Learning outcomes on successful completion of the programme will depend on the modules taken but will include some or all of the following.
Knowledge and understanding
-
Demonstrate deep knowledge of information security principles and challenges in networks and software systems, protection mechanisms, approaches to assess and mitigate risks, security standards, data protection and cybersecurity regulations
-
Demonstrate deep knowledge of network security, secure software systems development, and cryptography
-
Understand strengths and limitations of important public key and symmetric/asymmetric cryptographic protocols
-
Demonstrate advanced knowledge of security trends and technologies
-
Applying knowledge and understanding
-
Perform risk assessment, management and mitigations of secure infrastructures and operations
-
Track strategic threats and maintain situation awareness
-
Identify cybersecurity laws that apply to complex organisations and apply protection measures to comply with these laws
-
Apply network security and secure software development concepts to the design, configuration and implementation of networked, software and distributed systems technologies
-
Perform vulnerability assessment and penetration testing
-
Develop patches to fix vulnerabilities in software projects
-
Apply cryptographic techniques to secure software, systems and computer networks
-
Apply incident response principles and methodologies to secure infrastructures and operations
-
Apply advanced security knowledge to address industry and research problems
Making judgements
-
Evaluate trade-offs involving security, regulations, business, economic and management principles
-
Apply appropriate (quantitative/qualitative) risk assessment techniques to measure security risks
-
Appraise intrusion detection system and security of modern internet protocols (e.g., IPv6)
-
Identify effective penetration testing strategies
-
Apply appropriate incident response principles and methodologies to secure infrastructures and operations
-
Apply appropriate cryptographic protocols to secure networks, software and systems
-
Assess the strengths and limitations of modern security trends and technologies
Communication and working skills
-
Communicate security risks and mitigation strategies to executives
-
Work and engage in discussions in security teams, share work fairly to meet the obligations set by the group
-
Explain advantages and disadvantages of cryptographic protocols
-
Communicate security research challenges and methodologies adopted to tackle the problem and the results obtained
Learning skills
-
Attract and assess security talent
-
Lead security teams and influence organisational culture
-
Be curious about latest security vulnerabilities and technologies
-
Actively promote security practices within the organisation
-
Identify novel security research directions