MBA Business Administration with Professional Placement
The MBA Business Administration with Professional Placement program at UCLan is designe...
Preston Campus
INTAKE: January
The MSc IT Security program at the University of Central Lancashire is a comprehensive course that focuses on the principles and practices of information technology security. It addresses the critical challenges of protecting digital data, systems, and networks from cyber threats.
Program Structure: The MSc IT Security program typically spans one year full-time, with part-time options available. It combines theoretical learning with hands-on practical applications.
Core Modules: The program includes essential modules such as Network Security, Cybersecurity Management, and Digital Forensics. These modules provide a solid foundation in IT security principles.
Cybersecurity Principles: Students delve into cybersecurity principles, learning about encryption, authentication, intrusion detection, and other key concepts.
Cyber Threats and Attacks: The program covers a wide range of cyber threats and attack vectors, including malware, phishing, and denial of service (DoS) attacks.
Security Policies and Compliance: Students gain expertise in developing security policies, ensuring compliance with regulations and standards, and conducting security audits.
Digital Forensics: The program includes modules on digital forensics, teaching students how to investigate and analyze cyber incidents.
Penetration Testing: Students may have the opportunity to engage in penetration testing and ethical hacking exercises, identifying vulnerabilities in systems and networks.
Practical Labs: Some programs offer practical lab sessions where students can simulate real-world cyber threats and develop countermeasures.
Dissertation: The program often culminates in a dissertation or a major project, allowing students to conduct original research or address specific cybersecurity challenges.
Preston Campus
IELTS 6.5
£ 14500
Postgraduate Entry Requirement:
Students must provide:
Work experience: Some postgraduate courses may require relevant work experience in the field.
It is important to note that meeting the minimum entry requirements does not guarantee admission, as the university considers factors such as availability of places and competition for the program. Additionally, some courses may have higher entry requirements or additional selection criteria, such as interviews or portfolio submissions.
Scholarships for International Students at the University of Central Lancashire (UCLan):
It is important to note that the availability, eligibility criteria, and application deadlines for scholarships may vary each year.
Graduates of the MSc IT Security program from the University of Central Lancashire are well-prepared for specialized roles in the field of information technology security.
Cybersecurity Analyst: Graduates can work as cybersecurity analysts, monitoring and responding to security incidents, conducting threat assessments, and implementing security measures.
Security Consultant: Many alumni pursue careers as security consultants, advising organizations on security strategies, risk assessments, and compliance with regulations.
Security Administrator: Graduates may become security administrators, responsible for configuring and maintaining security systems, firewalls, and intrusion detection systems.
Digital Forensic Analyst: Some students opt for roles as digital forensic analysts, specializing in investigating cybercrimes, data breaches, and incident response.
Penetration Tester: Alumni with a passion for ethical hacking may work as penetration testers, identifying vulnerabilities in systems and conducting security assessments.
Security Manager: Graduates can explore careers as security managers, overseeing security teams, developing security policies, and managing compliance efforts.
Security Architect: Some alumni focus on security architecture, designing secure IT systems, networks, and applications for organizations.
Cybersecurity Researcher: Graduates with research interests may pursue careers in cybersecurity research, contributing to advancements in the field.