By combining the key subject areas of Cyber Security and Digital Forensics, the programme presents a hybrid learning scope, highlighting how to protect and prevent cybercrimes occurring in organisations and be compliant with regulations governing Cyber Security. Students will also get to understand how to detect and advise on cybercrimes that have occurred in organizations and be compliant with regulations governing Digital Forensics.
Graduates of the programme will be equipped with professional and employable skills and attributes such as:
Core modules such as programming, networks, and IT security are covered in this course extensively. You will develop expert knowledge in the technological, ethical, regulatory and legal issues in this field, including security, encryption, operating systems and information systems.
This module helps students to model, design and implement a database system that reflects information in an organisation. Students will also learn how to query and manipulate data that is stored in relational database using Structured Query Language (SQL).
This module provides an introduction to operating systems and command line. Essentials of computer architecture are also covered. The lab work ranges between using C programming, Batch, Bash and Python.
The main aim of this module is to provide you with the opportunity to learn to program effectively. This takes place in the context of learning to solve a range of problems arising in the context of the processing, storing and transmitting data. You will understand the role of a basic but important range of data structures and types and several data structures of interest within the networking and security fields will be considered.
This module will help students to understand the “layered” approach to networks by examining the OSI and TCP/IP models in detail. Among the topics covered will be the various network devices, network addressing schemes and the types of media used to carry data across the network.
This module attempts to cover all aspects of networking and protocols including Internet Protocols, Network Services and Cloud Environments as well as Network Monitoring and Analysis.
This module helps students to identify and comply with relevant legislation, regulations and standards. It considers the language and terminology of laws and standards and how `in house’ regulation can be written to facilitate the following of best practice. In addition, the module enables the student to evaluate and use relevant e-Disclosure/e-Discovery procedures.
This module considers GDPR compliancy for websites and more importantly implement them for the protection of collected data. It also explains how to implement the setting up of a secure web server for websites.
This module helps to acquire a thorough understanding of all phases in a digital investigation, and the principles of evidence management, preservation and documentation. All stages of the digital forensic lifecycle are covered with the use of industry standard tools and software. These skills are then deployed in a simulated crime scene where the student will acquire digital evidence and produce a report for their own forensic investigation.
The two main aims of the module are as follows:
1. Complete the extraction of artifacts from memory acquisition whilst minimising the contamination; and,
2. Complete analysis to discover and then reconstruct events from the memory artifacts that will inform the investigation.
This module aims to provide an overview of the different types of cyber security threats to computer systems and networks and the measures that can be put in place to counteract and mitigate against these threats.
This project module consolidates and deepens the knowledge and skills gained from other parts of the programme. It provides an opportunity to study independently in order to complete a thesis on a Cyber Security &Digital Forensics related topic, under the guidance of an allocated supervisor.
The aim of the module is to introduce students to a range of Artificial Intelligence theories and techniques, including the most commonly used. This will extend to the ability to implement these techniques, and the students will extend their own development skills.
This module helps to understand general and advanced areas related to network security, cyber security, and network forensics and includes threats and security attacks, vulnerabilities, cryptography, security tools, software security, network attacks and defences, countermeasures, web based security, IDS, network forensic analysis, and security in cloud computing.
This module includes essentials and anatomy of blockchain, programming and Implementation of blockchain as well as analysis of existing blockchains.
Our new campus demonstrates what can be achieved when all stakeholders share a clear vision. The concept was developed by a London architect, Graham Wilson, who also is credited for developing many of Middlesex buildings in Hendon.
Course fees are subject to annual inflation. An international Admin Fee is also applicable for international students. For more details, see link to respective fees and payment plans below.
You will be taught through a combination of lectures, seminars, laboratory sessions and practical workshops. Lectures allow you to gain and develop knowledge in specific subjects. You can discuss and develop your understanding of topics covered in lectures and practicals in smaller seminar groups usually made up of around 20 students. In workshops, you will be able to develop your skills by doing exercises, with teaching staff at hand to provide help and answer questions. In addition, you can arrange one to one sessions with your personal tutor or module leader. You will also have access to and use resources to support your learning including library support, a broad range of available software and laptops on loan throughout your course.
During your course duration, your weekly timetable will typically consist of:
When not attending your teaching, sessions mentioned above, you will be expected to continue learning independently through self-study. Typically, this will involve reading journal articles and books, working on projects, undertaking research, and preparing for assessments including coursework, presentations and examinations. Your independent learning is supported by the facilities available including the library, Study Rooms and online materials accessible via MyUniHub.
Your overall workload will include the activities listed above, and with each credit being completed equating to 10 hours of study time (You will complete 120 credits per level of study, which are broken down into modules of typically 30 credits). Bear in mind your actual hours may depend on the optional modules that you choose (if available).
You will have access to academic support services that will assist you in the following areas;
More information on how to access these services would be provided to you at your induction.
The course will provide you with opportunities to test your knowledge and understanding informally through ‘formative’ assessment. This will be completed before your formal ‘summative’ assessment which will count towards your final marks. Each module normally contains at least one piece of formative assessment from which you will receive feedback from your tutor. Formative assessments are developmental and any grade you receive from formative assessment does not count towards your final marks.
There is formal ‘summative’ assessment as part of the module, usually towards the end of the module. Assessment is generally by coursework – this includes practical assignments, project reports, both individual and group presentations and other written work. Assessment for certain modules can also be a mix of coursework and written examinations which are conducted at the end of the module syllabus. The grades from the summative assessments count towards your module mark. Assessments are reviewed annually and may be updated based on student feedback, to suit content or based on feedback from an external examiner.
The balance of assessment will depend on the modules that you complete throughout your course. The approximate percentage of the course which is assessed by coursework and written examination is outlined below:
70% Coursework; 30% Examinations
75% Coursework*; 25% Examination* (*: Depends on optional module chosen)
You will receive feedback on formative assessment and written summative assessments. Feedback on examination performance can be requested from the module leader. Feedback is intended to help you learn and progress, and you are encouraged to review and discuss your feedback with your module or personal tutor.
We will aim to provide you with feedback within 15 working days of submission.
Details of progression and pass marks for assessment can be found in the university regulations.
You will be taught by an experienced teaching team who possess the expertise, knowledge and experience closely aligned to the content of the modules on offer. The team includes academics, professional practitioners, and technical staff. Graduate Teaching Assistants or trained postgraduate research students may also have input into your teaching under the supervision of the module coordinator.
Equipped with a hybrid skill set, you will be able to pursue several different career pathways in several promising fields of industry ranging from generic roles to more specialist roles.
IT Managers specialise in overseeing the process of planning, executing and delegating responsibilities around an organization's information technology (IT) pursuits and goals. As project participants are often spread across different offices and teams, the role of the IT project manager is to ensure that projects are delivered smoothly on-time and on-budget with minimal unexpected stoppages in work.
Database administrators (DBAs) work with technology, using specialized types of software to store and organize a company's data. Some of the responsibilities are to ensure the performance, integrity and security of a database. Others are the planning and development of the database, manage the security and disaster recovery aspects of a database, as well as in troubleshooting any issues on behalf of the users.
A Computer Forensics Investigator may perform studies to identify breaches in a firm’s security or track the source of an unauthorized intrusion. This specialist advises the client on ways to protect their systems and produces any evidence which could be used against the intruder. Responsibilities include identification, gaining access and securing any necessary devices or systems to be examined as well as reconstructing damaged hardware, if necessary. The investigator must ensure that all work is done in compliance with local and federal laws and forensic standards.
A Cyber Security Researcher conducts regular security audits and assessments from both a logical/theoretical standpoint and a technical/hands-on standpoint to identify security gaps and proposes solutions accordingly. Some responsibilities include the development of tools to automate security testing and enable more efficient discovery and resolution of security problems, educating teams of an organisation on security best practices by providing real-world examples and hands on training.