Cybersecurity (with optional Placement/Project year) MSc
Program start date | Application deadline |
2024-10-01 | - |
2025-02-01 | - |
2025-05-01 | - |
2025-10-01 | - |
Program Overview
The Cybersecurity (Conversion) Master's degree from the University of Hertfordshire is designed for both engineering and non-engineering students seeking to enter the cybersecurity field. The program combines theory and practical skills, with modules covering topics such as web systems, research methods, and penetration testing. Students can choose to complete a placement or project year for additional industry experience.
Program Outline
Degree Overview:
Our Cybersecurity (Conversion) Master’s degree is aimed at both engineering and non-engineering students who wish to make the leap into the rapidly expanding field of cybersecurity. The course aims to provide both theory and real-world practical skills and expertise to an advanced level in the emerging field of cybersecurity. The “full time” and “part time” study options for this programme are accredited by BCS, The Chartered Institute for IT for the purposes of partially meeting the academic requirement for registration as a Chartered IT Professional. Please note that the “placement year” and “project year” variants of the course are not accredited. The Cybersecurity Facility is part of the Department of Computer Science and is an innovative, forward-thinking Department. The course is taught by experts in the field with years of expertise in industry, and has close links with industry, government, and the police. The Department is also home to the Informatics Centre, a software development team where students can gain experience of commercial projects. There is an option to choose a Project/Placement year for this course, at an additional cost.
Outline:
Modules:
- Web Systems (Optional)
- Module Content: Internet and web terminology, protocols and infrastructure; Web document structure and content (e.g. HTML); Web aesthetics; Web scripting; Web requests (e.g. use of HTTP verbs); Using Internet and Web tools (e.g. IDEs, FTP clients); Web APIs; Common Web security issues (e.g. CSRF, XSS, SQL Injection); Web hosting configuration; Server side scripting; Databases (e.g. SQL, Keys, CRUD operations)
- Module Aims: To enable students to develop a broad knowledge of web technologies; To introduce the languages commonly used to structure, present, and provide interactivity within web sites; To give students a solid foundation in practical technical skills required to develop client-side web applications; To provide an overview to server-side web application development including understanding of the client-server model
- Research Dissertation (Compulsory)
- Module Content: Projects which will involve the application of methods and equipment introduced in taught modules, will be based on subjects agreed in principle with the Postgraduate Dissertation Coordinator and potential supervisors. The research dissertation may be University-based or carried out in the employer’s workplace, or through a work placement where a local organisation has a direct role in facilitating the project.
- Module Aims: To afford students the opportunity to experience the complete life-cycle of a successful and significant research-based project; To provide real-world experience of meeting the requirements of academic and professional standards, including high-level writing and referencing skills; To demonstrate to peers and to current and potential employers the student’s ability to carry out good quality academic research, in a particular field, which is relevant to their programme of study. This may involve the application of existing research within a novel context.
- Research Methods (Compulsory)
- Module Content: Time management, library skills and literature search; Evaluation of information sources; Critical analysis of information; Ethical issues in science, technology and engineering research (including intellectual property and plagiarism); Writing for research: styles and rules for presentation (including referencing standards); Choosing a research area and evaluating source material; Hypothesis formation; Research approaches and methodologies; Design and application of questionnaires & interviews; Quantitative and statistical tools for researchers (e.g. R, Python, SPSS)
- Module Aims: To clarify the distinctions between undergraduate and postgraduate level work and expectations; To increase students' experience in order to conduct a professional study and to use sampling procedures and analysing techniques; To improve students' appreciation of time management and how to conduct a literature search; To reinforce students' research skills; To consolidate students' appreciation of professional issues such as copyright and ethics
- Virtual Environments (Optional)
- Module Content: The module draws on the research expertise and investment in virtual reality hardware that exists within the Department of Computer Science to instruct students in an exciting area of computer science that is growing in commercial importance. The module content will include lecture material on: How virtual environments work; seeing in 3D; Presence and Immersion. Social and ethical considerations. Characteristics of displays. Content creation for Virtual Environments. Input and output devices. Real time Interaction. Augmented Reality. Case studies from medical, oil and gas industry, manufacturing, car design, entertainment industry, and more.
- Module Aims: To study the technology elements needed to build and interact with a Virtual Environment. To provide an overview of Human Perception and how it works. The technologies discussed will be illustrated by a series of state-of-the-art case studies and hands-on demonstrations. The course has been designed to conform with the QAA Subject Benchmark Statement for Computing (2011) and delivers specialised instruction in the subject matter that contributes to improving a student's computing-related cognitive skills, computing-related practical skills, and generic skills for employability. The module covers a greater range and depth of specialist knowledge than that that would be obtained at Bachelor degree level and provides a unique opportunity to design and develop real time 3D content that utilises a person's natural senses and skills.
- Robotics (Optional)
- Module Content: Evolution of Robotics; Microcontrollers: Arduino and Raspberry Pi; Computer Vision; Agents and Multi-Agent Systems; Machine learning and robotics
- Module Aims: To introduce the concept of artificial intelligence (AI) and to evaluate its role in the development of robotics; To introduce theoretical approaches to the development of intelligent robots; To undertake practical tasks to demonstrate how AI techniques can be implemented for robotics; To analyse methods for designing and deploying robotic systems; To critically evaluate the ways in which intelligent robots can be used in real world situations
- Cyber Concepts and Techniques (Optional)
- Module Content: Speaking Cyber - Core understanding of Cybersecurity terminologies; Introduction to programming with cybersecurity perspective; Implementing secure systems. Illustrative of what may be covered include: Design and development considerations; Selecting and applying core technologies; Cryptography; Human factors; Auditing (security audits, logging, digital investigation etc. ); Defense-in-depth; Google hacking; Pentesting; Threats and resolutions
- Module Aims: To empower the students with core understanding of the key terminologies in cybersecurity; To introduce students to programming with a cybersecurity perspective; To provide students with the understanding of the common cybersecurity concepts and technical security controls available to prevent, detect and recover from security incidents and to mitigate risks; To give students a solid foundation in the practical technical skills which can then be harnessed later in CO7604 and CO7605
- Business Implications of Cybersecurity (Compulsory)
- Module Content: Information Security Management; This will include core security standards (e.g., ISO27001, ISO27032), policies and governance etc. Information Risk Management and Business continuity Management; Audit, Assurance and Review; Understanding the threats and risks businesses face today. Illustrative part of how this (or what) might be covered include: Through problem based learning and possible industry collaboration; Exploring Social Engineering, the Least Resistance Path, Incident Response, Defence Indepthetc. Government strategy on Cybersecurity
- Module Aims: This module will develop the student's understanding of the implications of cybersecurity to today's businesses, how businesses can gain market advantage by leveraging simple and yet robust cybersecurity principles, and government's cybersecurity strategy for businesses in the UK. Being a conversion masters, this will prepare students with useful cyber skills to lead or easily be part of cybersecurity efforts in their organisations. The aims are further broken down as follows: To develop the capability for determining, establishing and maintaining appropriate governance of processes and responsibilities, delivery of controls, and cost-effective solutions for information security within a given organisation; To understand and be able to manage the risks relating to information, information systems and assets; To understand the need for, and be able to design and implement processes for, establishing business continuity; To develop the capability for defining and implementing the processes and techniques used in verifying compliance against security policies, standards, legal and regulatory requirements; To use real life business scenarios to expose students to cybersecurity needs of today’s businesses; To understand government's strategies for tackling cybersecurity issues in business.
- Software Exploitation (Optional)
- Module Content: Software attack techniques, approaches, and methodologies; Exposure to exploitation techniques, including for example, buffer overflow, stack overflow, heap attacks, and UAF (Use After Free), amongst others; Attack methods including system, host, network, and web-based attacks; Tools and techniques; use of existing tools and development of new tools; Software Protection Methods and principles of secure software and system design.
- Module Aims: The main weakness in systems is often the software they run, including software on devices and networked systems. The aim of this module is to study, understand, and practice the state-of-the-art technique for gaining entry, i.e. 'exploitation', of software across a variety of systems and platforms. With this understanding, the student will in parallel study and understand various counter-measures employed in system software against these attacks, the limitations of both the attacks and counter-measures, and counter-counter-measures. Understanding this cycle will give the student appreciation of the exploitable vulnerabilities and the need for and way to architect and design a secure system. Furthermore, the student will gain understanding of and experience in a number of tools and techniques in order to perform vulnerability and penetration tests on new software.
- Digital Forensics and Incident Response (Optional)
- Module Content: Digital system forensics; Disk; Memory; Mobile; Cloud; Live forensics; Encryption and obfuscation; Malware analysis and investigation; Network forensics; Anti-forensics; Methodologies, approaches, and techniques; Cyber Threat Intelligence and attribution; Incident Response; Ethical issues in digital forensics and incident response
- Module Aims: This module aims to introduce the student to the need for and uses of digital forensics and incident response from an organisational security perspective. The aim of this module is to introduce, study, understand and practice digital forensics techniques, and to understand the limitations of common techniques. It aims to develop in the student an appreciation and understanding of anti- and counter-forensics, including falsification of data. Finally, it aims to build the students' understanding of malware, how it operates, and practices to deal with it. Students will gain an understanding of Incident Response and Cyber Threat Intelligence.
- Penetration Testing and Active Defence (Optional)
- Module Content: Network security and attacks; The current threat landscape; Social engineering; Penetration testing tools; Active defence; Threat hunting; Defensive strategies and tools; Hack back and the legal implications; Hacker tools; Penetration testing; methodologies, approaches, and techniques; Penetration test reporting; Ethical issues in penetration testing and active defence
- Module Aims: This module aims to: introduce the student to the need for and uses of penetration testing and active defence from an organizational security perspective; introduce, study, understand and practice active defence and the limitations of common techniques. This will also look at relevant tools and the legal aspect of 'hack back'; help the student study, understand, and practice penetration testing techniques, developing skills in 'access' over networks, and how attackers look at a target; the relevant skills, knowledge and usage of hacker tools and how to stop/deter attackers. These will be built upon to allow the student to better understand network and holistic defenses and to be able to design secure interconnected systems.
- Advanced Embedded Systems & Internet of Things (Optional)
- Module Content: Embedded Systems and Field Programmable Gate Array (FPGA) Technology; Concurrent assignment statements and unintended memory; Adopting proper hardware description language (HDL) coding style and taking a divide and conquer approach for code development; The need for design simplification; Regular sequential circuit block system and registers; Building test-benches for sequential circuits; Timing, clocking, operating frequency and clock tree considerations; The Finite-state machine (FSM), its representation and FSM HDL code development; The Finite-state machine with data path (FSMD), its representation and FSM HDL code development; Internet of Things (IoT); Automatic Identification Technology and Radio-frequency identification (RFID); Wireless Sensor Network; Location System; Internet and Mobile Internet; Wireless Access Technology; Big Data, IoT & Cloud Computing; Information Security for IoT; IoT Application Case Studies; Arduino Opla, Espressif System on Chip (SoC) & Raspberry Pi IoT technologies
- Module Aims: The Embedded Systems part of this module aims to develop the skill in students of digital systems design with the VHDL hardware description language (HDL) and Field Programmable Gate Array (FPGA) reprogrammable and fast prototyping technologies. Students will be able to produce design, synthesis of circuits and implement system on chip (SoC) using modern electronic design automation (EDA) tools. The Internet of Things (IoT) contents aim to develop the advanced practical skills in building and designing IoT related components and network systems, going from the sensors layer to the cloud processing. This part also develops expertise in the use of a hardware/software tools to create and simulate practical systems, considering big data, energy consumption control and network security aspects.
Structure:
- There are six modules and a supervised research module
- The majority of work will be assessed by coursework
- This course is designed around in-person study
- There may be some online learning activities
Course Schedule:
- The core modules comprise three hours of structured learning activities in the form of lectures and workshops delivered over 10 weeks in person, in our cyber/PC labs.
- Along with this, you can budget independent study of 15 to 17 hours per week for each 20-credit module.
Assessment:
- Assessments take different forms, which include coursework assignments and presentations based on case studies and realistic scenarios delivered as individual technical reports or group projects.
- Depending on the module, students can access formative assessments to monitor their progress.
Teaching:
- You will learn from experts in the field through visitations, guest lectures and demonstrations.
- We provide a platform where you can book one-to-one meetings with the tutor.
- You will have your own Personal Academic Tutor who can support you both academically and in non-academic aspects that may affect your academic progression.
Careers:
- Graduates have gone on to leading roles in industry in the field of security and penetration testing, in policing, and in government.
- The University has an award-winning Careers and Employability service which provides a variety of employability-enhancing experiences; through the curriculum, through employer contact, tailored group sessions, individual information, advice and guidance.
- Careers and Employability aims to deliver a service which is inclusive, impartial, welcoming, informed and tailored to your personal goals and aspirations, to enable you to develop as an individual and contribute to the business and community in which you will live and work.
- We provide access to part-time jobs, extra-curricular employability-enhancing workshops and offer practical one-to-one help with career planning, including help with CVs, applications and mock interviews.
- We also deliver group sessions on career planning within each course and we have a wide range of extensive information covering graduate jobs and postgraduate study.
Other:
- The ‘Cyber Concepts and Techniques’ module is optional for February starters and compulsory for October starters.
- If you choose a placement or project year, the Research Dissertation module will be replaced by a placement or project module.
- Choosing a Professional Placement MSc is a win-win for your career, giving you the chance to get real experience, apply your cutting-edge skills in the workplace and stand out to future employers.
- In the first year you will have help from the University to find a placement, whilst developing your expertise.
- You will then spend your second year out in industry on placement, getting the chance to work with industry professionals and grow your network of industry contacts. Bringing your university-acquired knowledge and insights to industry, you will get to make a difference to the workplace and make lasting links with your employer.
- Students need to find and secure their own placement, supported by the University.
- A preparation module will also help you to get ready for your placement.
- The Professional Project MSc is your chance to get the experience you need to stand out to graduate employers and make a difference by solving real global business challenges and demonstrating practical application of your learning. Prepare for the future by reflecting on your experience and the enhanced skills that you have gained.
- In the first year you will have help from the University to find a professional project whilst developing your expertise in the taught modules of your degree.
- You will then spend your second year working on a client-led project, getting the chance to work with industry professionals and building your contacts.
- Students need to find and secure their own project, supported by the University.
- A preparation module will also help you to get ready for your project and develop your professional skills.
Tuition Fees and Payment Information:
Home Students
- £10,215 for the full course (2024/25)
International/EU Students
- £14,750 for the full course (2024/25)
- The professional placement/project year will cost an additional £2,650 (due at the start of the second year of the course), totaling £17,400 for the full course fee 2024/25.
- The University of Chester offers generous international and merit-based scholarships for postgraduate study, providing a significant reduction to the published headline tuition fee. You will automatically be considered for these scholarships when your application is reviewed, and any award given will be stated on your offer letter.
- For more information, go to our International Fees, Scholarship and Finance section.
- Irish Nationals living in the UK or ROI are treated as Home students for Tuition Fee Purposes.