Skip to content

Cyber Security module details

Foundations of Cyber Security

Covers four broad topic areas: programming, operating systems, encryption and networks. This module prepares the ground for other more tightly focused modules covering closely related topics.

Cyber Threat Intelligence

Develops your ability to reason about threats to cyber security, in particular, understanding the strengths and limitations of methods to produce actionable intelligence.

Host and Network Security

Introduces the conceptual framework of hardware and software layers within a computer and common vulnerabilities and threats.

Penetration Testing and Incident Response

Provides you with the knowledge and insight to what hackers may do, how to probe systems for exploitable vulnerabilities and how to react appropriately when an incident occurs.

Cyber Engineering

Introduces you to the core electronic and communication engineering concepts and devices that constitute the physical part of the cyber domain. The aim of this module is to make you aware of the physical constraints on systems and devices

Digital Forensics Principles and Practice

Provides you with the knowledge and understanding of how to preserve the evidential value of any digital artefacts that are relevant to the incident, then interpret them

Malware Analysis

Introduces you to the principles, tools and techniques used to reverse engineer binaries, including how to avoid anti reversing traps

Legal, Ethical and Professional Practice

Provides an insight into the ethical and professional context of cyber security, and in doing so addresses the theory of professionals in organisations; security management; project management; the legal framework; ethical issues in professional practice and their resolution; and the legal, moral and professional responsibilities of the computer forensic and security practitioner.

MSc Cyber Security Project/Dissertation

Opportunity to carry out a self-managed, in-depth study involving design, fact finding, analysis, synthesis and integration of complex ideas that are sometimes based on incomplete and contractor data or requirements.