Cyber Security MSc

Study level: Postgraduate
bright screen showing binary code

The MSc in Cyber Security aims to provide you with the knowledge and necessary skills in several core areas of cyber security.

Year of entry

2024-25

Location

Coventry University (Coventry)

Study mode

Full-time
Sandwich

Duration

1 year full-time
2 years sandwich

Course code

EECT029

Start date

September 2024
January 2025
May 2025


Course overview

The course aims to provide a comprehensive and deep understanding of security principles, as well as the practical techniques used in solving security problems and addressing relevant issues.

  • Fully certified1 by the National Cyber Security Centre (NCSC), the course has been designed to give you the opportunity to equip yourself to work at a professional level, developing a range of industry-informed knowledge and skills in areas such as network security, secure design, cryptography, risk assessment, ethical hacking, digital forensics and incident response.
  • Running in a research-driven environment, the course also aims to build foundations for further research at Doctoral level in cyber security for students from a wide range of undergraduate degrees.
  • The course will provide recent graduates and early to mid-career practitioners in the computing industry opportunities to enhance their knowledge or move into cyber security.
  • You will have the option to apply for a ‘work placement’ opportunity2, designed to further develop your skills and knowledge with the aim of maximising your employability prospects. See modules for more information.
A star in the centre of a rosette.

Rated Gold Overall

Teaching Excellence Framework (TEF) 2023

Five stars in a speech bubble.

5 QS Stars for Teaching and Facilities

QS Stars University Ratings

City buildings next to a tree.

Top 5 Student City in England (Coventry)

QS Best Student Cities Index 2025

Why you should study this course

The overall aim of the course is for you to develop:

  • a deep and comprehensive understanding of current cyber security issues, concepts and technologies.
  • technical skills in assessing systems security, detecting and mitigating security incidents.
  • an understanding of the changing cyber threat landscape and the developments in cyberspace.

The delivery is based on a combination of face-to-face sessions and online learning, with a substantial opportunity for practical ‘hands-on’ activities. This is supported by specialist ethical hacking, digital forensics and networking laboratories, as well as a virtual cyber security lab. This provides you with the opportunity to apply the theoretical aspects you learn across the course’s modules, as well as to design, implement and evaluate a variety of real-world examples and case studies.

Research project opportunities could be available for you to further develop your skills. Current work covers a range of topics such as security for low-powered embedded systems, software defined networking, enhancing security through machine learning, protocol analysis, IoT security, crypto algorithms, vehicle security and security Industry 4.0 environments. Research project opportunities may be subject to availability.

The Cyber Security Research Group at Coventry University currently has strong links with several industries and government bodies, including companies in cyber security and forensics, automotive, Internet-of-Things (IoT) and others, both in supporting our curriculum and learning, as well as research and development addressing real-world problems.

Accreditation and professional recognition

This course is accredited1 and recognised by the following bodies:

NCSC logo

National Cyber Security Centre (NCSC)

NCSC fully certified. For more information visit the NCSC website.



What you'll study

Your main study themes are:

  • Network and system security: A fundamental aspect of security is the service and communication infrastructure. The course makes use of our specialist labs and equipment to give people as much hands-on experience as possible to help make the theory understandable.
  • Cryptography: It’s obvious that secure communication is underpinned by cryptography, but it is also essential in areas such as proof of identity and ownership; escrow; password storage and more.
  • Secure design and development: In addition to how to build systems from off-the-shelf components securely, analyse and breach systems, the course looks at the ways in which software is designed and built to be secure. From formal methods to code review, you will have the opportunity to examine how industry tackles the problem of insecure software.
  • Ethical hacking: A practical approach to testing security and also one of the best ways to learn the finer points of how systems are constructed is through penetration testing. The course encourages students to explore in a safe environment and provides a number of carefully constructed scenarios and challenges as well as the opportunity to take part in international competitions with our CTF (Capture the Flag) team, the Ethical Slackers2.
  • Intrusion detection and incident response: Security is essential, but no matter how much time and money is spent on it, breaches happen. New vulnerabilities and attack vectors are discovered regularly and it’s critical that an organisation knows how to respond once a breach occurs.
  • Digital data acquisition, recovery and analysis: Data recovery and analysis covers a wide range of activities, from log analysis to identifying misuse or data exfiltration to gathering evidence suitable for prosecution and even the most basic tasks of recovering from system failure.
  • Security of emerging connected systems: The Internet of Things (IoT) is a term we see more often than ever now, and it refers to the tide of devices that are interconnected and tapped into the Internet that we have in our homes and workplaces. Manufacturers of consumer electronics are fast converting their products to become ‘smart’, often without understanding the security implications that software developers in traditional firms hopefully do. A number of interesting security vulnerabilities have come to light recently and the expectation is that this will grow rapidly. Outside of the home, the industrial application of connected devices is just starting to become more commonplace and the security issues of IoT are about to become problematic there, too.
  • Automotive cyber security: Automotive security is a major challenge to connected and autonomous vehicles coming from the increase in the use of digital and software components on connected platforms. This requires deep understanding of the complex nature of the challenge with a systematic threat assessment and attack analysis, and design paradigms for assurance, privacy and regulatory compliance.

This course is delivered over three semesters. In the first two semesters, you will study core and optional pathway modules, and in the third semester, you will work on your research project.

In your first semester, you will study the fundamental subjects in computer security, such as network security, cryptography, and secure design and development. We will also dive into the offensive part in the ethical hacking module.

In the second semester, you will focus on the defensive side in intrusion detection and response, and the digital data acquisition, recovery and analysis modules. Depending on the pathway you choose, you will continue in cyber security management, security audit, or some of the cyber security emerging areas in the automotive cyber security and security of emerging connected systems modules.

In your final semester, you will be expected to demonstrate the knowledge and skills you have learned by undertaking an in-depth individual project. Guided by an expert tutor, this project helps to develop your research skills and gain an experience matching that of a computer security professional.

Modules

With work placement pathway

The ‘With work placement’ opportunity2 enables you to apply in semester 1 for an optional work placement of up to 12 months, extending the duration of your master’s to 24 months. The placement provides an opportunity for you to develop expertise and experience in your chosen field with the aim of enhancing your employability upon graduation. The work placement would take place in semesters 3, 4 and 5.

Please note that the optional placement modules will incur an additional tuition fee of £4,000. Placement opportunities may also be subject to additional costs, visa requirements being met, subject to availability and/or competitive application. Work placements are not guaranteed but you will benefit from the support of the Talent Team in trying to find and secure an opportunity. Find out more about the work placement option.

We regularly review our course content, to make it relevant and current for the benefit of our students. For these reasons, course modules may be updated.


How you'll learn

Modules may be delivered as a combination of lectures, computer laboratory sessions, online learning, problem classes, seminars, discussions and tutorials.

The course adopts a combination of a lab-rotation model and flipped-classroom of teaching and learning, with a combination of online/in-class lectures, online/in-class tutorials and in-class discussions and presentations. These are designed and set by the module leaders reflecting the specific topics with the aim of maximising attainment and learning.


Teaching contact hours

A 15-credit module will typically have about 30 hours of contact time associated with it. This will include a combination of, but may not be limited to, lectures, small-group sessions, laboratory sessions and support sessions. In addition, you will be expected to undertake significant self-directed study each week of around 35 hours, depending on the demands of individual modules.

The contact hours may be made up of a combination of face-to-face teaching, individual and group tutorials, and online classes and tutorials.

As an innovative and enterprising institution, the university may seek to utilise emerging technologies within the student experience. For all courses (whether on-campus, blended, or distance learning), the university may deliver certain contact hours and assessments via online technologies and methods.

Since COVID-19, we have delivered our courses in a variety of forms, in line with public authority guidance, decisions, or orders and we will continue to adapt our delivery as appropriate. Whether on campus or online, our key priority is staff and student safety.


Assessment

This course will be assessed using a variety of methods which will vary depending upon the module.

Assessment methods may include:

  • Formal examinations
  • Phase tests
  • Essays
  • Group work
  • Presentations
  • Reports
  • Projects
  • Coursework
  • Exams
  • Individual Assignments

The Coventry University Group assessment strategy ensures that our courses are fairly assessed and allows us to monitor student progression towards achieving the intended learning outcomes.


International experience opportunities

Throughout the programme, we will refer to international case studies and examples such as Edward Snowden, Julian Assange or the Russian involvement in the US election. You may also have opportunities to collaborate with students from other international universities on Collaborative online international learning (COIL) projects and be given an opportunity to participate in an international internship.

Please note that all international experience opportunities may be subject to additional costs, competitive application, availability and meeting applicable visa and travel requirements are therefore not guaranteed2.


Entry requirements

Typical offer for 2024/25 entry.

An applicant will normally be expected to possess at least one of the following:

  • A minimum of a second-class honours degree in a relevant subject such as Computer Science, Mathematics, Physics or Engineering.
  • A relevant professional qualification of an equivalent level.
  • A lower qualification plus appropriate and relevant experience at a professional level.
  • Satisfactory independent evidence of working for several years in a position that would normally be occupied by an honours graduate, in a relevant area (such as the IT sector), which would lead to gaining benefit from the course.

Each application will be considered on its merits and the final decision will be made by the course director.

We recognise a breadth of qualifications, speak to one of our advisers today to find out how we can help you.

Chat with us

Select your region to find detailed information about entry requirements:

You can view our full list of country specific entry requirements on our Entry requirements page.

Typical entry requirements

An applicant will normally be expected to possess at least one of the following:

  • A minimum of a second class honours degree in a relevant subject such as Computer Science, Mathematics, Physics or Engineering.
  • A relevant professional qualification of an equivalent level.
  • A lower qualification plus appropriate and relevant experience at a professional level.
  • Satisfactory independent evidence of working for several years in a position that would normally be occupied by an honours graduate, in a relevant area (such as the IT sector), which would lead to gaining benefit from the course.

Each application will be considered on its merits and the final decision will be made by the course director.

If you do not have the typical entry requirements, you may want to consider studying this course with an international pre-master's. Upon successful completion our International Pre-Master's - Engineering will provide you with the knowledge and skills you need to progress onto this postgraduate degree.

Alternatively, visit our International hub for further advice and guidance on finding in-country agents and representatives, joining our in-country events and how to apply.

Some international students may require an ATAS certificate to study this course. For further information see our ATAS Certificates web page.

English language requirements

  • IELTS: 6.5 overall, with no component lower than 5.5. 

If you don't meet the English language requirements, you can achieve the level you need by successfully completing a pre-sessional English programme before you start your course. For more information on our approved English language tests visit our English language requirements page.

Chat with us


Fees and funding

2024/25 tuition fees.

Student Full-time Part-time
UK, Ireland*, Channel Islands or Isle of Man £11,200 | £15,200 (with prof. experience)   Not available
EU £11,200 | £15,200 (with prof. experience) per year with EU Support Bursary**
£20,050 | £24,050 (with prof. experience) per year without EU Support Bursary**
Not available
International £20,050 | £24,050 (with prof. experience)   Not available

For advice and guidance on tuition fees3 and student loans visit our Postgraduate Finance page and see the university's Tuition Fee and Refund Terms and Conditions.

We offer a range of International scholarships to students all over the world. For more information, visit our International Scholarships page.

Tuition fees cover the cost of your teaching, assessments, facilities and support services. There may be additional costs not covered by this fee such as accommodation and living costs, recommended reading books, stationery, printing and re-assessments should you need them.

The following are additional costs not included in the tuition fees:

  • Any optional overseas field trips or visits: £400+ per trip.
  • Any costs associated with securing, attending or completing a placement (whether in the UK or abroad).

*Irish student fees

The rights of Irish residents to study in the UK are preserved under the Common Travel Area arrangement. If you are an Irish student and meet the residency criteria, you can study in England, pay the same level of tuition fees as English students and utilise the Tuition Fee Loan.

**EU Support Bursary

Following the UK's exit from the European Union, we are offering financial support to all eligible EU students who wish to study an undergraduate or a postgraduate degree with us full-time. This bursary will be used to offset the cost of your tuition fees to bring them in line with that of UK students. Students studying a degree with a foundation year with us are not eligible for the bursary.


Facilities

Our aim is to offer you sector-leading facilities4.

Male student working at a computer having server racks on the background

Cisco lab

The Cisco lab is used for working with general networking and towards accreditation by Cisco.

Abstract of neuro links with flares coming out of atoms

Virtual labs

Our virtual labs provide a cutting-edge environment to create entire virtual networks, complete with services, users and even attackers. Students can access this environment from anywhere on or off campus.

Adult student working on a computer while having a screen in the background

Games Technology lab

This lab contains high-end gaming PCs with the capacity to run industry standard games engines and programming environments.
 


Careers and opportunities

On successful completion of this course, you will be able to demonstrate:

  • a critical awareness of the legal frameworks, ethical and professional issues of cyber security
  • a comprehensive understanding of network and information systems secure communication technologies and protocols and their application to contemporary Internet and mobile-based solutions and technologies
  • a thorough understanding of the theoretical concepts and implementation of current security frameworks and architectures as well as cryptographic protocols and algorithms
  • an awareness of current issues and new technologies in cyber security which are informed by leading edge research and/or practice in the field.

You will also be able to:

  • perform systematic risk assessment, identification and analysis in accordance with international standards and demonstrate an ability to deal with complex issues
  • evaluate and justify a suitable methodology and tools for vulnerability assessment of a system
  • conduct and report an ethically based security audit and test to a professional standard, recommending and specifying suitable countermeasures
  • assess systems’ security requirements and apply secure design methodology and formal methods in systems design, implementation and testing
  • apply appropriate technological solutions and processes in the detection, management and investigation of information security incidents, and document a digital investigation from a legal and professional standpoint
  • extrapolate from existing research, scholarship and/or fieldwork findings to identify new or revised approaches to practice
  • conduct rigorous research/formal enquiry into cyber security issues that require familiarity with a range of technologies, research sources and appropriate methodologies, and for such to inform the overall learning process.

Where our graduates work

Upon successful completion of this course, you may have the opportunity to be employed in the cyber security industry in a variety of roles such as a penetration tester, SOC security analysis or digital forensic investigator, to name a few.


How to apply

You may also like

Coventry University (Coventry) fingers on a keyboard

Computer Science MSc

Coventry University (Coventry) Students working on desktops in computer suite

Data Science MSc