What you will study
You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.
As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.
The Management Studies route will set your technical knowledge in a management context.
The full MSc course consists of an induction programme, four taught modules, and a project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.
For a student to go on placement they are required to pass every module first time with no reassessments. It is the responsibility of individual students to find a suitable paid placement. Students will be supported by our dedicated placement team in securing this opportunity.
Network and Information Security MSc with Management Studies
Core modules
Cryptography and Applications
30 credits
This core module provides an overview of cryptography and various applications in information security, communication and computer science. This module deals with mathematical principles on which cryptography is based to include cryptographic algorithms, including practical examples of breaking codes. Additional techniques such as information hiding and secret sharing are progressively introduced. An introduction to advanced and emerging cryptographic techniques such as elliptic curve cryptography and quantum techniques.
On successful completion of the module, students will be able to:
- review concepts in computational number theory and their relevance for the design of secure and efficient techniques in cryptography;
- describe and deploy common symmetric and asymmetric encryption algorithms used as standards in modern cryptosystems;
- compare and contrast the properties of hash functions and attacks on them, and be familiar with their use in digital signature algorithms and their role in security protocols;
- explain techniques for information hiding and secret sharing, and analyse their applications in security;
- analyse cryptographic protocols for implementing a wide range of security requirements; and
- critically discuss applications of cryptography including the latest and future trends.
Network and Information Security
30 credits
This module provides an overview of a wide range of security aspects and techniques of computer networks, both cabled and wireless. It will introduce basic aspects of Information Security, comprising Security and Risk Management as well as Policies and Standards. It also covers Ethical and legal aspects of security and hence addresses the employability of the students in their future career. The module then goes on to the topic of Network Security, both from a theoretical and practical aspect: network attacks, vulnerabilities and controls are introduced and examined in practical lab sessions. Finally, cutting-edge topics such as Web and Cloud security complete the picture.
Data Communications
30 credits
This core module provides a working knowledge of data communications covering TCP/IP networks and digital communications. Topics covered include transport layer services, multiplexing, TCP congestion control, network layer – network service models, IP addressing and IP network design, routing principles, dynamic routing, digital transmission, modulation, multiplexing and channel coding.
On successful completion of the module, you will be able to:
- Compare computer network architectures.
- Evaluate the performance of TCP under varying flow control and congestion conditions.
- Design an IP addressing scheme for a network.
- Define and calculate transmission performance over a communication link.
- Study and analyse characteristics of modulation methods.
Business in Practice
30 credits
This postgraduate module covers the theory and practice of the business and management needs of students from different academic contexts such as, but not limited to Science, Engineering, Computing and Health Services who are aspiring team leaders, managers, and entrepreneurs in business within the context of the commercial, public, voluntary, or academic sector.
On successful completion of the module, students will be able to:
- Investigate business topics ranging from finance, accounting, budgeting, and marketing, to organisational management by developing the leadership skills to meet business challenges and to cope with their complexity.
- Explain and put into context business concepts to graduates from a variety of sectors including those encompassed by Science, Engineering, Computing and Health Services.
Project Dissertation
60 credits
This module constitutes the major individual piece of work of the Masters Programme where the student carries out a project involving independent critical research, design and implementation (where applicable).
On successful completion of the module, students will be able to:
- Select, justify and use effectively the research methods and techniques appropriate for particular cases in order to carry out a literature search and an independent work of research
- Critically identify the need to position their research in the wider academic or business context and structure the dissertation format to agreed conventions
- Plan, manage and critically evaluate the project using the techniques and tools needed in order to bring it in successfully on time and within resourcing limits
- Identify and critically analyse real-world problems or knowledge gaps to which academic concepts and methods can be realistically applied to improve or resolve the problem situation
- Apply skills to show an ability to engage in academic and professional communication with others in their field through report and presentation
- Present critical awareness in applying appropriate legal, social or ethical obligations and when required, respond to the financial and other constraints of a corresponding business environment.