2025/26 entry

MSc Cyber Security

Start date(s):
September
Study mode:
Full-time
Course duration:
1 year

Tuition fees

Home full-time per year
£9,840
International full-time per year
£18,250
General enquiries:
0151 231 5090
courses@ljmu.ac.uk
International admissions
international@ljmu.ac.uk

Send a message >

About this course

LJMU's Cyber Security MSc enables students with computing and related experience to further their studies in this challenging and much in-demand sector.

  • Study a course based on the latest research and informed by industry liaison
  • Follow a curriculum aligned with the Government's professional practitioner benchmark for Cyber Security Masters-level study
  • Enhance your scientific, engineering and technical skills
  • Gain the knowledge and practical skills required for a career in Cyber Security
  • Benefit from the support of a personal tutor throughout your studies

Computer Security focuses on protecting computers, computer networks - such as public and private networks, critical infrastructure, smartphones, smart objects, software and digital information from unauthorised access, change or destruction.

This MSc is based on the latest research in the field. The programme and its modules are the result of extensive communications with industry and government, and the School maintains a regular industrial liaison panel. It is designed to equip you with advanced skills in the theory, practice, tools and applications necessary for a career in Cyber Security.

We are proud of our high teaching standards and the approachability of our staff. Informal staff-student relationships are excellent. If you decide to study with us, you will be joining a relaxed and friendly department where staff are committed not only to student welfare but also to ensuring that our courses are continually developed to meet the needs of employers.

  • User Story Image

    Impressed by the amount of one-to-one teaching

    Cyber Security Masters student Sandra Ise progressed to postgraduate study from her undergraduate degree in ICT at the University of Bradford.

    I wanted to improve my chances of getting a job...

    Read more..

  • User Story Image

    It's good to challenge yourself

    With an undergraduate degree in Computer Science and five years' work experience under her belt, Irene Bundi moved from Kenya to study for a Masters in Cyber Security at LJMU.

    I have always ...

    Read more..

Fees and funding

There are many ways to fund postgraduate study for home and international students

Fees

The fees quoted at the top of this page cover registration, tuition, supervision, assessment and examinations as well as:

  • library membership with access to printed, multimedia and digital resources
  • access to programme-appropriate software
  • library and student IT support
  • free on-campus wifi via eduroam

Additional costs

Although not all of the following are compulsory/relevant, you should keep in mind the costs of:

  • accommodation and living expenditure
  • books (should you wish to have your own copies)
  • printing, photocopying and stationery
  • PC/laptop (should you prefer to purchase your own for independent study and online learning activities)
  • mobile phone/tablet (to access online services)
  • field trips (travel and activity costs)
  • placements (travel expenses and living costs)
  • student visas (international students only)
  • study abroad opportunities (travel costs, accommodation, visas and immunisations)
  • academic conferences (travel costs)
  • professional-body membership
  • graduation (gown hire etc)

Funding

There are many ways to fund postgraduate study for home and international students. From loans to International Scholarships and subject-specific funding, you’ll find all of the information you need on our specialist postgraduate funding pages.

Please be aware that the UK’s departure from the EU may affect your tuition fees. Learn more about your fee status and which tuition fees are relevant to you.

Employability

Further your career prospects

LJMU has an excellent employability record with 96% (HESA 2018) of our postgraduates in work or further study six months after graduation. Our applied learning techniques and strong industry connections ensure our students are fully prepared for the workplace on graduation and understand how to apply their knowledge in a real world context.

With an MSc in Cyber Security your skills are highly sought after by companies employing ethical hackers, secure software developers, computer security consultants, network or system administrators and data analysts. You could find yourself working in one of a wide variety of fields including data mining, security applications development, the police, intelligence, security or computer forensics initiatives, network security management or education.

The student experience

Discover life as a postgraduate student at LJMU.

Course modules

Discover the building blocks of your programme

Your programme is made up of a number of core modules which are part of the course framework. Some programmes also have optional modules that can be selected to enhance your learning in certain areas and many feature a dissertation, extended report or research project to demonstrate your advanced learning.

Core modules

Research Methods
20 credits

The aim of this module is to develop your knowledge of effective and academic research design at Masters level and provide guidance on the purpose and design of literature reviews; the use of theory; writing strategies; citation and ethical considerations. It provides an understanding of how the range of qualitative, quantitative and mixed method data approaches can be most appropriately applied. It provides the knowledge and research skills you need to:

  • establish the most effectual research design and method for the dissertation project and write a successful research proposal
  • prepare for the project module and for a possible future research career

Computer Security
20 credits

The purpose of the module is to provide the fundamental technical concepts and research issues essential for computer security. This module develops the understanding of threats to and the security requirements of computer systems, as well as tools and techniques to enforce security. It aims to:

  • develop the knowledge of various security threats and vulnerabilities in computer systems as well as the importance of Computer Security
  • critically assess a variety of generic security technologies for the protection of computer systems
  • promote the use of appropriate methodologies and tools in the analysis, design, implementation and management of secure systems
  • examine current research issues in Computer Security

Network Security
20 credits

The growth of the Internet means that it is more important than ever to be aware of security threats to computer networks. This module explores security vulnerabilities and threats, emphasising the importance of network security. It looks at security issues and solutions to network protection, critically assessing security technologies and promoting the use of security techniques.

Project Dissertation
60 credits

This module aims to develop your ability to plan, execute and report in-depth on a major investigation.

Information Security Management
20 credits

This module will develop an appreciation of information security problems and develop skills relating to risk assessment and control analysis. You will develop an appreciation of using standards such as ISO-27001. You will gain experience in engaging in debates around legal, ethical and professional issues relating to information security.

Ethical Hacking
20 credits

This module will help you to gain a significant understanding of various security vulnerabilities and cyber threats to computer systems/applications as well as the importance of cyber security. This will help you to assess critically a variety of ethical hacking tools and penetration testing techniques for the protection and evaluation of computer systems and applications.

The module will promote the use of appropriate ethical security techniques to solve cyber security problems. This will help you to understand practices of network forensics and intrusion analysis to aid cyber threat intelligence gathering. In doing so, you will develop independent research skills in threat intelligence to detect, respond to, and defeat focused and targeted threats.

Secure Systems
20 credits

This module intends to familiarise you with common system security techniques, tools and methods that can be utilised during the design, deployment and maintenance of systems. This will help you to develop new advanced security skills and to combine your existing and new skills in a practical context.

Teaching

An insight into teaching on your course

Study hours

This Masters is completed full-time in one year. You will attend university for teaching on Monday and Tuesday, Wednesday and Friday mornings and Thursday afternoons.

Teaching methods

The course offers a range of approaches to learning, with peer and tutor feedback greatly encouraged. Workshop activities and tutor support facilitate formative feedback to enable you to work on your weaknesses and build on your strengths.

Assessment

How learning is monitored on your programme

To cater for the wide-ranging content of our courses and the varied learning preferences of our students, we offer a range of assessment methods on each programme.

Assessment of knowledge and understanding on this programme is through coursework and examinations. You will undertake laboratory and project work, write reports and present your findings.

Course tutors

Our staff are committed to the highest standards of teaching and learning

I really enjoy the stimulating environment associated with learning and teaching at the cutting edge of computing and ICT technology.

School facilities

What you can expect from your School

Studying at the Byrom Street site in the City Campus, which has recently enjoyed a 6 million investment, you will have access to state-of-the-art laboratories and teaching facilities. We have over 150 high performance computers including PC/ Linux Workstations and Networked Multimedia PCs for general use, in addition to the campus computing cluster. Youll also have access to an exclusive Game Technology Lab, a Computer Forensics Lab, two Multimedia Labs, a Distance Learning Lab and specialist labs for research on network security and networked appliances.

Entry requirements

You will need:

Qualification requirements

Undergraduate degree

  • An honours degree in Computing or a Computing-related subject, including subjects with a significant core of computing

Alternative qualifications considered

  • A professional qualification equivalent to an honours degree

International requirements

  • IELTS

    • IELTS English language requirement: 6.0 (minimum 5.5 in each component)

Further information

  • Extra Requirements
  • RPL

    • RPL is accepted on this programme

Application and selection

Securing your place at LJMU

To apply for this programme, you are required to complete an LJMU online application form. You will need to provide details of previous qualifications and a personal statement outlining why you wish to study this programme.

Your applications will need to:

  • demonstrate sufficient knowledge to embark on the programme
  • display the potential to develop high level research skills
  • demonstrate the ability and commitment to work at postgraduate level

The University reserves the right to withdraw or make alterations to a course and facilities if necessary; this may be because such changes are deemed to be beneficial to students, are minor in nature and unlikely to impact negatively upon students or become necessary due to circumstances beyond the control of the University. Where this does happen, the University operates a policy of consultation, advice and support to all enrolled students affected by the proposed change to their course or module.

Further information on the terms and conditions of any offer made, our admissions policy and the complaints and appeals process.