Students
Tuition Fee
GBP 25,800
Per year
Start Date
Medium of studying
On campus
Duration
2 years
Details
Program Details
Degree
Masters
Major
Cybersecurity | Network Security
Area of study
Information and Communication Technologies | Security Services
Education type
On campus
Timing
Full time
Course Language
English
Tuition Fee
Average International Tuition Fee
GBP 25,800
Intakes
Program start dateApplication deadline
2025-09-01-
About Program

Program Overview


Applied Cyber Security with Professional Internship

Overview

The world’s online security depends on you. Step up to the plate with this fascinating Master’s course, taught by experts at one of the world’s leading cyber security hubs.


About You

You’ll be analytical, technical and a modern-day codebreaker. Cyber security is a challenge that will not go away, affecting companies, individuals and even governments. You could be:


  • A recent graduate – possibly a maths or engineering graduate with good programming skills, or you might be a good developer but have little knowledge of cyber security.
  • Already working in industry – experienced in technical software development, and looking to upskill and enhance your professional development.
  • An international student looking to study a UK master’s degree, to meet the global need for cyber security skills.

About the Course

This innovative programme is at the forefront of technical advances in cutting-edge cyber security topics such as cryptography, computer forensics, malware, networking, software development, as well as investigating the increasingly important legal and ethical issues in cyber security. This is an applied course, which mixes theoretical skills with practical work in the lab to give you hands-on experience.


Course Structure

The course is taught in block-mode with modules normally running in four-week blocks. Teaching normally happens during the first three-weeks with an intensive mix of taught classes and practical lessons scheduled from 9 am – 5 pm on Thursdays and Fridays each week. The fourth week of each module’s block is usually reserved for assessment.


Modules

The MSc Applied Cyber Security with Professional Internship is a two-year programme. The first year comprises taught modules and a research project. The second year comprises an internship up to 12 months in industry in a cyber security related role. To progress to an internship in the second year students must secure an internship before the end of the first year. Students must also pass all modules before beginning an internship.


Core Modules

  • Foundations of Cyber Security (10 credits)
  • Pen-testing & Ethical Hacking (20 credits)
  • Cyber - AI (20 credits)
  • Innovation & Creativity Clinic: Project Based Learning (10 credits)
  • Individual Research Project (60 credits)
  • Network Security and Monitoring (20 credits)
  • Software Assurance (20 credits)
  • Cryptography (20 credits)
  • Applied Cyber Security Internship (0 credits)

Professional Accreditations

Fully certified by GCHQ/NCSC https://www.ncsc.gov.uk/information
csc-certified-cyber-security-master-s-degrees


World Class Facilities

The syllabus, teaching materials and labs are informed by the world-class research being undertaken at the Centre for Secure Information Technologies (CSIT) at Queen's University Belfast. In addition to GCHQ/NCSC Master’s certification, CSIT itself is also certified as an Academic Centre of Excellence in Cyber Security Research by GCHQ/NCSC.


Student Testimonials

Our MSc is informed by the world-class research being undertaken at the Centre for Secure Information Technologies (CSIT). In 2015 Queen Elizabeth II awarded CSIT a Queen’s Anniversary Prize for Higher and Further Education for its work in strengthening global cyber security and protecting the online activity of billions of internet users around the world. Belfast is rapidly developing a reputation as a global hub for cyber security and we hope students will be inspired to thrive in this dynamic and exciting environment. Dr Niall McLaughlin - Course Director


Course Details

The course, comprising seven taught modules and a research project, provides a broad foundation in cyber security. The MSc in Applied Cyber Security is available in a full-time or a part-time option. Full-time (1-year): Consists of seven taught modules (120 CATS points) and a 3-4 month practical project of a research nature (60 CATS). Part-time (2+ years): Part-time students are normally enrolled for two years. The first year will normally compromise four taught modules (60 CATS), and the second year normally comprises three taught modules (60 CATS) plus an individual research project (60 CATS).


Entrance Requirements

Normally a 2.1 Honours degree or equivalent qualification acceptable to the University in Computer Science, Software Engineering, Electrical and/or Electronic Engineering, Mathematics with Computer Science, Physics with Computer Science or a related discipline. Applicants must normally have achieved 2:1 standard or above in relevant modules. Applicants who hold a 2.2 Honours degree and a Master’s degree (or equivalent qualifications acceptable to the University) in one of the above disciplines will be considered on a case-by-case basis.


International Students

Our country/region pages include information on entry requirements, tuition fees, scholarships, student profiles, upcoming events and contacts for your country/region. Use the dropdown list below for specific information for your country/region.


English Language Requirements

Evidence of an IELTS* score of 6.0, with not less than 5.5 in any component, or an equivalent qualification acceptable to the University is required (*taken within the last 2 years).


Tuition Fees

Northern Ireland (NI) 1 | £7,300 Republic of Ireland (ROI) 2 | £7,300 England, Scotland or Wales (GB) 1 | £9,250 EU Other 3 | £25,800 International | £25,800


Additional course costs

Students undertaking a 3 month summer placement or a one year professional internship are responsible for funding travel, accommodation and subsistence costs. These costs vary significantly depending on the location and duration of the placement. Students may receive payment from their placement provider.


Career Prospects

In keeping with the aims of GCHQ/NCSC certified Master’s courses, this programme is intended to provide:


  • a deeper understanding of cyber security concepts, principles, technologies and practices
  • a bridge between undergraduate degrees and careers in cyber security
  • a platform for further research at Doctoral level
  • an effective way for people in mid-career to enhance their knowledge of the subject or to move into cyber security as a change of career path.

Graduate Plus/Future Ready Award for extra-curricular skills

In addition to your degree programme, at Queen's you can have the opportunity to gain wider life, academic and employability skills. For example, placements, voluntary work, clubs, societies, sports and lots more. So not only do you graduate with a degree recognised from a world leading university, you'll have practical national and international experience plus a wider exposure to life overall. We call this Graduate Plus/Future Ready Award. It's what makes studying at Queen's University Belfast special.


Modules

Foundations of Cyber Security (10 credits)


  • Overview: This module targets both Law and EEECS students who are seeking to develop a base-level understanding of the main issues within the field of Cybersecurity and the building blocks of a defence system.
  • Learning Outcomes: Upon successful completion of this module, a student will have achieved the following learning outcomes:
    • Increased understanding of the cyber security landscape
    • Have an awareness of fundamental cyber security concepts
    • Be able to identify cyber security risks and threats
    • Critically reflect on the impact and context of cyber security in society

Pen-testing & Ethical Hacking

  • Overview: This module seeks to develop a student’s skills in penetration testing, in line with recommendations in Cybok. Students will develop a methodical approach to evaluating the security profile of companies and applications by using best practices in Pen-testing and Ethical Hacking.
  • Learning Outcomes: Upon successful completion of the module a student will be able to:
    • Understand test infrastructures for vulnerabilities
    • Understand malicious attacks and
    • Be able to model penetration test engagement: Initial engagement, scoping, testing, reporting and follow up (Engagement Lifecycle).
    • Be able to rate the severity of issues found.
    • Be able to carry out penetration test development and create a plan of action

Cyber - AI

  • Overview: This course will present an in-depth exploration of AI/ML for cyber-security. The course will be research-led, incorporating recent work in Cyber-AI from CSIT.
  • Learning Outcomes: Successful students will be able to:
    • Understand and apply concepts and algorithms of machine learning to solve cybersecurity specific problems.
    • Implement, evaluate and compare machine learning algorithms on cyber security problems involving real datasets.
    • Understand and apply concepts related to the security of AI Models, including attacks and defence methods.

Innovation & Creativity Clinic: Project Based Learning

  • Overview: Project Based Learning (PBL) is a pedagogical approach built upon a real-world case in which students learn through the experience of problem- solving.
  • Learning Outcomes: This innovative approach of academic exercise will develop student skills such as research, communication/ presentation and ability to work in a collaborative environment. By the end of the module, students will develop the following skills:
    • problem-solving;
    • critical thinking and analysis;
    • information processing skills.
    • learning by doing/ questioning;
    • collaborative learning;
    • capacity of offering clear solutions

Individual Research Project

  • Overview: The project will take the form of an extensive research investigation. A research problem will be investigated that is relevant to the topic of cyber security.
  • Learning Outcomes: Learning Outcomes
    • On completion of this module, the successful student will have achieved the following learning outcomes, commensurate with module classification:
    • Deep knowledge and understanding of a given research problem
    • Critically evaluate a research problem
    • Conduct a detailed analysis of the literature
    • Act autonomously and creatively in planning and implementing tasks
    • Develop complex supporting software, hardware or experimental setup
    • Critically analyse results
    • Communicate conclusions clearly

Network Security and Monitoring

  • Overview: • Network fundamentals, OSI model, TCP/IP, network protocols • Network threats and vulnerabilities • Anatomy of an attack from a network perspective • Secure network principles, design and architectures • Network security monitoring theory and practice • Packet and flow analysis • Access control, firewalls and DMZs • Intrusion detection, prevention and response • Tools for network monitoring and pen-testing • Emerging topics in network security.
  • Learning Outcomes: • Comprehensive understanding of key problems in network security and the threat landscape • Critical awareness of how network traffic can be manipulated and the network misused to enable attacks, the consequent risks, and an ability to select mitigation measures • Ability to devise, analyse and make judgements on the effectiveness of prevention, monitoring and detection tools and methodologies • Ability to design and assess a network architecture based on secure design principles • Practical skills to monitor and analyse networks using appropriate software tools

Software Assurance

  • Overview: Software is ubiquitous and underpins much of our services and technologies that are essential for business, government, e-commerce and society.
  • Learning Outcomes: Upon successful completion of this module, a student will have achieved the following learning outcomes:
    • Understand and analyse the cyber security threat landscape;
    • Apply software assurance best practice;
    • Manage and implement software assurance processes;
    • Critically assess security requirements;
    • Identify risks and vulnerabilities in software components;
    • Implement secure coding standards;
    • Software verification using pen-testing and code analysis tools.

Cryptography

  • Overview: This module will introduce the basics of cryptography and how to achieve practical crypto implementations. This will include a study of classical cryptographic algorithms.
  • Learning Outcomes: On completion of this module, a student will have achieved the following learning outcomes, commensurate with module classification:
    • Comprehensive understanding number theory employed in cryptography
    • Analyse different cryptographic primitives used in security architectures
    • Critically evaluate when and why it is suitable to use different cryptographic primitives
    • Critical awareness of cryptanalytic techniques
    • Practical techniques in side-channel cryptanalysis to break encryption algorithm implementations
    • Critically reflect on how to implement secure and efficient cryptographic algorithms

Applied Cyber Security Internship

  • Overview: The overall aim of the professional internship is to provide the student with experience in industry which complements the academic study in the University and contributes to their development. The Professional Internship is a compulsory part of the programme.
  • Learning Outcomes: Understandably, students on placement will engage in widely differing activities, However, the great majority of placements should enable students to:
    • Understand the operation of industrial, commercial or government service organisations.
    • Understand the systems of communication, control and responsibility within the organisation.
    • Acquire experience of working with other people at all levels.
    • Have an appreciation of the organisational and administrative principles of running a business.
    • Further develop their personal communication skills; good use of language, accurate writing and appropriate style and manner are required.
    • Learn how they can best contribute to the organisation and develop their potential and self-management; appropriate application of initiative should be encouraged.
    • Acquire confidence in applying their knowledge to the solution of real problems; in keeping with this, they should be given progressively increasing responsibility.
See More
How can I help you today?