menu icon

Key information

Qualification type

MSc - Master of Science

Subject areas

Internet Security Systems

Course type


Course Summary


The issue of cyber security continues to be a major issue for both individuals and large corporations. It has been reported by the Cyber Security Breaches Survey 2018 that over four in ten businesses (43%) and two in ten charities (19%) experienced a cyber security breach or attack in the last 12 months.

For businesses it is no longer a question of if a cyber-attack will occur but rather when, and as such the demand for qualified IT security professionals has risen exponentially. Northumbria University’s part-time MSc Cyber Security has been designed to give you the skills to meet this increased demand, including how to handle security incidents, identify new and existing threats, and determining methods to minimise them.

How will I be taught and assessed?

Our MSc Cyber Security is designed to allow you to fit your studies around your working life and is assessed through modular assignments, exams and a final dissertation. All taught lectures are delivered across 15 of weekends spread throughout the 2 year programme. This is based on 210am-4pm sessions over 15 weekends, you will also have an additional 6-hours of contact time through a workshop. You will also have 6-hours of contact time with your tutor as part of your final project, this can be on campus or online.

You will also be expected to engage in independent study, around 3-4 hours per week on average over the 2 years. This will be supported by your module tutor and will consist of pre-class reading preparation, research, assessment preparation, development and writing as well as skills development and online tests and quizzes.

Each module builds upon your understanding of information governance and assurance, along with technology risk management practices. You will study with a diverse group like-minded IT professionals, and will be able to trial new approaches and processes in a safe environment, working on real world scenarios and case studies.

You will be assessed via a range of assessment methods including exams, assignments, presentations and group work.

Technology Enhanced Learning (TEL) is embedded throughout the course with tools such as the ‘Blackboard’ eLearning Portal and electronic reading lists that will guide your preparation for seminars and independent research.

We offer extensive student support in and outside of the classroom with a dedicated student support team based in London.

Careers and further study

Cyber security has become an increasingly recurring issue for businesses, governments and the public.

With all this investment, there are a plethora of career options following completion of this course, typical roles include:

  • Threat management & forensics
  • Risk analytics & management
  • Policy makers & Strategists
  • Operations & security management
  • Engineering, Architecture & Design
  • Chief Technology Officer

Different course options

Study mode



2 years

Start date



This module will provide you with an in-depth knowledge of the processes used in assuring the security of information during use, sharing, storage, transmission and disposal. It will cover the protection of the integrity, authenticity, availability and confidentiality of all classes of information. The module is designed to provide a comprehensive framework for ensuring the resilience of business activities during threats and disruptive events thus enabling the assessment of potential risks to the business which could result from disasters or emergency situations. A breakdown of the key areas of information risk assessment ? context establishment, information risk assessment will be followed by the various elements of risk analysis and evaluation. An examination of the treatment of identified risks will be used to illustrate that mitigation is not the only option that organisations The last element of the module will explore the important aspect of communicating the result of the risk management process with key stakeholders. You will develop an in-depth understanding of the different types of business interruptions ? man-made, natural disasters and technology failures ? and the potential damage / revenue losses that can result from them. It is crucial to perform regular disaster recovery testing exercises in order to prove that organisations can recover from catastrophic loss of data and facilities.

Tuition fees

UK fees
Course fees for UK / EU students

For this course (overall cost)


Average for all Postgrad courses (per year)


International fees
Course fees for non-UK / EU students

To be confirmed

Average for all Postgrad courses (per year)


Entry requirements

Standard entry requirements Minimum 2:2 or above from a recognised university in a relevant field (IT/Computer Science/related field) or Professional qualifications that are equivalent to an honours degree Non-standard entry requirements Relevant qualifications and/or work experience will be taken into consideration where the applicant has the judged potential to benefit from the programme. Requests will be considered on an individual basis by the Programme Leader and relevant module tutors where appropriate.

University information

Northumbria University’s London campus is based right in the heart of the city, and with the University’s focus specialisation in industry-focused degrees, you’ll find yourself perfectly placed to search for work experience and internships and rub shoulder with all the right sorts of people as you think ahead to your career. Many of the business-related postgraduate degrees can be studied full time or part time in one-to-two years, to fit in...more

Similar courses at this uni