The course covers a wide range of topics including programming, databases, security, project management and computer networking The educational aims of this course are as follows: Enhance critical understanding of security processes, methodologies and practices with clear references to standards and legal requirements around cybersecurity domains so as to better fit theory into practice. The course will provide the foundations to understand and analyse threats actors, multistage cyber-attacks and proper controls in place to mitigate their risks and impact in alignment with the infor...
The course covers a wide range of topics including programming, databases, security, project management and computer networking The educational aims of this course are as follows: Enhance critical understanding of security processes, methodologies and practices with clear references to standards and legal requirements around cybersecurity domains so as to better fit theory into practice. The course will provide the foundations to understand and analyse threats actors, multistage cyber-attacks and proper controls in place to mitigate their risks and impact in alignment with the information security strategies and policies imposed. The course will offer you the synthesis skills required around security breaches and violations in all domains of interactions in the cyberspace (physical, natural and electronic) and help you to further articulate and understand the importance of compliance, auditing and governance in modern Information security management systems. Be exposed to a wide range of pedagogical approaches in articulation of network defence and offence tools and techniques with strong system administration as part of the skills development throughout the programme. This will give you a more holistic education experience that strikes a balance between the technical and management skills much on demand in the cybersecurity domain. The programme will develop the appropriate learning platform to enhance research underpinned teaching and further your knowledge in order to allow entry to a doctoral level of studies while increasing their awareness and exposure to the relevant professional codes and conduct expected of Information security professionals and active researchers.
Some courses vary and have tailored teaching options, select a course option below.
Course Details
Information
Study Mode
Part-time
Duration
2 Years
Start Date
05/2026
Campus
Luton Campus
Application deadline
Provider Details
Codes/info
Course Code
Unknown
Institution Code
B22
Points of Entry
Unknown
Take the next steps at University of Bedfordshire with our postgraduate course search.