University of Gloucestershire’s 100% online MSc Computer Science with Cyber Security provides the expertise to protect businesses and individuals from evolving cyber threats. As digital technologies expand, understanding how to safeguard systems against vulnerabilities and attacks is more crucial than ever.
This course provides in-depth knowledge of industry tools, techniques, and strategies to prevent cyber threats, data breaches, and unauthorised access. You’ll explore how to secure information systems and networks across industries, from business and healthcare to government agencies, reducing the risk of data exposure. Furthermore. you’ll have a strong foundation in cyber security principles and the ability to recommend effective solutions to protect digital environments.
Designed to fit around your professional and personal commitments, this MSc equips you to lead in the rapidly-evolving world of cyber security—whether in global enterprises, agile start-ups, or your own tech venture.
Course overview
Develop the expertise to secure digital systems and protect sensitive data across a wide range of industries. This course equips you with both the theoretical foundations and practical skills needed to address evolving cyber threats.
Study areas include encryption and cryptography, digital forensics, and endpoint protection. You’ll examine how to investigate cyber incidents, safeguard information, and apply secure communication protocols. Core topics span malware analysis, mobile device forensics, and cryptographic algorithms, with emphasis on risk mitigation and system resilience. Graduates will be equipped to evaluate security measures, implement protective technologies, and respond effectively to security breaches in complex IT environments.
.
Skills and knowledge
Graduates of this course will be able to:
Solve complex problems by evaluating secure business-focused solutions
Apply knowledge of architecture to assess system trade-offs
Explain how risk mitigation protects systems and networks
Define cryptographic protocols used in secure digital transactions
Implement a REST API solution that meets security needs
Entry requirements
To study Gloucestershire’s 100% online MSc Computer Science with Cyber Security, you will need to have completed:
A 2:2 undergraduate honours degree, or a comparable professional qualification. (Applicants with significant work experience but without a formal Level 6 qualification will also be considered.)
OR
A minimum of three years of relevant work experience (CV required, including one reference).
English language requirements
If English is not your first language, or if your most recent education or work experience was not conducted in English, you must demonstrate proficiency through an approved English language test. This includes IELTS (minimum overall score of 6.0, with no individual component below 5.5) or an equivalent qualification.
Modules
Principles of Programming Languages
Explore the evolution of programming languages and the core abstractions they use, including data types and control structures. This module introduces key paradigms through practical examples from languages like Java and Lisp, while also covering advanced features such as exceptions and polymorphism. You will gain a foundational understanding of how programming languages are structured and the rationale behind their design.
Computer and Digital Forensics
Explore the principles and practices of computer and digital forensics, focusing on legal, ethical, and technical aspects of investigating digital evidence. Topics include malware analysis, network forensics, mobile device forensics, and forensic procedures for operating systems. You will study common tools, protocols, and forensic methodologies used by law enforcement, government, and private organisations to recover, preserve, and analyse digital information. Through practical exercises, you will also gain insight into the skills and responsibilities of computer forensic analysts in supporting legal investigations.
Cryptography
Learn the core concepts and mathematical foundations of modern cryptography. You will examine both symmetric and asymmetric encryption methods, public-key infrastructure, digital signatures, hash functions, and block cipher design. Theoretical principles such as number theory will be applied to understand how secure communication is enabled and protected. You will also analyse cryptographic primitives, common attack types, and cryptographic protocols, developing the ability to evaluate and apply encryption algorithms within secure systems.
End-Point Security
Examine strategies and technologies for protecting endpoint devices such as laptops, mobile phones, and servers from cybersecurity threats. Key topics include endpoint protection platforms, encryption, web security, IoT security, anti-phishing tools, and data classification methods. You will study how endpoint security contributes to the overall integrity of information systems by minimising risks to sensitive data, including personally identifiable information (PII), intellectual property, and financial records. Emphasis is placed on practical understanding of configuring and managing endpoint security measures within a networked environment.
Algorithms & Data Structures
Learn to design and evaluate the algorithms and data structures that form the backbone of effective software development. This module focuses on analysing efficiency, understanding core data objects such as arrays, stacks, queues, trees, and graphs, and implementing algorithmic patterns. You'll also explore techniques for enhancing code performance, reusability, and optimisation to support scalable software solutions.
Computer Architecture
Examine how computer systems are designed and how their architecture supports business and technical needs. You’ll explore hardware and software components, system functionality, and decision-making strategies for implementing performance-optimised, usable solutions. By the end of the module, you'll be able to assess architectural designs aligned with organisational requirements.
Operating Systems
Gain a comprehensive understanding of how operating systems function, including process and memory management, file systems, device drivers, and concurrency. This module explores both design principles and practical implementations across systems like Windows, iOS, Linux, and distributed networks. Case studies will help you evaluate OS choices and their implications for system design and software development.
Computer Network Security
Develop a solid foundation in the principles and practices of network security. You’ll analyse vulnerabilities in LANs, WANs, databases, and operating systems while exploring risk assessment, intrusion detection, encryption, authentication, and access control. This module equips you to design secure systems and apply the right security measures for diverse communication environments.
Machine Learning
This module is an introduction to machine learning with R. The students will learn how to process and analyse various data sets. Topics covered include exploratory data analysis (EDA), unsupervised learning (e.g., PCA, k-means), and supervised learning (e.g., linear regression, logistic regression). Machine learning techniques such as test-train-split, k-fold cross-validation, and regularisation will also be covered. By the end of the module, students will be able to write code to apply machine learning techniques and methodologies mentioned above to real data sets.
Research Methods for Computer Science
Develop your ability to conduct academic research in computer science. You’ll explore research design, methodology, and epistemological frameworks, while learning how to critically review literature, develop a proposal, and ensure ethical compliance. The emphasis is on creating a robust foundation for a future research project or dissertation.
Applied Research for Computer Science (30 credits)
Apply your research knowledge to a real-world computer science problem by developing a thesis or project. Building on your research methods training, you'll define a problem, design and execute a research strategy, collect and analyse data, and present solutions or insights, demonstrating your ability to conduct independent, applied research.
Begin your online learning journey with Gloucestershire today
The information below is required for social login
Login to your account
JOIN FOR FREE
Let’s begin with setting up your account to keep track of your progress