Master of Science in

Cyber Security

About the Programme

The exponential increase in mobile devices, converged applications and Cloud technologies, initiatives such as Bring your Own Device (BYOD) / Choose Your Own Device (CYOD) and the advent of digital information technologies, has increased the proliferation of threats in our vibrant and active cyber-physical-natural environment diluting further its perimeter. Our cyberspace is constantly increasing its size almost linearly to its value recognising Cyber Security as a global response to the challenges posed by constantly evolving systems which are harder to secure.

The MSc Cyber Security seeks to address the increasing demand for Cyber Security related domains in both academic, vocational qualifications and projection for an increased shortage of Cyber Security professionals in the industry. The course has been designed by a team of leading experts, researchers and trainers in the field and gives the opportunity to the students to be exposed to cutting-edge technologies, tools and techniques in cyber exploitation and defence.

Programme Highlight

This program combines a variety of learning activities, including computer-based learning, interactive workshops, case studies, and structured laboratory exercises, alongside personalized tutorials, group exercises, and research project investigations, all supported through the University’s VLE (CANVAS) for enhanced communication and resources.

Programme
Modules

The purpose of this unit is to provide an in-depth and specialised knowledge on penetration testing and vulnerability assessment. Students will be introduced to Ethical Hacking and the concept of offensive security with cutting-edge tools and research-informed delivery. Students will learn how to look for weaknesses in a target system to test the security posture for exploits in a lawful and legitimate way. This requires a skill set that includes but not limited to computer networks, operating systems but also aspects of psychology and the human behaviour.

Incident management describes methods to identify, analyse, and correct hazards to prevent a future re-occurrence. The purpose of this unit is to provide specialised and research-informed knowledge with hands-on practicals on cutting-edge incident response and digital forensics methods. The full life cycle of an incident responder is covered from building a CERT-team to utilising ‘sound’ forensics tools to collect, safeguard, transport and analyse digital evidence. This includes secure stakeholder management within organisational context fully considering ethical and professional responsibilities, but also practical exhibition of the digital investigation process with the application of modern commercial and open-source tools, the judicial process and relevant laws within the UK and critical aspects of international laws affecting incident responders. Students will also be learning about expert testimony and technical topics such as file carving techniques, file systems, network forensics, TCP/IP steganography, memory analysis, in 3addition to threats associated with emerging technologies such as Internet-of-Things (IoT).

The module seeks to address the discipline of Information Governance and compliance and its associated theories, practices and principles that govern any modern information system in alignment with multi-disciplinary structures, processes and procedures. Particular focus is given to the frameworks, standards and strategies for managing an organisation’s information assets with all the underpinned legal and regulatory requirements need to be fulfilled within existing and emerging Governance, Risk and Compliance (GRC) frameworks.

Motivated by the growing importance of Internet-of-Things (IoT), this module will provide specialised knowledge and hands-on practicals covering IoT devices and applications while focusing on security. IoT is a fusion of interconnected devices of various sized and complexities with examples ranging from simple sensors to autonomous vehicles and smart homes, therefore, it is essential to learn how to identify emerging threats and plan mitigation techniques to minimise vulnerabilities. Examples of fundamental underpinning technologies enabling IoT include wireless sensor networks, Wi-Fi, Bluetooth and embedded systems.

Cyber Defence has become one of the biggest business priorities in an attempt to deal with dynamic attack vectors while still relying on static controls and measures. It is a systematic approach to help organisation to better articulate, manage and change threat thresholds and improve the effectiveness of security controls. This module seeks to address the core principles, methods, tools and products available used in proactive network defence with the aim of preventing cyber-attacks or decreasing the time taken to discover them. The module guides the students through the fundamentals of building and evaluating successful and secure network communication platforms with focus on all strategic, tactical and operational aspects.

By studying this module, you will develop the personal and professional skills required to design and undertake research in your chosen subject area at post graduate level. You will also consider professional conduct and the social, legal and ethical implications related to the profession in-line with BCS guidelines.

Whether the student progresses to further study or into employment, one of the most important skills expected of a computing professional is the ability to work creatively under the appropriate guidance of a member of staff. It is therefore essential that the students use and develop comprehensively knowledge and skills gained from other units, and from their wider educational and working background (e.g. their first degree which may be in a subject area rather than computing), in a major integrative exercise. The project module is an ideal vehicle for this purpose. Students will be expected to develop an idea (most likely generated by a member of academic staff) and demonstrate their ability to develop it further, producing a suitable artefact by applying their technical, analytical, practical and managerial skills in an integrated manner. They are required to emphasise on a topic which sufficiently reflects on the course they are studying and get an ethical approval prior to commencing their work. No student can proceed to the project without gaining prior ethical approval. Normally students will retain their own intellectual property unless they are sponsored by a company or funded by an organization and the contractual agreement with the organization dictates them to transfers these IP rights. Also, students will not normally undertake projects that require security clearance.

Course Details

Study Mode & Duration

Full-time 12 months

Part-time 12 months

Intakes

SOC date:

Jan / Sep

Average Teacher-Student Ratio

1:150 (Classroom based lecture)

Registration

1 months prior to intake date

Assessment

100% coursework

Graduation Requirement

• Must passed all modules.
• Must achieve an overall attendance of 90% (International Student) and 75% (Local Student).

Career Opportunities

Graduates may choose to pursue a future (but not limited to) in these departments/industries:

Cybersecurity Analyst

Forensic Computer Analyst

Network Security Engineer

Data Privacy Officer

Cybersecurity Educator

Entry requirement

International Students / Local students
Age:
 Minimum 19 years old
 

Academic Minimum Entry Requirement

  • A recognised undergraduate degree in computer science (or equivalent) from an accredited university 
  • A Postgraduate Certificate in Computer Science or a related subject from an accredited university with a minimum of grade 50% in all modules
  • A professional qualification (e.g. CISSP, CEH) and a minimum of 3 years working experience in related industries will be assessed on an individual basis.
  • Other qualifications will be assessed on a case-by-case basis and the final decision rests with the university. 

Mature Candidates: Applicants must be at least 30 years of age with 8 years of working experience

 
English Language Minimum Entry Requirement
IELTS 6.5 or equivalent
 
Application Procedure
You may apply to EAIM either by visiting EAIM Balestier Campus or mail your application to East Asia Institute of Management, 9 Ah Hood Road, Singapore 329975

Course Fees

International Students
Tuition Fee
S$ 25,296
Admin Fee
S$1,100
Application Fee
S$540
Total Course Fee
S$26,936
Local Students (Full-time)
Tuition Fee
S$25,296
Admin Fee
S$1,100
Application Fee
S$150
Total Course Fee
S$26,546
Local Students (Part-time)
Tuition Fee
S$21,216
Admin Fee
S$1,100
Application Fee
S$150
Total Course Fee
S$22,466
  • The Application Fee is a one-time payment and is non-refundable.
  • Administration Fee includes STP fee, FPS Insurance, medical insurance, etc.
  • All prices are subject to prevailing Goods & Services Tax (GST) of 9%.
  • All prices are effective for intakes from April 2025.
  • Start of class is subjected to minimum class size of 10 achieved.
  • Other miscellaneous fees may apply. (Please click here for more information.)

Related Courses

Join Us Now

Unlock your hidden potential with EAIM today!

Scroll to Top