MSc Cyber Security

Plymouth

 

INTAKE: Jan & Sept

Program Overview

The MSc Cyber Security program at the University of Plymouth covers a wide range of topics related to cybersecurity. 

  1. Cyber Threats and Attacks: Students learn about different types of cyber threats, including malware, social engineering, and network attacks. They study the techniques used by cybercriminals and develop an understanding of their motivations and strategies.

  2. Network Security: The program focuses on securing computer networks and systems against cyber threats. Students learn about network protocols, firewalls, intrusion detection systems, and other security measures. They gain practical skills in configuring and monitoring network security tools.

  3. Digital Forensics: Students explore the field of digital forensics, which involves investigating cybercrimes and collecting evidence from digital devices. They learn techniques for data recovery, analysis, and preservation, as well as legal and ethical considerations in digital investigations.

  4. Cryptography and Data Protection: The program covers the principles and algorithms of cryptography, which is essential for securing data and communications. Students learn about encryption, decryption, digital signatures, and secure communication protocols.

  5. Risk Management: Students develop skills in assessing and managing cybersecurity risks. They learn how to conduct risk assessments, identify vulnerabilities, and implement risk mitigation strategies. They also study relevant legal and regulatory frameworks related to cybersecurity.

  6. Cybersecurity Policies and Governance: The program explores the policies, standards, and best practices governing cybersecurity. Students learn about industry standards and frameworks, such as ISO 27001, and gain an understanding of the roles and responsibilities of cybersecurity professionals within organizations.

  7. Cybersecurity Incident Response: Students learn how to detect, respond to, and recover from cybersecurity incidents. They develop incident response plans and gain practical experience in handling security incidents and conducting post-incident analysis.

  8. Ethical Hacking and Penetration Testing: The program includes modules on ethical hacking and penetration testing, where students learn how to identify vulnerabilities in computer systems and networks. They gain hands-on experience in performing security assessments and implementing appropriate security controls.

Pollster Education

Location

Plymouth

Pollster Education

Score

IELTS 6.5

Pollster Education

Tuition Fee

£ 19800

Postgraduate Entry Requirements:

  • Applicants should have successfully completed a bachelor's degree or its equivalent from a recognized institution with a minimum overall score of 55% or equivalent.
  • English language proficiency is required, and applicants must provide evidence of their English language skills through an approved language test.
    • IELTS: A minimum overall score of 6.5 with no individual component below 6.0.
    • TOEFL: A minimum overall score of 76, with at least 17 in Listening, 18 in Reading, 20 in Speaking, and 18 in Writing.
    • PTE Academic: A minimum overall score of 59 with no individual score below 59.
  • Some postgraduate programs may have specific subject prerequisites or additional requirements.

Students must provide:

  • academic marksheets & transcripts
  • letters of recommendation
  • a personal statement - SOP
  • passport
  • other supporting documents as required by the university.

Work experience: Some postgraduate courses may require relevant work experience in the field.

It is important to note that meeting the minimum entry requirements does not guarantee admission, as the university considers factors such as availability of places and competition for the program. Additionally, some courses may have higher entry requirements or additional selection criteria, such as interviews or portfolio submissions.

The University of Plymouth offers various scholarships and financial support options to help students fund their studies. 

  1. Vice-Chancellor's Scholarships: These scholarships are awarded to high-achieving students who demonstrate exceptional academic excellence and potential. The scholarships provide a partial tuition fee waiver for the duration of the program.
  2. International Academic Excellence Scholarships: These scholarships are available for international students who have achieved outstanding academic results. The scholarships offer a partial tuition fee reduction for the first year of study.
  3. International Plymouth Global Scholarships: These scholarships are designed to attract high-caliber international students to the University of Plymouth. The scholarships provide a partial tuition fee reduction for the first year of study.
  4. Sport Scholarships: The university offers sport scholarships to talented athletes who have achieved a high level of sporting excellence. The scholarships provide support in the form of financial assistance, training, and access to sports facilities.
  5. Subject-Specific Scholarships: Some academic departments at the University of Plymouth offer subject-specific scholarships for students enrolled in particular programs or disciplines. These scholarships may be based on academic merit, research potential, or other criteria determined by the department.

Graduates of the MSc Cyber Security program from the University of Plymouth have excellent career prospects in the field of cybersecurity. 

  1. Cybersecurity Analyst: Graduates can work as cybersecurity analysts, responsible for monitoring and analyzing security incidents, conducting threat assessments, and implementing security measures to protect organizations from cyber threats.

  2. Security Consultant: Graduates can pursue careers as security consultants, providing expert advice and guidance to organizations on cybersecurity best practices, risk management, and compliance with regulatory requirements.

  3. Digital Forensics Investigator: Graduates can work in digital forensics, investigating cybercrimes, analyzing digital evidence, and assisting in legal proceedings. They may work in law enforcement agencies, private investigation firms, or cybersecurity consulting companies.

  4. Security Architect: Graduates can become security architects, involved in designing and implementing secure IT infrastructures and systems. They assess security risks, develop security policies, and recommend appropriate security solutions.

  5. Penetration Tester: Graduates with expertise in ethical hacking and penetration testing can work as penetration testers, responsible for identifying vulnerabilities in computer systems and networks through controlled testing.

  6. Security Manager: Graduates can pursue managerial roles in cybersecurity, overseeing the implementation of security policies, managing security operations teams, and ensuring compliance with industry standards and regulations.

  7. Cybersecurity Researcher: Graduates can contribute to the advancement of cybersecurity through research and development. They may work in research institutions, universities, or private companies, exploring innovative solutions to emerging cybersecurity challenges.


Similar Courses
WhatsApp Enquiry Call Enquiry