Smart Male IT Programer Working on Desktop Computer.

Course Summary

The Advanced Cybersecurity MSc is designed to equip you with a comprehensive understanding of cybersecurity, covering every major aspect of its existence and practice. You will develop advanced expertise in the complex concepts central to the field, with a focus on mastering cutting-edge tools and techniques.

Throughout the degree, you’ll dive deep into the theories that shape cybersecurity, gaining hands-on experience to hone your skills. By the end, you’ll be ready to join the highly skilled workforce, prepared to meet the growing demands of industry and government in the rapidly evolving cybersecurity landscape.

There is an option to choose a Project/Placement year for this course, at an additional cost.

 

Switch combined course content

Optional 2-year master's to suit your needs

Choosing a Professional Placement MSc is a win-win for your career, giving you the chance to get real experience, apply your cutting-edge skills in the workplace and stand out to future employers.

In the first year you will have help from the University to find a placement, whilst developing your expertise. You will then spend your second year out in industry on placement, getting the chance to work with industry professionals and grow your network of industry contacts. Bringing your university-acquired knowledge and insights to industry, you will get to make a difference to the workplace and make lasting links with your employer.

Students need to find and secure their own placement, supported by the University. A preparation module will also help you to get ready for your placement.

Please note, this programme is available as a one-year master degree programme, or as a Two-Year Master's Programme with a Professional Placement or Project. Please carefully consider your options when applying for our one year or Two-year routes as successful international applicants will not be able to change between programmes after a Confirmation of Acceptance of Studies (CAS) letter has been issued or after arriving in the UK.

What You'll Study

There is an emphasis on real-world practice and supporting theory, to develop towards an expertise in digital forensics, incident response, penetration testing, active defence, software exploitation and system protection methods, and cybersecurity in business.

Students studying on the 2 year full time course will not undertake the research project. They will undertake the Professional Placement or Professional Project pathway instead.

Modules

An essential skill for postgraduate students is the ability to investigate topics with the objective of identifying facts , theories, ideas, methodologies, etc., that could inform the development of new insight for further research.  A major aspect of this is critical analysis of information. The module aims to develop critical reasoning in students and an understanding of other researchers’ work.  Students will learn how to use current research literature and relevant sources to gain new insight for a new research.  They will learn how to support their research report with relevant facts, theories, ideas, etc.  They will develop their ability to understand approaches and methodologies adopted in existing research toward writing a literature review and handling full research projects in their subject area.

The learning content also includes:

  • Time management, library skills and literature search
  • Evaluation of information sources
  • Ethical issues in science, technology and engineering research (including intellectual property and plagiarism)
  • Writing for research: styles and rules for presentation (including referencing standards)
  • Choosing a research area and evaluating source material
  • Hypothesis formation
  • Design and application of questionnaires & interviews
  • Quantitative and statistical tools for researchers (e.g. R, Python, SPSS)

The main weakness in systems is often the software they run, including software on devices and networked systems. This module provides learning to students on how to understand, and practice the state-of-the-art technique for gaining entry, i.e. 'exploitation', of software across a variety of systems and platforms.  With this understanding, the student will in parallel study and understand various counter-measures employed in system software against these attacks, the limitations of both the attacks and counter-measures, and counter-counter-measures.  Understanding this cycle will give the student an appreciation of the exploitable vulnerabilities and the need for and way to architect and design a secure system.

Furthermore, the student will gain an understanding of and experience in a number of tools and techniques in order to perform vulnerability and penetration tests on new software.  The module content includes:

  • Software attack techniques, approaches, and methodologies.
  • Exposure to exploitation techniques, including for example, buffer overflow, stack overflow, heap attacks, and UAF (Use After Free), amongst others.
  • Attack methods including system, host, network, and web-based attacks.
  • Tools and techniques; use of existing tools and development of new tools.
  • Software Protection Methods and principles of secure software and system design.

This module provides an in-depth exploration of penetration testing, active defence, digital forensics, and incident response to provide a comprehensive approach to organizational security. Students will explore the methodologies attackers use to exploit systems and the tools and techniques which ethical hackers/penetration testers use to identify threats, the module also seeks to investigate and respond to security incidents. Emphasizing practical skills, this module covers penetration testing, active defence strategies, anti- and counter-forensics, malware analysis, and cyber threat intelligence. Through the coverage of these key concepts, the module enables students to understand key security vulnerabilities, allows threats to be thoroughly understood and enables students to recognise key security challenges enabling them to propose and design secure systems to respond to cyber threats.

The module is about Information Security Management and it will develop the student's understanding of the implications of cybersecurity to today's businesses, how businesses can gain market advantage by leveraging simple and yet robust cybersecurity principles, and the government's cybersecurity strategy for businesses in the UK. As the Cybersecurity programme is designed with conversion students in mind, this module will prepare students with useful cyber skills to lead or easily be part of cybersecurity efforts in their organisations.  The learning content will include:

  • Core security standards (e.g., ISO27001, ISO27032), policies and governance etc.
  • Information Risk Management and Business Continuity Management
  • Audit, Assurance and Review
  • Understanding the threats and risks businesses face today. Illustrative part of how this (or what) might be covered include:
    • Through problem based learning and possible industry collaboration
    • Exploring Social Engineering, the Least Resistance Path, Incident Response, Defence Indepth etc.
  • Government strategy on Cybersecurity

The databases and security module involves the development of databases and their querying through the use of SQL. Databases will be discussed both theoretically and in practice. Students will have opportunies to develop and practice database creation and development. Database security will be discussed and shown how to apply in practice.

This module investigates different types of machine learning algorithms to find patterns in data. Each algorithm will be discussed in theory and practice, discussing: its data pre-processing requirements, pseudo-code, and evaluation metrics, e.g., Dunn index for clustering. Detailed demonstrations will show how to apply these algorithms to data using specified libraries in Python. Students will be required to investigate the merits of each algorithm for various types of data in both theory and practice.

This module facilitates the study of biological processes and their ability to produce adaptive, dynamic solutions to complex problems. The focus is on naturally occurring systems capable of producing emergent phenomena based on simple rules of interaction between entities and their environment. Techniques such as evolutionary computing, swarm intelligence, cellular automata and neural networks are viewed as digital realisations of these natural processes. The related topics of iterated functions, chaos, complexity and fractals are introduced to motivate the application of such techniques in the computing discipline.

The Research Project is the pinnacle of a taught, academic programme of master’s level study. It is a demonstration of academic, subject-specific, and research capabilities. Projects are a significant and substantial piece of individual work that draw upon the knowledge, technical abilities, and problem-solving skills developed in earlier modules. Students need to apply high-level research skills to a defined, complex problem. A distinguishing feature of the research project is that it is largely self-directed and independent, with support from an academic supervisor.

The information listed in this section is an overview of the academic content of the course that will take the form of either core or option modules and should be used as a guide. We review the content of our courses regularly, making changes where necessary to improve your experience and graduate prospects. If during a review process, course content is significantly changed, we will contact you to notify you of these changes if you receive an offer from us.

If chosen, your second year of study will consist of your Project or Professional Placement

MODULES

  • Professional Placement Option
  • Professional Project Option

The information listed in this section is an overview of the academic content of the course that will take the form of either core or option modules and should be used as a guide. We review the content of our courses regularly, making changes where necessary to improve your experience and graduate prospects. If during a review process, course content is significantly changed, we will contact you to notify you of these changes if you receive an offer from us.

Who You'll Learn From

How You'll Learn

Modules will be taught on-site (Exton Park) in 3-hour weekly sessions over 10 weeks of tutor contact sessions that take place in PC labs and Cyber labs.

There is a blended learning approach (asynchronous) where resources for your learning will be made available via Moodle which is accessible on the University's VLE. The course is delivered over three terms with each term covering one or two modules depending on the optional modules selected. You can access real and virtual machines in the library which can be used for independent practice times.

The modules are delivered by experienced academics in each of the subject areas. This will occasionally involve engagements with guest lecturers and speakers from relevant industries.

The learning process also includes a broad range of assessment methods mostly involving realistic tasks to expose you to the tasks you might encounter in the workplace. You may be required to solve tasks in groups which is aimed to develop your ability to function in a team as well as learn other academic skills.

Entry Requirements

2:1honours degree

A good first Degree (normally a 2:2 or above) in IT-related or Engineering subject areas is required. All
applicants are expected to have good experience in using one desktop and one mobile operating system.
They must have skills in using basic computing or cybersecurity tools and competency in using any
of the relevant operating systems (Windows, Linux). All applicants should be willing to develop
technical skills at an advanced level as part of this course and may be required to attend a short
interview before confirmation of acceptance into the course.

English Language Requirements

  • IELTS Academic: Postgraduate: 6.5 (minimum 5.5 in each band)

For more information on our entry requirements, please visit International Entry Requirements.

Where You'll Study Exton Park, Chester

Fees and Funding

£10,530for the full course (2025/26)

Guides to the fees for students who wish to commence postgraduate courses are available to view on our Postgraduate Taught Programmes Fees page. Here you will also find information about part-time fees and project/placement year fees.

The professional placement/project year will cost an additional £2,750, due at the start of the second year of the course.

£15,000for a full-time course (2025/26)

The tuition fees for international students studying Postgraduate programmes in 2025/26 are £15,000.

Please note: For MSc programmes where a placement or project year is undertaken there will be an additional charge of £2,750 for the placement/project year (due at the start of the second year of the course).

The University of Chester offers generous international and merit-based scholarships for postgraduate study, providing a significant reduction to the published headline tuition fee. You will automatically be considered for these scholarships when your application is reviewed, and any award given will be stated on your offer letter.

For more information, go to our International Fees, Scholarship and Finance section.

Irish Nationals living in the UK or ROI are treated as Home students for Tuition Fee Purposes.

Your course will involve additional costs not covered by your tuition fees. This may include books, printing, photocopying, educational stationery and related materials, specialist clothing, travel to placements, optional field trips and software. Compulsory field trips are covered by your tuition fees. 

The University of Chester supports fair access for students who may need additional support through a range of bursaries and scholarships. 

Full details, as well as terms and conditions for all bursaries and scholarships can be found on the Fees and Finance section of our website.

Your Future Career

Job Prospects 

Graduates have gone on to leading roles in industry in the field of security and penetration testing, in policing, and in government.

Careers service

The University has an award-winning Careers and Employability service which provides a variety of employability-enhancing experiences; through the curriculum, through employer contact, tailored group sessions, individual information, advice and guidance.

Careers and Employability aims to deliver a service which is inclusive, impartial, welcoming, informed and tailored to your personal goals and aspirations, to enable you to develop as an individual and contribute to the business and community in which you will live and work.

We are here to help you plan your future, make the most of your time at University and to enhance your employability. We provide access to part-time jobs, extra-curricular employability-enhancing workshops and offer practical one-to-one help with career planning, including help with CVs, applications and mock interviews. We also deliver group sessions on career planning within each course and we have a wide range of extensive information covering graduate jobs and postgraduate study.

Enquire about a course