
Overview
Why study this course
The Cyber Security and Technology programme at Cardiff University aims to equip you with an in-depth understanding of the ever-changing cyber threat landscape and the wide range of cyberattacks on operating systems, computer networks and web-applications. The course helps you develop a solid understanding of underlying technologies, their weaknesses and how they can be efficiently secured. In addition to covering theoretical foundations of computer science and cyber security, the programme includes a significant, hands-on component of practical application.
The security techniques and methods taught include, but are not limited to, network traffic analysis, network enumeration, port scanning, network segmentation, prevention of injection attacks, prevention of common web-app attacks (injection attacks, XSS, CSRF), secure configuration of cloud-based IT environments. You will learn to perform digital and network forensic investigations and analysis using modern forensics tools and software packages. The programme will also inform you about the human-factors affecting cyber security, privacy issues, cyber security legislation and regulations.
This is an exciting opportunity to learn from world-class cyber security researchers and industry practitioners, acquainting you with state-of-the-art technologies, research ideas, and industry standards.
On completing this course, you will have learned how to assess, identify and resolve cyber security threats as a professional. You will also be able to navigate business needs alongside an organisation’s cyber security needs, and influence business decisions by effectively communicating the importance of cyber security measures to different audiences.
Funded studentships are available to selected students on a competitive basis.
Career prospects
Our graduates are well prepared for leadership roles in cyber security and for a career in industrial, commercial, or governmental organisations with particular responsibility for information and cyber security, including cyber security management and risk assessment, network security and operating system security, penetrating testing and forensic investigations.
Career destinations include: information security manager, cyber security risk manager, technical security roles in IT and computer forensics, identity management roles, secure systems developer, and industrial and university research.
Accreditation
- This programme is certified by the National Cyber Security Centre (NCSC)
Get more details
Visit university websiteProgramme Structure
Courses include:
- Cyber Security and Risk Management
- Penetration Testing and Malware Analysis
- Computer and Network Forensics
- Cloud and Database Systems Security
- Developing Secure Systems and Applications
- Operating Systems Security
Check out the full curriculum
Visit university websiteKey information
Duration
- Full-time
- 12 months
Start dates & application deadlines
- Starting
- Apply before
-
If you submit an application after this date, we will only consider it if places are still available.
Language
Interested in IELTS preparation material? Get started here
Credits
Delivered
Disciplines
Computer Sciences Cyber Security View 561 other Masters in Computer Sciences in United KingdomExplore more key information
Visit university websiteAcademic requirements
English requirements
Interested in IELTS preparation material? Get started here
Other requirements
General requirements
Typically, you will need to have either:
- a 2:1 honours degree in a relevant subject area such as computer science, IT or software engineering, or an equivalent international degree
- a university-recognised equivalent academic qualification
You may choose to supplement your application with:
- a detailed CV
- or any other supporting material you may consider to be appropriate.
Make sure you meet all requirements
Visit university websiteTuition Fee
Visit university websiteLiving costs for Cardiff
The living costs include the total expenses per month, covering accommodation, public transportation, utilities (electricity, internet), books and groceries.
Funding
Check for any work restrictions
Visit university websiteIn order for us to give you accurate scholarship information, we ask that you please confirm a few details and create an account with us.
Scholarships Information
Below you will find Master's scholarship opportunities for Cyber Security and Technology.
Available Scholarships
You are eligible to apply for these scholarships but a selection process will still be applied by the provider.
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility