menu icon

Key information
Source: HOTCOURSES, January 2017.

DATA SOURCE : HOTCOURSES

Qualification type

MSc - Master of Science

Subject areas

Information Security Computer Security Systems

Course type

Taught

Course summary
Source: HOTCOURSES, January 2017.

The MSc Information Security addresses both the technical and the management aspects of cyber security. Through this degree you will: Gain cyber security skills required for senior level careers by focusing on principles and best management techniques; Benefit from Royal Holloway’s expertise and consulting experience, which ensures that the degree is up-to-date and commercially relevant; Enhance your career prospects. Our graduates work for financial institutions and consultancies, and as security specialists within a wide range of companies and R&D organisations. This course is developed by the Information Security Group at Royal Holloway, one of the foremost academic security groups in the world. The Information Security Group performs cutting-edge research in a number of areas including the design and evaluation of smart cards, system and mobile security, cryptography and the integration of security techniques.

The ISG was awarded a Queen's Anniversary Prize in 1998 for providing "a unique national resource for the training of information security specialists" and is recognised as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR). The MSc Information Security became one of the first distance-learning courses to receive GCHQ certification. Accredited degrees were adjudged "to provide well-defined and appropriate content, delivered to the highest standard". Our students come from a variety of backgrounds, from recent graduates to senior security managers. Graduates of the programme can be found in many organisations, ranging from large financial institutions and consultancies through to technology and research-oriented organisations. They also act as security specialists within a wide range of companies. The MSc in Information Security is also a solid foundation for postgraduate research.

Different course options
Source: HOTCOURSES, January 2017.

Study mode

Online

Duration

5 years

Start date

01-OCT-17

Modules
These are the sub-topics that you will study as part of this course.

Source: HOTCOURSES, January 2017.

Security Management - Core

This module will emphasise the need for good security management. Its aims are to identify the problems associated with security management and to show how various (major) organisations solve those problems.

An Introduction to Cryptography and Security Mechanisms - Core

This module takes a very specific approach to presenting cryptography - Fundamental principles: This module is intended to be both relevant and relatively timeless. It is easy to present a module on cryptography that is quickly out of date. This module is intended to be just as relevant in ten years time as it would have been relevant ten years ago. This is because it is primarily concerned with the fundamental principles rather than technical details of current technology. Application-focussed: This module is primarily concerned with the cryptography that a user or practitioner of information security needs to know. While there is a great deal of contemporary theoretical research on cryptography, few of these ideas make it through to real-world applications, which tend to deploy only well-tested and understood techniques. This module focuses on cryptography for everyday applications. Widely accessible: This module is intended to be suitable as a first introduction to cryptography. It focuses on core issues and provides an exposition of the fundamentals of cryptography. This module is intended to be introductory, self-contained and widely accessible.

Network Security - Core

This module is concerned with the protection of data transferred over commercial information networks, including computer and telecommunications networks. After an initial brief study of current networking concepts, a variety of generic security technologies relevant to networks are studied, including user identification techniques, authentication protocols and key distribution mechanisms. This leads naturally to consideration of security solutions for a variety of types of practical networks, including LANs, WANs, proprietary computer networks, mobile networks and electronic mail.

Tuition fees
Source: HOTCOURSES, January 2017.

UK fees
Course fees for UK / EU students

Contact University and ask about this fee

Average for all Postgrad courses (per year)

£5,202

International fees
Course fees for non-UK / EU students

Contact University and ask about this fee

Average for all Postgrad courses (per year)

£12,227

Entry requirements
Source: HOTCOURSES, January 2017.

Students need to have an undergraduate degree (e.g. bachelor) which is considered at least comparable to a UK second class honours degree, in a relevant discipline, from an institution acceptable to the University (a relevant discipline includes, but is not restricted to, computer science, electronics, information systems, and mathematics). Students without a degree but with appropriate industrial experience will also be considered on an individual basis.

University Information

Find out more about the University you are interested in... Get prospectus

Similar courses at this uni