Course Content
The degree programme is comprised of 7 compulsory modules and a Dissertation project to develop your specific interests and expertise. All taught modules are 20 credits, unless specified.
Information security - Risks, Threat and Attacks (20 Credits)
This module provides an insight into the implementation of data security in computer systems and aims to encourage students to appreciate the practical and theoretical management principles associated with information security.
Human Centred Security (20 credits)
This module provides an insight into usable security, social & behavioural factors impacting security, security culture and awareness, as well as the impact of security controls on user behaviours.
Forensics (20 credits)
This module explores computer forensics with specific focus on definitions, conceptual models, operating system and artifact analysis, main memory, application and cloud forensics.
Secure systems and software (20 credits)
This module provides detailed insights into privacy and security of systems & software, and approaches for designing secure systems & software using traditional and emerging secure SDLCs.
Network Security (20 credits)
This module explores Internet architecture, network protocols and vulnerabilities, network defence tools, wireless LAN, security, and Advanced network security topics including SDN, IoT.
Applied Cryptography (20 credits)
This module covers in-depth topics such applied cryptographic schemes, symmetric and asymmetric cryptography, cryptographic security models, and standard and advanced protocols.
Research Methods for Technology Dissertations (20 credits)
The aim of this module is to equip the student with the skills, knowledge and techniques necessary to produce a dissertation with a research or technical focus. The module will be assessed through a written research proposal which can then be used as the basis for the dissertation.
Cyber security dissertation (40 credits)
The aim of the technology project is for the student to apply knowledge, skills and techniques developed during directed and independent study to solve a real-world computer security related project. The computer security project may take the form of an in-depth research project or the development of a computer security system. In either case, the module enables the student to advance their knowledge and understanding of real world development projects and research through independent learning and critical evaluation.
To obtain an MSc degree, you must follow and successfully complete a total of 180 credits. PgC (60 credits) and PgD (120 credits) may be awarded as standalone or exit awards.
Learning & Teaching
A range of teaching methods are used in the new Cardiff School of Technologies, including lectures, practical workshops, tutorials, seminars and real-world case studies, all supported by online learning via Moodle. With a student-centred approach, the School operates an open door policy to staff and all students will be assigned a personal tutor.
Staff
The course is led by a team of specialist cyber security staff who are also active researchers in the domain.
Lectures
Lectures are a major part of the teaching strategy for the programme. Lectures are an effective way of delivering core material and establishing a framework for a module against which other material can be set.
Modular Subject Tutorials
Tutorials are meetings of a student or group of students with a lecturer or lecturers and are used in two ways within the programme:
- expanding upon material covered in lectures through an enquiry-driven problem solving approach
- remedial work to overcome any deficiencies in a student’s background knowledge.
Seminars
Seminars involve a student or students presenting previously prepared work to peers and a lecturer. This strategy is used to extend specific theoretical or practical concepts as well as introducing problem solving exercises. Seminars are used in most modules and provide students with valuable experience in presentational skills as well as providing staff with a method of assessing student-centred learning.
Practical Workshops
In these classes students are able to practise and refine their skills in a supportive environment where they can receive feedback from a member of academic staff. Practical workshops represent a valuable transition between theory and the workplace.
Case Studies
Case studies are a teaching and learning strategy, employed in a range of modules; they also are a useful assessment tool. Students are presented with or asked to develop real or simulated complex problems which they are required to analyse in detail and then synthesise/present their own solution in writing or orally.
Moodle
The majority of modules will be supported by Moodle and provide students with a wide range of learning material and study guidance.
Assessment
The assessment strategy for the programme varies to ensure the most appropriate method for each specific module and subject area. Assessments take the form of individual or group coursework, research-based assignments, practical assessments, presentations, reports, class tests and a dissertation.
Detailed, specific and timely feedback will be given to each students work according to the Cardiff Met guidelines.
Employability & Careers
The specialist knowledge you will acquire through the course will place you in a strong position to pursue a wide range of careers involving the analysis of risk, including computer incident analyst, cyber security analyst, information security consultant and managerial roles in industry. The programme also gives you a range of computing skills that could be widely applied to any role within the fields of data science and computing.
You will be able to start careers in more technical roles such as ethical hacker or security incident handler, as well as management roles such as risk assessor, information security policy developer, data protection officer and compliance officer.
Students who are interested in further education can join research degrees such as MPhil/PhD/ProfDoc within the vibrant Cardiff Met research community.
Entry Requirements
Applicants should meet one of the following:
- Possess, or expect to obtain, an undergraduate degree or equivalent, in a relevant area with a minimum of a 2:2 classification;
- Hold a suitable professional qualification from an appropriate professional body.
International Applicants
Students whose first language is not English will need to provide evidence of fluency to at least an IELTS 6.5 standard or equivalent. For full details about how to apply and English Language qualifications please visit the
International pages on the website.
If you are interested in using credit from another institution, or have obtained qualifications and/or experience to study for a course at Cardiff Met, you can find further information on this as well as information on how to apply on the
RPL page.
Additional Information
Selection Procedure:
Selection for this course is through an application form and where necessary an interview.
How to Apply:
Applications for this course should be made direct to the university via our self-service facility. For further information please visit our How to Apply pages at www.cardiffmet.ac.uk/howtoapply.
Tuition Fees and Financial Support:
For up to date information on tuition fees and the financial support that may be available. Please refer to www.cardiffmet.ac.uk/fees.
Part-time fees:
Charges are per Single Module unless specified:
Undergraduate = 10 Credits; Postgraduate = 20 Credits
Generally we find most students will complete 60 credits per year for both Undergraduate and Postgraduate study; to obtain a true costing please clarify this by contacting the Programme Director directly.
Contact Us