About this course
LJMU's Cyber Security MSc enables students with computing and related experience to further their studies in this challenging and much in-demand sector.
- Study a course based on the latest research and informed by industry liaison
- Follow a curriculum aligned with the Government's professional practitioner benchmark for Cyber Security Masters-level study
- Enhance your scientific, engineering and technical skills
- Gain the knowledge and practical skills required for a career in Cyber Security
- Benefit from the support of a personal tutor throughout your studies
Computer Security focuses on protecting computers, computer networks - such as public and private networks, critical infrastructure, smartphones, smart objects, software and digital information from unauthorised access, change or destruction.
This MSc is based on the latest research in the field. The programme and its modules are the result of extensive communications with industry and government, and the School maintains a regular industrial liaison panel. It is designed to equip you with advanced skills in the theory, practice, tools and applications necessary for a career in Cyber Security.
We are proud of our high teaching standards and the approachability of our staff. Informal staff-student relationships are excellent. If you decide to study with us, you will be joining a relaxed and friendly department where staff are committed not only to student welfare but also to ensuring that our courses are continually developed to meet the needs of employers.
Impressed by the amount of one-to-one teaching
Cyber Security Masters student Sandra Ise progressed to postgraduate study from her undergraduate degree in ICT at the University of Bradford.
I wanted to improve my chances of getting a job...
It's good to challenge yourself
With an undergraduate degree in Computer Science and five years' work experience under her belt, Irene Bundi moved from Kenya to study for a Masters in Cyber Security at LJMU.
I have always ...
Fees and funding
There are many ways to fund postgraduate study for home and international students
The fees quoted at the top of this page cover registration, tuition, supervision, assessment and examinations as well as:
- library membership with access to printed, multimedia and digital resources
- access to programme-appropriate software
- library and student IT support
- free on-campus wifi via eduroam
Although not all of the following are compulsory/relevant, you should keep in mind the costs of:
- accommodation and living expenditure
- books (should you wish to have your own copies)
- printing, photocopying and stationery
- PC/laptop (should you prefer to purchase your own for independent study and online learning activities)
- mobile phone/tablet (to access online services)
- field trips (travel and activity costs)
- placements (travel expenses and living costs)
- student visas (international students only)
- study abroad opportunities (travel costs, accommodation, visas and immunisations)
- academic conferences (travel costs)
- professional-body membership
- graduation (gown hire etc)
There are many ways to fund postgraduate study for home and international students. From loans to International Scholarships and subject-specific funding, you’ll find all of the information you need on our specialist postgraduate funding pages.
Please be aware that the UK’s departure from the EU may affect your tuition fees. Learn more about your fee status and which tuition fees are relevant to you.
Further your career prospects
LJMU has an excellent employability record with 96% (HESA 2018) of our postgraduates in work or further study six months after graduation. Our applied learning techniques and strong industry connections ensure our students are fully prepared for the workplace on graduation and understand how to apply their knowledge in a real world context.
With an MSc in Cyber Security your skills are highly sought after by companies employing ethical hackers, secure software developers, computer security consultants, network or system administrators and data analysts. You could find yourself working in one of a wide variety of fields including data mining, security applications development, the police, intelligence, security or computer forensics initiatives, network security management or education.
Discover the building blocks of your programme
This course is currently undergoing its scheduled programme review, which may impact the advertised modules. Programme review is a standard part of the University’s approach to quality assurance and enhancement, enabling us to ensure that our courses remain up to date and maintain their high standard and relevancy.
Once the review is completed, this course website page will be updated to reflect any approved changes to the advertised course. These approved changes will also be communicated to those who apply for the course to ensure they wish to proceed with their application.
Your programme is made up of a number of core modules which are part of the course framework. Some programmes also have optional modules that can be selected to enhance your learning in certain areas and many feature a dissertation, extended report or research project to demonstrate your advanced learning.
The aim of this module is to develop your knowledge of effective and academic research design at Masters level and provide guidance on the purpose and design of literature reviews; the use of theory; writing strategies; citation and ethical considerations. It provides an understanding of how the range of qualitative, quantitative and mixed method data approaches can be most appropriately applied. It provides the knowledge and research skills you need to:
- establish the most effectual research design and method for the dissertation project and write a successful research proposal
- prepare for the project module and for a possible future research career
The purpose of the module is to provide the fundamental technical concepts and research issues essential for computer security. This module develops the understanding of threats to and the security requirements of computer systems, as well as tools and techniques to enforce security. It aims to:
- develop the knowledge of various security threats and vulnerabilities in computer systems as well as the importance of Computer Security
- critically assess a variety of generic security technologies for the protection of computer systems
- promote the use of appropriate methodologies and tools in the analysis, design, implementation and management of secure systems
- examine current research issues in Computer Security
The growth of the Internet means that it is more important than ever to be aware of security threats to computer networks. This module explores security vulnerabilities and threats, emphasising the importance of network security. It looks at security issues and solutions to network protection, critically assessing security technologies and promoting the use of security techniques.
This module aims to develop your ability to plan, execute and report in-depth on a major investigation.
Information Security Management
This module will develop an appreciation of information security problems and develop skills relating to risk assessment and control analysis. You will develop an appreciation of using standards such as ISO-27001. You will gain experience in engaging in debates around legal, ethical and professional issues relating to information security.
This module will help you to gain a significant understanding of various security vulnerabilities and cyber threats to computer systems/applications as well as the importance of cyber security. This will help you to assess critically a variety of ethical hacking tools and penetration testing techniques for the protection and evaluation of computer systems and applications.
The module will promote the use of appropriate ethical security techniques to solve cyber security problems. This will help you to understand practices of network forensics and intrusion analysis to aid cyber threat intelligence gathering. In doing so, you will develop independent research skills in threat intelligence to detect, respond to, and defeat focused and targeted threats.
This module intends to familiarise you with common system security techniques, tools and methods that can be utilised during the design, deployment and maintenance of systems. This will help you to develop new advanced security skills and to combine your existing and new skills in a practical context.
An insight into teaching on your course
This Masters is completed full-time in one year. You will attend university for teaching on Monday and Tuesday, Wednesday and Friday mornings and Thursday afternoons.
The course offers a range of approaches to learning, with peer and tutor feedback greatly encouraged. Workshop activities and tutor support facilitate formative feedback to enable you to work on your weaknesses and build on your strengths.
How learning is monitored on your programme
To cater for the wide-ranging content of our courses and the varied learning preferences of our students, we offer a range of assessment methods on each programme.
Assessment of knowledge and understanding on this programme is through coursework and examinations. You will undertake laboratory and project work, write reports and present your findings.
Our staff are committed to the highest standards of teaching and learning
Dr Rubem Pereira
Dr Rubem Pereira
Before joining the LJMU team, Rubem completed his PhD in Computer Network Performance Modelling in 1997. In the same year he started working at LJMU. He has been a reader in Multimedia Networks and became programme leader for MSc programmes in Computing in 2003. He has also participated in many externally funded projects, supervised PhD students and organised national and international workshops and conferences. Rubem's special areas of interest include: network technologies, distributed systems, video encoding and streaming, the future of Internet, modelling and performance analysis and evaluation of computer systems.
I really enjoy the stimulating environment associated with learning and teaching at the cutting edge of computing and ICT technology.
What you can expect from your School
Studying at the Byrom Street site in the City Campus, which has recently enjoyed a 6 million investment, you will have access to state-of-the-art laboratories and teaching facilities. We have over 150 high performance computers including PC/ Linux Workstations and Networked Multimedia PCs for general use, in addition to the campus computing cluster. Youll also have access to an exclusive Game Technology Lab, a Computer Forensics Lab, two Multimedia Labs, a Distance Learning Lab and specialist labs for research on network security and networked appliances.
You will need:
an honours degree in Computing or a Computing-related subject, including subjects with a significant core of computing
Alternative qualifications considered
a professional qualification equivalent to an honours degree
- IELTS English language requirement: 6.0 (minimum 5.5 in each component)
- Extra Requirements
- RPL is accepted on this programme
Application and selection
Securing your place at LJMU
To apply for this programme, you are required to complete an LJMU online application form. You will need to provide details of previous qualifications and a personal statement outlining why you wish to study this programme.
Applications are considered by the programme leader and at least two course tutors. They are assessed on your application form and references.
You will need to:
- demonstrate sufficient knowledge to embark on the programme
- display the potential to develop high level research skills
- demonstrate the ability and commitment to work at postgraduate level
The University reserves the right to withdraw or make alterations to a course and facilities if necessary; this may be because such changes are deemed to be beneficial to students, are minor in nature and unlikely to impact negatively upon students or become necessary due to circumstances beyond the control of the University. Where this does happen, the University operates a policy of consultation, advice and support to all enrolled students affected by the proposed change to their course or module.