MSc Cyber Security
Offered By: Coventry University via FutureLearn
Course Description
Overview
As cyber security threats become more sophisticated, we require a deeper understanding of the challenges they bring. With security professionals in demand in government and industry, this degree is designed to equip you with the skills needed to identify and respond to those threats.
It aims to give you the knowledge and skills needed to work at a professional level. You’ll have the opportunity to develop industry-focused knowledge and skills in key areas of network and system security, ethical hacking, secure design, cryptography and risk assessment.
Syllabus
A student who successfully completes the degree will have achieved the following learning outcomes:
-
Demonstrated a critical awareness of the legal frameworks, ethical and professional issues of cyber security
-
Performed systematic risk assessment, identification and analysis in accordance with international standards and demonstrated an ability to deal with complex issues
-
Demonstrated a comprehensive understanding of network and information systems secure communication technologies and protocols and their application to contemporary Internet-based solutions and technologies
-
Evaluated and justified a suitable methodology and tools for vulnerability assessment of systems and organisations
-
Conducted and reported on an ethically-based security audit and test to a professional standard, recommending and specifying suitable countermeasures
-
Demonstrated a thorough understanding of the theoretical concepts and implementation of current security frameworks and architectures, as well as cryptographic protocols and algorithms
-
Be able to assess systems’ security requirements and apply secure design methodology and formal methods in systems design, implementation and testing
-
Applied appropriate technological solutions and processes in the detection, management and investigation of information security incidents, and documented a digital investigation from a legal and professional standpoint
-
Demonstrated a critical awareness of current issues and new technologies in cyber security which are informed by leading edge research and/or practice in the field
-
Extrapolated from existing research, scholarship and/or fieldwork findings to identify new or revised approaches to practice
-
Conducted rigorous research/formal inquiry into cyber security issues that require familiarity with a range of technologies, research sources and appropriate methodologies, and for such to inform the overall learning process
Courses
-
Investigate the security of encrypted data
Is it possible to prove the security of encrypted data? Will every algorithm fail given sufficient time or computing power?
On this course you will get an introduction to cryptography and cryptanalysis. From ancient examples of secret messages and the spies that cracked them to modern cryptographic applications, you will have the opportunity to explore the foundations of data security.
During the course you will also get an opportunity to try encrypting data yourself by completing a cryptography and cryptanalysis challenge.
The Institute of Coding supported the development of this course in response to consultation with industry representatives from the healthcare, manufacturing and automotive sectors.
This course is for people who want to understand more about the way cryptography keeps our communications safe, either out of curiosity or to prepare for advanced study of the topic.
Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.
-
Understand the threats posed to organisations’ networks and how to secure them
On this course you will examine the theory and practice of network fundamentals from the defender’s and attacker’s perspectives. You will have the opportunity to use tools for networking that allow you to query services, test routing and more.
At the end of the course, you will have the opportunity to challenge yourself to a network security boot camp – can you work with a virtual networked device to make it secure?
The Institute of Coding supported the development of this course in response to consultation with industry representatives from the healthcare, manufacturing and automotive sectors.
This course is designed for people familiar with basic computing who want to learn about the techniques and technologies of network security.
Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.
In order to complete the labs you will need a PC capable of running Virtual Machines (VMs). We recommend at least a dual core CPU and 8GB of memory. You would also need about 100GB of hard disk space to store the VMs.
In order to run the virtual machines you will need to download and install VMware Workstation Player (if you are running on Windows or Linux). It is free for non-commercial/educational use and you can get it from the VMware website. If you are running a Mac you will need VMware Fusion.
You will also use Linux. If you are not already familiar with the Linux environment and its command line, there are plenty of online resources and tutorials to get you started. We would recommend that you look into some of these before starting the modules. You need to be familiar with the core linux commands, input/output redirecting and piping, file manipulation, basic network configuration and user account management.
-
Explore the principles and methods of ethical hacking
What is ethical hacking? How does it work? What principles do ethical hackers follow? Answer these questions and more with the course introducing ethical hacking. You will have the opportunity to learn the principles of ethical hacking and consider its legal and methodological foundations.
You’ll also explore the processes and legal framework of penetration testing and take part in a simple exploitation exercise in the first of a series of carefully-constructed scenarios designed to develop your ethical hacking skills.
This course is for professionals and students who already have some knowledge of computer science – or a related discipline – and want to understand more about ethical hacking principles, practices and legislation.
This course is the first in the Ethical Hacking program, part of the MSc Cyber Security.
-
Learn how to safeguard your software systems and help prevent cyber crime
Cyber attacks can pose a major threat to any digital business. Addressing the need for system security during the software development life cycle should be a top priority for any organisation.
During this course, you will discover the importance of secure system design and how a security-first mindset can improve the software development process. You will also discuss the legal and ethical implications of the software development process.
This course is for people who want to increase their understanding of the security practices and legislation involved in the software development life cycle.
-
Discover the techniques used by businesses to protect their cyber security
How do businesses handle cyber attacks? What value does a security operations centre give to an organisation? Discover the answers to these questions on this course.
You will have the opportunity to gain a deeper understanding of the processes of a SOC and how it’s operated by staff. You will also consider how it fits in within the rest of the business.
This course is for anyone looking to learn more about cyber security incidents and how they’re addressed by modern organisations.
Please note that the staff described in the ‘Who will you learn with?’ section below may be subject to change.
In order to complete the practical laboratory exercises that take place in this course and across the rest of the program, you’ll need to download and configure the Virtual Machines (VMs) from our repository. In order to complete the virtual labs you will need a PC capable of running Virtual Machines (VMs).
We recommend at least a dual-core CPU with Intel’s vt-x or AMD-V enabled (sometimes these features require a BIOS setting to activate in same laptops). You will also need a minimum of 8GB of memory and about 60GB of free hard disk space to store the VMs.
-
Discover how the internet is changing the nature of everyday things
What is the Internet of Things (IoT)? Simply put, it’s the concept that everyday objects can connect to each other and transfer data using the internet. It’s said that by 2025, the internet will connect over 75 billion IoT devices.
On this course, you will be introduced to the fundamentals of IoT and the rise of industrial and home automation. You will focus on the possible security risks and legal implications of IoT applications.
You will examine the use of IoT devices, the models and methods of their function, and the legal and ethical aspects of their use.
This course is for anyone that works in or is interested in the home and workplace environments that are impacted by IoT. It would also suit people looking to develop smart, connected devices.
-
Is it possible to proactively protect vehicles against cyber attacks?
On this course, you will have the opportunity to develop your awareness of the key theoretical concepts that underpin automotive cyber security.
You will explore how the levels of automation in vehicles has changed over time, and how this has made vehicles more vulnerable.
Using real-world case studies, you will explore different types of cyber attacks, from physical to remote. You will also have the opportunity to assess security flaws and threats in vehicles.
This short course is for anyone interested in cybersecurity in the automotive context.
Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.
Tags
Related Courses
Network Security(ISC)² via Coursera À la découverte des télécommunications
Institut Mines-Télécom via France Université Numerique Network Routing Fundamentals
A Cloud Guru Secure Sockets Layer (SSL) Fundamentals
A Cloud Guru Advanced System Security Design
University of Colorado System via Coursera