Search

Chat With Us

    Network & Information Security
    Go to Kingston University
    Kingston University

    Network & Information Security

    Kingston University
    University RankQS Ranking
    608

    Key Facts

    Program Level

    Master by Course Work

    Study Type

    Full Time

    Delivery

    On Campus

    Campuses

    Penrhyn Road

    Program Language

    English

    Start & Deadlines

    Next Intake DeadlinesSeptember-2024
    Apply to this program

    Go to the official application for the university

    Duration 2 year(s)
    Tuition Fee
    GBP 18,500  / year
    Next Intake September-2024

    Network & Information Security

    About

    Cyber security, the umbrella term for computer, network and information security is of increasing importance - new legislation, technologies, vulnerabilities and threats necessitate frequent system updates.

    This course offers a critical awareness of current developments and future trends in cryptography, network security and mobile/wireless security. You will explore techniques and technologies to combat threats such as malware, social engineering, data leakage or zero-day attacks, based on understanding secure authentication mechanisms, access control, intrusion detection, information security policies and user education. A project/dissertation will enable you to study an area of interest in depth; it can be an excellent selling point.

    Apply for this course

    What you will study

    You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols.

    As security and dependability are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage.

    The Management Studies route will set your technical knowledge in a management context.

    The full MSc course consists of an induction programme, four taught modules, and a project dissertation. Please note that this is an indicative list of modules and is not intended as a definitive list.

    For a student to go on placement they are required to pass every module first time with no reassessments. It is the responsibility of individual students to find a suitable paid placement. Students will be supported by our dedicated placement team in securing this opportunity.

    Network and Information Security MSc modules

    Network and Information Security MSc with Management Studies

    Core modules

    Cryptography and Applications

    30 credits

    This core module provides an overview of cryptography and various applications in information security, communication and computer science. This module deals with mathematical principles on which cryptography is based to include cryptographic algorithms, including practical examples of breaking codes. Additional techniques such as information hiding and secret sharing are progressively introduced. An introduction to advanced and emerging cryptographic techniques such as elliptic curve cryptography and quantum techniques.

    On successful completion of the module, students will be able to:

    • review concepts in computational number theory and their relevance for the design of secure and efficient techniques in cryptography;
    • describe and deploy common symmetric and asymmetric encryption algorithms used as standards in modern cryptosystems;
    • compare and contrast the properties of hash functions and attacks on them, and be familiar with their use in digital signature algorithms and their role in security protocols;
    • explain techniques for information hiding and secret sharing, and analyse their applications in security;
    • analyse cryptographic protocols for implementing a wide range of security requirements; and
    • critically discuss applications of cryptography including the latest and future trends.
    Network and Information Security

    30 credits

    This module provides an overview of a wide range of security aspects and techniques of computer networks, both cabled and wireless. It will introduce basic aspects of Information Security, comprising Security and Risk Management as well as Policies and Standards. It also covers Ethical and legal aspects of security and hence addresses the employability of the students in their future career. The module then goes on to the topic of Network Security, both from a theoretical and practical aspect: network attacks, vulnerabilities and controls are introduced and examined in practical lab sessions. Finally, cutting-edge topics such as Web and Cloud security complete the picture.

    Data Communications

    30 credits

    This core module provides a working knowledge of data communications covering TCP/IP networks and digital communications. Topics covered include transport layer services, multiplexing, TCP congestion control, network layer - network service models, IP addressing and IP network design, routing principles, dynamic routing, digital transmission, modulation, multiplexing and channel coding.

    On successful completion of the module, you will be able to:

    • Compare computer network architectures.
    • Evaluate the performance of TCP under varying flow control and congestion conditions.
    • Design an IP addressing scheme for a network.
    • Define and calculate transmission performance over a communication link.
    • Study and analyse characteristics of modulation methods.
    Project Dissertation

    60 credits

    This module constitutes the major individual piece of work of the Masters Programme where the student carries out a project involving independent critical research, design and implementation (where applicable).

    On successful completion of the module, students will be able to:

    • Select, justify and use effectively the research methods and techniques appropriate for particular cases in order to carry out a literature search and an independent work of research
    • Critically identify the need to position their research in the wider academic or business context and structure the dissertation format to agreed conventions
    • Plan, manage and critically evaluate the project using the techniques and tools needed in order to bring it in successfully on time and within resourcing limits
    • Identify and critically analyse real-world problems or knowledge gaps to which academic concepts and methods can be realistically applied to improve or resolve the problem situation
    • Apply skills to show an ability to engage in academic and professional communication with others in their field through report and presentation
    • Present critical awareness in applying appropriate legal, social or ethical obligations and when required, respond to the financial and other constraints of a corresponding business environment.

    Optional modules

    Wireless Communications and Networks

    30 credits

    The module addresses theory and practice of wireless communication systems and networks, including the most recent wireless communications standards.

    The first part will focus on the propagation characteristics of wireless channels and the main techniques for efficient communication, including modulation and channel coding. Characteristics and performance limits of wireless systems, techniques and tools to analyse them and methods for their design will also be covered.

    The second part of the module will cover real-world wireless systems and networks, including wireless broadband systems and wireless sensor networks. It will provide practical and useful knowledge that can be readily applied in the wireless industry.

    It covers the real-world, practical knowledge needed to understand, design, evaluate, deploy, test, validate and debug WLAN, WMAN and WPAN, as well as GPRS/ UMTS/ 3G and 4G and beyond networks and systems and Wireless Sensor Networks (WSN). Advanced technologies such as ultra-wideband communications and cognitive radio will also be addressed.

    Mobile Security

    30 credits

    (For NCSC Certified Pathway)

    This module will provide you with a comprehensive knowledge into the main areas of mobile computing and its security aspects. Mobile communication modalities will be covered, including 3G/4G communication networks, Wi-Fi and personal area networks, mobile privacy and ethical issues. The gained knowledge will be applied in different mobile computing business environments such as mobile healthcare (m-health), mobile commerce (m-commerce), mobile learning (m-learning) and mobile web services (m-WS). Mobile security assessment will be introduced in order to formulate appropriate security requirements. Key management protocols in typically ad hoc, wireless and location-dynamic environments will be presented and analysed. Emerging topics such as the Internet of Things (IoT), mobile clouds and distributed social network security will also be discussed. The module also provides hands-on practical exposure to apps development in location and context aware environments.

    Multimedia Communications

    30 credits

    The module addresses theory and practice of multimedia communication systems and networks, with a special focus on multimedia signals (audio, images and video) and relevant compression and transmission techniques.

    The first part of the module focuses in particular on the representation of multimedia sources and on lossless and lossy compression methods for data, audio, image and video signals.

    The second part of the module focuses in particular on the transmission of multimedia sources over communication systems and networks and on the strategies adopted to protect multimedia content from channel and network errors and losses.

    Core modules

    Cryptography and Applications

    30 credits

    This core module provides an overview of cryptography and various applications in information security, communication and computer science. This module deals with mathematical principles on which cryptography is based to include cryptographic algorithms, including practical examples of breaking codes. Additional techniques such as information hiding and secret sharing are progressively introduced. An introduction to advanced and emerging cryptographic techniques such as elliptic curve cryptography and quantum techniques.

    On successful completion of the module, students will be able to:

    • review concepts in computational number theory and their relevance for the design of secure and efficient techniques in cryptography;
    • describe and deploy common symmetric and asymmetric encryption algorithms used as standards in modern cryptosystems;
    • compare and contrast the properties of hash functions and attacks on them, and be familiar with their use in digital signature algorithms and their role in security protocols;
    • explain techniques for information hiding and secret sharing, and analyse their applications in security;
    • analyse cryptographic protocols for implementing a wide range of security requirements; and
    • critically discuss applications of cryptography including the latest and future trends.
    Network and Information Security

    30 credits

    This module provides an overview of a wide range of security aspects and techniques of computer networks, both cabled and wireless. It will introduce basic aspects of Information Security, comprising Security and Risk Management as well as Policies and Standards. It also covers Ethical and legal aspects of security and hence addresses the employability of the students in their future career. The module then goes on to the topic of Network Security, both from a theoretical and practical aspect: network attacks, vulnerabilities and controls are introduced and examined in practical lab sessions. Finally, cutting-edge topics such as Web and Cloud security complete the picture.

    Data Communications

    30 credits

    This core module provides a working knowledge of data communications covering TCP/IP networks and digital communications. Topics covered include transport layer services, multiplexing, TCP congestion control, network layer - network service models, IP addressing and IP network design, routing principles, dynamic routing, digital transmission, modulation, multiplexing and channel coding.

    On successful completion of the module, you will be able to:

    • Compare computer network architectures.
    • Evaluate the performance of TCP under varying flow control and congestion conditions.
    • Design an IP addressing scheme for a network.
    • Define and calculate transmission performance over a communication link.
    • Study and analyse characteristics of modulation methods.
    Business in Practice

    30 credits

    This postgraduate module covers the theory and practice of the business and management needs of students from different academic contexts such as, but not limited to Science, Engineering, Computing and Health Services who are aspiring team leaders, managers, and entrepreneurs in business within the context of the commercial, public, voluntary, or academic sector.

    On successful completion of the module, students will be able to:

    • Investigate business topics ranging from finance, accounting, budgeting, and marketing, to organisational management by developing the leadership skills to meet business challenges and to cope with their complexity.
    • Explain and put into context business concepts to graduates from a variety of sectors including those encompassed by Science, Engineering, Computing and Health Services.
    Project Dissertation

    60 credits

    This module constitutes the major individual piece of work of the Masters Programme where the student carries out a project involving independent critical research, design and implementation (where applicable).

    On successful completion of the module, students will be able to:

    • Select, justify and use effectively the research methods and techniques appropriate for particular cases in order to carry out a literature search and an independent work of research
    • Critically identify the need to position their research in the wider academic or business context and structure the dissertation format to agreed conventions
    • Plan, manage and critically evaluate the project using the techniques and tools needed in order to bring it in successfully on time and within resourcing limits
    • Identify and critically analyse real-world problems or knowledge gaps to which academic concepts and methods can be realistically applied to improve or resolve the problem situation
    • Apply skills to show an ability to engage in academic and professional communication with others in their field through report and presentation
    • Present critical awareness in applying appropriate legal, social or ethical obligations and when required, respond to the financial and other constraints of a corresponding business environment.

    Please note

    Optional modules only run if there is enough demand. If we have an insufficient number of students interested in an optional module, that module will not be offered for this course.

    Requirements

    Entry Requirements

    Bachelors degree (4 years)

    • UK 2:1 equivalent: 2.8 or B or 75% 
    • UK 2:2 equivalent: 2.5 or C or 65% 

    Career

    After you graduate

    Where this course will take you

    Computer, network and information security are current 'hot topics'. They are here to stay, as we will never be able to design or build a system without having to take into account its security in an operational scenario. 

    Many companies are actively recruiting security specialists at the moment and the major software houses are training their coders in security. In fact, it can be hard to get a job with a large company, even as a software developer, without some appreciation of security.

    Graduates have progressed to work at Google, ECS and Lloyd's, in roles such as ethical banker, cyber security engineer and security consultant.

    Have a look at ITJobsWatch.

    Careers and recruitment advice

    The Faculty of Science, Engineering and Computing has a specialist employability team. It provides friendly and high-quality careers and recruitment guidance, including advice and sessions on job-seeking skills such as CV preparation, application forms and interview techniques. Specific advice is also available for international students about the UK job market and employers' expectations and requirements.

    The team runs employer events throughout the year, including job fairs, key speakers from industry and interviews on campus. These events give you the opportunity to hear from, and network with, employers in an informal setting.

    Fee Information

    Tuition Fee

    GBP 18,500  / year

    How to Apply

    Apply online

    You can apply for most of our postgraduate courses online via the relevant course page.

    If you are applying for a course in the Kingston School of Art or the Faculty of Health, Science, Social Care and Education, you must use the online application route for your chosen course and not apply by post or email.

    If you have any queries please contact [email protected].

    Apply by post or email

    If you prefer, or if your course does not have an online option, you can apply by email or post. Please download our Postgraduate Application Form (PDF) and send the completed version by post or email to:

    • Kingston University Admissions
      Room 1004, Yorkon Building
      Kingston University
      Kingston Hill campus
      Kingston upon Thames
      Surrey KT2 7LB

      Email: [email protected]
      Tel: +44 (0)20 3308 9932

    Please note: you will need to have the correct version of Adobe Acrobat (Professional 7 or later) if you wish to complete the PDF version of the postgraduate application form. 

    If you are unsure, please complete the Word version of the postgraduate application form and save it to your desktop. You may then attach your completed application form and email it to [email protected].

    Kingston University

    Network & Information Security

    Kingston University

    [object Object]

    United Kingdom,

    London Borough of Sutton

    Similar Programs

    Other interesting programs for you

    Find More Programs
    Wishlist