Postgraduate Studentships - Search for funding opportunities.
Use your background in IT to develop your ability to implement cyber security mechanisms into any business or organisation.
As part of this course, you’ll:
Applicants should either have at least a second class honours degree in the cognate subjects of Computing, at least a second class honours degree in a non-cognate subject supported by evidence of an aptitude for the subject applied for, or have equivalent experience or training, normally from within the work environment.
For fee and funding information please see our website.
Studying a postgraduate course lets you develop a deeper understanding of your chosen subject. This has the potential to significantly increase your ...
Sign up to Postgraduate Studentships
Sign up to compare masters
Thanks for making your selection. Click below to view your comparisons.