< Cyber Security : MSc (Full Time)

Contact Information

If you encounter any difficulties accessing Online Courses Handbook information you should contact the student registry:

If you require further details in relation to academic content you should contact the appropriate academic department directly.

Breadcrumbs

Cyber Security

MSc (Full Time)

Year:14/15
UCAS Code: 
Minimum Length:1 Year(s)
Maximum Length:1 Year(s)
Credit Points:180
Director of Studies:Professor MA Rashid

Educational Aims: Knowledge, Understanding and Skills

back to top

Subject Specific: Knowledge, Understanding and Skills

The overall aim of the programme is to equip students with the knowledge and skills necessary to work within an IT security profession, combining advanced technical skills with an understanding of the management of risk, information economics, types of crime relevant to IT systems, criminal behaviour, methods of intervention and detection and the legal frameworks surrounding IT Systems Security.  Its strength and uniqueness lies in the multi-disciplinary nature of the programme, drawing upon expertise from Applied Social Science, Psychology, The Management School, Computing and ICT Focus.

Elements of the technical curriculum will build upon certification programmes such as CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker) and CHFI (Computer Hacking Forensic Investigator) thus giving successful students the added opportunity to go on and gain industry-recognised qualifications.

General: Knowledge, Understanding and Skills
Students will also benefit from the development of skills that are essential for someone working within IT security. They will develop advanced problem solving and planning skills, critical self-reflection skills and the ability to reflect upon the motivation of others, appropriate research and investigative skills and the ability to synthesyse and evaluate complex information.

Learning Outcomes: Knowledge, Understanding and Skills

back to top

Subject Specific: Knowledge, Understanding and Skills
On successful completion of this scheme of study students will possess a solid understanding of the technical and human elements of the field of Information System Security. Further, the student will have gained a broad awareness of current practice and issues. They will also have gain enough understanding in order for them to critically evaluate current research and best practice within the realm of Information Security Systems.

Successful students will also have gained enough understanding in order to make informed judgements on the appropriate application of a range of methodologies and technologies to a wide range of Information Systems in order to improve or enhance their security. Students will be able to take a methodical and creative approach to applying their knowledge and communicating their findings to specialist and non-specialist audiences.

Successful students will also be able to demonstrate a self-directing capability in conducting their work and an originality in problem solving in the field of human-computer security engineering.

The programme is composed of two core modules with a further two optional modules. The learning outcomes are listed below.

Core Specific objectives:

  • SEC11: a fundamental understanding of security technologies appropriate for an IT infrastructure. This will cover access control, telecommunications and network security, cryptographic techniques and security Architectures and Models.
  • SEC12: security management skills and techniques appropriate to manage an IT infrastructure. Students will explore areas such as security policy design, basic risk management and analysis, Business Continuity Planning. Further, students will investigate issues surrounding Law, regulatory investigation and Ethics.
  • SEC21: an awareness of the attack vectors that may be used against modern IT infrastructures. IT infrastructures will be examined from the ground up, exploring exploits at all communication levels, from network communication protocols to applications. Further, information gathering techniques for recognisance and social engineering will be explored.
  • SEC22: the skills required to exploit and defend against common attack vectors. Students will explore how these skills may be used in conjunction to perform a complete penetration test, including non technical elements involving social engineering.
  • SEC31: a knowledge of the regulation, ethics and process behind computer forensics investigation. This will cover investigative processes covering a variety of scenarios.
  • SEC32: an understanding of the tools and techniques to perform forensic analysis on a range of electronic devices. A student will be able to understand the mechanism by which information is hidden and appropriate mechanism by which to recover such information for investigative purposes.
  • ECO11: an understanding of the market system and how to analyse problems using skills and knowledge from the field of economics
  • ECO12: an understanding of the current research and think behind the economics of security and information economics
  • RM11: an understanding of the main concepts of risk management within the context of information security.
  • RM12: an understanding of quantitative risk assessment approaches for high reliability organisation of systems.
  • PSY11: an appreciation of what can be learned from studying the behaviour of criminals in a scientific framework and be able to apply psychological theories of behaviour to explain criminal case studies and experiences in criminal contexts. Further will be able to understand and discuss different explanations of crime and criminal behaviour as well as theories of crime and how clinical classifications of personality manifest in the criminal context.
  • PSY12: a detailed knowledge of the current research in types of crime that are critical to their investigative area. Further, students will be able to discuss the social explanations of crime and be able to apply these frameworks to help comprehend the actions of individuals.
  • PSY21: detailed knowledge of the most recent psychological contributions to interviewing, persuasion and negotiation, deception detection, and critical incident management. Further, students will develop an understanding of the complexities of the interviewing process
  • PSY22: the ability to critically discuss the merits of different approaches to detecting deception and be able to evaluate critical decisions and be aware of the contexts within which they emerge.
  • SOC11: identify, describe, compare, and critically discuss different types of ‘cybercrime’ and develop an understanding in the relationship between crime, deviance, ICTs, and ICT users within various historical, cultural, socio-economic and socio-political contexts.
  • SOC12: analyse policing, legal, corporate, electronic, social, and other measures designed to combat ‘cybercrime’ and identify their main strengths and weaknesses and critically analyse criminological and sociological theories of ‘cyberspace’ and coherently apply these theories to the specific field of ‘cybercrime’.
  • DIS11: an ability to select an appropriate problem and evaluate appropriate sources for solutions Further students will develop skills to design a research programme and demonstrate appropriate research and investigative skills.
General: Knowledge, Understanding and Skills
On successful completion of this scheme of study students will have gained a range of general qualities and transferable skills that will assist them in either carrying out further study/research (e.g. at PhD level) or in holding down professional positions that require the qualities such as the exercise of initiative and personal responsibility; technical decision making in complex and unpredictable situations; and the independent learning ability required for continuing professional development.

General Specific objectives:

  • GEN01: Reason critically
  • GEN02: Apply relevant theoretical concepts
  • GEN03: Identify and solve problems, both individually and working in groups and formulate appropriate methods for troubleshooting.
  • GEN04: Demonstrate and exercise independence of mind and thought.
  • GEN05: Evaluate research and different types of information & evidence arguments critically.
  • GEN06: Synthesise and select appropriate information from a number of sources.
  • GEN07: Structure and communicate ideas effectively in writing
  • GEN08: Plan, undertake and report on an individual piece of research-based work.
Lancaster University
Bailrigg
LancasterLA1 4YW United Kingdom
+44 (0) 1524 65201