+ All Categories
Home > Documents > Infosec Prospectus London University

Infosec Prospectus London University

Date post: 06-Jan-2016
Category:
Upload: garcia-a-javier
View: 66 times
Download: 0 times
Share this document with a friend
Description:
Mark of excellence, Quality of learning, Worldwide relevance, Access a wealth of resources, flexible learning, module outlines, how to apply and fees.
Popular Tags:

of 16

Transcript
  • Postgraduate courses in

    londoninternational.ac.uk/infosec

    Information Security20152016The World Class: studied anywhere, valued everywhere.

    Academic direction by

  • Join the world class

    Postgraduate distance learning in Information Security2

    1 A mark of excellence Gain a University of London degree and increase your potential career development in information security-related fields.

    2 Quality of learning The programmes in this leaflet are developed by academics at Royal Holloway, one of the worlds leading centres for information security.

    3 Worldwide relevance You will benefit from the commercially relevant knowledge of Royal Holloways academics, with content that includes cryptography, computer security and digital forensics.

    4 Access a wealth of resources You receive comprehensive study guides specially written by subject experts at Royal Holloway, as well as access to online resources.

    5 Flexible learning With no travel, relocation or accommodation costs, studying through the University of London International Programmes is much more affordable than coming to London to study on campus. Whats more, you can continue working full time.

  • In the increasingly competitive environment of worldwide access to higher education, the University of London International Programmes continue to offer a guarantee of quality, value and intellectual rigour.Professor Sir Adrian Smith FRS Vice-Chancellor, University of London

    londoninternational.ac.uk/infosec 3

  • Your prestigious University of London qualification

    Postgraduate distance learning in Information Security4

    About your qualificationWhen you graduate with a degree, diploma or certificate from the University of London you will receive two important documents your Final Diploma (the parchment you receive on graduation) and a Diploma Supplement.

    The Diploma Supplement Describes the nature, level and content of programme you successfully completed.

    Includes the transcript of courses taken, marks achieved and overall classification.

    States the role of Royal Holloway and the method of study.

    The Final Diploma Indicates that you were registered with the University of London and awarded a University of London degree, diploma or certificate.

    Gives the name of the University of London College that developed the syllabus and provided assessment.

    Features the University of London crest and the Vice-Chancellors signature.

  • Key dates

    Application deadline 31 July

    Registration deadline 31 August

    Programme starts 1 October

    Examinations take place May

    A global reach with 54,000 students spanning 180 countries

    Postgraduate courses in Information SecurityJoin the world class 2

    Your prestigious University of London qualification 4

    Academic Direction: Royal Holloway, University of London 6

    Welcome to a world-renowned programme 7

    Why study with us? 8

    Programme structure 9

    An innovative approach to learning 10

    Module outlines 11

    Entrance requirements 13

    How to apply and fees 14

    Contents

    londoninternational.ac.uk/infosec 5

  • Peter Komisarczuk Distance Learning Programme Director, Royal Holloway

    Academic direction: Royal Holloway, University of London

    Postgraduate distance learning in Information Security6

    A history of academic excellenceRoyal Holloway enjoys an international reputation for the highest quality teaching and research across the sciences, arts and humanities.

    The famous Founders Building (pictured right) was officially opened by Queen Victoria in 1886. Since then, Royal Holloway has continued to grow in size and status, building on the excellence of its scholarship and the talents of its students.

    Today, a combination of distinctive character, academic vision and membership of the University of London has established Royal Holloway among the top research-led university institutions in the country.

    Royal Holloway Information Security Group (ISG)Royal Holloway, University of London, is home to the ISG, one of the largest academic security groups in the world. It brings together in a single institution expertise in education, research and practice in the field of Information Security.

    The ISG offers an active research environment. It has a thriving PhD community and offers world-leading Masters and Postgraduate Diploma programmes (campus-based and online). The ISG also includes the Smart Card Centre of Excellence which it founded with Vodafone and Giesecke & Devrient. In recognition of its work, the ISG received a prestigious Queens Anniversary Prize for Higher and Further Education.

  • either on academic research or specific topics such as forensics. From the start, the Royal Holloway programme has covered the entire breadth of the subject: from the management of security, to computer crime, to cryptographic mechanisms and how they are used in the protection of computers and their networks.

    Given our strength in depth across the programme and the active contribution of security professionals to its continuing review and development, we are uniquely well placed to maintain the programmes relevance within a fast-moving industry.

    The content of the distance learning MSc, launched in 2003, is broadly similar to that for campus-based students at Royal Holloway. Delivered online, you are fully supported by a Virtual Learning Environment through which you can interact with tutors and fellow students worldwide. We look forward to welcoming you to our online security community.

    In acknowledgement of his major contributions to Information Security, Professor Fred Piper was elected to the InfoSecurity Europe Hall of Fame in 2008. He has also been recognised as a Fellow of (ISC)2, the elite network of certified information security professionals.

    Welcome to a world-renowned programme

    londoninternational.ac.uk/infosec 7

    An introduction from Professor Fred Piper, Founder and Former Director, Information Security GroupLaunched in 1992, Royal Holloways MSc in Information Security was the first of its kind in the world. Since then, the number of degree programmes has grown rapidly, concentrating

    GCHQ Certification of Masters degrees in Cyber SecurityRoyal Holloways MSc in Information Security is one of just four UK university degree programmes to receive full certified status by GCHQ in 2014. The certification applies to Royal Holloways campus-based and distance learning degrees, with the latter currently being the only distance learning programme to have received the certification.

    The CESG website states: The successful degrees were judged to provide well-defined and appropriate content, delivered to the highest standard. Partnerships and a collaborative approach have been key throughout the process with the assessment of applicants based on the expert views of industry, academia, professional bodies, GCHQ and other government departments.

    For more information, please see the CESG website: https://www.cesg.gov.uk/awarenesstraining/academia/Pages/Masters-Degrees.aspx

  • Keith Vella LicariMSc Information Security, Malta

    About two to three years ago I was looking to make a career change and I applied for a position with Deloitte Malta. At the time I was studying for the MSc in Information Security and I believe that it made a difference when my qualifications were compared with those of other candidates.

    The company I work for at the moment is eager to take my newly acquired skills to the market and is actively looking at providing security services to the local market. I would recommend the MSc in Information Security to all those who may be interested in making a career shift and who are actively considering a job in information security.

    Postgraduate distance learning in Information Security8

    Why study with us?

    Is the programme for you?Our students come from a variety of backgrounds, ranging from new graduates through to senior security managers seeking a formal qualification in Information Security. Graduates of the programme can be found in a range of organisations working as security professionals, from large financial institutions to technology and research-oriented organisations.

    To ensure that the programme is completely up to date, several modules involve substantial input from internationally recognised information security experts. Furthermore, all academic staff have

    links with external organisations that are involved with information security and secure digital business.

    In addition to the distance learning version, the programme is also available directly through Royal Holloway (full/part time, block mode, or as individual modules for continuing professional development).

    Flexible studyStudying at a distance allows you a high degree of flexibility. Generally, you can study whenever, wherever and however you choose.

    Fits your continuing professional development needs. You can study for either a full MSc or Postgraduate Diploma, or choose to take any modules for your continuing professional development.

    Fits your lifestyle. You can fit your study around family and work commitments.

    Fits your finances. Your overall costs are substantially lower than if you came to London to study full time. You will have no travel, relocation or accommodation costs.

    Fits with your location. You can study anywhere and choose where you sit your exams.

  • londoninternational.ac.uk/infosec 9

    Programme structure

    Daniel RoethlisbergerMSc Information Security, Switzerland

    Ive been in information security ever since I started my professional life and I wanted an academic qualification in the field I am working in.

    The fact that I could do distance learning was crucial for my decision, because I have quite a busy life and I needed flexibility to study when I have time.

    My favourite part of the course was the Advanced cryptology module. I really enjoyed gaining in-depth knowledge in the field. I would definitely recommend the distance learning MSc in Information Security, especially for people who are in a day job and need the flexibility.

    StructureFour compulsory core modulesSecurity management

    An introduction to cryptography and security mechanisms

    Network security

    Computer security

    PLUS two optional modules chosen from:Application security

    Advanced cryptography

    Database security

    Cybercrime

    Smart cards/tokens security and applications

    Digital forensics

    Security testing theory and practice

    PLUS (MSc only)Project

    Additional informationThere is an induction module for this programme available through our website. You are strongly advised to look at this for further details about learning materials and online support. Please visit: http://bit.ly/induction-module

    AssessmentYou do not have to come to London to sit your exams, as we have exam centres in more than 180 countries worldwide.

    Modules are assessed by unseen written examinations in May each year. For An introduction to cryptography and security mechanisms, assessment also includes coursework. The assessment of the project will also include the submission of a written dissertation.

    Time commitmentFor individual modules, a reasonable expectation for study and exam preparation would be around 200 hours. For most students a reasonable expectation for completion of the programme in the minimum period would be to study 20 hours per week during the academic session (September-April). You have between 2-5 years to complete the MSc, and between 1-5 years to complete the Postgraduate Diploma.

    FlexibilityIf desired, modules can also be studied on the Royal Holloway campus in one week long blocks instead of by distance learning.

  • An innovative approach to learning

    Postgraduate distance learning in Information Security10

    Virtual Learning Environment (VLE)The programme is offered online and is fully supported by a VLE, a virtual classroom that the University uses to deliver the content of the programme via the Internet.

    The VLE will allow you to: access your study materials

    take part in discussions/seminars with your tutor and other students

    receive notices, seminar dates, project support and other programme-related information

    ask questions regarding the administration of the programme

    seek help for technical problems that you may encounter.

    Study materialsWhen you register we will provide: a Student Handbook

    a copy of The Sciences Good Study Guide

    Textbooks (for certain modules)

    USB memory sticks

    a password and username to allow you to log on to the VLE.

    Study support The VLE enables you to communicate with tutors and other students from around the world, share insights and support each other in the distance learning process.

    You will discuss topics in tutored groups. You will also be able to contribute to the conferencing discussion at the times that suit you best. All contributions are stored so that you can make reflective and considered contributions. You are also able to print out a permanent record of all discussions on a particular topic within your tutor group.

    Most subjects will include a variety of non-assessed coursework and you will be expected to participate in all the virtual seminars.

    Continuing Professional Education (CPE)CPE credits are earned through activities related to the information security profession, including the completion of higher academic courses. All of the compulsory core modules are also available on a stand-alone basis for the purposes of

    CPE. On the successful completion of each module you will receive a University of London certificate.

    Students who have completed the Postgraduate Diploma or MSc degree in Information Security may also register for further optional modules offered by the programme.

    If you meet all the necessary entrance requirements you may later apply to register for the MSc and gain credits for the modules you have already passed.

    David Lindsay PrizeThe British Computer Society Information Security Specialist Group awards the David Lindsay Prize for the dissertation that best addresses innovative applications of Information Security. All MSc projects in the area of Information Security are eligible for the prize. The final decision is made by the British Computer Society Information Security Specialist Group.

  • and key distribution mechanisms. This leads naturally to consideration of security solutions for a variety of types of practical networks, including LANs, WANs, proprietary computer networks, mobile networks and electronic mail.

    Computer security This module deals with the more technical means of making a computing system secure. This process starts with defining the proper security requirements, which are usually stated as a security policy. Security models formalise those policies and may serve as a reference to check the correctness of an implementation. The main security features and mechanisms in operating systems will be examined as well as security-related issues of computer architecture. Specific well-known operating systems are then studied as case studies. Other areas investigated include the security of middleware, software protection and web security.

    Application security This module analyses the role of security from the perspective of business application design. The aim is to learn the fundamental processes that need to be incorporated into the application development lifecycle,

    Security management This module will emphasise the need for good security management. Its aims are to identify the problems associated with security management and to show how various (major) organisations solve those problems.

    An introduction to cryptography and security mechanisms

    The approach of this module is non-technical. The main objective is to introduce the students to the main types of cryptographic mechanism, to the security services which they can provide, and to their management, including key management. The mathematical content of this module is minimal. Support materials for the elementary mathematics needed for this module will be provided.

    Network security This module is concerned with the protection of data transferred over commercial information networks, including computer and telecommunications networks. After an initial brief study of current networking concepts, a variety of generic security technologies relevant to networks is studied, including user identification techniques, authentication protocols

    londoninternational.ac.uk/infosec 11

    Module outlinesand thus how to integrate security as a core component within an application architecture. This module uses case studies to support the learning of these fundamental application security design skills, to understand what decisions need to be made to both meet business requirements and to mitigate information security risks.

    Advanced cryptography This module follows on from the introductory cryptography module. In that module cryptographic algorithms were introduced according to the properties they possessed and how they might fit into a larger security architecture. In this unit we look inside some of the most popular and widely deployed algorithms and we highlight design and cryptanalytic trends over the past twenty years. This module is, by necessity, somewhat mathematical and some basic mathematical techniques will be used. However, despite this reliance on mathematical techniques, the emphasis of the module is on understanding the more practical aspects of the performance and security of some of the most widely used cryptographic algorithms.

  • Postgraduate distance learning in Information Security12

    Database securityThis module covers several aspects of database security and the related subject of concurrency control in distributed databases. We will discuss methods for concurrency control and failure recovery in distributed databases and the interaction between those methods and security requirements. We will also examine how access control policies can be adapted to relational and object-oriented databases.

    Cybercrime This module complements other modules by examining the subject from the criminal angle and presenting a study of cybercrime and the cyber criminal. We will discuss its history, causes, development and repression through studies of surveys, types of crime, legal measures, and system and human vulnerabilities. We will also examine the effects of cybercrime through the experiences of victims and law enforcement and look at the motives and attitudes of hackers and other cyber criminals.

    Smart cards/tokens security and application

    This module will:

    provide an overview of smart cards/tokens and their properties

    introduce various applications that exploit smart cards/tokens

    examine benefits, threats and attacks

    consider systems for the development, manufacture and management of smart cards/tokens

    review smart card standards and security evaluation methodologies.

    Digital forensicsThis module will:

    provide the foundations and theoretical underpinnings for an understanding of the way in which data that can subsequently be used as evidence is generated, stored, and transmitted.

    cover methods for the collection and analysis of digital evidence which will not alter the underlying data or potentially trigger destructive mechanisms and which can be reproduced reliably.

    provide an understanding of general and UK legal requirements as well as resulting frameworks for the handling and processing of such evidence.

    Security testing theory and practice

    This module provide the foundation and theoretical underpinning which aims to give an understanding of the way in which IT systems can be attacked and penetrated by circumventing security or exploiting vulnerabilities in the system. This foundation forms the basis of a methodical approach to surveying and auditing systems, and prepares candidates to design secure systems, identify vulnerabilities, and defend systems against intrusion.

    Project (MSc only)The project is a major individual piece of work. It can be of academic nature and aim at acquiring and demonstrating understanding and the ability to reason about some specific area of Information Security. Alternatively, the project work may document the ability to deal with a practical aspect of Information Security.

    Further information about all the modules, including their aims and learning outcomes, are available at: londoninternational.ac.uk/infosec

  • londoninternational.ac.uk/infosec 13

    Entrance requirements

    AcademicA second class honours degree or the equivalent, in a relevant discipline (eg. computer science, electronics, information systems, or mathematics) from a university or other institution acceptable to the University.

    Alternatively, mature students with industrial experience will be considered and are encouraged to apply.

    English languageA high level of competence in English. You may be required to pass, or to have passed within the last three years, at the appropriate level, a test of proficiency in English acceptable to the University. Mature students working in an English-speaking environment can expect to be exempted from such a proficiency test.

    Individual modules for Continuing Professional DevelopmentStudents applying for individual modules should normally satisfy the entrance requirements for the MSc/Postgraduate Diploma. However, if

    you do not hold such qualifications, the University will still consider your application. Upon successful completion of two individual modules, you will then be considered for entry to the Postgraduate Diploma or MSc degree programmes.

    Minimum PC specificationHardware requirement:

    Any recent laptop or desktop machine with speakers.

    An ISP connection.

    Software requirement:

    Adobe Acrobat Reader (download latest version free from: adobe.com).

    Flash Plug-in: Adobe Flash Player (download latest version free from: adobe.com/products/flashplayer).

    Real Player: RealOne Player (Basic) (download latest version free from: http://uk.real.com).

    A recent version of Microsoft Office or any compatible product such as Open Office (Word, PowerPoint, Excel and Access).

    Cyrill BrunschwilerMSc Information Security, Switzerland

    Ive been working in information security for about 10 years now and needed some external input to understand whether Im on top of the technology.

    I came across the Royal Holloway course and it perfectly fit my work-life balance.

    I work for a company called Compass Security. They specialise in penetration testing, security reviews and digital forensics. I need to understand our customers opinions on risk and security needs, and Royal Holloway helped me a lot to understand that risk level.

  • Postgraduate distance learning in Information Security14

    FeesThe fees given below refer to the 20152016 academic year only and are effective from 1 March 2015. Fees are subject to annual review and may be paid in one of two ways:

    Option 1On registration, a single payment covering the registration fee and all module fees:

    Total MSc degree 14,265

    Total Postgraduate Diploma 11,000

    Option 2Pay the registration fee, plus the fee for each module you take in your first year. Then, in subsequent years, you pay the fee for each new module you take.

    Registration fee 1,220

    Fee per module 1,630

    Project (MSc only) 3,265

    Please note: You will have to pay an additional fee to your local examination authority (this fee will vary).

    only be considered when we have received all the necessary documentation, including the references, where applicable.

    Stage 4If your application is successful, we will send you:

    an offer of registration

    instructions for completion of the payment and registration process

    a link to the Regulations.

    Stage 5Registration needs to be completed by 31 August*. The programme starts on 1 October.

    Additional informationIf you have any questions about your application after you have applied to us, please contact: Tel: +44 (0)20 7862 8360 enquiries.londoninternational.ac.uk

    *Please note: as there is a limit to the number of students who can be registered each year, applicants who meet the entrance requirements will be given a conditional offer of registration. Registration will then

    Getting started Please apply online at:

    londoninternational.ac.uk/how_to_apply

    Please ensure you read the Guidance notes for online applications (Postgraduate) before you complete your application.

    Stage 1Apply online via the course web pages: londoninternational.ac.uk/infosec as soon as possible, but no later than 31 July.

    Please read the How to apply section before making your application: londoninternational.ac.uk/how_to_apply

    Stage 2We will acknowledge receipt of your application form and send you a student number to use as a reference whenever you contact the University. Everyone who applies is allocated a number.

    Stage 3We will notify you whether or not you have been accepted. Please note: applications will

    How to apply and feesonly be confirmed on payment of the appropriate fee and if there is still a place available for that study year. A student whose registration is not confirmed will be made a conditional offer of registration for the following year.

  • The information contained in this leaflet was correct at the date of publication but may be subject to change. The University does not intend by publication or distribution of this leaflet to create any contractual or other legal relation with applicants, registered students, their advisers or any other persons. For the most up-to-date information please visit our website.

    Published by University of London International Programmes (Design, Editorial and Production).

    Copyright University of London, May 2015.

    londoninternational.ac.uk/infosec 15

  • londoninternational.ac.uk/infosec

    For further information on the range of programmes we offer, please visit our website or contact us at:

    The Student Advice Centre University of London Senate House Malet Street London WC1E 7HU United Kingdom

    Telephone +44 (0)20 7862 8360 enquiries.londoninternational.ac.uk

    Follow us on:

    londoninternational.ac.uk/linkedin

    londoninternational.ac.uk/googleplus

    londoninternational.ac.uk/flickr

    londoninternational.ac.uk/blog

    londoninternational.ac.uk/youtube

    londoninternational.ac.uk/facebook

    londoninternational.ac.uk/twitter

    londoninternational.ac.uk/instagram


Recommended