Skip to main content

Cyber Security and Digital Forensics (with Placement) MSc

2022-23 (also available for 2023-24)

Start date

19 September 2022

9 January 2023


18 months with placement

Places available (subject to change)


About the course

Reasons to study

  1. We’ll support you in finding a 6 month work placement. You could work in industry, a research group or within a teaching environment.
  2. Our course is practical and offers highly marketable Cyber Security, Computer Security and Digital Forensics skills.
  3. 94.1% of our graduates from the School of Computing and Engineering were in work or further study 15 months after graduation*. (HESA Graduate Outcomes 18/19)

This course is specifically aimed at International students, supporting those wishing to gain practical work based experiential learning. Together with studying your chosen course we are offering you the opportunity to secure a placement* for an additional 6 months, making the course 18 months in length. This allows students with limited experience to put into practice the skills and techniques developed throughout the Master’s degree.

Cyber security aims to reduce the risk of cyber-attacks, and protect against the unauthorised exploitation of systems, networks and technologies. Whereas Digital forensics is focused on recovery and investigation of artefacts found on a digital device. Devices that store data include computers, laptops, smartphones, memory cards or external hard drives.

This Masters course has been designed with a high degree of relevance to industry’s needs, in order to meet the demand for experts with a wide range of security, investigative and general computing skills. Our course is practical and offers highly marketable Cyber Security, Computer Security and Digital Forensics skills. The course aims to enhance your technical effectiveness, thus increasing your immediate worth to industry. We aim to develop your ability to evaluate existing and emerging Cyber Forensics technologies, apply knowledge, understanding and analytical and investigative skills in support of the construction of their solutions and investigative approaches.

On completion of this Masters course you will be equipped with an understanding of the fundamental approaches to implementing Cyber Security solutions, as well as skills needed to acquire, preserve and analyse digital evidence.

*Please see placement section for more details.

Course detail

Effective Research and Professional Practice

This module aims to provide you with skills that are key to helping you become a successful computing researcher or practitioner. You'll get the opportunity to study topics including the nature of research, the scientific method, research methods, literature review and referencing. The module aims to cover the structure of research papers and project reports, reviewing research papers, ethical issues (including plagiarism), defining projects, project management, writing project reports and making presentations.

Cyber-crime and Forensics Awareness

Upon successful completion of this module, you will have a systematic understanding of knowledge, and critical awareness of current cyber security challenges and how they are exploited through cybercrime. This includes gaining practical knowledge of how to perform and critical evaluate a crime scene from a digital perspective.  This Masters module also enables a conceptual understanding the enables the learner critically evaluate and engage in scholarship in the discipline, including proposing and testing both research and investigative hypotheses. The module covers many different aspects of cybercrime and how they fundamentally possible, often through exploiting weaknesses in computer and network security. The module presents an introduction to forensic analysis of digital systems, which is focussed on recovering deleted data from persistent data storage mechanisms (e.g. hard drives).

Data Mining

Data mining is a collection of tools, methods and statistical techniques for exploring and extracting meaningful information from large data sets. It is a rapidly growing field due to the increasing quantity of data gathered by organisations. There is a potential high value in discovering the patterns contained within such data collections. In this module you will look at different data mining techniques and use appropriate data-mining tools in order to evaluate the quality of the discovered knowledge. You will study approaches to preparing data for exploration, supervised and un-supervised approaches to data mining, exploring unstructured data and the social impact of data mining. You will be expected to develop your knowledge such that you are able to contribute to discussions around current application areas and research topics and to increase your background knowledge and understanding of issues and developments associated with data mining. Topics studied include looking at the value of data; approaches to preparing data for exploration; supervised and un-supervised approaches to data mining; exploring unstructured data; social impact of data mining. Current application areas and research topics in data mining will also be discussed and students will be expected to develop their knowledge such that they are able to contribute to such discussions and to increase their background knowledge and understanding of issues and developments associated with data mining.

Emerging Technologies for Cyber Physical Systems

Cyber-Physical Systems (CPS) are collections of physical and software components that communicate and interact with users via networks. CPS extend the traditional capabilities of embedded systems by incorporating sensor networks and data services to enable previously disparate systems to become more integrated through ‘smart’ capabilities. Examples of CPS include the Internet of Things (IoT), smart cities and digital manufacturing. This module will enable learners to explore contemporary issues in relation to emerging technologies that can be used to realise cyber-physical systems.

Digital Forensics

Digital Forensics (DF) is the process of identifying, acquiring, analysing and reporting on digital evidence (DE) used in a wide range of investigations. Digital Forensic Investigations (DFIs) have a variety of applications, being used in civil, administrative, and criminal proceedings in pursuit of DE. A typical DFI would involve the investigation of crimes such as hacking, digital espionage, counter- terrorism and possession of illegal imagery, etc. The aim of this module is to provide you with the knowledge and critical understanding of the key concepts in Digital Forensics. Through this module, you will be taught how to identify, preserve, extract and analyse digital evidence in a forensically-sound manner and report on your findings. Furthermore, this module will equip you with practical skills in applying specialised forensic tools, such as FTK Imager and Autopsy, and techniques, such as data carving and file system analysis, to a specific application scenario.

Applications of Artificial Intelligence in Cyber Security

Artificial intelligence (AI) is the study and development of intelligent behaviour exhibited in computational form. Its purpose is to demonstrate intelligent characteristics that provide enriched system functionality beyond that of traditional software systems. The benefits of AI spreads across many application areas, and one such area is that of cyber security. Artificial intelligence can be loosely categorised into symbolic and statistical approaches, which are often used depending on application requirements. In this module, you will study the different types of AI systems and focus on their different application use cases in cyber security. You will learn different techniques, such as Hidden Markov Models, Support Vector Machines to understand the fundamentals of AI technology. This module has a strong application focus, ensuring you gain knowledge and experience of how these techniques can be used in security in applications such as malware analysis, intrusion detection, and security policy analysis.

Introduction to Cryptography

The goal of cryptography is to make information secret so that only trusted individuals can access it. Cryptography has become critically important in the digital age. It is the cornerstone of secure communication and data storage, particularly in the area of e-commerce. This module aims to provide you with knowledge and critical understanding of the key concepts in cryptography. You will study the fundamental principles of cryptography. To aid your understanding, you will explore commonly used symmetric and asymmetric encryption and digital signature schemes in detail. Furthermore, you will be exposed to current state of the art developments in relation to cryptography. Finally, this module seeks to give you practical development skills in applying cryptographic techniques to a specific application scenario.

Distributed Ledger Technologies

Advancement in the capability and pervasive access to computing power through personal devices such as smartphones and Internet of Things (IoT) appliances, together with inexpensive communication networks and storage made available by cloud computing, is enabling new mechanisms for the transfer of value between peers. Distributed ledger technologies (DLT) are the foundation by which electronic transactions can be recorded and shared in a way that offers transparency without the need for a centralised authority, such as a bank in the finance industry. Learners will explore current state of the art developments in relation to DLT, whilst also enabling learners to develop strategies to evaluate and select technologies that are most appropriate for a chosen domain.

Individual Project

This module enables you to work independently on a project related to a self-selected problem. A key feature in this final stage of the course is that you will be encouraged to undertake an in-company project with an external Client. Where appropriate, however, the Project may be undertaken with an internal Client - research-active staff - on larger research and knowledge transfer projects. The Project is intended to be integrative, a culmination of knowledge, skills, competencies and experiences acquired in other modules, coupled with further development of these assets. In the case where an external client is involved, both the Client and Student will be required to sign a learning agreement that clearly outlines scope, responsibilities and ownership of the project and its products or other deliverables. The Project will be student-driven, with the clear onus on you to negotiate agreement, and communicate effectively, with all parties involved at each stage of the Project.

Professional Development and Practice

This module provides you with the opportunity to reflect on your professional practice during your Masters degree by undertaking a period of development through study or by working with a company, research group or within a teaching environment in the UK or overseas. This module encourages you to reflect on your technical, personal and professional development experiences, and to identify your learning from these experiences.

Entry requirements

Entry requirements for this course are normally:

  • An Honours degree (2:1 or above) in Computing or a related subject or an equivalent professional qualification.
  • Other qualifications and/or experience that demonstrate appropriate knowledge and skills equivalent to Honours degree level.
  • Substantial (5 years) relevant industry experience.

If your first language is not English, you will need to meet the minimum requirements of an English Language qualification. The minimum of IELTS 7.0 overall with no element lower than 6.5, or equivalent will be considered acceptable. Read more about the University’s entry requirements for students outside of the UK on our Where are you from information pages.

Why Choose Huddersfield?

Watch this clip to find out five great reasons to choose the University of Huddersfield for postgraduate study.


This course provides you with the chance to undertake a 6 month placement at the end of the taught element. This may be by working in a company, a research group or within a teaching environment. A placement can help you build on the knowledge and skills developed on the course.

The placement is a valuable tool that can enhance your employability and help you to develop as an individual. It is acknowledged that graduates with work experience are generally much more attractive to employers.

Our Placement Unit will be on hand to support you in finding a suitable placement opportunity. Students will have access to online learning materials to pick up advice on CVs, cover letters, speculative applications, online applications, and interviews. In addition, students will have access to the placement drop-in sessions for one-to-one advice and have a mock interview.

Enhance your career

Previous graduates from courses in this subject area have gone on to work in a variety of roles such as senior information security specialist, service desk analyst, web developer, and head of information technology in both public and private sector companies based in the UK and overseas.**
You could also go on to further study and the University has many options available for postgraduate research which may interest you.

*  Percentage of graduates from the School of Computing and Engineering who are in work and/or further study fifteen months after graduating (HESA Graduate Outcomes 18/19, UK domiciled graduates)

**Source: LinkedIn


Student support

At the University of Huddersfield, you'll find support networks and services to help you get ahead in your studies and social life. Whether you study at undergraduate or postgraduate level, you'll soon discover that you're never far away from our dedicated staff and resources to help you to navigate through your personal student journey. Find out more about all our support services.

In the School of Computing and Engineering we have a dedicated guidance team that provides the students that need it, guidance and support on both academic and non-curriculum matters.These may include:

  • Settling in
  • Personal development
  • Health and wellbeing
  • Balancing work and studies
  • Exam and assignment preparation
  • Staying the course (attendance, change course, extensions etc.)
  • Study skills and Technical English support from our Academic Skills Tutor

Important information

We will always try to deliver your course as described on this web page. However, sometimes we may have to make changes as set out below.

Changes to a course you have applied for

If we propose to make a major change to a course that you are holding an offer for, then we will tell you as soon as possible so that you can decide whether to withdraw your application prior to enrolment.

Changes to your course after you enrol as a student

We will always try to deliver your course and other services as described. However, sometimes we may have to make changes as set out below:

Changes to option modules

Where your course allows you to choose modules from a range of options, we will review these each year and change them to reflect the expertise of our staff, current trends in research and as a result of student feedback or demand for certain modules. We will always ensure that you have a range of options to choose from and we will let you know in good time the options available for you to choose for the following year.

Major changes

We will only make major changes to the core curriculum of a course or to our services if it is necessary for us to do so and provided such changes are reasonable. A major change in this context is a change that materially changes the services available to you; or the outcomes, or a significant part, of your course, such as the nature of the award or a substantial change to module content, teaching days (part time provision), classes, type of delivery or assessment of the core curriculum.

For example, it may be necessary to make a major change to reflect changes in the law or the requirements of the University’s regulators; to meet the latest requirements of a commissioning or accrediting body; to improve the quality of educational provision; in response to student, examiners’ or other course evaluators’ feedback; and/or to reflect academic or professional changes within subject areas. Major changes may also be necessary because of circumstances outside our reasonable control, such as a key member of staff leaving the University or being unable to teach, where they have a particular specialism that can’t be adequately covered by other members of staff; or due to damage or interruption to buildings, facilities or equipment.

Major changes would usually be made with effect from the next academic year, but this may not always be the case. We will notify you as soon as possible should we need to make a major change and will carry out suitable consultation with affected students. If you reasonably believe that the proposed change will cause you detriment or hardship we will, if appropriate, work with you to try to reduce the adverse effect on you or find an appropriate solution. Where an appropriate solution cannot be found and you contact us in writing before the change takes effect you can cancel your registration and withdraw from the University without liability to the University for future tuition fees. We will provide reasonable support to assist you with transferring to another university if you wish to do so.

Termination of course

In exceptional circumstances, we may, for reasons outside of our control, be forced to discontinue or suspend your course. Where this is the case, a formal exit strategy will be followed and we will notify you as soon as possible about what your options are, which may include transferring to a suitable replacement course for which you are qualified, being provided with individual teaching to complete the award for which you were registered, or claiming an interim award and exiting the University. If you do not wish to take up any of the options that are made available to you, then you can cancel your registration and withdraw from the course without liability to the University for future tuition fees and you will be entitled to a refund of all course fees paid to date. We will provide reasonable support to assist you with transferring to another university if you wish to do so.

When you enrol as a student of the University, your study and time with us will be governed by a framework of regulations, policies and procedures, which form the basis of your agreement with us. These include regulations regarding the assessment of your course, academic integrity, your conduct (including attendance) and disciplinary procedure, fees and finance and compliance with visa requirements (where relevant). It is important that you familiarise yourself with these as you will be asked to agree to abide by them when you join us as a student. You will find a guide to the key terms here, along with the Student Protection Plan, where you will also find links to the full text of each of the regulations, policies and procedures referred to.

The Office for Students (OfS) is the principal regulator for the University.

You may also be interested in...

Artificial Intelligence MSc

Our Artificial Intelligence (AI) course is designed to meet the demand for a new kind of IT specialist with skills and knowledge in intelligent systems.

Find out more How to apply



Computing MSc

Develop your knowledge of the computer technology all around us. Study interaction with technology and the science behind it all.

Find out more How to apply



Computing (with Placement) MSc

Develop your knowledge of the computer technology all around us. Study interaction with technology and the science behind it all.

Find out more How to apply



Data Analytics MSc

Data Analytics is designed to meet the demand for specialists with skills and knowledge for working with large data sets (big data).

Find out more How to apply



Information Systems Management MSc

This course will provide you with key skills in databases, design, and system operation. With this engaging and challenging course, we aim to prepare you for a successful career in IT.

Find out more How to apply



Internet of Things MSc

The Internet of Things (IoT) is a new and rapidly expanding area in Computer Science, technology and engineering.

Find out more How to apply