|Study location||United Kingdom, Nottingham, Clifton campus|
|Type||Master courses, full-time|
|Nominal duration||1 year|
|Tuition fee||To be confirmed|
Undergraduate diploma (or higher)
Bachelor degree in Computer Science or Computing related subject.
Applicants with relevant employment experience or other relevant qualifications will also be considered.
The entry qualification documents are accepted in any language
At least 2 reference(s) should be provided.
The overall aim of this course is to provide you with a specialist master’s level education in theory and practice relating to Information Technology security issues.
Building on a practical foundation comprising the understanding of operating systems, network protocols security and how to develop secured code, you will learn how to critically assess the security risks to IT organisations and how to evaluate the information security solution to mitigate them. In addition, the course will also provide you with the research skills necessary to investigate the continually changing issues in computer forensics and security in Cloud infrastructures.
Throughout the course you will develop a critical understanding of IT security-related processes and procedures. You will be able to critically analyse software requirements and apply appropriate tools to design and develop innovative solutions. You will acquire the skills to investigate and appraise new and existing technologies and adapt these to specific purposes.
Information Security Management
Gain knowledge and understanding of the main issues and challenges related to information security management. Learn how to critically evaluate information security solutions and make decisions regarding the adoption and implementation of information security related technologies, policies and practices in an organisational context.
Develop a critical appreciation of the theoretical and practical issues in the field of computer forensics. Learn the necessary skills, methodologies and processes to conduct an initial computer forensics investigation within an organisation and gain an in-depth understanding of the importance of various computing systems in computer forensics investigations.
Learn how to critically analyse the security problems affecting computing systems at the operating system and application levels, understand the design patterns for developing secure code and devise security solutions and formulate detailed technical reports.
Develop an understanding of the analysis, design and implementation of secure web applications for the Internet and intranet. After an introduction to web based mark-up languages the main focus of the module will be to study the architecture and implementation of internet based applications in the context of current object-oriented systems methodologies.
Network and Cloud Security
Gain an understanding of the security problems of computer networks and the main technologies related to network security. Learn how to migrate networked computing solutions to Cloud infrastructures and address the associated security risks.
You will develop the skills of research and enquiry that will enhance your independent learning abilities and enable you to write effective project reports and technical papers.
On completion of the taught modules on this course you will then have the opportunity to undertake an MSc topic. This gives you 15 weeks to concentrate full time on a specialist area that interests you and apply what you have learnt to a specific problem.
This course will prepare you for roles as a technical security specialist together with a range of technical development and implementation roles. You will also have the potential to develop into security consultancy and technical management roles.