MSc Computer Security

Speak without obligation to University of Essex, Colchester Campus

To contact you must accept the privacy policy

Image gallery

Comments about MSc Computer Security - At the institution - Colchester - Essex

  • Objectives
    To provide postgraduate training in the security of computer networks and information systems and to produce engineers with an understanding of the principles and practice of computer systems and networks, their security weaknesses, and the ways in which they can be made more secure. To prepare students for careers in advanced research and/or industry by extending their knowledge and skills in a specialised area of computer and network security. To enable students to contribute to future developments in their field by providing them with an understanding of recent advances and current research activity. To develop students' ability to make a critical evaluation of the theories, techniques and systems used in their chosen area of specialisation. To develop research and problem-solving techniques in their chosen area of specialisation. To develop students' ability to undertake research through practical project experience.
  • Entry requirements
    Entry Qualifications Normally 2(i) BEng degree, or equivalent qualification, in Computer Science, Electronics, Physics or a related field. Applicants with a good 2(ii) supported by strong recommendation and/or previous work experience are also considered. Overseas students' English requirement: IELTS of 6 or TOEFL of 220 or 560.
  • Academic title
    MSc Computer Security
  • Course description

    Course Description
    This course explores security issues in the modern, networked environment in which we live and work. Modules give in-depth knowledge of the issues involved in securing computer systems, both stand-alone and networked, looking at the types of attack, how one hardens systems, detects intruders, and so on. Topics such as cryptography, secure communication and virtual private networks are all explored. A background in computer science, electronic engineering or a related discipline is appropriate; graduates with these skills are typically employed as computer security specialists in large financial institutions.

    Modules and Options

    The lists of modules below represent the range of options available for each year of study. This may not be a complete list of the options you will study, and may be subject to change, so please contact the department for further details.

    Stage 1

        ADVANCED IP BASED SERVICES
        Compulsory: COMPUTER SECURITY
        Compulsory: INTRODUCTION TO JAVA
        Compulsory: NETWORK CONCEPTS
        Compulsory: NETWORKING PRACTICE
        Compulsory: NETWORKS LABORATORY
        Compulsory: PROFESSIONAL PRACTICE AND RESEARCH METHODOLOGY
        Core: MSC PROJECT/DISSERTATION
        CRYPTOGRAPHY AND CODES
        MOBILE COMMUNICATIONS
        NETWORK SECURITY
        NETWORKED AUDIO AND VIDEO
        PERVASIVE COMPUTING AND AMBIENT INTELLIGENCE

    Teaching and Assessment Methods

    A: Knowledge and Understanding
        Learning Outcomes
        A1 : The principles that underlie computer networks and the design and implementation of modern networks.
        A2 : Practical issues concerning computer networks, including planning, configuration, monitoring and security.
        A3 : The fundamentals of the gamut of possible security problems and detailed knowledge of the most important ones.
        A4 : The protection of at least one networked computer system against security breaches.
        A5 : Advanced topics in selected areas of modern computer and network security.
        A6 : A selected current research area, including practical experience in it.

        Teaching Methods
        A1 and A3 are developed through lectures and coursework.

        A2 is developed through lectures and network laboratory experiments.

        A4 is developed through lectures and software laboratory experiments.

        A5 is developed mainly through lectures that involve, in some cases, industrial lecturers who emphasise current industrial practices, and project.

        A6 is developed principally through a research project.

        Assessment Methods
        A1-A4 are examined through coursework, tests, and examinations.

        A5 is assessed through examinations, one module through exam and course work, and project.

        A6 is assessed by means of a written report and oral defence.

    B: Intellectual/Cognitive Skills
        Learning Outcomes
        B1 : Integrate knowledge and information in order to explain and evaluate the security weaknesses of networks of computers.
        B2 : Use data and knowledge in order to improve the security of a modern computer network.
        B3 : Assimilate and link information presented in different courses.
        B4 : Plan and conduct an independent research project under the guidance of a supervisor.

        Teaching Methods
        B1 and B2 are developed principally through lectures, problem classes, seminars and practical work.

        B3 is mostly developed through problem classes, research project, course work and practicals.

        B4 is developed through research project guided by the Supervisor.

        Assessment Methods
        B1 and B2 are assessed through written examinations and oral assessment in the networks laboratory.

        B3 and B4 are assessed principally through reports on practical work, including the project report.

    C: Practical Skills
        Learning Outcomes
        C1 : Developing and/or install computer programs that implement network security policies.
        C2 : Making effective use of software packages for the handling, analysis and presentation of security-related data.
        C3 : Writing and reporting complex technical concepts concerned with security in a readable and balanced way.
        C4 : Demonstrate inter-personal skills and participate actively in teamwork.
        C5 : Show self-motivation, self-discipline and initiative.

        Teaching Methods
        C1 are developed in lectures and practicals in the networks and software laboratories.

        C2 - C5 are developed in the laboratories and in project work.

        Assessment Methods
        C1 and C2 are assessed in reports on laboratory experiments.

        C3 is assessed principally in the project report and to a lesser extent in reports on experiments.

        C4 and C5 are assessed through oral examination of selected practicals and the project oral.

    D: Key Skills
        Learning Outcomes
        D1 : To report effectively, both written and oral, in structured fashion on independent and group work.
        D2 : To use current computer systems for communication, data acquisition, data management, and data analysis.
        D3 : To analyse technical problems involving numerical values.
        D4 : To learn top-down/bottom-up approach and systematically explore, combine, deduce techniques for solving complex problems.
        D5 : To work as part of a group to set-up experiments and do measurement, and analyse the associated results.
        D6 : To evaluate background knowledge, assess learning pace, plan work with realistic targets.

        Teaching Methods
        D1, D2 are developed through coursework and project work and project reports.

        D3 and D4 are developed through problem classes, project work and course work.

        D5 is developed through practicals.

        D6 is developed through project work, practicals and course work.

        Assessment Methods
        D1 is assessed through oral and written project report and laboratory report.

        D2 is assessed through project work, laboratory work and course work.

        D3 is assessed mainly through the examination.

        D4 is assessed through the examination, project work and course work.

        D5 is assessed through the laboratory work.

        D6 is assessed through project.

Other programs related to information quality and security

This site uses cookies.
If you continue navigating, the use of cookies is deemed to be accepted.
See more  |