Cyber Security

Master of Science (M.Sc.)

Studienberatung Online Bewerben Infomaterial

Für Deine Karriere im Bereich Cybersicherheit

Cybersicherheit ist ein Zukunftsthema und steht nicht umsonst auch auf der Agenda der Bundesregierung. – Der Masterstudiengang Cyber Security deckt alle Aspekte der Cybersicherheit ab und konzentriert sich auf den wirtschaftlichen Kontext. Der Studiengang M.Sc. Cyber Security richtet sich an alle, die eine Karriere als Cybersicherheitsexperte/-in anstreben und eine führende technische oder leitende Funktion in diesem Bereich übernehmen möchten. Mit der Umsetzung der immer strengeren Datenschutzverordnungen und zunehmenden Risiken der Cyber-Umgebung wird es für Unternehmen einen immer größeren Bedarf an Informationssicherheitsmanagern geben. Der M.Sc. Cyber Security bereitet Dich optimal auf eine erfolgreiche Karriere als Sicherheitsexperte vor.

Studiere jetzt Cyber Security am Campus der Fachhochschule des Mittelstands und der University of Gloucestershire in Düren – als Vollzeitstudium oder als berufsbegleitendes Studium/Teilzeitstudium.

Erfahre mehr über die University of Gloucestershire.

Click here for the English version

For your career in cyber security

Expand your knowledge of cyber security - a priority area for government. The course covers all aspects of cyber security and focuses on its business context.

The course is aimed at those who wish to pursue a career as a cyber security professional and take on a senior technical or managerial role. With the implementation of increasingly stringent data protection regulations and growing risks to the cyber environment, there will be an higher number of roles for information security managers in the business context. The MSc Cyber Security is an excellent foundation for a successful career.

Study Cyber Security now at the campus of the University of Applied Sciences and the University of Gloucestershire in Düren - as a full-time or part-time degree programme.

Find out more about the University of Gloucestershire.

For international students:

Please contact the Welcome Center.

Alle Details zu Deinem Studium!

Vollzeit-Studium

Standort

Dauer

12 Monate

Studienstart

Februar, September

Studiengebühren

Düren

8.500€/ Jahr

Non-EU Applicants: refer to agent for fees

Credits

90 ECTS

Einmalige Gebühren

500,00 € (Abschlussprüfung)

Sonstiges

Alle Module finden in Englisch statt.
Der Kursinhalt wird in Unterrichtsblöcken vermittelt.
Pro Trimester finden 3 Wochen Blockunterricht statt.

Information on the M.Sc. Cyber Security programme

Possible careers

Graduates from this course can go on to work as:

  • Security Analyst
  • Cyber Security Consultant
  • Chief Technical Officer

Course modules

Here's an example of the types of modules you'll study (it's unlikely but the contents and structure of the course could change).

The course content is taught in teaching blocks. There are 3 weeks of block teaching per trimester. 

All students must complete these modules:

Dissertation

The Dissertation is the single largest piece of assessed work undertaken by the student and is designed to synthesize the range of knowledge and skills acquired throughout the course. The Dissertation provides students with an opportunity to conduct a sustained and intensive investigation into one project area, drawing on programme-related cognitive and practical skills and to present their findings in a formal manner in accordance with academic conventions.

Independent Learning Hours: 600
Assessment
001: 100% Dissertation / Major Project: 16,000 words or equivalent

Information Security Management

This module is concerned with the operation and improvement of information security. As such, it encompasses three roles commonly defined in the security community: Security and Information Risk Advisor; Security Architect; and Security Officer.

It also incorporates six domains commonly recognized by the security industry: Access Control; Business Continuity and Disaster Recovery Planning; Information Security Governance and Risk Management; Software Development Security; Security Architecture and Design; and Physical and Environmental Security.

Scheduled Contact Hours: 20
Independent Learning Hours: 130
Assessment
001: 100% Assignment: Individual: 4000 words or equivalent

Network Security

This module is concerned with secure information storage at network end-points, and its secure transmission between them, in a way that can be assessed and audited for compliance with stated security objectives, policies, standards and processes. As such, it encompasses three roles commonly defined in the security community: Communications Security Officer, Auditor, and Accreditor.

It also incorporates four domains commonly recognized by the security industry: Telecommunications and Network Security; Cryptography; Security Operations; and Legal, Regulations, Investigation and Compliance.

Lectures and associated laboratory sessions.

Assessment
001: 100% Assignment: Individual: 4,000 words or equivalent

Research Methods for Computing

This module aims to give students an in-depth study in the practical and theoretical skills required to read, understand, and undertake academic research in the computing-related disciplines. This includes planning and preparing a detailed proposal for a project suitable for a Master’s dissertation. Both qualitative and quantitative methods are studied and practical data collection and analysis is also included. Research paradigms and research ethics for research with or without human participants are outlined and explored.

Scheduled Contact Hours: 20
Independent Learning Hours: 130
Assessment
001: 100% Portfolio: Individual:

Human Factors in Cyber Security

This module offers students an opportunity to investigate challenges associated with the human factors element of cyber security and focuses in particular on managing and mitigating the complex, ever-evolving elements of cyber risk in socio-technical systems in organisations Scheduled Contact Hours: 20
Independent Learning Hours: 130
Assessment
001: 100% Assignment: Individual: 4,000 words or equivalent

Cyber Security Principles

This module will aim to provide students with the knowledge and understanding of the fundamental principles of cyber security.

The intention is for students to critically evaluate and synthesize a number of subjects relating to the field of cyber security. This will include comprehending the five core components of cyber security risk management: identification, protection, detection, response and recovery. By implementing this framework, students will be in an improved position to critique, analyse and advance the security posture of an organisation, therefore, reducing their risks.

This module is designed to encompass the three roles commonly defined in the security industry: Security and Information Risk advisor, security architect and security officer.

Scheduled Contact Hours: 30
Independent Learning Hours: 120
Assessment
001: 100% Assignment: Individual: 4,000 words or equivalent

You can choose from the following modules:

Secure System Architecture

This module will aim to provide students with the knowledge and understanding to design secure organisational system architectures.

Learning and Teaching Activities
Scheduled Contact Hours: 30
Independent Learning Hours: 120


Assessment
001: 100% Assignment: Individual: .4000 words or equivalent

Advanced Malware Analysis

Malware Analysis is one of the key areas of Cyber Security as defined by GCHQ. It involves developing technical knowledge of different attack methods and includes Malware detection and analysis. The current cybersecurity scenery continues to evolve and increase, and so does cyber threats and attacks.

Current malicious software can range from simple adware to a nation-level cyber-weapon and, due to this, the ability to identify, analyse and provide an effective response to such a threat is invaluable to the cybersecurity field.

This module enables students to practice technical knowledge on malware detection and different attack technologies both in a local network or remotely. It develops a level of understanding behind the creation of modern Malware, the techniques used to exploit weaknesses in systems and networks, and the tools and skills needed to defend and recover from malicious code attacks.

Learning and Teaching Activities
Scheduled Contact Hours: 20
Independent Learning Hours: 130


Assessment
001: 50% Assignment: Individual: 2000 words
002: 50% Assignment: Individual: 2000 words

Adversarial Behaviour

This module will address adversarial behaviour and present a taxonomy of malicious operations happening in different areas and systems. Students will have the opportunity to learn and discuss malicious activities based on the attacker’s motivations and aptitudes. Also, students will be introduced to the many technological and human elements that different adversaries can use to perform a successful attack. This module then presents cyber-enabled and cyber-dependent crimes and cyber-enabled and dependent organized criminals. Also, the module discusses and introduce students to different infection vectors, infrastructures and the usage of exploit kits.

Students will be presented with a number of frameworks to support the modelling and understanding of attackers and their malicious operations. This module will introduce students to attack trees and kill chains. Also, this module provides a discussion on current and new research in the area of attack attribution.

Learning and Teaching Activities
Scheduled Contact Hours: 20
Independent Learning Hours: 130


Assessment
001: 100% Assignment: Individual: 4000 words

Artificial Intelligence

Learning and Teaching Activities
Scheduled Contact Hours: 36
Independent Learning Hours: 114


Assessment
001: 100% Assignment: Individual: 2,000 words or equivalent

Network Security Administration

Network Security Administration is one of the key areas of MSc in Cyber Security defined by GCHQ and it is focusing on defining and managing policies, network active and passive monitoring, vulnerability assessment and incident management. This module prepares the students to have administration view on network security in medium size to large networks.

Learning and Teaching Activities
Scheduled Contact Hours: 36
Independent Learning Hours: 114


Assessment
001: 100% Assignment: Individual: 4000 words or equivalent

Entry requirements

Typical Offers

  • You should hold at least a  2.2 Bachelors degree with honours.

Professional or postgraduate qualification

  • We will consider a comparable professional or postgraduate qualification

Relevant work experience

  • Relevant work experience will also be taken into consideration

IELTS 6.0

  • EU and international students need IELTS 6.0 overall (no less than 5.5 in writing and in any other band) or equivalent.

Downloads

Stories from our students

Harry is studying Cyber and Computer Security.

“I’ve had so many opportunities on my course – travelling to Las Vegas for DEFCON26, exhibiting at cyber security conventions, and … on placement at BAE Systems.”

Harry has just completed his exciting placement year in the Insider Threat Team at BAE. He’s now completing his final year back on campus in our incredible computing facilities.

Application Cyber Security

application form