Cybersecurity MSc

Apply Online


Students must apply via one of the following online application forms:-

To apply for the full time course click apply now

Course starts: 16 September 2019Apply now

Apply now

Study a fast-growing and exciting subject. Develop the technical and organisational skills to make a difference to society. Graduate and embark on a career as a cybersecurity professional in a flourishing sector.

Register your interest

Overview

This course is excellent preparation for jobs in cybersecurity, which is a rapidly growing area given the rise in computer-related crime. You’ll study topics such as network security and cybersecurity in organisations.

Why us?

  • 95.3% of our graduates are in employment or further study within six months of graduating, according to DLHE 2016/17 (based on UK postgraduate students)
  • ‘Internationally excellent' research in Computer Science and Informatics, according to the latest Research Excellence Framework (REF)

Course structure

You’ll be taught by passionate academics who produce internationally-excellent research. A typical week for you will include lectures, group work, research, discussion groups and seminars, and your progress will be assessed by written reports and research papers, practical assignments and the Masters project.

Compared to an undergraduate course, you will find that this Masters requires a higher level of independent working.

Modules on this course include:

  • Fundamentals of Cybersecurity (30 credits)

Cover a range of governance and management topics which will enable you to determine, establish and maintain appropriate governance, delivery and creation of cybersecurity solutions for information, systems and network security. Understand the underlying technologies of secure systems and gain a critical awareness of the inherent risks and related privacy issues of their use in the cybersecurity environment by applying concepts such as the principles of least privilege, separation of risk, defence in depth and secrecy. Learn to analyse the range of trade-offs in balancing the security properties of confidentiality, integrity and availability (CIA) and the usability demands of computer and information systems. Learn how to select the appropriate tools and techniques to address and manage concepts of risk, threats, vulnerabilities and potential attacks. Explain, apply and evaluate the concepts of trust and trustworthiness in a cybersecurity context and apply the issues associated with authentication, authorisation and access control.

  • Technology Management for Organisations (30 credits)

Learn to apply the principles, policies and procedures of cybersecurity and data science to provide resilient and robust organisational solutions for secure and valuable information. Develop techniques and use tools that will enable you to undertake critical analysis of the challenges and opportunities of using cybersecurity to mitigate and manage risk to data and enable business continuity in the case of data breaches. Develop a critical understanding of governance, standards, audit, assurance and review in order to evaluate the challenges in managing technology. 

  • Cyber Resilience and Incident Response (30 credits)

Consider cybersecurity in design and development using the concepts of secure design across a range of platforms and problem areas. Study applied cryptography, secure programming and defensive programming. Gain the knowledge and skills to undertake first-response in cyber breach and associated incidents. Evaluate effective measures for securing evidential content in the wake of an event, technical issues relating to breaches, factors for mitigating risk, the impact this may have on the organisation and those directly affected by breach data loss in a legal context. Acquire the technical knowledge and skills to respond to breaches and implement proactive measures to potentially prevent their occurrence. 

  • Cybersecurity and User Experience Design (30 credits)

Study the two themes of cybersecurity and usability in software design. Learn to understand the trade-offs and challenges these themes present. Research challenges in the areas of usable security through a survey of past and recent research in usable cybersecurity. Examine the nature of usability and the user experience, as it applies to cybersecurity, the impact of user psychology, user models, usage contents and usability evaluation techniques. 

  • Computing Masters Project (60 credits)

Develop a practical deliverable and investigate an area of academic research through the support of a sponsor for example: an IT strategy; an investigative study; a technically challenging artefact (e.g. a feasibility study, design, implementation, re-engineered solution); or undertake a theoretical review based on a novel research question (provided by a research active member of staff). Underpin the project with a literature review that is a conceptual framework of your study - a systematic synthesis of concepts, assumptions, expectations, beliefs, and theories that supports and informs your research. 

  

Some modules have prerequisites. Read more about what this means in our Help and Advice article.

  • Our outstanding IT facilities include the David Goldman Informatics Centre, which has hundreds of computers so it’s easy to find a free workstation with the software you need.

    We are an accredited Cisco Academy and have two laboratories packed with Cisco networking equipment including routers, switches, terminals and specialist equipment for simulating frame relay and ISDN links.

    We host high-performance computing platforms, including a Big Data machine and a High Performance Computing Cluster system, for concurrent processing of complex computational tasks. We also have the equipment and licences for our own public mobile cellular network.

     

     

     

     

     

    IT facilities for computing, networks and big data
  • Some of the most important sources for computing students include:

    • British Standards Online, which offers more than 35,000 documents covering specifications for products, dimensions, performance and codes of practice
    • Association of Computing Machinery digital library, which includes full-text articles from journals as well as conference proceedings
    • Science Direct, which offers more than 18,000 full-text journals published by Elsevier
    • Archives of publications from Emerald, including over 35,000 full-text articles dating back to 1994 on a range of subjects including technology
    • Business Source Elite from EBSCO Publishing, which covers hundreds of journals and includes articles on topics such as e-commerce and information management
    Library Services for computing
  • Map and directions

Facilities

You’ll be based at The David Goldman Informatics Centre, on the Sir Tom Cowie Campus at St Peter’s; it looks out over the River Wear and is less than a mile from the seaside.

 

 

 

 

 

 

 

 

 

Entry requirements

We require applicants to hold an undergraduate degree with a classification of 2:2 or above in computing or a 2:1 or above in a relevant non-computing discipline, such as mathematics, statistics or engineering.

If English is not your first language, please see our English language requirements.

Fees and finance

The annual fee for this course is:

  • £7,000 if you are from the UK or EU
  • £13,500 if you are from outside the EU

Tuition fees for part-time students are £361 per 10 credits.

If you are not sure whether you qualify as a UK, EU or international student, find out more in our Help and Advice article.

If you currently serve (or have recently served) within the Armed Forces, then the Ministry of Defence's ELCAS scheme may be able to help cover your funding for this course. For more information, see our Funding for Armed Forces personnel page.

Take a look at the Your Finances section to find out about the scholarships and bursaries that may be available to you.

You are viewing entry requirements for visitors from United States. Not from United States? Change your country preferences.

This information was correct at the time of publication.

Student in the Sunderland Futures department

Employment

There is a high demand for cybersecurity professionals and the UK government is investing £1.9 billion over the next five years in a cybersecurity strategy that will include automatic defences to protect businesses and individuals.

On completion of this course, you’ll progress in some of the most attractive fields and industries as we prepare you for a range of cyber security jobs. Advance your career in a wide range of roles, including: information security manager, security analyst, security architect, security administrator, incident responder, security engineer, security auditor, security software developer and vulnerability assessor.

Strong industry links

The cybersecurity course is underpinned by strong collaboration with employers, and it is further enhanced by the contribution from cybersecurity employers and external experts in a number of ways including a series of guest lectures, master classes and seminars.

Graduates studying Cybersecurity have gone on to secure employment with a range of companies and organisations including: GCHQ, (ISC)2, Accenture, HPE, BT, PWC, SAGE, Sunderland City Council, Northumbria and Durham Police forces and the Cybersecurity Workforce Alliance.


Meet the students

  • I’m glad I took the chance and applied to do the course, it is a decision I will not regret.
    Dom Peace Case Study Square Image

    Dom Peace

Meet the team

Sign up to receive more information

Sign up to receive emails about your subject area.

Keep me up to date relating to my interest in the University of Sunderland via:

You may unsubscribe at any time.

Oops! You've not opted in to receiving other useful information about the University of Sunderland.

Using Your Personal Information
The University of Sunderland is collecting this data in order for you to receive information on your chosen subject(s). Your information will be stored securely in our Customer Relationship Management system which is provided by a 3rd party and used only for the administration and provision of this information. Should you choose to opt in to further communications we will also use your information to facilitate other useful marketing information based on your preferences. Further information on how your data is stored and used can be found in our Privacy notice - marketing.