理学硕士

In Cyber Security

关于计划

The exponential increase in mobile devices, converged applications and Cloud technologies, initiatives such as Bring your Own Device (BYOD) / Choose Your Own Device (CYOD) and the advent of digital information technologies, has increased the proliferation of threats in our vibrant and active cyber-physical-natural environment diluting further its perimeter. Our cyberspace is constantly increasing its size almost linearly to its value recognising Cyber Security as a global response to the challenges posed by constantly evolving systems which are harder to secure.

The MSc Cyber Security seeks to address the increasing demand for Cyber Security related domains in both academic, vocational qualifications and projection for an increased shortage of Cyber Security professionals in the industry. The course has been designed by a team of leading experts, researchers and trainers in the field and gives the opportunity to the students to be exposed to cutting-edge technologies, tools and techniques in cyber exploitation and defence.

计划亮点

This program combines a variety of learning activities, including computer-based learning, interactive workshops, case studies, and structured laboratory exercises, alongside personalized tutorials, group exercises, and research project investigations, all supported through the University’s VLE (CANVAS) for enhanced communication and resources.

计划
模块

The purpose of this unit is to provide an in-depth and specialised knowledge on penetration testing and vulnerability assessment. Students will be introduced to Ethical Hacking and the concept of offensive security with cutting-edge tools and research-informed delivery. Students will learn how to look for weaknesses in a target system to test the security posture for exploits in a lawful and legitimate way. This requires a skill set that includes but not limited to computer networks, operating systems but also aspects of psychology and the human behaviour.

Incident management describes methods to identify, analyse, and correct hazards to prevent a future re-occurrence. The purpose of this unit is to provide specialised and research-informed knowledge with hands-on practicals on cutting-edge incident response and digital forensics methods. The full life cycle of an incident responder is covered from building a CERT-team to utilising ‘sound’ forensics tools to collect, safeguard, transport and analyse digital evidence. This includes secure stakeholder management within organisational context fully considering ethical and professional responsibilities, but also practical exhibition of the digital investigation process with the application of modern commercial and open-source tools, the judicial process and relevant laws within the UK and critical aspects of international laws affecting incident responders. Students will also be learning about expert testimony and technical topics such as file carving techniques, file systems, network forensics, TCP/IP steganography, memory analysis, in 3addition to threats associated with emerging technologies such as Internet-of-Things (IoT).

The module seeks to address the discipline of Information Governance and compliance and its associated theories, practices and principles that govern any modern information system in alignment with multi-disciplinary structures, processes and procedures. Particular focus is given to the frameworks, standards and strategies for managing an organisation’s information assets with all the underpinned legal and regulatory requirements need to be fulfilled within existing and emerging Governance, Risk and Compliance (GRC) frameworks.

Motivated by the growing importance of Internet-of-Things (IoT), this module will provide specialised knowledge and hands-on practicals covering IoT devices and applications while focusing on security. IoT is a fusion of interconnected devices of various sized and complexities with examples ranging from simple sensors to autonomous vehicles and smart homes, therefore, it is essential to learn how to identify emerging threats and plan mitigation techniques to minimise vulnerabilities. Examples of fundamental underpinning technologies enabling IoT include wireless sensor networks, Wi-Fi, Bluetooth and embedded systems.

Cyber Defence has become one of the biggest business priorities in an attempt to deal with dynamic attack vectors while still relying on static controls and measures. It is a systematic approach to help organisation to better articulate, manage and change threat thresholds and improve the effectiveness of security controls. This module seeks to address the core principles, methods, tools and products available used in proactive network defence with the aim of preventing cyber-attacks or decreasing the time taken to discover them. The module guides the students through the fundamentals of building and evaluating successful and secure network communication platforms with focus on all strategic, tactical and operational aspects.

By studying this module, you will develop the personal and professional skills required to design and undertake research in your chosen subject area at post graduate level. You will also consider professional conduct and the social, legal and ethical implications related to the profession in-line with BCS guidelines.

Whether the student progresses to further study or into employment, one of the most important skills expected of a computing professional is the ability to work creatively under the appropriate guidance of a member of staff. It is therefore essential that the students use and develop comprehensively knowledge and skills gained from other units, and from their wider educational and working background (e.g. their first degree which may be in a subject area rather than computing), in a major integrative exercise. The project module is an ideal vehicle for this purpose. Students will be expected to develop an idea (most likely generated by a member of academic staff) and demonstrate their ability to develop it further, producing a suitable artefact by applying their technical, analytical, practical and managerial skills in an integrated manner. They are required to emphasise on a topic which sufficiently reflects on the course they are studying and get an ethical approval prior to commencing their work. No student can proceed to the project without gaining prior ethical approval. Normally students will retain their own intellectual property unless they are sponsored by a company or funded by an organization and the contractual agreement with the organization dictates them to transfers these IP rights. Also, students will not normally undertake projects that require security clearance.

课程详情

学习方式和时间

全职 12 个月

兼职 12 个月

摄入量

SOC 日期:

Jan / Sep

师生平均比例

1:150 (课堂授课)

注册

接收日期前 1 个月

评估

100% 课程作业

毕业要求

- 必须通过所有模块。.
- 总出勤率必须达到 90%(国际学生)和 75%(本地学生)。.

工作机会

毕业生可以选择(但不限于)在这些部门/行业发展:
Cybersecurity Analyst
Forensic Computer Analyst
Network Security Engineer
Data Privacy Officer
Cybersecurity Educator

入学要求

留学生/本地学生
年龄
 至少 19 岁
 

学术最低入学要求

  • A recognised undergraduate degree in computer science (or equivalent) from an accredited university 
  • A Postgraduate Certificate in Computer Science or a related subject from an accredited university with a minimum of grade 50% in all modules
  • A professional qualification (e.g. CISSP, CEH) and a minimum of 3 years working experience in related industries will be assessed on an individual basis.
  • 其他资格将根据具体情况进行评估,最终决定权在大学。. 

英语最低入学要求

IELTS 6.5 or equivalent
 
申请程序
您可前往 EAIM Balestier 校区或将申请表邮寄至:East Asia Institute of Management, 9 Ah Hood Road, Singapore 329975。

课程费用

EAIM 为您的未来提供支持--立即了解我们的红宝石周年纪念补助金。.

国际学生 S$
学费

27,572.64

17,662.36

管理费
1,199.00
申请费
588.60
学费总额

29,360.24

19,449.96

本地学生(全日制) S$
学费

27,572.64

17,662.36

管理费
1,199.00
申请费
163.50
学费总额

28,935.14

19,024.86

本地学生(非全日制) S$
学费

23,125.44

15,000.58

管理费
1,199.00
申请费
163.50
学费总额

24,487.94

16,363.08

  • 申请费为一次性缴费,不予退还。.
  • 管理费包括 STP 费用、FPS 保险、医疗保险等。.
  • 所有价格均已包含 9% 的商品及服务税 (GST)。.
  • 所有价格均适用于 2025 年 6 月.
  • 每班至少达到 10 人。.
  • 可能需要支付其他杂费。(请点击 这里 了解更多信息)。
  • 研究补助金 条款和条件 申请。.

相关课程

立即加入我们

今天就通过 EAIM 发掘您的潜能!

滚动至顶部