Sie sind auf Seite 1von 3

master of Science

in COMPUTER SECURITY

MSc in Computer Security

The MSc in Computer Security You should emerge with the technical C Dissertation
provides a comprehensive and commercial expertise that will Students refine their dissertation topic
approach to this growing field. be increasingly in demand in today’s in conjunction with their Personal
Using a detailed, interdisciplinary information-dependent world. Your Dissertation Advisor, an academic
approach, it examines the global advanced, specialist qualification should supervisor who will provide support
threats to electronically stored and provide the foundation for a senior throughout the study and writing process.
transmitted information, and the career as a computer security expert
countermeasures that can be used in a dynamic global organisation. Programme duration
against them. The programme takes, on average, 30
Programme structure months to complete. However, since
Programme outline The programme comprises eight modules students progress at their own pace,
Our MSc in Computer Security equips (six required modules plus two electives you may choose to complete your studies
you with the depth of knowledge and chosen from six options), culminating in a in as little as 18 months or spread them
range of skills required to handle the dissertation. over the six-year maximum.
challenges of this fast-expanding
area. It encompasses a wide variety of The first module lasts nine weeks and
technologies and disciplines, including incorporates a week-long introduction
cryptography, forensics, network design to both the programme and our online
and programming the internet, along with learning platform. Each of the other
an examination of commercial and legal modules are eight weeks long.
considerations that influence security
policy. Personalised study
Students can customise their degree
Our international virtual classroom according to their individual requirements.
provides an ideal perspective from which
to consider the global nature of security A Core modules
and confidentiality issues, offering a • Computer structures
unique insight into threats and solutions • Professional issues in computing
across the world. • Computer communications and
networks
Core modules cover computer structures, • Security engineering
professional issues, communication and • Computer forensics
networks, security engineering, computer • Programming the internet
forensics and programming the internet.
You can then personalise your degree B Elective modules
with two elective modules chosen from • Databases
database analysis, software engineering, • Software engineering
QA and testing, operating systems, Java • Management of QA and software
programming, XML applications and testing
e-commerce. You complete your degree • Object-oriented programming in Java
with an original dissertation. • Web XML applications
• E-commerce
master of SCIENCE computer security

MSc Modules

Core modules: Security engineering Elective modules:


Aim: To provide a grounding in the
Computer structures principles and practice of building Databases
secure distributed systems.
Aim: To provide a comprehensive Aim: To equip you with a thorough
overview of core software and This module provides a foundation in the understanding of the fundamental
hardware technologies. principles and practice of building secure principles of database construction.
distributed systems. You will discover
This module covers everything from As already dominant database
how to protect systems against malicious
computer architecture to databases, technology develops even further,
attacks, using your understanding
algorithms, languages, operating you will analyse how data is stored,
of technologies such as cryptology,
systems, communications, computer manipulated, queried (with an emphasis
software reliability, secure message
networks, artificial intelligence and the on relational databases) and backed up.
transmission, tamper resistance, secure
theoretical foundations of computation. You will also become acquainted with
printing and auditing.
It will give you a sound theoretical and various paradigms and technologies
practical grounding on which to build (parallel as well as distributed) related to
Computer forensics
your understanding of future technical database design, implementation and
developments. Aim: To provide an extensive range of maintenance.
forensic techniques to determine the
Professional issues in computing root causes of breaches in computer Software engineering
security.
Aim: To provide a broad Aim: To provide a firm theoretical
understanding of the social and As concern grows over identity theft and foundation and practical skills in
legal context in which information information security, this module explains software engineering.
technology operates. how to identify, extract, document,
This module encompasses the
interpret and preserve computer media
This module examines the relationship theoretical foundation and practice of the
as digital evidence and how to analyse
between IT, society and the law. three key phases of problem definition,
the root cause of security breaches. It will
It helps develop an understanding of software development and maintenance.
give you an understanding of electronic
external matters affecting computer It covers identification, definition, design,
media, crypto-literacy, data hiding,
systems and organisations, provides analysis, verification and management
hostile code, and Windows™ and/
an overview of professional and ethical of basic requirements, coding, testing,
or UNIX system forensics in the digital
issues and develops the skills required evaluation and quality assurance. You will
environment.
to manage systems in a way that is emerge equipped to lead a programming
both effective and sensitive to their project and deliver products on time and
Programming the internet
operating environment. within budget.
Aim: To give you the theoretical and
practical tools necessary for building Management of QA and
Computer communications
advanced, content-rich internet sites. software testing
and networks
This module covers markup languages Aim: To provide an extensive
Aim: To familiarise you with the
and advanced technologies, including understanding of how to guarantee
principles and techniques of
HTML, JavaScript, DHTML, CSS, XML software quality, including testing,
computer networks.
and CGI. On completion, you will be maintenance and effective
As the development of computer able to design and create an advanced management.
communications accelerates with the website and will be equipped to
exponential growth of the internet, this This module provides the techniques
undertake complex internet projects.
module examines a growing range of you need to design and implement tests,
hardware technology protocols and conduct inspections and employ release
network applications. You will learn the and maintenance procedures. It also
principles of communication networks addresses key management aspects
and protocol architectures, assessing of the quality assurance process.
the suitability of different switching and
multiplexing techniques for carrying
a variety of distributed systems.
master of SCIENCE computer security
Laureate Online Education B.V
The e-learning partner of
the University of Liverpool
Telephone: +31 (0)20 713 0000
Admissions:
admission@ohecampus.com

Visit us and enrol today at


www.uol.ohecampus.com

Object-oriented programming Dissertation


in Java Aim: To undertake a piece of original
Aim: To provide a theoretical and research to demonstrate your
practical understanding of object- mastery and integration of knowledge
oriented programming and design you have acquired during the
using Java. programme.
This module develops the essential You choose your dissertation topic in
problem-solving and programming conjunction with your personal dissertation
skills you need to write well structured advisor, an academic supervisor, who will
object-oriented programs in Java. provide support throughout the study and
On the way you will explore many other writing process. Your dissertation will apply
important techniques (such as modern your new knowledge and work experience
distributed systems and component and must have merit beyond the narrower
technology) based on the concepts that scope of your particular need.
have made object-oriented programming
today’s predominant software
development method.

Web XML applications


Aim: To offer an overview of the uses
of the XML language and its role in
the next generation of e-business
applications.
This module provides an understanding
of core XML technologies, the
standardised development environment
they provide and their implications
on future developments with internet
applications. You will study XSL,
databases and the information discovery
and exchange standards, SOAP, WDSL,
UDDI, and the use of XML for structuring
data on the semantic web.

E-commerce
Aim: To provide an overview of key
e-commerce issues.
This is an introduction to the
fundamentals of e-commerce, from
business models through technical
infrastructure and implementation to
social, legal and ethical considerations.
You will act as a CIO/CEO working
on an e-commerce business proposal,
with evaluations from a peer review
group. Learning to build an e-business
holistically in a risk-free environment will
help you become a more effective and
successful manager.

Das könnte Ihnen auch gefallen