MSc Computer Science with Cyber Security
100% Online
- Programme length : 2 years part-time
- Total programme fees : ÂŁ9,480
Break into the cyber security sector
This 100% online MSc Computer Science programme is aimed at working professionals and graduates from other disciplines who are seeking to move into a career in computer science. You will develop skills in computational thinking and an academic understanding of cyber security threats and techniques for security engineering and their application to real world problems.
This programme is designed to develop your theoretical and foundational understanding of Cyber Security. As a Masters level student you will read and learn about programming techniques, computer and network infrastructure and protocols, security risks and security engineering. You will explore a range of cyber concepts and solutions such as cryptography, memory and resource management, password protection, and denial of service attacks (DoS).
Practical components and assessments are designed to enable you to further explore these concepts from a theory-led perspective and develop a better understanding of their application in real world challenges and scenarios.
Enhancing our online MSc Computer Science programmesAn exciting redesign of our MSc Computer Science online programmes is underway. As a student, this means you can expect to see enhancements and improvements to create a more engaging and dynamic learning experience including, additional video content, interactive elements, quizzes, and practical activities, as you progress through your programme. We’re also adding new content to reflect recent advancements in computer science, so our curriculum is up-to-date and in sync with the latest teaching and learning in computer science and digital technologies. |




Course Content
The programme’s eight-week modules provide an introduction to and experience of computational thinking and problem solving across software, hardware, artificial intelligence, and with a specialism in Cyber Security. The research methods and research proposal modules develop your critical evaluation, academic research and writing skills providing a sound basis for your individual research project.
- Software
- Algorithms and Data Structures
- Software Engineering
- Advanced Programming
- Hardware
- Computer Architecture and Operating Systems
- Computer and Mobile Networks
- Artificial Intelligence
- Artificial Intelligence and Machine Learning
- Cyber Security
- Cyber Security Threats
- Security Engineering
- Research project development
The modules research proposal and independent research project should focus on ideas and areas of interest within the scope of Cyber Security
- Research Methods
- Research Proposal
- Independent Research Project
Learning Outcomes
Every course at York is built on a distinctive set of learning outcomes. These will give you a clear understanding of what you will be able to accomplish at the end of the course and help you explain what you can offer employers. Our academics identify the knowledge, skills, and experiences you’ll need upon graduation and then design the course to get you there.
- Computational thinkingApply computational thinking to high security problems, using skills in analysis, design and implementation of computing systems, drawing on the foundations of cyber security and computer science and the current research literature.
- Evaluation and SynthesisAnalyse a high security problem from a written description, derive security requirements and specifications from an understanding of problems, and create and/or justify designs to satisfy given requirements, applying knowledge of risk identification and security system analysis and design.
- Software and hardwareBuild computer-based systems of varying levels of complexity to serve the needs of users, making effective use of the variety of physical implementations on which that software may be running, and applying the theory and practice of programming and software engineering.
- ApplicationCritically evaluate and effectively apply computer systems and tools such as security risk assessment tools, source code analysis tools, software security testing tools and assurance case development tools for use to address high security problems, underpinned by a knowledge of how those systems work.
- IndependenceScope, plan, manage and execute an individual cyber security research project of significant size in cyber security, demonstrating critical engagement with the discipline.
- CommunicationCommunicate complex computational problems and their solutions in written format to technical and non-technical professional colleagues, in a clear and organised manner and using compelling and convincing arguments drawn from relevant evidence.
- ProfessionalismOperate as responsible Computer Science professionals, by maintaining awareness of key legal and ethical issues and risk management.


Entry requirements for home and international students
- 2:2 undergraduate degree or equivalent qualification, including a Masters degree. If you earned your degree outside the UK, our country-specific pages can help you check if it’s equivalent to a 2:2.
If English isn't your first language you may need to provide evidence of your English language ability. We accept the following qualifications:
- International English Language Testing System (IELTS): 6.5, with 6.0 in each component
- TOEFL IBT (internet-based and special home edition): 87, with 21 in each component
- Trinity ISE: Level 3, with Merit in each component
- PTE Academic: 61, with 55 in each component
- Cambridge B2 First: 176, with 169 in each component
- LanguageCert SELT B2: 33/50 in each component
- LanguageCert Academic: 70, with a minimum of 65 in each component
- Duolingo: 120, with 105 in each component
- KTE: 478-509, with 444-477 in all other components
- Skills for English B2: Merit overall, with Pass with Merit in each component
- Oxford ELLT: 7, with 6 in each component
- Oxford Test of English Advanced: 136, with 126 in each component
- GCSE: B/6 or above
You need to have completed the test within two and a half years of the start date of your programme. You cannot combine scores from more than one sitting of the test.
You may not need to provide evidence of your English language abilities:
- If you’re from a specified majority English-speaking country
- If you’ve completed a degree in English in a specified country within seven years of your intended start date


Modules
This module provides techniques for using algorithms and associated data structures. It also covers computational thinking and the theoretical underpinnings and practical applications of computer science, covering: programming; control structures; methods; inheritance; arrays and mechanics of running and testing; and complexity and implementation of algorithms in programs.Â
This module details advanced programming concepts such as file manipulation, event-driven programming, multi-threaded programming, programming for data analysis and the use of packages and documentation. It also covers the social context of computing: social impact of computers and the internet; professionalism; codes of ethics and responsible conduct; copyrights, intellectual property; and software piracy.Â
This module explores the field of artificial intelligence along with the principal ideas and techniques in three core topic areas: problem solving, knowledge representation and machine learning. The implications of AI for business and society are also covered.Â
A sound understanding of internet architecture, protocols and technologies and their real-world applications forms the core of this module. Discussions around networks and the internet, network architecture, communication protocols and their design principles, wireless and mobile networks, network security issues and networking standards feature. The module also covers related social, privacy and copyright issues.Â
The module covers the concepts of modern computer architecture and system software. After an overview of computer architecture, it then delves into how computer systems execute programs, store information, and communicate. You will also learn the principles, design and implementation of system software such as operating systems.Â
Teaching the fundamentals of cyber security and understanding of typical threats. You will become familiar with a range of technologies and regulations that can reduce risk, increase protection and remain compliant.Â
This module teaches methods, techniques and tools for the development of secure application systems, from security requirement analysis and specification to design of secure application systems, secure programming and security testing. It also covers security assurance in order to demonstrate a system is secure to operate.Â
This module focuses on designing and building software systems. You will look at principles and patterns of software design, where to apply them, and how they inform design choices. Learn techniques for ensuring systems you build behave correctly. We demonstrate how the application of these principles makes it possible to evolve systems effectively and rigorously.Â
This module provides you with a range of approaches to research and individual research projects. Formulate research questions appropriate to an area of interest, and evaluate the relationship between question, methodology and method.Â
This is an extended research proposal for your final Individual Research Project. The module is created to ensure you are prepared for the IRP in sufficient depth before undertaking final studies. Designed to give you the flexibility of developing a proposal, it explores a work-based problem or one that is driven by your own findings.Â
The 30-credit Individual Research Project (IRP) builds on your Research Project Proposal, defining and developing a plan for research within a particular field of your choice. The IRP is the implementation and write-up of these results. A self-study module, you’ll draw on skills acquired throughout the degree, including self-management, deadlines and subject knowledge.Â
The information below is required for social login
Login to your Account
JOIN FOR FREE
Let’s begin with setting up your account to keep track of your progress