**Please check the Sheffield Hallam University website for the latest information.**
**Course summary**
- Develop ethical hacking skills to fundamentally understand cyber-attacks.
- Learn to deploy countermeasures that secure and protect computer systems.
- Apply and manage information security in organisational frameworks.
- Gain skills to undertake BSI ISO 27001 Lead Auditor certification.
During our MSc Cyber Security course, you’ll develop your knowledge and skills to prepare for a career as a computing se...
**Please check the Sheffield Hallam University website for the latest information.**<br/><br/>**Course summary**<br/>- Develop ethical hacking skills to fundamentally understand cyber-attacks. <br/><br/><br/>- Learn to deploy countermeasures that secure and protect computer systems. <br/><br/><br/>- Apply and manage information security in organisational frameworks. <br/><br/><br/>- Gain skills to undertake BSI ISO 27001 Lead Auditor certification. <br/><br/><br/>During our MSc Cyber Security course, you’ll develop your knowledge and skills to prepare for a career as a computing security professional. With accreditation from the National Cyber Security Centre (NCSC), you can be confident you’ll graduate with the Cyber-Body of Knowledge (CyBok), industry-standard techniques that so many employers are seeking.<br/><br/>**How you learn**<br/><br/>At Sheffield Hallam, all our courses are designed to engage you with the world and challenge you to think in new ways. You’ll get to collaborate with others, and you’ll be taught in a supportive environment where you can thrive. <br/><br/>This course explores the fundamentals in network security, where youll learn to secure networks and detect intrusions through real-world case studies. Your tutorials and workshops will emphasise information security, covering cryptography, access control and risk management for robust cyber protection. <br/><br/>The course also focuses on ethical hacking, teaching you penetration testing techniques to identify and exploit system vulnerabilities. Youll gain expertise in cyber threat intelligence and digital forensics to understand attack vectors and compile evidence for law enforcement. We’ll also prepare you for the BSI ISO 27001 Lead Auditor certification, making sure you’re ready to implement and manage information security within organisational frameworks.<br/><br/>Towards the end of the course, you’ll undertake a significant dissertation project where you’ll be researching a relevant topic. This allows you to tailor your learning towards a specific area – perhaps one you’re keen to pursue as a career. You’ll be supported through your dissertation project by a supervisor, who themselves will be a domain expert. <br/><br/>You learn through: <br/>- Tutorials <br/><br/><br/>- Workshops <br/><br/><br/>- Problem-solving activities <br/><br/><br/>- Practical projects <br/><br/><br/>- Teamwork <br/><br/><br/>- Reports <br/><br/><br/>- Demonstrations <br/><br/><br/>- Real-world case studies<br/><br/><br/>- Discussions <br/><br/><br/>- Presentations <br/><br/><br/>- Structured walk-throughs <br/><br/><br/>**Key themes** <br/><br/>You’ll start by building your knowledge and skills in network security, where you’ll learn how to secure networks and detect intrusions. This progresses into information security that provides further layers of cyber protection – including cryptography, access control and risk management. <br/><br/>You’ll then develop your ethical hacking / pen-testing skills to try and compromise those systems, to understand vectors of attack. This includes learning how to identify security vulnerabilities within operating systems, undertake password attacks, and exploit social engineering to gain system access. You’ll use platforms such as Hack The Box to safely practise and develop your skills in this area. <br/><br/>Once the fundamentals are covered, you’ll further your understanding towards security-measure compliance by working on case studies that reflect industry scenarios. This also prepares you for the Lead Auditor certification – for example, determining whether sensitive data is being properly managed with specific reference to Confidentiality, Integrity and Availability (CIA). <br/><br/>Cyber threat intelligence is another important component of the discipline, where you’ll learn about frameworks – e.g. Mitre Att&ck – and adversary behaviour to help identify attack vectors. Once attacks have happened, you’ll use digital forensics to better understand their origin, compiling evidence to help protect from future threats, and to help law enforcement agents to tackle the source. <br/><br/>**Work experience** <br/><br/>This course also has a work experience route that offers a placement in industry of up to 12 months.