A person using a laptop

Course Summary

Our Cybersecurity (Conversion) Master’s degree is aimed at both engineering and non-engineering students who wish to make the leap into the rapidly expanding field of cybersecurity. The course aims to provide both theory and real-world practical skills and expertise to an advanced level in the emerging field of cybersecurity.

The Cybersecurity Facility is part of the Department of Computer Science and is an innovative, forward-thinking Department.

The course is taught by experts in the field with years of expertise in industry, and has close links with industry, government, and the police.

The Department is also home to the Informatics Centre, a software development team where students can gain experience of commercial projects.

There is an option to choose a Project/Placement year for this course, at an additional cost.

 

Switch combined course content

Optional 2-year master's to suit your needs

Choosing a Professional Placement MSc is a win-win for your career, giving you the chance to get real experience, apply your cutting-edge skills in the workplace and stand out to future employers.

In the first year you will have help from the University to find a placement, whilst developing your expertise. You will then spend your second year out in industry on placement, getting the chance to work with industry professionals and grow your network of industry contacts. Bringing your university-acquired knowledge and insights to industry, you will get to make a difference to the workplace and make lasting links with your employer.

Students need to find and secure their own placement, supported by the University. A preparation module will also help you to get ready for your placement.


What you'llStudy

There is an emphasis on real-world practice and supporting theory, to develop towards an expertise in digital forensics, incident response, penetration testing, active defence, software exploitation and system protection methods, and cybersecurity in business.
The ‘Cyber Concepts and Techniques’ module is optional for February starters and compulsory for October starters.
If you choose a placement or project year, the Research Dissertation module will be replaced by a placement or project module.

Module content:

  • Internet and web terminology, protocols and infrastructure
  • Web document structure and content (e.g. HTML)
  • Web aesthetics
  • Web scripting
  • Web requests (e.g. use of HTTP verbs)
  • Using Internet and Web tools (e.g. IDEs, FTP clients)
  • Web APIs
  • Common Web security issues (e.g. CSRF, XSS, SQL Injection)
  • Web hosting configuration
  • Server side scripting
  • Databases (e.g. SQL, Keys, CRUD operations)

Module aims:

  • To enable students to develop a broad knowledge of web technologies
  • To introduce the languages commonly used to structure, present, and provide interactivity within web sites
  • To give students a solid foundation in practical technical skills required to develop client-side web applications
  • To provide an overview to server-side web application development including understanding of the client-server model

Module content:

  1. Projects which will involve the application of methods and equipment introduced in taught modules, will be based on subjects agreed in principle with the Postgraduate Dissertation Coordinator and potential supervisors.
  2. The research dissertation may be University-based or carried out in the employer’s workplace, or through a work placement where a local organisation has a direct role in facilitating the project.

Module aims:

To afford students the opportunity to experience the complete life-cycle of a successful and significant research-based project

To provide real-world experience of meeting the requirements of academic and professional standards, including high-level writing and referencing skills.

To demonstrate to peers and to current and potential employers the student’s ability to carry out good quality academic research, in a particular field, which is relevant to their programme of study. This may involve the application of existing research within a novel context.

Module content:

To include:

  • Time management, library skills and literature search
  • Evaluation of information sources
  • Critical analysis of information
  • Ethical issues in science, technology and engineering research (including intellectual property and plagiarism)
  • Writing for research: styles and rules for presentation (including referencing standards)
  • Choosing a research area and evaluating source material
  • Hypothesis formation
  • Research approaches and methodologies
  • Design and application of questionnaires & interviews
  • Quantitative and statistical tools for researchers (e.g. R, Python, SPSS)

Module aims:

  • To clarify the distinctions between undergraduate and postgraduate level work and expectations
  • To increase students' experience in order to conduct a professional study and to use sampling procedures and analysing techniques.
  • To improve students' appreciation of time management and how to conduct a literature search
  • To reinforce students' research skills
  • To consolidate students' appreciation of professional issues such as copyright and ethics

Module content:

  • Evolution of Robotics
  • Microcontrollers: Arduino and Raspberry Pi
  • Computer Vision
  • Agents and Multi-Agent Systems
  • Machine learning and robotics

Module aims:

  • To introduce the concept of artificial intelligence (AI) and to evaluate its role in the development of robotics.
  • To introduce theoretical approaches to the development of intelligent robots.
  • To undertake practical tasks to demonstrate how AI techniques can be implemented for robotics.
  • To analyse methods for designing and deploying robotic systems.
  • To critically evaluate the ways in which intelligent robots can be used in real world situations

Module content:

  1. Speaking Cyber - Core understanding of Cybersecurity terminologies
  2. Introduction to programming with cybersecurity perspective
  3. Implementing secure systems. Illustrative of what may be covered include:
    1. Design and development considerations
    2. Selecting and applying core technologies
    3. Cryptography
    4. Human factors
    5. Auditing (security audits, logging, digital investigation
      etc.)
    6. Defense-in-depth
    7. Google hacking
    8. Pentesting
  4. Threats and resolutions 

Module aims:

  1. To empower the students with core understanding of the key terminologies in cybersecurity
  2. To introduce students to programming with a cybersecurity perspective 
  3. To provide students with the understanding of the common cybersecurity concepts and technical security controls available to prevent, detect and recover from security incidents and to mitigate risks
  4. To give students a solid foundation in the practical technical skills which can then be harnessed later in CO7604 and CO7605 

Module content:

  1. Information Security Management
    1. This will include core security standards (e.g., ISO27001, ISO27032), policies and governance
      etc.
  2. Information Risk Management and Business continuity Management
  3. Audit, Assurance and Review
  4. Understanding the threats and risks businesses face today. Illustrative part of how this (or what) might be covered include:
    1. Through problem based learning and possible industry collaboration
    2. Exploring Social Engineering, the Least Resistance Path, Incident Response, Defence Indepth
      etc.
  5. Government strategy on Cybersecurity

Module aims:

This module will develop the student's understanding of the implications of cybersecurity to today's businesses, how businesses can gain market advantage by leveraging simple and yet robust cybersecurity principles, and government's cybersecurity strategy for businesses in the UK. Being a conversion masters, this will prepare students with useful cyber skills to lead or easily be part of cybersecurity efforts in their organisations. The aims are further broken down as follows:

  1. To develop the capability for determining, establishing and maintaining appropriate governance of processes and responsibilities, delivery of controls, and cost-effective solutions for information security within a given organisation.
  2. To understand and be able to manage the risks relating to information, information systems and assets.
  3. To understand the need for, and be able to design and implement processes for, establishing business continuity.
  4. To develop the capability for defining and implementing the processes and techniques used in verifying compliance against security policies, standards, legal and regulatory requirements.
  5. To use real life business scenarios to expose students to cybersecurity needs of today’s businesses.
  6. To understand government's strategies for tackling cybersecurity issues in business.

Module content:

Software attack techniques, approaches, and methodologies.

Exposure to exploitation techniques, including for example, buffer overflow, stack overflow, heap attacks, and UAF (Use After Free), amongst others.

Attack methods including system, host, network, and web-based attacks.

Tools and techniques; use of existing tools and development of new tools.

Software Protection Methods and principles of secure software and system design.


Module aims:

The main weakness in systems is often the software they run, including software on devices and networked systems.

The aim of this module is to study, understand, and practice the state-of-the-art technique for gaining entry, i.e. 'exploitation', of software across a variety of systems and platforms.

With this understanding, the student will in parallel study and understand various counter-measures employed in system software against these attacks, the limitations of both the attacks and counter-measures, and counter-counter-measures.  Understanding this cycle will give the student appreciation of the exploitable vulnerabilities and the need for and way to architect and design a secure system.

Furthermore, the student will gain understanding of and experience in a number of tools and techniques in order to perform vulnerability and penetration tests on new software.

Module content:

  • Digital system forensics
    • Disk
    • Memory
    • Mobile
    • Cloud
  • Live forensics
  • Encryption and obfuscation
  • Malware analysis and investigation
  • Network forensics
  • Anti-forensics
  • Methodologies, approaches, and techniques
  • Cyber Threat Intelligence and attribution
  • Incident Response
  • Ethical issues in digital forensics and incident response

Module aims:

This module aims to introduce the student to the need for and uses of digital forensics and incident response from an organisational security perspective.

The aim of this module is to introduce, study, understand and practice digital forensics techniques, and to understand the limitations of common techniques.  It aims to develop in the student an appreciation and understanding of anti- and counter-forensics, including falsification of data.  Finally, it aims to build the students' understanding of malware, how it operates, and practices to deal with it.

Students will gain an understanding of Incident Response and Cyber Threat Intelligence.

Module content:

  • Network security and attacks
  • The current threat landscape
  • Social engineering
  • Penetration testing tools
  • Active defence
  • Threat hunting
  • Defensive strategies and tools 
  • Hack back and the legal implications
  • Hacker tools
  • Penetration testing; methodologies, approaches, and techniques
  • Penetration test reporting
  • Ethical issues in penetration testing and active defence

Module aims:

This module aims to:

  • introduce the student to the need for and uses of penetration testing and active defence from an organizational security perspective;
  • introduce, study, understand and practice active defence and the limitations of common techniques. This will also look at relevant tools and the legal aspect of 'hack back';
  • help the student study, understand, and practice penetration testing techniques, developing skills in 'access' over networks, and how attackers look at a target; 
  • the relevant skills, knowledge and usage of hacker tools and how to stop/deter attackers

These will be built upon to allow the student to better understand network and holistic defenses and to be able to design secure interconnected systems.

Module content:

Embedded Systems and Field Programmable Gate Array (FPGA) Technology

  • Concurrent assignment statements and unintended memory
  • Adopting proper hardware description language (HDL) coding style and taking a divide and conquer approach for code development
  • The need for design simplification.
  • Regular sequential circuit block system and registers 
  • Building test-benches for sequential circuits
  • Timing, clocking, operating frequency and clock tree considerations
  • The Finite-state machine (FSM), its representation and FSM HDL code development
  • The Finite-state machine with data path (FSMD), its representation and FSM HDL code development

Internet of Things (IoT)

  • Automatic Identification Technology and Radio-frequency identification (RFID)
  • Wireless Sensor Network
  • Location System
  • Internet and Mobile Internet
  • Wireless Access Technology
  • Big Data, IoT & Cloud Computing
  • Information Security for IoT
  • IoT Application Case Studies
  • Arduino Opla, Espressif System on Chip (SoC) & Raspberry Pi IoT technologies

Module aims:

The Embedded Systems part of this module aims to develop the skill in students of digital systems design with the VHDL hardware description language (HDL) and Field Programmable Gate Array (FPGA) reprogrammable and fast prototyping technologies. Students will be able to produce design, synthesis of circuits and implement system on chip (SoC) using modern electronic design automation (EDA) tools.

The Internet of Things (IoT) contents aim to develop the advanced practical skills in building and designing IoT related components and network systems, going from the sensors layer to the cloud processing. This part also develops expertise in the use of a hardware/software tools to create and simulate practical systems, considering big data, energy consumption control and network security aspects.

Who you'll Learn from

Dr Toyosi Oyinloye

Programme Leader for MSc Cybersecurity
Toyosi Oyinloye

Dr Nigel Houlden

Visiting Lecturer
Dr Nigel Houlden

Paul Underhill

Programme Leader for Data Science
Paul Underhill

Paul Underhill

Programme Leader for Data Science
Paul Underhill

How you'll Learn

Teaching

You will learn from experts in the field through visitations, guest lectures and demonstrations.

This course comprises six 20-credit modules and a 60-credit supervised research module.

The core modules comprise three hours of structured learning activities in the form of lectures and workshops delivered over 10 weeks in person, in our cyber/PC labs. Along with this, you can budget independent study of 15 to 17 hours per week for each 20-credit module.

Outside of the timetabled sessions, we provide a platform where you can book one-to-one meetings with the tutor. In addition to this, you will have your own Personal Academic Tutor who can support you both academically and in non-academic aspects that may affect your academic progression.

Assessment

Assessments take different forms, which include coursework assignments and presentations based on case studies and realistic scenarios delivered as individual technical reports or group projects. Depending on the module, students can access formative assessments to monitor their progress.

Entry Requirements

2:2 honours degree

A good honours degree (normally 2:2 or above) in a computer science aligned field is required. 

For October 2024, the MSc Cybersecurity programme is a conversion course and is therefore open to applicants of any discipline so long as they possess a good first degree (normally a 2:2 or above) and/or equivalent industrial experience.

All applicants are expected to have a willingness to develop technical skills as part of this course and may be required to attend a short interview before confirmation of acceptance onto the course.

For October 2024, the MSc Cybersecurity programme is a conversion course and is therefore open to applicants of any discipline so long as they possess a good first degree (normally a 2:2 or above) and/or equivalent industrial experience.

All applicants are expected to have a willingness to develop technical skills as part of this course and may be required to attend a short interview before confirmation of acceptance onto the course.

English Language Requirements

For those who do not have IELTS or an acceptable in-country English language qualification, the University of Chester has developed its own online English language test which applicants can take for just £50.

For more information on our English Language requirements, please visit International Entry Requirements.

Where you'll Study Exton Park, Chester

Fees and Funding

£10,530 for the full course (2025/26)

Guides to the fees for students who wish to commence postgraduate courses in the academic year 2025/26 are available to view on our Postgraduate Taught Programmes Fees page.

The professional placement/project year will cost an additional £2,750, due at the start of the second year of the course.

£15,000 for the full course (2025/26)

The tuition fees for international students studying Postgraduate programmes in 2025/26 are £15,000.

The professional placement/project year will cost an additional £2,750 (due at the start of the second year of the course), totalling £17,750 for the full course fee 2025/26.

The University of Chester offers generous international and merit-based scholarships for postgraduate study, providing a significant reduction to the published headline tuition fee. You will automatically be considered for these scholarships when your application is reviewed, and any award given will be stated on your offer letter.

For more information, go to our International Fees, Scholarship and Finance section.

Irish Nationals living in the UK or ROI are treated as Home students for Tuition Fee Purposes.

Your course will involve additional costs not covered by your tuition fees. This may include books, printing, photocopying, educational stationery and related materials, specialist clothing, travel to placements, optional field trips and software. Compulsory field trips are covered by your tuition fees.

If you are living away from home during your time at university, you will need to cover costs such as accommodation, food, travel and bills.

The University of Chester supports fair access for students who may need additional support through a range of bursaries and scholarships. 

Full details, as well as terms and conditions for all bursaries and scholarships can be found on the Fees & Finance section of our website.

Your Future Career

Job Prospects 

Graduates have gone on to leading roles in industry in the field of security and penetration testing, in policing, and in government.

Careers service

The University has an award-winning Careers and Employability service which provides a variety of employability-enhancing experiences; through the curriculum, through employer contact, tailored group sessions, individual information, advice and guidance.

Careers and Employability aims to deliver a service which is inclusive, impartial, welcoming, informed and tailored to your personal goals and aspirations, to enable you to develop as an individual and contribute to the business and community in which you will live and work.

We are here to help you plan your future, make the most of your time at University and to enhance your employability. We provide access to part-time jobs, extra-curricular employability-enhancing workshops and offer practical one-to-one help with career planning, including help with CVs, applications and mock interviews. We also deliver group sessions on career planning within each course and we have a wide range of extensive information covering graduate jobs and postgraduate study.