Cyber Security MSc | 2017/2018
CLOSE

Campus Map

Working with Coventry University

Working at Coventry University

Coventry University is a diverse and exciting place to work and we share the enthusiasm of our staff and students to be the best at whatever they choose to do. As one of the City’s biggest employers, we offer some impressive benefits for our staff and are committed to delivering the very best opportunities. We have a comprehensive training, personal and professional development programme that provides our employees with the skills to enhance their performance in the workplace and grow in their careers. There are pension schemes, a generous holiday allowance and flexible working opportunities as well as lifestyle benefits including childcare vouchers, discounted membership to the £4 million sports and recreation centre and schemes such as Cycle to Work and the CU Car Share initiative.

View current job vacancies.

LOG IN TO THE COVENTRY UNIVERSITY SITE

Staff portal

Access the central point of information for all staff across the University.

LOG IN TO THE STAFF PORTAL

Student Portal

Check your assessments, access Solar and get course information.

LOG IN TO THE STUDENT PORTAL

Cyber Security MSc 2018/19 entry

Course code:

EECT006

Study options:

1 year full-time
2 years part-time

Location:

Coventry University

Starting:

September 2018

 

Fees:
Faculty:

Get in touch

For questions regarding study and admissions please contact us:


+44 (0) 24 7765 2152


Overview

The European Commission reports the global cost of computer crime to be around 750 billion euros a year, increasing the demand for individuals who can advise businesses and organisations on the best ways to protect their computer networks and the commercially sensitive information stored within them.

Our specialist Master’s course aims to addresses the skills gap and needs identified in the UK Government’s National Cyber Security Strategy. It is also designed to address the global cyber security workforce shortage, forecast to be 1.5 million in 2020 by the global information security workforce study – the largest of its kind run on behalf of the International Information System Security Certification Consortium or (ISC).

The course will provide the opportunity to critically examine the nature of the cyber security issues and threats facing modern businesses and organisations within the context of associated business issues, such as globalisation and ethics. You should achieve an integrated understanding of operations and strategic management, so that you can manage and mitigate future risks of cyber and information security failure.

Why Coventry University?

An award-winning university, we are committed to providing our students with the best possible experience. We continue to invest in both our facilities and our innovative approach to education. Our students benefit from industry-relevant teaching, and resources and support designed to help them succeed. These range from our modern library and computing facilities to dedicated careers advice and our impressive Students’ Union activities.

Global ready

An international outlook, with global opportunities

Employability

Career-ready graduates, with the skills to succeed

Student experience

All the support you need, in a top student city

Course information

Students on the course can benefit from a combination of practical experience, theoretical exploration and investigation of the legal and ethical frameworks that apply to professions in cyber security.

Students can investigate specialisms on the course, such as Automotive Cybersecurity, Digital Security Risk and Audit Management or Cyber Security Management and Leadership.

Every student on the course conducts a Cyber Security Individual Project, with a course team member as their supervisor.  Projects cover the whole range of the subject area.

Modules

Overview

Modules

  • Semester 1

    • Cyber Security Strategy
    • Network Security
    • Accounting and Decision Making for Cyber Security
    • Cyber Security Marketing and Crisis Communications
  • Semester 2

    • Cyber Security and Organisational Behaviour
    • Cyber Security Knowledge Management
    • International Cyber and Digital Law
    • Cyber Security Management and Leadership
    • Global Professional Development
  • Semester 3

    • Internship Module
    • Dissertation

In more detail...

  • Specialist ‘International Cyber and Digital Law’ module designed in conjunction with Coventry Law School.
  • Innovative, interactive teaching features business simulations and software to gain practical insights into business problems and IT solutions.
  • High levels of student satisfaction among our postgraduate ‘Business’ students – 88% overall, above the sector average of 80% (Postgraduate Taught Experience Survey 2016).
  • 85% of the School’s ‘Business and Management’ research was recognised internationally in the 2014 Research Excellence Framework (REF), of which 13% received the highest ‘world-leading’ classification.
  • Hands-on experience of market-leading software packages including: GMMSO (Global Marketing Management System Online) and EIMSO (Export Import Management System Online) from Janavaras and Associates International, Xsol software and SAP, the world’s leading enterprise resource planning (ERP) software provider.
  • Staff research expertise in: inter-organisational relationships, the security markets, relationship marketing, cyber security, computing, ethical hacking, information security, industrial espionage, international legal frameworks, lean management, international pedagogies, educational technology, human resource management, strategic management, international business and economics, organisational survival, responsible management and corporate social responsibility issues.
Your main study themes are:
  • Ethical Hacking. A practical approach to testing security and also one of the best ways to learn the finer points of how systems are constructed is through penetration testing. The course encourages students to explore in a safe environment and provides a number of carefully constructed scenarios and challenges as well as the opportunity to take part in international competitions with our CTF (Capture the Flag) team, the Ethical Slackers. 

  • Network Security. A fundamental aspect of security is the architecture of communication and the course makes use of our specialist labs and equipment to give people as much hands-on experience as possible to help make the theory understandable.Incident Response. Security is essential, but no matter how much time and money is spent on it, breaches happen.  New vulnerabilities and attack vectors are discovered regularly and it’s critical that an organisation knows how to respond once a breach occurs. Digital Data Acquisition, Recovery and Analysis. Data recovery and analysis covers a wide range of activities, from log analysis to identify misuse or data exfiltration to gathering evidence suitable for prosecution and even the most basic tasks of recovering from system failure.Secure Design and Development. As well how to build systems from off-the-shelf components securely, analyse and breach systems, the course covers the ways in which software is designed and built to be secure.  From formal methods to code review, we examine how industry tackles the problem of insecure software.

  • Cryptography. It’s obvious that secure communication is underpinned by cryptography, but it is also essential in areas such as proof of identity and ownership; escrow; password storage and more.Security of Emerging Connected Systems. The Internet of Things (IoT) is a term we see more often than ever now, and it refers to the tide of devices that are interconnected and tapped into the Internet that we have in our homes and workplaces.  Manufacturers of consumer electronics are fast converting their products to become “smart”, often without understanding the security implications that software developers in traditional firms hopefully do.  A number of interesting security vulnerabilities have come to light recently and the expectation is that this will grow rapidly.  Outside of the home, the industrial application of connected devices is just starting to become more commonplace and the security issues of IoT are about to become problematic there, too.

This course can be studied full-time over one year and may also be taken part-time over two years. You can start in September.

Your teaching will be informed by the latest research findings from staff with expertise in a wide variety of areas, such as the security markets, cyber security, ethical hacking, information security and industrial espionage. We incorporate a range of teaching methods including: traditional lectures, seminars, discussion groups, visits, Moodle discussion, self-directed study, reading, activities in the computer laboratories and one-to-one discussions with tutors (in particular during dissertation supervision meetings).

Lectures, guest speakers and Internet-based materials are used to bring contemporary issues into the curriculum. For example, you may discuss some of the key vulnerabilities identified by the UK government in its latest cyber strategy, including poor cyber hygiene and compliance, insufficient training and skills and the continued use of out-of-date software, which is often unpatched and unsupported.

One of the key aims of the programme is to provide you with experience of real-life organisations and their efforts to remain cyber resilient. This is achieved through the use of case studies and simulations, which give valuable insights into how international organisations operate and help you to understand how core functions within businesses depend on data, information and knowledge which may become targets for cyber-attacks.

You will also be encouraged to attend the ‘Leadership Lecture Series’ presentations, which provide different perspectives on business and leadership from current industry practitioners.

The Business School supports Cyber Security Challenge UK, a series of national competitions, learning programmes and networking initiatives designed to identify, inspire and enable more people to become cyber security professionals, and will encourage you to attend these activities. In April 2015, we hosted the UK’s first Cyber Security Challenge UK Insights Camp to raise awareness on the increased requirement of Cyber Security Personnel and to gain interest from both students and industry, bringing together students and staff this University, the University of Warwick, De Montfort University, the University of Birmingham and the University of Wolverhampton, as well as representatives from industry, including NCA, HP, Sophos and Encription.

On the successful completion of 180 level Masters credits, awards may be made with a ‘Distinction’ or ‘Merit’, based on the achievement of an average mark of at least 70% or 60% respectively. Students may be awarded the Postgraduate Diploma (PgDip) if they achieve 120 credits and a Postgraduate Certificate (PgCert) if they achieve 60 credits. Students may only progress to the final stage of Masters programmes after meeting the requirements for award of a Postgraduate Diploma.

Teaching methods include: a mixture of lectures, seminars and labs.  

Progress in learning will be measured against module- and course-level learning outcomes and you will be provided with feedback at regular points throughout the course.  Achievement of learning outcomes in most taught modules is assessed by a combination of including coursework, reports, presentations, phase tests and examinations. Where appropriate, the learning and assessment strategy will be enhanced by the use of online assessment opportunities.

Together with a combination of formative and summative assessment, the use of industry case study to inform curriculum and pedagogy, facilitation of student-to-student knowledge co-creation and exchange, action-based learning and assessment strategies and the combination of knowledge acquired at different modules in an integrated assessment strategy will also allow for the most effective number of assessment points throughout the course.

On the successful completion of 180 level Masters credits, awards may be made with a ‘Distinction’ or ‘Merit’, based on the achievement of an average mark of at least 70% or 60% respectively. Students may be awarded the Postgraduate Diploma (PgDip) if they achieve 120 credits and a Postgraduate Certificate (PgCert) if they achieve 60 credits. Students may only progress to the final stage of Masters programmes after meeting the requirements for award of a Postgraduate Diploma.

On successful completion, you should have knowledge of:

  • Organisations, their external context and how they are managed.
  • How established techniques of research and enquiry are used to develop and interpret knowledge in cyber security management.
  • The changing cyber threat landscape and the developments in cyberspace. 


On successful completion, you should be able to:

  • Lead and manage cyber security teams in an organisational context.
  • Apply relevant knowledge to a range of complex situations to include IT security; finance; accounting, organisational behaviour and people issues, taking account of the inter-relationships of these topics and their interactions with other areas of the business and the industry and external environment.
  • Demonstrate a critical awareness of current issues in cyber security management, which are informed by leading edge research and/or practice in the field.
  • Evaluate appropriate techniques sufficient to allow detailed investigation into relevant cyber security management issues.
  • Analyse IT risks to mitigate threats to an organisation and its decision-making processes.
  • Critically evaluate the role of a security policy for protecting information assets and demonstrate self-direction in designing security policies to defend those assets within the context of a global communication and the web.
  • Identify vulnerabilities and threats within the current cyberspace context and develop and apply suitable strategies for defence against their exploitation.
  • Select appropriate information security audit strategies and apply them to complex real-world examples.
  • Analyse risk assessment strategies, including identifying and assessing levels of risk.
  • Create an information security management system, including documentation in accordance with industry standards.

In a typical week you will have up to 17 ‘contact’ hours of teaching. This generally breaks down as follows:

  • Personal tutorial/small group teaching: 1 hour smaller tutorial/seminar with focused tutor contact each week.
  • Medium group teaching: 2 hours of seminars each week.
  • Large group teaching: 2 hours of lectures and 12 hours of studio practice each week.

In addition, you will be expected to undertake a further 20 hours of self-directed study each week, eg. working on course assignments.

Throughout the programme, we will refer to international case studies and examples such as, for example, Edward Snowden, Julian Assange or Russian involvement in the US election. You will also have opportunities to collaborate with students from other international universities on online international learning (OIL) projects and be given an opportunity to apply to participate in an international internship (subject to application and additional costs).

Global ready

Did you know we help more students travel internationally than any other UK university according to data from the experts in higher education data and analysis, HESA?

In 2014/15, we were able to provide a total of 2,264 student experiences abroad that lasted at least five days, 73% of which were our own organised trips for undergraduates and 27% from postgraduate travel. Plus, we've been able to help more than 5,000 students spend time in other countries, from America to China, India and beyond.

Much of this travel is made possible through our Global Leaders Programme, which enables students to prepare for the challenges of the global employment market, as well as strengthening and developing their broader personal and professional skills.

Explore our international experiences

1st for

international experiences

Sending more students overseas than any other UK uni (HESA)


2,264

Student experiences

The number of student trips abroad for at least 5 days in 2014/15



12,000

and counting

The number of students we’ve helped travel internationally so far

21

global programmes

As well as trips, we offer other opportunities like language courses


Entry Requirements

Honours degree or an equivalent qualification in a computing discipline, or an unclassified degree in computing plus professional experience within the field of computing.

Honours degree or an equivalent qualification in a computing discipline, or an unclassified degree in computing plus professional experience within the field of computing.

English as a Foreign Language This course requires IELTS 6.5 overall. Pre-Sessional English is available if required.

Our International Student Hub offers information on entry requirements for your country, as well as contact details for agents and representatives should you need more advice.

More detail

Honours degree or an equivalent qualification in a computing discipline, or an unclassified degree in computing plus professional experience within the field of computing.

English as a Foreign Language This course requires IELTS 6.5 overall. Pre-Sessional English is available if required.

Our International Student Hub offers information on entry requirements for your country, as well as contact details for agents and representatives should you need more advice.

More detail

Tuition Fees

We pride ourselves on offering competitive tuition fees which we review on an annual basis and offer a wide range of scholarships to support students with their studies. Course fees are calculated on the basis of what it costs to teach each course and we aim for total financial transparency.

Starts

Fee


September 2018

£7,750 (per year)


Scholarships

If you're a truly outstanding undergraduate candidate we may be able to offer you a Coventry University Scholarship. Coventry University Scholarships are awarded to recognise truly exceptional sports achievement and academic excellence.

Starts

Fee


September 2018

£7,750 (per year)


Scholarships

For the September 2017 and January 2018 intakes, we're investing £1 million into scholarships for high achieving and enterprising students.

Our scholarships are worth up to £10,000 and every student that applies will be considered. Fulfil your potential this academic year with Coventry University!

Starts

Fee


September 2018

£15,050 (per year)


Scholarships

For the September 2017 and January 2018 intakes, we're investing £1 million into scholarships for high achieving and enterprising students.

Our scholarships are worth up to £10,000 and every student that applies will be considered. Fulfil your potential this academic year with Coventry University!

Career prospects

Organisations, both private and public, have come to the realisation that they need management staff to be aware of information security risks, able to put plans in place to reduce and mitigate risks, threats and crises. Many now actively seek managers with the relevant skills and knowledge to carry out a security audit and implement risk management strategies to counter cyber-attacks.

This course can enable you to become a future manager of cyber security; a specialist with a solid working knowledge of cyber security risks, issues, management and terminology.

Coventry University is committed to preparing you for your future career and giving you a competitive edge in the graduate job market. The University’s Careers and Employability team provide a wide range of support services to help you plan and prepare for your career.

Disclaimer

By accepting your offer of a place with us, a Student Contract (“the Contract”) will be formed between you and the University. The Contract will detail all of your rights and also the obligations you will be bound by during your time as a student and will also contain all of the obligations that the University owes to you.  We would encourage you to read the Student Contract before you accept any offer of a place at the University. A copy of the Contract can be found here.