appropriate protocols, network devices, and managing network design.
This module focuses on the design and implementation of modern Operating Systems and Application Environments that are used to build mobile applications. The module examines key operating concepts including: processes and threads, memory management, file systems, network interfaces, inter-process communication (IPC), synchronisation, networking interfaces and socket programming. Additionally, the module then focuses on a detailed study of key application environments including building applications using Android Studio. Practical experience of modern Operating Systems will be provided using labs on Linux, Windows and Android.
This module covers the concepts and critical issues of security with emphasis on security architecture and mechanisms, standards, protocols, solutions and applications. It aims at providing students with an understanding of security technologies, algorithms and solutions. It will also provide an understanding of the design criteria in security, basic system security analysis, and security solution synthesis.
The aim of this module is to provide the students with the knowledge and experience of advanced hacking techniques and their countermeasures. The module aims to develop critical and reflective thinking with regards to the methods used to carry out an attack and the countermeasures to stop hackers. The module will furnish students with skills to test IT infrastructures for vulnerabilities and enable them to understand the attack lifecycle.
This is module covers the principles and foundations of network security. It aims at providing students with security issues, technologies, algorithms and protocols used in securing computer networks and associated systems. It will also provide an understanding of possible security breaches, security risk analysis and mechanisms to protect computer and network communication systems. It also studies an in-depth review of commonly-used security mechanisms and techniques, security threats and network-based attacks.
This module covers the fundamental concepts and methods to maintain and preserve Cyber security. The module provides you with a command to the subject of cyber security and information assurance. This includes a broad understanding of the security technologies available to support information assurance and security requirements and vulnerabilities corresponding to attack vectors.
This module is an independent piece of work shaped largely by one’s own decisions and preferences to accomplish and deliver a task via prescribed stages. The module aims to facilitate students’ understanding of designing, planning and conducting applied research. The module encourages students to apply and test theory and to contribute to applications, through enhancing students’ ability to handle data for problem solving and evaluation; to test theory using analysis and simulations, integrating the learning from other modules.
Our new campus demonstrates what can be achieved when all stakeholders share a clear vision. The concept was developed by a London architect, Graham Wilson, who also is credited for developing many of Middlesex buildings in Hendon.
Course fees are subject to annual inflation. An international Admin Fee is also applicable for international students. For more details, see link to respective fees and payment plans below.
You will be actively involved in a range of learning, teaching and assessment approaches as part of Cyber Security and Pen Testing Programme. As well as developing your practical skills in laboratory sessions, you'll attend lectures, seminars, workshops and tutorials, where you'll deepen your theoretical knowledge, work on activities and case studies, and develop your analytical and problem-solving skills.
You will do research, produce written reports, give presentations and take part in group discussions and group work, supplementing all this with your own independent study. Such active approaches aim to put you at the centre of your learning so you are involved and engaged in all aspects of your assessment and learning. Your programme will require your active participation in learning activities and engagement with your fellow students both individually and collaboratively, working and learning with other students as part of a small group. Learning activities may also occur both within and outside the classroom.
Your learning will also be supported by technology. Increasingly your tutors will be using existing and emerging learning technologies to engage you in e-learning activities. Your programme will be facilitated using a variety of media and online tools which will allow you flexible access to a diverse range of online resources, quizzes and learning materials as well as collaborative tools with which you can engage and learn with your peers. Not confined by the time and space associated with traditional teaching methods you may take part in online discussions and learning activities from wherever you are studying.
By engaging with e-learning you will also be developing skills, which are essential for your learning and are also highly valued by employers. These include but are not limited to: working flexibly, communication, understanding of IT, team working and creating shared understandings based on quality resources and access to global expertise. In addition, you can arrange one to one sessions with your personal tutor or module leader. You will also have access to and use resources to support your learning including library support, and a broad range of available software throughout your course.
During your academic year, your weekly timetable will typically consist of: 1 hours of lectures; 2 hours of bi-weekly supervised practicals and seminars; regular meetings with your end-of-programme project supervisor.
When not attending your teaching, sessions mentioned above, you will be expected to continue learning independently through self-study. Typically, this will involve reading journal articles and books, working on projects, undertaking research, and preparing for assessments including coursework, presentations and examinations. Your independent learning is supported by the facilities available including the library, Study Rooms and online materials accessible via MyUniHub.
Each 30cps module involves approximately 180 hours of study and each 15 cps involves approximately 90 hours of study. There is a notional number of approximately 1,800 hours learning hours per year on the MSc Cyber Security and Pen Testing Programme. This includes attendance at lectures, tutorials, laboratory activities and study at home or in industry. All modules on the programme are compulsory.
You will be taught by an experienced teaching team who possess the expertise, knowledge and experience closely aligned to the content of the modules on offer. The team includes academics, professional practitioners, and technical staff. The programme involves extensive team teaching drawing on the collective knowledge and expertise of the entire department. Most staff teaching on the programme have PhDs. A few have professional qualifications (CCNA, LPI, CISSP, CEH…) as well as or instead of a PhD.
Assessment is an integral part of learning and you may hear it referred to as formative or summative.
Formative assessment is designed to give you feedback on your performance and how it can be improved. As a result you will get detailed feedback on formative assessment but not a grade. Formative assessment is an important part of the learning process and has been shown to help students improve both their grades and their learning style.
Summative assessment is designed to measure the extent to which you have achieved the learning outcomes of a module and therefore the grade you will be awarded. Learning outcomes are the specific skills and knowledge that you are expected to demonstrate as a result of taking a module. Summative assessment should assess achievement of all learning outcomes in a secure, fair and accurate manner and on your programme this will mainly comprise of exams, seminar tests, lab tests, essays etc.
Assessment may also involve self, peer or group approaches. For example, you may be asked to self-assess your own work, indicating where you feel you have clearly demonstrated your understanding and also identifying areas where can see you have room to improve. Assessment may also be a peer process where students, individually or as groups, offer feedback on one another’s work. Group assessment may also be part of your programme where part of the assessment requires you to demonstrate your ability to work as part of a group and possibly receive a group mark. Assessments are reviewed annually and may be updated based on student feedback, to suit content or based on feedback from an external examiner.
The balance of assessment will depend on the modules. The varies per module from 100% coursework on some modules, to a percentage mix of unseen exams, lab assessments and coursework on others.
You will receive feedback on formative assessment and written summative assessments. Feedback on examination performance can be requested from the module coordinator. Feedback is intended to help you learn and progress, and you are encouraged to review and discuss your feedback with your module or personal tutor.
We will aim to provide you with feedback within 15 working days of submission.
Details of progression and pass marks for assessment can be found in the university regulations.
You will have access to academic support services that you assist you in the following areas;
More information on how to access these services would be provided to you at your induction.
Equipped with a hybrid skill set, you will be able to pursue several different career pathways in a promising field of industry where business operations merge with information technologies.
This job is listed as #4 among Best Technology Jobs and #40 overall by U.S. News & World Report. In this role your main duty will be to protect sensitive information. You will create the plans and implement strategies for preventing attacks, develop policies to protect the organization against such attacks, ensure compliance of policies, monitor data access and train other employees.
Typically working as part of a team of security experts, analysing and assessing risk, developing secure software and identifying vulnerabilities.
A security architect is responsible for analysing security threats and recommending solutions to protect information and data. They may participate in the development of security hardware and software, oversee and educate staff on security policies, design security models and install VPNs, firewalls and more.
Penetration testers are in charge of identifying vulnerabilities in an organizations network. They do this through constantly probing and testing the network using various tools and software.
A forensics expert is a cybercrime-fighting Sherlock Holmes who investigates cyber-attacks and tries to identify flaws in the system that allow for an attack, along with clues left by the attackers. Related job titles include Cybersecurity Forensics Analyst, Cybersecurity Incident Responder, and Cyber Forensics Analyst.
The CISO is a senior level role in charge of developing, implementing and maintaining security processes that protect the company from threats and risk.