What you will study
You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.
As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.
The Management Studies route will set your technical knowledge in a management context.
The full MSc course consists of an induction programme, four taught modules, and a project dissertation. Please note that this is an
indicative list of modules and is not intended as a definitive list.
For a student to go on placement they are required to pass every module first time with no reassessments. It is the responsibility of individual students to find a suitable paid placement. Students will be supported by our dedicated placement team in securing this opportunity.
Network and Information Security MSc modules
Core modules
Cryptography and Applications
30 credits
This core module provides an overview of cryptography and various applications in information security, communication and computer science. This module deals with mathematical principles on which cryptography is based to include cryptographic algorithms, including practical examples of breaking codes. Additional techniques such as information hiding and secret sharing are progressively introduced. An introduction to advanced and emerging cryptographic techniques such as elliptic curve cryptography and quantum techniques.
On successful completion of the module, students will be able to:
- review concepts in computational number theory and their relevance for the design of secure and efficient techniques in cryptography;
- describe and deploy common symmetric and asymmetric encryption algorithms used as standards in modern cryptosystems;
- compare and contrast the properties of hash functions and attacks on them, and be familiar with their use in digital signature algorithms and their role in security protocols;
- explain techniques for information hiding and secret sharing, and analyse their applications in security;
- analyse cryptographic protocols for implementing a wide range of security requirements; and
- critically discuss applications of cryptography including the latest and future trends.
Network and Information Security
30 credits
This module provides an overview of a wide range of security aspects and techniques of computer networks, both cabled and wireless. It will introduce basic aspects of Information Security, comprising Security and Risk Management as well as Policies and Standards. It also covers Ethical and legal aspects of security and hence addresses the employability of the students in their future career. The module then goes on to the topic of Network Security, both from a theoretical and practical aspect: network attacks, vulnerabilities and controls are introduced and examined in practical lab sessions. Finally, cutting-edge topics such as Web and Cloud security complete the picture.
Data Communications
30 credits
This core module provides a working knowledge of data communications covering TCP/IP networks and digital communications. Topics covered include transport layer services, multiplexing, TCP congestion control, network layer – network service models, IP addressing and IP network design, routing principles, dynamic routing, digital transmission, modulation, multiplexing and channel coding.
On successful completion of the module, you will be able to:
- Compare computer network architectures.
- Evaluate the performance of TCP under varying flow control and congestion conditions.
- Design an IP addressing scheme for a network.
- Define and calculate transmission performance over a communication link.
- Study and analyse characteristics of modulation methods.
Project Dissertation
60 credits
This module constitutes the major individual piece of work of the Masters Programme where the student carries out a project involving independent critical research, design and implementation (where applicable).
On successful completion of the module, students will be able to:
- Select, justify and use effectively the research methods and techniques appropriate for particular cases in order to carry out a literature search and an independent work of research
- Critically identify the need to position their research in the wider academic or business context and structure the dissertation format to agreed conventions
- Plan, manage and critically evaluate the project using the techniques and tools needed in order to bring it in successfully on time and within resourcing limits
- Identify and critically analyse real-world problems or knowledge gaps to which academic concepts and methods can be realistically applied to improve or resolve the problem situation
- Apply skills to show an ability to engage in academic and professional communication with others in their field through report and presentation
- Present critical awareness in applying appropriate legal, social or ethical obligations and when required, respond to the financial and other constraints of a corresponding business environment.
Optional modules
Wireless Communications and Networks
30 credits
The module addresses theory and practice of wireless communication systems and networks, including the most recent wireless communications standards.
The first part will focus on the propagation characteristics of wireless channels and the main techniques for efficient communication, including modulation and channel coding. Characteristics and performance limits of wireless systems, techniques and tools to analyse them and methods for their design will also be covered.
The second part of the module will cover real-world wireless systems and networks, including wireless broadband systems and wireless sensor networks. It will provide practical and useful knowledge that can be readily applied in the wireless industry.
It covers the real-world, practical knowledge needed to understand, design, evaluate, deploy, test, validate and debug WLAN, WMAN and WPAN, as well as GPRS/ UMTS/ 3G and 4G and beyond networks and systems and Wireless Sensor Networks (WSN). Advanced technologies such as ultra-wideband communications and cognitive radio will also be addressed.
Mobile Security
30 credits
(For NCSC Certified Pathway)
This module will provide you with a comprehensive knowledge into the main areas of mobile computing and its security aspects. Mobile communication modalities will be covered, including 3G/4G communication networks, Wi-Fi and personal area networks, mobile privacy and ethical issues. The gained knowledge will be applied in different mobile computing business environments such as mobile healthcare (m-health), mobile commerce (m-commerce), mobile learning (m-learning) and mobile web services (m-WS). Mobile security assessment will be introduced in order to formulate appropriate security requirements. Key management protocols in typically ad hoc, wireless and location-dynamic environments will be presented and analysed. Emerging topics such as the Internet of Things (IoT), mobile clouds and distributed social network security will also be discussed. The module also provides hands-on practical exposure to apps development in location and context aware environments.
Multimedia Communications
30 credits
The module addresses theory and practice of multimedia communication systems and networks, with a special focus on multimedia signals (audio, images and video) and relevant compression and transmission techniques.
The first part of the module focuses in particular on the representation of multimedia sources and on lossless and lossy compression methods for data, audio, image and video signals.
The second part of the module focuses in particular on the transmission of multimedia sources over communication systems and networks and on the strategies adopted to protect multimedia content from channel and network errors and losses.