Information Security and Digital Forensics at University of East London - UCAS

There are other course options available which may have a different vacancy status or entry requirements – view the full list of options

Course summary

The threat of cyber security attacks is increasingly apparent to individuals and organisations across the globe. From hacking to phishing, scamming to grooming, and botnets to cyber-terrorism, the variety and ingenuity of exploits appear to expand constantly. In this context, this programme addresses system vulnerabilities and the preventative measures that may counter cyber-attacks, including steps to repair systems weaknesses, prevent repeat occurrences, and collect and examine digital evidence using a variety of digital and mobile forensics tools such as FTK and Cellebrite. You will also develop a detailed understanding of comprehensive cyber risk management practices for ensuring overall security. This course is also available as atwo-year master's with an industrial placement year. The embedded industrial placement offers a unique opportunity to apply the skills learned on real-life projects. This, in turn, prepares graduates of the programme for successful careers in both the information security and digital forensics professions.

Modules

Security Management This module will provide the core theoretical background necessary for ensuring the security of information systems. The module aims to extend your knowledge of systems and risks management and to identify the problems associated with security management and expand your ability to better manage security vulnerabilities and integrate security management with the rest of IT management. It provides practical experience of auditing information systems for adequate information security based on industry specific standards. Computer Security The main aim of this module is to provide students with the knowledge and skills necessary to protect computers, networks, and internet sites from unauthorized intrusion. The module focuses on studying security risks, analysing threats, and applying appropriate defensive mechanisms and tools to counter cyber-crime. The main topics covered include computer security, risk analysis, identification, authentication, access control, cryptography, encryption, digital signatures, digital certificates, viruses, malware, intrusion detection, defensive measures, software protection, software hardening, obfuscation, and security evaluation. By exploring these topics, students will develop a comprehensive understanding of computer security and gain the ability to safeguard digital systems against potential threats. IT & Internet Law This module aims to develop an understanding of legal issues raised by the increased use of communication networks, such as the Internet. In particular the module will focus on the differences and contradictions between the requirements of national, supra-national and global legislative codes. Digital Forensics This module aims to qualify and equip students with the skills and knowledge required to conduct an investigation (seizure, extraction, and examination of digital evidence from digital devices). Mental Wealth; Professional Life (Dissertation) In this practical project at the master’s level, students will undertake a project within the scope of the selected MSc program to develop skills relevant to a senior computing professional. Students will consider ethical, legal, social, and professional issues while conducting research, analysis, design, implementation, quality assurance, evaluation, and project management. The dissertation will require appropriate research methodologies, literature surveys, referencing, and academic writing and presentation skills. Students will also focus on self-reflection, self-awareness, and strategies to improve their mentoring skills, health, and well-being. Additionally, students will engage with real-world projects and computing professionals and develop a recent development in the field of computer science to a professional standard.

Assessment method

Modules are allocated a mark out of 100 percent. The pass mark for each module is based on an aggregate mark of 50 percent. The aggregate mark comprises marks from components whose threshold is 40 percent. Assessment may incorporate one, two, or three components. The module specifications specify the mode of assessment for each module. Assessment methods include formal examinations, coursework, project work, and group exercises.


Entry requirements

Bachelor's degree with minimum Second Class (2:2) in Computer Science (or equivalent degree with significant maths and computing content). We accept a wide range of European and international qualifications in addition to A-levels, the International Baccalaureate and BTEC qualifications. Overall IELTS 6.0 with minimum 6.0 in writing and speaking, and 5.5 in listening and reading(or recognised equivalent) If you do not meet the academic English language requirements for your course, you may be eligible to enrol onto a pre-sessional English course . The length of the course will depend on your current level of English and the requirements for your degree programme. We offer a 5-week and an 10-week pre-sessional course.


Fees and funding

Tuition fees

No fee information has been provided for this course

Additional fee information

No additional fees or cost information has been supplied for this course, please contact the provider directly.
Information Security and Digital Forensics at University of East London - UCAS