A person using a laptop A person using a laptop

Accreditations


Course Summary

Our Cybersecurity (Conversion) Master’s degree is aimed at both engineering and non-engineering students who wish to make the leap into the rapidly expanding field of cybersecurity. The course aims to provide both theory and real-world practical skills and expertise to an advanced level in the emerging field of cybersecurity.

This programme is accredited by BCS, The Chartered Institute for IT for the purposes of partially meeting the academic requirement for registration as a Chartered IT Professional.

The Cybersecurity Facility is part of the Department of Computer Science, and is an innovative, forward-thinking Department.

The course is taught by experts in the field with years of expertise in industry, and has close links with industry, government, and the police.

The Department is also home to the Informatics Centre, a software development team where students can gain experience of commercial projects.


What you'llStudy

There is an emphasis on real-world practice and supporting theory, to develop towards an expertise in digital forensics, incident response, penetration testing, active defence, software exploitation and system protection methods, and cybersecurity in business. The ‘Cyber Concepts and Techniques’ module is optional for February starters and compulsory for October starters.

Module content:

  • Internet and web terminology, protocols and infrastructure
  • Web document structure and content (e.g. HTML)
  • Web aesthetics
  • Web scripting
  • Web requests (e.g. use of HTTP verbs)
  • Using Internet and Web tools (e.g. IDEs, FTP clients)
  • Web APIs
  • Common Web security issues (e.g. CSRF, XSS, SQL Injection)
  • Web hosting configuration
  • Server side scripting
  • Databases (e.g. SQL, Keys, CRUD operations)

Module aims:

  • To enable students to develop a broad knowledge of web technologies
  • To introduce the languages commonly used to structure, present, and provide interactivity within web sites
  • To give students a solid foundation in practical technical skills required to develop client-side web applications
  • To provide an overview to server-side web application development including understanding of the client-server model

Module content:

  1. Projects which will involve the application of methods and equipment introduced in taught modules, will be based on subjects agreed in principle with the Postgraduate Dissertation Coordinator and potential supervisors.
  2. The research dissertation may be University-based or carried out in the employer’s workplace, or through a work placement where a local organisation has a direct role in facilitating the project.

Module aims:

To afford students the opportunity to experience the complete life-cycle of a successful and significant research-based project

To provide real-world experience of meeting the requirements of academic and professional standards, including high-level writing and referencing skills.

To demonstrate to peers and to current and potential employers the student’s ability to carry out good quality academic research, in a particular field, which is relevant to their programme of study. This may involve the application of existing research within a novel context.

Module content:

To include:

  • Time management, library skills and literature search
  • Evaluation of information sources
  • Critical analysis of information
  • Ethical issues in science, technology and engineering research (including intellectual property and plagiarism)
  • Writing for research: styles and rules for presentation (including referencing standards)
  • Choosing a research area and evaluating source material
  • Hypothesis formation
  • Research approaches and methodologies
  • Design and application of questionnaires & interviews
  • Quantitative and statistical tools for researchers (e.g. R, Python, SPSS)

Module aims:

  • To clarify the distinctions between undergraduate and postgraduate level work and expectations
  • To increase students' experience in order to conduct a professional study and to use sampling procedures and analysing techniques.
  • To improve students' appreciation of time management and how to conduct a literature search
  • To reinforce students' research skills
  • To consolidate students' appreciation of professional issues such as copyright and ethics

Module content:

The module draws on the research expertise and investment in virtual reality hardware that exists within the Department of Computer Science to instruct students in an exciting area of computer science that is growing in commercial importance. The module content will include lecture material on:

How virtual environments work; seeing in 3D; Presence and Immersion. Social and ethical considerations.

Characteristics of displays.

Content creation for Virtual Environments.

Input and output devices.

Real time Interaction.

Augmented Reality.

Case studies from medical, oil and gas industry, manufacturing, car design, entertainment industry, and more.


Module aims:

To study the technology elements needed to build and interact with a Virtual Environment. To provide an overview of Human Perception and how it works. The technologies discussed will be illustrated by a series of state-of-the-art case studies and hands-on demonstrations.

The course has been designed to conform with the QAA Subject Benchmark Statement for Computing (2011) and delivers specialised instruction in the subject matter that  contributes to improving a student's computing-related cognitive skills, computing-related practical skills, and generic skills for employability. The module covers a greater range and depth of specialist knowledge than that that would be obtained at Bachelor degree level and provides a unique opportunity to design and develop real time 3D content that utilises a person's natural senses and skills.

Module content:

  • Evolution of Robotics
  • Microcontrollers: Arduino and Raspberry Pi
  • Computer Vision
  • Agents and Multi-Agent Systems
  • Machine learning and robotics

Module aims:

  • To introduce the concept of artificial intelligence (AI) and to evaluate its role in the development of robotics.
  • To introduce theoretical approaches to the development of intelligent robots.
  • To undertake practical tasks to demonstrate how AI techniques can be implemented for robotics.
  • To analyse methods for designing and deploying robotic systems.
  • To critically evaluate the ways in which intelligent robots can be used in real world situations

Module content:

  1. Speaking Cyber - Core understanding of Cybersecurity terminologies
  2. Introduction to programming with cybersecurity perspective
  3. Implementing secure systems. Illustrative of what may be covered include:
    1. Design and development considerations
    2. Selecting and applying core technologies
    3. Cryptography
    4. Human factors
    5. Auditing (security audits, logging, digital investigation
      etc.)
    6. Defense-in-depth
    7. Google hacking
    8. Pentesting
  4. Threats and resolutions 

Module aims:

  1. To empower the students with core understanding of the key terminologies in cybersecurity
  2. To introduce students to programming with a cybersecurity perspective 
  3. To provide students with the understanding of the common cybersecurity concepts and technical security controls available to prevent, detect and recover from security incidents and to mitigate risks
  4. To give students a solid foundation in the practical technical skills which can then be harnessed later in CO7604 and CO7605 

Module content:

  1. Information Security Management
    1. This will include core security standards (e.g., ISO27001, ISO27032), policies and governance
      etc.
  2. Information Risk Management and Business continuity Management
  3. Audit, Assurance and Review
  4. Understanding the threats and risks businesses face today. Illustrative part of how this (or what) might be covered include:
    1. Through problem based learning and possible industry collaboration
    2. Exploring Social Engineering, the Least Resistance Path, Incident Response, Defence Indepth
      etc.
  5. Government strategy on Cybersecurity

Module aims:

This module will develop the student's understanding of the implications of cybersecurity to today's businesses, how businesses can gain market advantage by leveraging simple and yet robust cybersecurity principles, and government's cybersecurity strategy for businesses in the UK. Being a conversion masters, this will prepare students with useful cyber skills to lead or easily be part of cybersecurity efforts in their organisations. The aims are further broken down as follows:

  1. To develop the capability for determining, establishing and maintaining appropriate governance of processes and responsibilities, delivery of controls, and cost-effective solutions for information security within a given organisation.
  2. To understand and be able to manage the risks relating to information, information systems and assets.
  3. To understand the need for, and be able to design and implement processes for, establishing business continuity.
  4. To develop the capability for defining and implementing the processes and techniques used in verifying compliance against security policies, standards, legal and regulatory requirements.
  5. To use real life business scenarios to expose students to cybersecurity needs of today’s businesses.
  6. To understand government's strategies for tackling cybersecurity issues in business.

Module content:

Software attack techniques, approaches, and methodologies.

Exposure to exploitation techniques, including for example, buffer overflow, stack overflow, heap attacks, and UAF (Use After Free), amongst others.

Attack methods including system, host, network, and web-based attacks.

Tools and techniques; use of existing tools and development of new tools.

Software Protection Methods and principles of secure software and system design.


Module aims:

The main weakness in systems is often the software they run, including software on devices and networked systems.

The aim of this module is to study, understand, and practice the state-of-the-art technique for gaining entry, i.e. 'exploitation', of software across a variety of systems and platforms.

With this understanding, the student will in parallel study and understand various counter-measures employed in system software against these attacks, the limitations of both the attacks and counter-measures, and counter-counter-measures.  Understanding this cycle will give the student appreciation of the exploitable vulnerabilities and the need for and way to architect and design a secure system.

Furthermore, the student will gain understanding of and experience in a number of tools and techniques in order to perform vulnerability and penetration tests on new software.

Module content:

  • Digital system forensics
    • Disk
    • Memory
    • Mobile
    • Cloud
  • Live forensics
  • Encryption and obfuscation
  • Malware analysis and investigation
  • Network forensics
  • Anti-forensics
  • Methodologies, approaches, and techniques
  • Cyber Threat Intelligence and attribution
  • Incident Response
  • Ethical issues in digital forensics and incident response

Module aims:

This module aims to introduce the student to the need for and uses of digital forensics and incident response from an organisational security perspective.

The aim of this module is to introduce, study, understand and practice digital forensics techniques, and to understand the limitations of common techniques.  It aims to develop in the student an appreciation and understanding of anti- and counter-forensics, including falsification of data.  Finally, it aims to build the students' understanding of malware, how it operates, and practices to deal with it.

Students will gain an understanding of Incident Response and Cyber Threat Intelligence.

Module content:

  • Network security and attacks
  • The current threat landscape
  • Social engineering
  • Penetration testing tools
  • Active defence
  • Threat hunting
  • Defensive strategies and tools 
  • Hack back and the legal implications
  • Hacker tools
  • Penetration testing; methodologies, approaches, and techniques
  • Penetration test reporting
  • Ethical issues in penetration testing and active defence

Module aims:

This module aims to:

  • introduce the student to the need for and uses of penetration testing and active defence from an organizational security perspective;
  • introduce, study, understand and practice active defence and the limitations of common techniques. This will also look at relevant tools and the legal aspect of 'hack back';
  • help the student study, understand, and practice penetration testing techniques, developing skills in 'access' over networks, and how attackers look at a target; 
  • the relevant skills, knowledge and usage of hacker tools and how to stop/deter attackers

These will be built upon to allow the student to better understand network and holistic defenses and to be able to design secure interconnected systems.

Module content:

Embedded Systems and Field Programmable Gate Array (FPGA) Technology

  • Concurrent assignment statements and unintended memory
  • Adopting proper hardware description language (HDL) coding style and taking a divide and conquer approach for code development
  • The need for design simplification.
  • Regular sequential circuit block system and registers 
  • Building test-benches for sequential circuits
  • Timing, clocking, operating frequency and clock tree considerations
  • The Finite-state machine (FSM), its representation and FSM HDL code development
  • The Finite-state machine with data path (FSMD), its representation and FSM HDL code development

Internet of Things (IoT)

  • Automatic Identification Technology and Radio-frequency identification (RFID)
  • Wireless Sensor Network
  • Location System
  • Internet and Mobile Internet
  • Wireless Access Technology
  • Big Data, IoT & Cloud Computing
  • Information Security for IoT
  • IoT Application Case Studies
  • Arduino Opla, Espressif System on Chip (SoC) & Raspberry Pi IoT technologies

Module aims:

The Embedded Systems part of this module aims to develop the skill in students of digital systems design with the VHDL hardware description language (HDL) and Field Programmable Gate Array (FPGA) reprogrammable and fast prototyping technologies. Students will be able to produce design, synthesis of circuits and implement system on chip (SoC) using modern electronic design automation (EDA) tools.

The Internet of Things (IoT) contents aim to develop the advanced practical skills in building and designing IoT related components and network systems, going from the sensors layer to the cloud processing. This part also develops expertise in the use of a hardware/software tools to create and simulate practical systems, considering big data, energy consumption control and network security aspects.

Who you'll Learn from

Dr Nabeel Khan

Senior Lecturer
A dark grey silhouette on a light grey background

Dr Nigel Houlden

Senior Lecturer
Dr Nigel Houlden

How you'll Learn

Teaching

You will learn from experts in the field through visitations, guest lectures and demonstrations.

This course comprises six 20-credit modules and a 60-credit supervised research module.

Assessment

The core modules comprise workshops of three hours of face-to-face time, each across ten weeks. You can expect a normal workload of 55-60 hours’ study and practice per week. In addition to this, you will have your own Personal Academic Tutor.

Entry Requirements

For the February 2024 intake, the MSc Cybersecurity programme will not be a conversion programme.

A good honours degree (normally 2:1 or above) in a computer science aligned field is required. 

Applicants with a 2:2 may be considered on an individual basis. This will include applicant's degree subject area, relevant experience and/or training, etc.

For October 2024, the MSc Cybersecurity programme is a conversion course and is therefore open to applicants of any discipline so long as they possess a good first degree (normally a 2:1 or above) and/or equivalent industrial experience. Applicants with a 2.2 may be considered on an individual basis. This will include applicant's degree subject area, relevant experience and/or training, etc.

All applicants are expected to have a willingness to develop technical skills as part of this course and may be required to attend a short interview before confirmation of acceptance onto the course.

For October 2024, the MSc Cybersecurity programme is a conversion course and is therefore open to applicants of any discipline so long as they possess a good first degree (normally a 2:1 or above) and/or equivalent industrial experience. Applicants with a 2.2 may be considered on an individual basis. This will include applicant's degree subject area, relevant experience and/or training, etc.

All applicants are expected to have a willingness to develop technical skills as part of this course and may be required to attend a short interview before confirmation of acceptance onto the course.

English Language Requirements

For those who do not have IELTS or an acceptable in-country English language qualification, the University of Chester has developed its own online English language test which applicants can take for just £50.

For more information on our English Language requirements, please visit International Entry Requirements.

Where you'll Study Exton Park, Chester

Fees and Funding

£10,215 per year (2024/25)

Guides to the fees for students who wish to commence postgraduate courses in the academic year 2024/25 are available to view on our Postgraduate Taught Programmes Fees page.

£14,750 per year (2024/25)

The tuition fees for international students studying Postgraduate programmes in 2024/25 are £14,750.

The University of Chester offers generous international and merit-based scholarships for postgraduate study, providing a significant reduction to the published headline tuition fee. You will automatically be considered for these scholarships when your application is reviewed, and any award given will be stated on your offer letter.

For more information, go to our International Fees, Scholarship and Finance section.

Irish Nationals living in the UK or ROI are treated as Home students for Tuition Fee Purposes.

Your course will involve additional costs not covered by your tuition fees. This may include books, printing, photocopying, educational stationery and related materials, specialist clothing, travel to placements, optional field trips and software. Compulsory field trips are covered by your tuition fees.

If you are living away from home during your time at university, you will need to cover costs such as accommodation, food, travel and bills.

The University of Chester supports fair access for students who may need additional support through a range of bursaries and scholarships. 

Full details, as well as terms and conditions for all bursaries and scholarships can be found on the Fees & Finance section of our website.

Your Future Career

Job Prospects 

Graduates have gone on to leading roles in industry in the field of security and penetration testing, in policing, and in government.

Careers service

The University has an award-winning Careers and Employability service which provides a variety of employability-enhancing experiences; through the curriculum, through employer contact, tailored group sessions, individual information, advice and guidance.

Careers and Employability aims to deliver a service which is inclusive, impartial, welcoming, informed and tailored to your personal goals and aspirations, to enable you to develop as an individual and contribute to the business and community in which you will live and work.

We are here to help you plan your future, make the most of your time at University and to enhance your employability. We provide access to part-time jobs, extra-curricular employability-enhancing workshops and offer practical one-to-one help with career planning, including help with CVs, applications and mock interviews. We also deliver group sessions on career planning within each course and we have a wide range of extensive information covering graduate jobs and postgraduate study.