Cyber security is now recognised as one of the top global risks, with hacking, malicious code and data theft among some of the reasons why it is vital in the design, development, and implementation of IT systems. This is particularly important as internet users increase exponentially in emerging economies, more data is created and collected than ever before, and businesses find themselves increasingly reliant on online services, and in need of a strong cyber security culture.
- Build your understanding of the managerial and technical elements of information security, as well as enterprise-level security
- Choose a course designed in consultation with industry to ensure it delivers all the skills needed for the workplace
- Enhance your employability and career prospects by preparing for the BSI ISO 27001 lead auditor certifications which are highly sought after by employers
- Study innovative techniques being developed through the latest research at the cutting edge of cyber security
- Learn how to take a strategic and holistic approach to protect an organisation's systems
- Be inspired by a teaching team offering a blend of industry experience and strong academic credentials
Our MSc Cyber Security has been developed to teach you the very latest in information protection techniques, all delivered by academics at the leading edge of research into system penetration and intrusion analysis.
Building a more secure digital society
The speed with which the internet and information sharing has developed has exceeded the pace of secure infrastructure development. Our MSc Cyber Security is designed to help bridge this gap and meet the accelerating demand for professionals with proven information security expertise.
The course prepares students for a management role within organisations to be able to put in place and give continuance to the security profile of the company. This is particularly important in light of the national Cyber Security Strategy and the current shortage of related skills.
A powerful set of skills
Along with exploring established techniques, we cover the innovative practices which are emerging as a result of the very latest research. You will learn about both the managerial and technical elements of information security, as well as enterprise level security. This includes risk management and compliance, together with issues such as securing networks and system penetration testing.
You will hone a wide range of technical skills that can be applied to protect against specific system breaches. You will also learn how to perform ethical hacking: by understanding many of the techniques employed by malicious hackers, you can mitigate risks and thwart potential attacks.
In addition, the MSc equips you with the skills needed to make vital managerial decisions related to protecting an organisation’s security holistically.
You will study modules such as:
Postgraduate Certificate
- This course is made up of three stages – Postgraduate Certificate, Postgraduate Diploma and MSc.
- For the Postgraduate Certificate, you will study three modules from the list below.
Advanced Security Protocols
This module equips you with the advanced knowledge and understanding you need to analyse complex security protocols. You will focus on the protocols required to ensure security over remote networks.
Enterprise Security Management
Management of the security process is a crucial part of successful implementation. On this module, you will look at the fundamental network and security management issues that affect businesses, including the often-conflicting organisational goals that can lead to difficult trade-offs between affordability and effective protection.
Studying Masters Level and Research Methods
You will develop the skills to study at masters level to help you plan and execute a research project. You will also gain an understanding of research design and methodological enquiry.
Security: Attacks and Countermeasures
Through investigation, analysis and creative design, this module will enhance your skills in protecting systems against internal and external threats. You will develop the analytical tools to perform pragmatic and ethical system penetration testing.
Securing Networks
The focus of this module is on protecting a network from external and internal threats. You will cover the different methods of system breach, together with the mechanisms for detecting and protecting against them.
Human and Legal Aspects of Cyber Security
This module gives you an introduction to the legal and human dimensions of cyber security. It first covers the application of legal provisions, with a focus on accountability in computer systems. Secondly, it explores the key concepts for human dimensions of cyber security, leading to an understanding of research practice in designing and running scientific studies.
Postgraduate Diploma
- For the Postgraduate Diploma, you will need to study all six modules.
Advanced Security Protocols
This module equips you with the advanced knowledge and understanding you need to analyse complex security protocols. You will focus on the protocols required to ensure security over remote networks.
Enterprise Security Management
Management of the security process is a crucial part of successful implementation. On this module, you will look at the fundamental network and security management issues that affect businesses, including the often-conflicting organisational goals that can lead to difficult trade-offs between affordability and effective protection.
Studying Masters Level and Research Methods
You will develop the skills to study at masters level to help you plan and execute a research project. You will also gain an understanding of research design and methodological enquiry.
Security: Attacks and Countermeasures
Through investigation, analysis and creative design, this module will enhance your skills in protecting systems against internal and external threats. You will develop the analytical tools to perform pragmatic and ethical system penetration testing.
Securing Networks
The focus of this module is on protecting a network from external and internal threats. You will cover the different methods of system breach, together with the mechanisms for detecting and protecting against them.
Human and Legal Aspects of Cyber Security
This module gives you an introduction to the legal and human dimensions of cyber security. It first covers the application of legal provisions, with a focus on accountability in computer systems. Secondly, it explores the key concepts for human dimensions of cyber security, leading to an understanding of research practice in designing and running scientific studies.
MSc
Independent Scholarship
During this triple module, you will formulate, research and resolve a commercial IT problem, often working in partnership with industrial collaborators to help focus attention on specific and real applications. You will present your findings and solutions in the form of a masters-level dissertation that you can use to demonstrate your ability to apply your learning in an independent and rigorous fashion.
Please note that our modules are subject to change - we review the content of our courses regularly, making changes where necessary to improve your experience and graduate prospects.
You will learn through lectures, seminars, discussion groups, practical sessions, presentations and blended learning. Our dedicated cyber security lab with an isolated network will also give you the chance to carry out your experiments.
How you are assessed
Assessment is through a mixture of coursework and examinations. There will be a range of coursework techniques, including analytical essays, reports on lab-based problems, assignments using case studies, multi-task portfolios and presentations.
Our research-active teaching team
This course sits within the School of Computing and Engineering where our researchers are helping to advance our understanding in these important areas. The programme team for this course includes:
- Professor Fatih Kurugollu – Fatih is a Professor of Cyber Security and is Head of the Cyber Security Research Group (CSRG). His current research interest is centred around AI-based Security Analytics.
- Dr Muhammad Ajmal Azad – Muhammad is a lecturer and Assistant Professor in Cyber Security. He has a background in the telecommunications industry and his research interests broadly cover the areas of network security and privacy.
- Kim Smith - Kim has more than 20 years experience in the industry, with a particular specialism in ethical hacking.
2021/22 Fees (August 2021 - July 2022)
Type | Full-time | Part-time |
---|
UK | £7,850 for the full course or £875 per 20 credits* | N/A |
International/EU | £14,700 for the full course | N/A |
Please note fees normally increase in line with inflation and the University's strategic approach to fees, which is reviewed on an annual basis. The total fee you pay may therefore increase after one year of study.
* UK full-time fees paid within one academic year are rounded down to the nearest £50 if applicable
Additional costs and optional extras
About postgraduate awards
Please note at postgraduate level, you’ll need to gain the following number of credits in total to obtain the respective awards. If you have any questions please contact us.
Award | Credits |
---|
Postgraduate Certificate | 60 Credits |
Postgraduate Diploma | 120 Credits |
MA or MSc | 180 Credits |
This means you will gain 180 credits in total to complete the full MA or MSc. If you are studying part time you will normally complete your studies over two or three years, depending on the course structure.
Funding your studies
Find out more about fees, postgraduate loans and support you may be entitled to.
Find out about funding your studiesFind out about funding your studies
Alumni discount for Derby graduates
We offer a discount on postgraduate course fees for all Derby alumni.
Find out about the Alumni discountFind out about the Alumni discount
Individuals with proven information security knowledge are now in high demand across many different sectors. Successful completion of this degree can therefore lead to prestigious roles in the IT security arena, including Chief Information Officer, System Penetration Tester, Information Security Consultant and Information Security Risk Assessor.
Alternatively, you could undertake further research leading to a PhD or gain employment in a research and development environment.
If you need any more information from us, eg on courses, accommodation, applying, car parking, fees or funding, please contact us and we will do everything we can to help you.
Contact us Contact us Download programme specification
Teaching hours
Like most universities, we operate extended teaching hours at the University of Derby, so contact time with your lecturers and tutors could be anytime between 9am and 9pm. Your timetable will usually be available on the website 24 hours after enrolment on to your course.
Additional costs and optional extras
We’re committed to providing you with an outstanding learning experience. Our expert teaching, excellent facilities and great employability prepare you for your future career. As part of our commitment to you we aim to keep any additional study costs to a minimum. However, there are occasions where students may incur some additional costs.
The information below is correct for entry in the academic year September 2020 - August 2021 only. Entry for future academic years may be subject to change.
Included in your fees
- Specialist computing labs
- access to software and equipment
- Industry speakers
Mandatory costs not included in your fees
- Printer consumables approx. £100 per year
- portable hard drive/memory card approx. £120
- portfolio case approx. £40
- core text books approx. £250
Optional costs not included in your fees
- Personal computer and or tablet computer. From £200 upwards depending on specification
Please note: Our courses are refreshed and updated on a regular basis. If you are thinking about transferring onto this course (into the second year for example), you should contact the programme leader for the relevant course information as modules may vary from those shown on this page.