inline-defaultCreated with Sketch.

This website uses cookies to ensure you get the best experience on our website.

Students
Tuition Fee
Start Date
Medium of studying
Duration
12 months
Program Facts
Program Details
Degree
Masters
Major
Cybersecurity
Area of study
Information and Communication Technologies
Timing
Full time
Course Language
English
Intakes
Program start dateApplication deadline
2024-09-01-
About Program

Program Overview


Abertay University's MSc Ethical Hacking and Cybersecurity program, certified by GCHQ, equips students with the skills to ethically exploit vulnerabilities and improve network security. Through an offensive approach, students learn to think like hackers, covering topics such as penetration testing, digital forensics, and malware analysis. Graduates are highly sought-after in the cybersecurity industry, with potential career paths including ethical hacker, penetration tester, and security analyst.

Program Outline


Degree Overview


Objective:

The MSc Ethical Hacking and Cybersecurity program seeks to equip students with the necessary skills and mindset to effectively tackle burgeoning threats posed by cyber attackers. This one-year program fully immerses students in the world of ethical hacking, providing them with the knowledge and tools to ethically exploit vulnerabilities and improve network security. Students cover a comprehensive range of topics, including:

  • Penetration testing
  • Digital forensics
  • Information security management
  • Malware analysis
  • Port scanning
  • Buffer overflows
  • Password cracking
  • The program curriculum is designed to evolve alongside the latest developments in the field, ensuring students graduate with the most up-to-date knowledge and skills.

Outline


Content:

  • Offensive Cybersecurity: Students develop the ability to think like attackers, enabling them to identify and exploit vulnerabilities in IT systems.
  • Defensive Cybersecurity: Students learn how to implement security measures to protect networks and systems from cyberattacks.
  • Cybercrime Investigation: Students gain the skills to investigate cybercrime incidents and collect evidence for legal proceedings.
  • Ethical Hacking Techniques: Students acquire expertise in a variety of ethical hacking techniques, including penetration testing, social engineering, and vulnerability assessment.
  • Digital Forensics: Students learn how to collect and analyze digital evidence to reconstruct events and identify perpetrators.

Structure:

The program is offered in two formats:

  • Full-time: Students complete the program in one year, attending classes on campus.
  • Part-time: Students complete the program in two years, with distance learning and weekly online sessions.

Course Schedule:

The program follows a modular structure, with each module covering a specific topic. The modules for the full-time program are:

  • Computer Security (CMP506)
  • Digital Forensics 3 (CMP507)
  • Information and Network Security Management (CMP508)
  • Ethical Hacking 4 (CMP509)
  • Engineering Resilient Systems Masters (CMP510)
  • Research Methods (1) (GRS501)
  • Masters Project (CMP504)
  • The part-time program follows a similar structure, with the modules spread across two years.

Module Descriptions:

  • Computer Security (CMP506): Introduces students to the fundamentals of computer security and ethical hacking, focusing on vulnerability assessment and defense techniques.
  • Digital Forensics 3 (CMP507): Equips students with the skills to conduct and evaluate computer forensic investigations, including using forensic software and developing appropriate investigation strategies.
  • Ethical Hacking 4 (CMP509): Provides students with advanced knowledge and experience in ethical hacking techniques and their countermeasures.
  • Engineering Resilient Systems Masters (CMP510): Examines social and technical approaches to enhance security resilience in systems, considering both offensive and defensive strategies.
  • Research Methods (1) (GRS501): Introduces students to research methods and statistical analysis, combining theoretical concepts with practical lab sessions.
  • Masters Project (CMP504): Challenges students to independently plan, conduct, and write a research-based investigation, culminating in a dissertation.

Assessment The program utilizes a variety of assessment methods, including:

  • Written coursework: Students complete assignments and essays demonstrating their understanding of the program's concepts.
  • Presentations: Students present their research findings and defend their arguments to peers and faculty.
  • Seminars: Students participate in discussions and debates on current cybersecurity issues, fostering critical thinking and collaboration.
  • Written dissertation: MSc students submit a comprehensive dissertation based on their research project, demonstrating their independent research skills and ability to contribute to the field.

Teaching


Teaching Methods:

The program uses a problem-based learning approach, encouraging students to actively engage with the material and apply their knowledge to real-world scenarios. This approach is complemented by lectures and practical sessions, ensuring students develop a thorough understanding of both theoretical and technical aspects of cybersecurity.


Faculty:

The program is taught by experienced academic staff who are active researchers in their respective fields. This ensures students receive up-to-date knowledge and benefit from the expertise of leading cybersecurity professionals.


Unique Approaches:

The program's offensive approach to cybersecurity sets it apart from traditional programs. This approach encourages students to think creatively and develop a deep understanding of how attackers operate, ultimately making them more effective defenders.


Careers


Career Paths:

Graduates of the program are altamente sought-after in the cybersecurity industry. Potential career paths include:

  • Ethical Hacker
  • Penetration Tester
  • Security Analyst
  • Security Engineer
  • Security Consultant
  • Cybercrime Investigator
  • Digital Forensic Analyst

Opportunities:

Graduates can find employment in a variety of sectors, including:

  • Government agencies
  • Private companies
  • Financial institutions
  • Technology companies
  • Consulting firms

Outcomes:

The program's graduates are well-equipped to make immediate contributions to their chosen careers. Graduates consistently secure employment in top cybersecurity firms and earn competitive salaries.


Other

  • The program is fully certified by GCHQ, a testament to its quality and relevance to the industry.
  • The program is accredited by BCS, the Chartered Institute for IT, recognizing its alignment with professional standards.
  • Abertay is a Crest academic partner, demonstrating its commitment to raising professional standards in the cybersecurity industry.
  • The program features a dedicated Hack Lab, providing students with a safe and controlled environment to experiment with ethical hacking techniques.
  • Students have the opportunity to join the Ethical Hacking Society and participate in industry events, enhancing their network and career prospects.
SHOW MORE
How can I help you today?