Students must apply via one of the following online application forms:-
If you are applying for this course Full Time, please click apply now
Course starts: 14 September 2020Apply now
This course is excellent preparation for jobs in cybersecurity, which is a rapidly growing area given the rise in computer-related crime. You’ll study topics such as network security and cybersecurity in organisations.
The tutors on your course are committed to ensuring that you have the best possible experience, whether that be via face-to-face or online teaching. Where access to resources is required, for example, use of the specialist network labs for the Computing, Cybersecurity and Computer Networks and Cybersecurity courses, then this will be provided as necessary or an equivalent means of delivering the same learning experience via online technologies will be provided. Where specialist software is required, for example RStudio for data science, Oracle for databases or Packet Tracer for network development, then module leaders will be ensuring that those resources are available whether you are on campus or off-campus. We will ensure you have all the support necessary to enable you to complete the course to the best of your ability.
In the coming months, before commencing your studies, please contact your Programme Leaders if we can offer any further guidance before joining us.
You’ll be taught by passionate academics who produce internationally-excellent research. A typical week for you will include lectures, group work, research, discussion groups and seminars, and your progress will be assessed by written reports and research papers, practical assignments and the Masters project.
Compared to an undergraduate course, you will find that this Masters requires a higher level of independent working.
Cover a range of governance and management topics which will enable you to determine, establish and maintain appropriate governance, delivery and creation of cybersecurity solutions for information, systems and network security. Understand the underlying technologies of secure systems and gain a critical awareness of the inherent risks and related privacy issues of their use in the cybersecurity environment by applying concepts such as the principles of least privilege, separation of risk, defence in depth and secrecy. Learn to analyse the range of trade-offs in balancing the security properties of confidentiality, integrity and availability (CIA) and the usability demands of computer and information systems. Learn how to select the appropriate tools and techniques to address and manage concepts of risk, threats, vulnerabilities and potential attacks. Explain, apply and evaluate the concepts of trust and trustworthiness in a cybersecurity context and apply the issues associated with authentication, authorisation and access control.
Learn to apply the principles, policies and procedures of cybersecurity and data science to provide resilient and robust organisational solutions for secure and valuable information. Develop techniques and use tools that will enable you to undertake critical analysis of the challenges and opportunities of using cybersecurity to mitigate and manage risk to data and enable business continuity in the case of data breaches. Develop a critical understanding of governance, standards, audit, assurance and review in order to evaluate the challenges in managing technology.
Consider cybersecurity in design and development using the concepts of secure design across a range of platforms and problem areas. Study applied cryptography, secure programming and defensive programming. Gain the knowledge and skills to undertake first-response in cyber breach and associated incidents. Evaluate effective measures for securing evidential content in the wake of an event, technical issues relating to breaches, factors for mitigating risk, the impact this may have on the organisation and those directly affected by breach data loss in a legal context. Acquire the technical knowledge and skills to respond to breaches and implement proactive measures to potentially prevent their occurrence.
Study the two themes of cybersecurity and usability in software design. Learn to understand the trade-offs and challenges these themes present. Research challenges in the areas of usable security through a survey of past and recent research in usable cybersecurity. Examine the nature of usability and the user experience, as it applies to cybersecurity, the impact of user psychology, user models, usage contents and usability evaluation techniques.
Develop a practical deliverable and investigate an area of academic research through the support of a sponsor for example: an IT strategy; an investigative study; a technically challenging artefact (e.g. a feasibility study, design, implementation, re-engineered solution); or undertake a theoretical review based on a novel research question (provided by a research active member of staff). Underpin the project with a literature review that is a conceptual framework of your study - a systematic synthesis of concepts, assumptions, expectations, beliefs, and theories that supports and informs your research.
Some modules have prerequisites. Read more about what this means in our Help and Advice article.
We require applicants to hold an undergraduate degree with a classification of 2:2 or above in computing or a 2:1 or above in a relevant non-computing discipline, such as mathematics, statistics or engineering.
If English is not your first language, please see our English language requirements.
The annual fee for this course is:
If you are not sure whether you qualify as a UK, EU or international student, find out more in our Help and Advice article.
The Skills Boost North East Discount is a 20% waiver on the full cost of course fees for postgraduate taught Masters courses for any worker who has been furloughed, has been made redundant, or is likely to be made redundant and who has a local connection to the North East region. Read more about the discount.
If you currently serve (or have recently served) within the Armed Forces, then the Ministry of Defence's ELCAS scheme may be able to help cover your funding for this course. For more information, see our Funding for Armed Forces personnel page.
Take a look at the Your Finances section to find out about the scholarships and bursaries that may be available to you.
Use our scholarships calculator to see what you may be entitled to.
This information was correct at the time of publication.
There is a high demand for cybersecurity professionals and the UK government is investing £1.9 billion over the next five years in a cybersecurity strategy that will include automatic defences to protect businesses and individuals.
On completion of this course, you’ll progress in some of the most attractive fields and industries as we prepare you for a range of cyber security jobs. Advance your career in a wide range of roles, including: information security manager, security analyst, security architect, security administrator, incident responder, security engineer, security auditor, security software developer and vulnerability assessor.
The cybersecurity course is underpinned by strong collaboration with employers, and it is further enhanced by the contribution from cybersecurity employers and external experts in a number of ways including a series of guest lectures, master classes and seminars.
Graduates studying Cybersecurity have gone on to secure employment with a range of companies and organisations including: GCHQ, (ISC)2, Accenture, HPE, BT, PWC, SAGE, Sunderland City Council, Northumbria and Durham Police forces and the Cybersecurity Workforce Alliance.
Sign up to receive emails about your subject area.
Using Your Personal Information
The University of Sunderland is collecting this data in order for you to receive information on your chosen subject(s). Your information will be stored securely in our Customer Relationship Management system which is provided by a 3rd party and used only for the administration and provision of this information. Should you choose to opt in to further communications we will also use your information to facilitate other useful marketing information based on your preferences. Further information on how your data is stored and used can be found in our Privacy notice - marketing.