Cyber Security (MSc)
- Duration: 3 years
- Mode: Part time
Open day
Find out more about studying here as a postgraduate at our next Open Day.
Why study this course
Address the key security issues that are faced by global communications and information systems and develop your practical skills through exposure to real-world problems and datasets.
Our MSc Cyber Security addresses the key security issues that are faced by global communications and information systems.
The programme, which has been shaped with input from large and small corporations via our industry advisory board, provides a mix of business context with core security, trust and privacy issues that challenge the IT sector. The learning outcomes in the programme are designed to align with the recommendations of GCHQ for a Masters level cyber security curriculum. The course builds on previous skills in computer science, to strengthen understanding of this emerging area.
As well as studying themes such as secure application development, network security, malware analysis, security operations and digital forensics, you will gain an understanding of the risk management and business continuity aspects that are crucial to cyber resilience in an ever-evolving threat landscape. This combined business/security approach provides valuable training for interacting with organisations, and understanding their business functions in a deeper context.
Using case-based analysis, you will have the opportunity to learn about security operations and forensic approaches to investigation across multiple platforms.
Distinctive features
- Researcher-led modules integrate the latest research ideas with current best practice.
- The programme is guided and supported by security practitioners from industry, ensuring high relevance and employability.
- Students will have access to our Cyber Security and Forensics Laboratory. In this dedicated network, they can explore the security challenges facing today’s professionals through experiments with real attacks in realistic real-world scenarios.
- Professionally accredited by the BCS, the Chartered Institute for IT.
- Placement opportunities with world-leading industrial security practitioners.
Where you'll study
School of Computer Science and Informatics
Our degree programmes are shaped by multidisciplinary research, making them relevant to today's employers and well placed to take advantage of tomorrow's developments.
Admissions criteria
In order to be considered for an offer for this programme you will need to meet all of the entry requirements. Your application will not be progressed if the information and evidence listed is not provided.
With your online application you will need to provide:
- A copy of your degree certificate and transcripts which show you have achieved a 2:2 honours degree in a relevant subject area, such as Computer Science or Computing, or an equivalent international degree. If your degree certificate or result is pending, please upload any interim transcripts or provisional certificates.
- A copy of your IELTS certificate with an overall score of 6.5 with 6.0 in all subskills, or evidence of an accepted equivalent. Please include the date of your expected test if this qualification is pending. If you have alternative acceptable evidence, such as an undergraduate degree studied in the UK, please supply this in place of an IELTS.
Application Deadline
We allocate places on a first-come, first-served basis, so we recommend you apply as early as possible. Applications normally close at the end of August but may close sooner if all places are filled.
Selection process
We will review your application and if you meet all of the entry requirements, we will make you an offer.
Find out more about English language requirements.
Applicants who require a Student visa to study in the UK must present an acceptable English language qualification in order to meet UKVI (UK Visas and Immigration) requirements.
Criminal convictions
You are not required to complete a DBS (Disclosure Barring Service) check or provide a Certificate of Good Conduct to study this course.
If you are currently subject to any licence condition or monitoring restriction that could affect your ability to successfully complete your studies, you will be required to disclose your criminal record. Conditions include, but are not limited to:
- access to computers or devices that can store images
- use of internet and communication tools/devices
- curfews
- freedom of movement
- contact with people related to Cardiff University.
Course structure
You will study taught modules to a total of 120 credits during the Diploma stage of your degree. All taught modules are worth 20 credits.
The Master’s stage of your degree will be an individual project (worth 60 credits) which you will write up as a dissertation, after the Diploma stage. This project will be carried out during your third year under the supervision of a member of academic staff.
This is a part-time course undertaken over three academic years. It is also available as a full-time course taken over one year.
The modules shown are an example of the typical curriculum. Final modules will be published one month ahead of your programme starting.
Year one
As a part-time student, you will complete three 20-credit modules in Year One.
Module title | Module code | Credits |
---|---|---|
Cyber Security and Risk Management | CMT116 | 20 credits |
Cybersecurity Operations | CMT217 | 20 credits |
Developing Secure Systems and Applications | CMT310 | 20 credits |
Year two
As a part-time student, you will complete three 20-credit modules in Year Two.
Module title | Module code | Credits |
---|---|---|
Penetration Testing and Malware Analysis | CMT121 | 20 credits |
Computer and Network Forensics | CMT216 | 20 credits |
Business Continuity and Transformation | CMT308 | 20 credits |
Year three
As a part-time student, you will complete your 60-credit dissertation project in Year Three.
Module title | Module code | Credits |
---|---|---|
Dissertation | CMT400 | 60 credits |
The University is committed to providing a wide range of module options where possible, but please be aware that whilst every effort is made to offer choice this may be limited in certain circumstances. This is due to the fact that some modules have limited numbers of places available, which are allocated on a first-come, first-served basis, while others have minimum student numbers required before they will run, to ensure that an appropriate quality of education can be delivered; some modules require students to have already taken particular subjects, and others are core or required on the programme you are taking. Modules may also be limited due to timetable clashes, and although the University works to minimise disruption to choice, we advise you to seek advice from the relevant School on the module choices available.
Learning and assessment
How will I be taught?
The School of Computer Science and Informatics has a strong and active research culture which informs and directs our teaching. We are committed to providing teaching of the highest standard.
Modules are delivered through a series of either full or half-day contact sessions, which include lectures, seminars, workshops, tutorials and laboratory classes. We regularly invite guest lecturers from industry and we pride ourselves on our hands-on experiences of practical cyber security
Most of your taught modules will have further information for you to study and you will be expected to work through this in your own time according to the guidance provided by the lecturer for that module.
How will I be assessed?
Modules will be assessed either by coursework, examination, or a combination of both.
Feedback:
Feedback on coursework may be provided via written comments on work submitted, by provision of ‘model’ answers and/or through discussion in contact sessions.
How will I be supported?
We pride ourselves on providing a supportive environment in which we are able to help and encourage our students.
At the start of your course you will be allocated a Personal Tutor who is an academic member of staff in the School and serves as a point of contact to advise on both academic and personal matters in an informal and confidential manner. Your Personal Tutor will monitor your progress throughout your time at university and will support you in your Personal Development Planning.
Outside of scheduled tutor sessions, our Senior Personal Tutor runs an open-door policy, being on hand to advise and respond to any personal matters as they arise.
What skills will I practise and develop?
The Learning Outcomes for this Programme describe what you will be able to do as a result of your study at Cardiff University. They will help you to understand what is expected of you.
The Learning Outcomes for this Programme can be found below:
Knowledge & Understanding:
On successful completion of the Programme you will be able to demonstrate:
- Knowledge of risk assessment, secure application development, network security, malware analysis, vulnerability assessment, cyber security operations, digital forensics and business continuity
- Understanding of how to conduct risk assessments and develop security policies – including technical security configurations, human factors affecting security policy, forensic responses and security monitoring
- Understanding of the cyber security landscape and professional roles within cybersecurity
Intellectual Skills:
On successful completion of the Programme you will be able to demonstrate:
- The ability to assess an unseen environment, evaluate the security landscape and select appropriate solutions and methods to present the case for a suitable cybersecurity solution
- Initiative and personal responsibility in decision-making in complex and unpredictable situations.
- Systematic and creative methods for dealing with complex issues; sound judgement making in the absence of complete data.
Professional Practical Skills:
On successful completion of the Programme you will be able to demonstrate:
- Hands-on experience of applying security methods (e.g. risk assessment standards) and the fundamental concepts behind security tools (e.g. forensic toolkits and security operations centres)
Transferable/Key Skills:
On successful completion of the Programme you will be able to demonstrate:
- The ability to communicate ideas, principles and theories effectively by oral, written and practical means to both specialist and non-specialist audiences.
- Effective working in a team and as an individual.
- The ability to apply logical and analytic thinking to problems.
Tuition fees for 2025 entry
Your tuition fees and how you pay them will depend on your fee status. Your fee status could be home, island or overseas.
Learn how we decide your fee status
Fees for home status
Year | Tuition fee | Deposit |
---|---|---|
Year one | £5,850 | None |
Year two | £5,850 | None |
Students from the EU, EEA and Switzerland
If you are an EU, EEA or Swiss national, your tuition fees for 2025/26 be in line with the overseas fees for international students, unless you qualify for home fee status. UKCISA have provided information about Brexit and tuition fees.
Fees for island status
Learn more about the postgraduate fees for students from the Channel Islands or the Isle of Man.
Fees for overseas status
Year | Tuition fee | Deposit |
---|---|---|
Year one | £15,850 | £2,500 |
Year two | £15,850 | None |
More information about tuition fees and deposits, including for part-time and continuing students.
Financial support
Financial support may be available to individuals who meet certain criteria. For more information visit our funding section. Please note that these sources of financial support are limited and therefore not everyone who meets the criteria are guaranteed to receive the support.
Additional costs
Will I need any specific equipment to study this course/programme?
A relatively recent laptop will be beneficial.
Living costs
We’re based in one of the UK’s most affordable cities. Find out more about living costs in Cardiff.
Funding
Career prospects
Graduates are well prepared for a career in industrial, commercial, or governmental organisations with particular responsibility for information, network and process security.
Career destinations include: information security manager, risk manager, technical security roles in computer forensics, identity management roles, secure systems developer, and industrial and university research.
Next steps
Open Day visits
Register for information about our upcoming dates.Make an enquiry
Contact us for more information about this course.International
Learn more about our truly global university.Other course options
Discover more
Related searches: Computer science
HESA Data: Copyright Higher Education Statistics Agency Limited 2021. The Higher Education Statistics Agency Limited cannot accept responsibility for any inferences or conclusions derived by third parties from its data. Data is from the latest Graduate Outcomes Survey 2019/20, published by HESA in June 2022.