| Program start date | Application deadline |
| 2025-09-15 | - |
| 2026-09-15 | - |
| 2027-09-15 | - |
Program Overview
Applied Cybersecurity MSc
Overview
This course is excellent preparation for jobs in cybersecurity, which is a rapidly growing area given the rise in computer-related crime. You’ll study topics such as network security and cybersecurity in organisations, looking at the processes, procedures and protocols required to implement effective secure and dependable systems.
Using the latest forensic analysis tools, you’ll interrogate data and systems, examining applications of cryptography, secure programming and defensive programming, as well as learning how to design a secure and resilient system.
In addition to the taught modules, you'll have the opportunity to undertake a placement (subject to availability) and put your skills into practice, enhancing your employability. You can find your own placements or develop professional practice projects, working in our Digital Incubator or research-based projects with one of our academic research teams.
This highly practical course means you’ll have the opportunity to experience the latest technologies and tools used in industry, giving you the confidence to be productive and effective when you go out into the workplace.
Why us?
- The course includes practical experience throughout, enabling you to transfer your new skills to industry
- There is a strong employability focus with strong links with companies in the region, and our modules are created in collaboration with employers so you graduate with the key skills and knowledge to make an immediate impact in your career
- The course is 100% coursework-based with no exams
- Sunderland boasts the second-fastest growth in digital turnover outside of London, and is the ideal city to study computing and set up a business
Course structure
You’ll be taught by passionate academics who produce internationally-excellent research. A typical week for you will include lectures, group work, research, discussion groups and seminars. Assessment is 100% coursework-based with no exams, with methods including written reports and research papers, practical assignments and the Masters project. The placement element of the course will be assessed by a portfolio of evidence gathered during your work, regular logs of your progress, progress reviews and a final presentation or video.
Compared to an undergraduate course, you will find that this Masters requires a higher level of independent working.
Course modules
Core modules:
- Fundamentals of Cybersecurity (30 credits)
- Cover a range of governance and management topics which will enable you to determine, establish and maintain appropriate governance, delivery and creation of cybersecurity solutions for information, systems and network security.
- Understand the underlying technologies of secure systems and gain a critical awareness of the inherent risks and related privacy issues of their use in the cybersecurity environment by applying concepts such as the principles of least privilege, separation of risk, defence in depth and secrecy.
- Learn to analyse the range of trade-offs in balancing the security properties of confidentiality, integrity and availability (CIA) and the usability demands of computer and information systems.
- Learn how to select the appropriate tools and techniques to address and manage concepts of risk, threats, vulnerabilities and potential attacks.
- Explain, apply and evaluate the concepts of trust and trustworthiness in a cybersecurity context and apply the issues associated with authentication, authorisation and access control.
- **Technology Management for Organisations (30 credits)
- Learn to apply the principles, policies and procedures of cybersecurity and data science to provide resilient and robust organisational solutions for secure and valuable information.
- Develop techniques and use tools that will enable you to undertake critical analysis of the challenges and opportunities of using cybersecurity to mitigate and manage risk to data and enable business continuity in the case of data breaches.
- Develop a critical understanding of governance, standards, audit, assurance and review in order to evaluate the challenges in managing technology.
- Cyber Resilience and Incident Response (30 credits)
- Consider cybersecurity in design and development using the concepts of secure design across a range of platforms and problem areas.
- Study applied cryptography, secure programming and defensive programming.
- Gain the knowledge and skills to undertake first-response in cyber breach and associated incidents.
- Evaluate effective measures for securing evidential content in the wake of an event, technical issues relating to breaches, factors for mitigating risk, the impact this may have on the organisation and those directly affected by breach data loss in a legal context.
- Acquire the technical knowledge and skills to respond to breaches and implement proactive measures to potentially prevent their occurrence.
- Cybersecurity and User Experience Design (30 credits)
- Study the two themes of cybersecurity and usability in software design.
- Learn to understand the trade-offs and challenges these themes present.
- Research challenges in the areas of usable security through a survey of past and recent research in usable cybersecurity.
- Examine the nature of usability and the user experience, as it applies to cybersecurity, the impact of user psychology, user models, usage contents and usability evaluation techniques.
Year 2 modules include:
- Computing Masters Placement (60 credits)
- Tackle real-world problems within an organisation.
- Develop an enterprising solution to a problem, either of your own devising or to answer a business need through the Digital Incubator.
- Alternatively, work on a research project with an academic colleague.
- Computing Masters Project (60 credits)
- Develop a practical deliverable and investigate an area of academic research through the support of a sponsor for example: an IT strategy; an investigative study; a technically challenging artefact (e.g. a feasibility study, design, implementation, re-engineered solution); or undertake a theoretical review based on a novel research question (provided by a research active member of staff).
- Underpin the project with a literature review that is a conceptual framework of your study – a systematic synthesis of concepts, assumptions, expectations, beliefs, and theories that supports and informs your research.
Facilities
You’ll be based at The David Goldman Technology Centre, on the Sir Tom Cowie Campus at St Peter’s; it looks out over the River Wear and is less than a mile from the seaside.
Entry requirements
Our typical offer is:
- Qualification | Minimum grade
- a bachelor's degree (3 years) | 2:2 classification
If you already hold a postgraduate qualification, please see our Applying for additional postgraduate degrees Help and Advice article.
If you don't meet our standard entry requirements, you can take one of the foundation pathways at our partners ONCAMPUS Sunderland. Find out more information and whether your course is eligible on our ONCAMPUS page.
If your qualification is not listed above, please contact the Student Administration team at for further advice.
We require applicants to hold an undergraduate degree with a classification of 2:2 or above in computing or a 2:1 or above in a relevant non-computing discipline, such as mathematics, statistics or engineering.
If English is not your first language, please see our English language requirements.
Is your qualification not displaying here? For international qualifications, search our full list of international entry requirements for this course.
Fees and finance
Fees are:
- £9,250 if you are from the UK/Europe
- £19,000 if you are an international student
If you currently serve (or have recently served) within the Armed Forces, then the Ministry of Defence's ELCAS scheme may be able to help cover your funding for this course.
See the scholarships and bursaries that may be available to you.
This information was correct at the time of publication.
Career ready
There is a high demand for cybersecurity professionals. On completion of this course, you’ll progress in some of the most attractive fields and industries as we prepare you for a range of cyber security jobs. Advance your career in a wide range of roles, including information security manager, security analyst, security architect, security administrator, incident responder, security engineer, security auditor, security software developer and vulnerability assessor.
Strong industry links
The cybersecurity course is underpinned by strong collaboration with employers, and it is further enhanced by the contribution from cybersecurity employers and external experts in a number of ways including a series of guest lectures, master classes and seminars.
Graduates studying Cybersecurity have gone on to secure employment with a range of companies and organisations including: GCHQ, (ISC)2, Accenture, HPE, BT, PWC, SAGE, Sunderland City Council, Northumbria Police, Durham Constabulary, and the Cybersecurity Workforce Alliance.
Professional practice placement
This course provides you with the opportunity to undertake professional practice by either undertaking a placement in an industry organisation (subject to availability) or undertaking professional or relevant, research-based practice work.
The placement will allow you to develop your research, knowledge and technical skills, and will improve your interpersonal, team working and project management skills, boosting your academic performance and future employability prospects.
We cannot guarantee external placements for all students but will support you in securing these and will offer professional or research-based practice projects if an industrial placement is not possible.
