|Study location||United Kingdom, Nottingham, Clifton campus|
|Type||Master courses, full-time|
|Nominal duration||1 year|
Undergraduate diploma (or higher)
Bachelor degree in Computer Science or Computing related subject.
Applicants with relevant employment experience or other relevant qualifications will also be considered.
At least 2 reference(s) should be provided.
Interested? To learn more about this study programme, entry requirements and application process, please contact one of our consultants in a country nearest to you.
Information Security Management
Gain knowledge and understanding of the main issues and challenges related to information security management. Learn how to critically evaluate information security solutions and make decisions regarding the adoption and implementation of information security related technologies, policies and practices in an organisational context.
Develop a critical appreciation of the theoretical and practical issues in the field of computer forensics. Learn the necessary skills, methodologies and processes to conduct an initial computer forensics investigation within an organisation and gain an in-depth understanding of the importance of various computing systems in computer forensics investigations.
Learn how to critically analyse the security problems affecting computing systems at the operating system and application levels, understand the design patterns for developing secure code and devise security solutions and formulate detailed technical reports.
Develop an understanding of the analysis, design and implementation of secure web applications for the Internet and intranet. After an introduction to web based mark-up languages the main focus of the module will be to study the architecture and implementation of internet based applications in the context of current object-oriented systems methodologies.
Network and Cloud Security
Gain an understanding of the security problems of computer networks and the main technologies related to network security. Learn how to migrate networked computing solutions to Cloud infrastructures and address the associated security risks.
You will develop the skills of research and enquiry that will enhance your independent learning abilities and enable you to write effective project reports and technical papers.
On completion of the taught modules on this course you will then have the opportunity to undertake an MSc topic. This gives you 15 weeks to concentrate full time on a specialist area that interests you and apply what you have learnt to a specific problem.
This course will prepare you for roles as a technical security specialist together with a range of technical development and implementation roles. You will also have the potential to develop into security consultancy and technical management roles.
Central European Time