This course is delivered part time only. Dates for each module are given below and where relevant will be updated as soon as the new timetable is confirmed. Each unit can be taken separately as CPD with or without formal assessment. If you do elect to take the unit with assessment you can accrue academic credits towards a full Masters.
- Cyber Security: Develop skills and knowledge for cyber security. Material, lectures and seminars in this unit capture concepts of cyberspace ecosystems and the security of socio-technical systems. The unit also covers the life cycle of cyber security mechanisms, including the design, development, management and, most importantly, how they're sustained. Dates 17-20 Jan 2018
- Human Factors: Soft systems, human factors integration (HFI), training, trust, organisational learning, information and knowledge management will be examined through case study analysis. You'll also conduct situational awareness and workload measurements in trials, experiments and exercises, and apply user experience (UX) techniques to evaluate interactive systems. Dates 13-16 Sep 2017. Unit leader: Dr Huseyin Dogan
Research Methods & Professional Issues: Research requires a structured and disciplined approach at all stages. We'll help you to develop key research skills in many areas from project proposals and planning to critical analysis of research findings, academic writing and dissemination. We'll also teach you about professional standards and ethical issues for research. Dates 16-19 May 2018. Unit leader: Dr Raian Ali
Please note that option units require minimum numbers in order to run and may only be available on a semester by semester basis. They may also change from year to year.
You'll choose three of the following:
- Cyber Psychology: Explore the impact of the internet and social media applications on individuals, groups, organisations and society, and human factors relevant to cyber security and online behaviours. You'll learn to evaluate the principal features of human factors in current and planned online secure systems and identify means of promoting safer online behaviour. Dates 9-11 Nov 2017
Enterprise Digital Forensics: As globalisation and the Internet have led to increasing integration, the opportunities for unauthorised exploitation have also grown. You'll develop competencies for constructing plans to capture and analyse data for an investigation of potentially abnormal activity.
Information Assurance: Evaluate issues to improve assurance and risk management. You'll evaluate human factors relevant to information assurance plans, and understand the roles of accreditation, compliance and governance in information assurance. Dates 12-14 July 2018. Unit leader: Dr Christopher Richardson
Security Event & Incident Management: Incident management capability means managing computer security events and incidents. Lectures and seminars in this unit will capture the concepts of event logging and collection. You'll learn to define policies, processes, procedures, roles and responsibilities and understand the issues of lead implementation of ISO 27001. Dates 15-17 Mar 2018
Security by Design: Security must be addressed as early as possible when building a system or planning organisational change. However, security never seems to be a driving concern when engaging in innovation. When security is addressed, we discover how hard building security in really is. In this unit, you'll have an opportunity to build security into the design and specification of secure systems, and the broader socio-technical context these fall into. Dates tbc
Programme specifications provide definitive records of the University's taught degrees in line with Quality Assurance Agency requirements. Every taught course leading to a BU Award has a programme specification which describes its aims, structure, content and learning outcomes, plus the teaching, learning and assessment methods used.
Download the programme specification for MSc Cyber Security & Human Factors.
Whilst every effort is made to ensure the accuracy of the programme specification, the information is liable to change to take advantage of exciting new approaches to teaching and learning as well as developments in industry. If you have been unable to locate the programme specification for the course you are interested in, it will be available as soon as the latest version is ready. Alternatively please contact us for assistance.
How you study
Designed to be flexible to the needs of working professionals, this part-time course minimises your time away from the workplace.
Each unit is intensively delivered over 3 or 4 days on campus to kick start your learning and give you a chance to meet your fellow students and engage with the academic team. It will be an intensive but valuable learning experience, giving you the opportunity to share ideas with like-minded professionals. The intensive nature of the teaching days provides a firm foundation for you to further develop your knowledge and explore the concepts in more detail.
You are able to fully utilise our online learning environment should you wish to complete the necessary subsequent self-directed learning off-campus. You will also have access to academic support and resources on-campus, and the opportunity for group work with your cohort. The period of self-directed study following the teaching days gives you time to complete your academic assignment, the specific subject matter and content of which is determined by your interests and professional context. Submission of each assignment is normally 9 weeks after the unit teaching period.
As this course is structured in this manner, we would expect you to complete all the taught units and submit your individual project within a minimum of 18 months.
Full entry requirements
The normal requirements for embarking upon this course are:
- A Bachelors Honours degree with 2:2 in a required subject
- Required subjects: Computer science, Electronics, IT, Law, Psychology or Business
For post-experience and professional qualifications (like CISSP and CISM) there may be additional entry requirements set by the association or institute that ultimately administers the qualification in question. The qualification description on the course information pages should tell you what these are but please get in touch with the Future Students Enquiry Team if you are in doubt.
If you lack the formal academic qualifications needed to enter a postgraduate or post-experience degree ,there are several alternative routes to follow. Some of these are based on experience. Contact the Future Students Enquiry Team for more information.
How to apply
If you wish to apply for the MSc Cyber Security & Human Factors please complete an application using the Apply now button above.
If you would like to take one or more individual units as CPD (with or without academic assesment) please email Norman Stock for more information.
International entry requirements
International entry requirements
If English is not your first language, you will need to provide evidence that you can understand English to a satisfactory level. English language requirements for this course are normally:
- IELTS (Academic) 6.0 with a minimum of 5.5 in each component of writing, speaking, listening and reading, or equivalent.
View further information about our English language requirements.
A number of pre-sessional English and preparatory programmes are offered through our partner institution, Bournemouth University International College, and will get you ready for study at BU at the appropriate level.
You can also find further details of the international qualifications we accept, and what level of study they apply to, on our postgraduate entry requirements page.
As the security of data is fundamental to any business, you will possess high marketability in the professional arena and be qualified to enjoy career opportunities in a wide variety of industries.
As an MSc Cyber Security & Human Factors graduate, you will be prepared to undertake roles such as:
- Cyber psychologist
- Security designer
- Digital forensic investigator
- Incident manager
- Intrusion detector.
Industries worked in
- Cyber security
- Online behaviours
- Academic research.
If you want to continue your studies after achieving your Master's, you can look into our range of doctoral programmes.
Meet our staff
Professor Vasilis Katos
The Head of the Department of Computing & Informatics, Vasilis is a certified Computer Hacking Forensic Investigator (CHFI) and has experience as an Information Security Consultant. He has served as an expert witness in Information Security for a criminal court in the UK.
Dr Michael Jones
Course Leader for MSc Cyber Security and Human Factors, Michael has been involved in a number of projects with various industries. His main current research interest is in the teaching of digital forensics.
Dr Edward Apeh
Course leader for BSc (Hons) Cyber Security Managment, Edward has over 12 years of industry experience and has led successful projects in the areas of data analytics, data mining and web technologies. He is published in the area of cyber security, data analytics, cognitive computation and neurocomputing; and he has a number of patents in signal analysis and processing.
Dr Christopher Richardson
Christopher heads up the Bournemouth University's Cyber Security Unit (BUCSU). He was recently quoted by leading newspapers on the Tesco Bank hacking scandal. He brings case studies like this to life in his teaching.
Read more about the expertise of other members of the Department of Computing & Informatics, and book on to an open day and come along and meet some of them.
This table indicates any changes to the course content
||Changes to this course
||Where the change was made
2 core units are now option choices
|Course details content
||Only offered part-time
||1 year full-time,
18-36 months part-time
Cyber Security Unit facilities
Our cyber security unit is something special. Using state-of-the-art technology across our three labs, we can run up to 50 million PCs using just 50. As the name of our facility suggests, it’s all about security here. From the labs we can see where cyber attacks are happening all over the world, and what attacks are happening and being stopped at BU.
Through our outreach programmes, we invite schools and businesses to use our labs, and we have a 10-week summer school for BU students. Our previous guests include the Police Volunteer Service.
We have some remarkable software that’s used for protecting and testing systems. This includes:
- CISCO FlexPod - this connects all the PCs in our labs together. Combined with a Blade server, it allows us to run all our machines and store up to 50G of RAM.
- OPNET - improves network strengths, and helps us turn 50 PCs into 50 million.
- NetBrain - this configures networks automatically.
- FireEye - we use this to check for intruder activity and to analyse cyber attacks on BU’s system.