...

Cyber Security and Digital Forensics MSc

Select the year

Start Dates

22 September 2025

Duration

1 year full-time


Recent Awards For Excellence

Computer Science & Information Systems - QS 2025
Find out more about these awards
About this course

Overview

Why choose Huddersfield for this course?

  • Develop specialist skills to investigate cyber-attacks and preserve digital evidence for real cases.
  • Gain hands-on experience with advanced tools and techniques used in modern security operations.
  • Apply your knowledge through an individual project tackling live cyber or forensics challenges.

Accreditation and Professional Links

Recognised connections to give you an extra edge when you graduate. Read More

Passionate about protecting against cyber-attacks and recovering and investigating artefacts on digital devices? If so, an MSc in Cyber Security and Digital Forensics at The University of Huddersfield can help you take the next step in your career.

This advanced course meets the demand for experts with a wide range of security, investigative and general computing skills, including cyber security, computer security and digital forensics skills.

Our course aims to equip you with the ability and knowledge to evaluate existing and emerging cyber forensics technologies, implement cyber security solutions and acquire, preserve and analyse digital evidence. Develop the competencies and technical skills necessary for high demand roles as computer forensics investigator and information security analyst.

Why study Cyber Security and Digital Forensics at Huddersfield?

Develop your confidence, knowledge base and skillset to thrive as a cyber security and digital forensics professional after graduation. At the end of the course, you’ll put your newfound experiences and skills to the test in a hands-on final Individual Project module.

Our course is provisionally certified by the National Cyber Security Centre (NCSC) with full certification expected by the end of 2024. The NCSC is the UK's National technical authority for cyber security. Certification independently confirms that our course includes well-defined and relevant content and is delivered to an appropriate standard.

Your tutors will encourage you to tackle challenging problems, ensuring you are in the best position to make a real difference in the computing sector. Research plays an important role in informing all our teaching and learning activities, and you'll find many of our academics are at the forefront of impactful research. The University's Centre for Cyber Security, for example, aims to develop and demonstrate advanced knowledge beneficial to understanding and mitigating cyber threats.

The University is nestled within the heart of Huddersfield, a warm and welcoming town, known for its friendly atmosphere and diverse community. When you’re not studying, you can enjoy an array of exciting activities and experiences. From cultural events and charming cafes to stunning scenery and fantastic transport links, there’s plenty to do in and around the town centre.

We also offer this course as a part-time Distance Learning route.

Career opportunities after the course *

Software Engineer

Network Engineer

Security Engineer

Infrastructure Engineer

Solutions Architect

*Lightcast

Who can apply?

Entry Requirements

Entry requirements for this course are normally:

  • An Honours degree (2:2 or above) in Computing or related subject or an equivalent professional qualification
  • Other qualifications and/or experience that demonstrate appropriate knowledge and skills at an Honours degree level
  • Substantial (3 years) relevant industry experience

If your first language is not English, you will need to meet the minimum requirements of an English Language qualification. The minimum for IELTS is 6.0 overall with no element lower than 5.5, or equivalent. Read more about the University’s entry requirements for students outside of the UK on our International Entry Requirements page.

What will you learn?

Course Details

This module aims to provide you with skills that are key to helping you become a successful computing researcher or practitioner. You'll get the opportunity to study topics including the nature of research, the scientific method, research methods, literature review and referencing. The module aims to cover the structure of research papers and project reports, reviewing research papers, ethical issues (including plagiarism), defining projects, project management, writing project reports and making presentations.

The goal of cryptography is to make information secret so that only trusted individuals can access it. Cryptography has become critically important in the digital age. It is the cornerstone of secure communication and data storage, particularly in the area of e-commerce. This module aims to provide you with knowledge and critical understanding of the key concepts in cryptography. You will study the fundamental principles of cryptography. To aid your understanding, you will explore commonly used symmetric and asymmetric encryption and digital signature schemes in detail. Furthermore, you will be exposed to current state of the art developments in relation to cryptography. Finally, this module seeks to give you practical development skills in applying cryptographic techniques to a specific application scenario.

Data mining is a collection of tools, methods and statistical techniques for exploring and extracting meaningful information from large data sets. It is a rapidly growing field due to the increasing quantity of data gathered by organisations. There is a potential high value in discovering the patterns contained within such data collections. In this module you will look at different data mining techniques and use appropriate data-mining tools in order to evaluate the quality of the discovered knowledge. You will study approaches to preparing data for exploration, supervised and un-supervised approaches to data mining, exploring unstructured data and the social impact of data mining. You will be expected to develop your knowledge such that you are able to contribute to discussions around current application areas and research topics and to increase your background knowledge and understanding of issues and developments associated with data mining.

Upon completion of this module, you will have a critical understanding of threats to digital systems and how these threats are possible, usually by exploiting weaknesses in digital systems. You will explore a number of key cyber security techniques, such as, for example, cryptography and access control, and gain an understanding of how these techniques protect systems. You will also be enabled to critically evaluate and engage in scholarship in the discipline, including proposing and testing both research and investigative hypotheses.

Digital Forensics (DF) is the process of identifying, acquiring, analysing and reporting on digital evidence (DE) used in a wide range of investigations. Digital Forensic Investigations (DFIs) have a variety of applications, being used in civil, administrative, and criminal proceedings in pursuit of DE. A typical DFI would involve the investigation of crimes such as hacking, digital espionage, counter- terrorism and possession of illegal imagery, etc. The aim of this module is to provide you with the knowledge and critical understanding of the key concepts in Digital Forensics. Through this module, you will be taught how to identify, preserve, extract and analyse digital evidence in a forensically-sound manner and report on your findings. Furthermore, this module will equip you with practical skills in applying specialised forensic tools, such as FTK Imager and Autopsy, and techniques, such as data carving and file system analysis, to a specific application scenario.

Artificial intelligence (AI) is the study and development of intelligent behaviour exhibited in computational form. Its purpose is to demonstrate intelligent characteristics that provide enriched system functionality beyond that of traditional software systems. The benefits of AI spreads across many application areas, and one such area is that of cyber security. Artificial intelligence can be loosely categorised into symbolic and statistical approaches, which are often used depending on application requirements. In this module, you will study the different types of AI systems and focus on their different application use cases in cyber security. You will learn different techniques, such as Hidden Markov Models, Support Vector Machines to understand the fundamentals of AI technology. This module has a strong application focus, ensuring you gain knowledge and experience of how these techniques can be used in security in applications such as malware analysis, intrusion detection, and security policy analysis.

Upon completion of this module, you will acquire a thorough understanding of the security attacks that may threaten wired and wireless networked systems and how these attacks are possible, usually by exploiting vulnerabilities in the design, implementation, or operation of network protocols. You will explore several key network security techniques, such as IP security and network authentication protocols, and gain an understanding of how these techniques protect networks. You will also learn how to identify security vulnerabilities in enterprise networks and propose sophisticated secure designs to face such threats.

In this module you will explore current state of the art developments in relation to Distributed Ledger Technologies (DLT). DLT are the foundation by which electronic transactions can be recorded and shared in a way that offers transparency without the need for a centralised authority, such as a bank in the finance industry. The module will enable you to develop strategies to evaluate and select DLT that are most appropriate for a chosen domain, including Internet of Things and FinTech.

This module enables you to work independently on a project related to a self-selected problem. A key feature in this final stage of the course is that you will be encouraged to undertake an in-company project with an external Client. Where appropriate, however, the Project may be undertaken with an internal Client - research-active staff - on larger research and knowledge transfer projects. The Project is intended to be integrative, a culmination of knowledge, skills, competencies and experiences acquired in other modules, coupled with further development of these assets. In the case where an external client is involved, both the Client and Student will be required to sign a learning agreement that clearly outlines scope, responsibilities and ownership of the project and its products or other deliverables. The Project will be student-driven, with the clear onus on you to negotiate agreement, and communicate effectively, with all parties involved at each stage of the Project.

Teaching and Assessment

Discover what to expect from your tutor contact time, assessment methods, and feedback process.

Where could this lead you?

Your Career

The top five job titles advertised in the UK for graduate roles associated with Cyber Security and Digital Forensics MSc courses are: Software Engineer, Network Engineer, Security Engineer, Infrastructure Engineer; and Solutions Architect.

Source: LightcastTM data - job postings from December 2023 to December 2024 showing jobs advertised associated with a selection of relevant graduate roles.

398%
Percentage of the University's postgraduate students go on to work and/or further study within fifteen months of graduating.

* HESA Graduate Outcomes 2022/23, UK domiciled.

£38.5k
The average salary of our postgraduates fifteen months after graduating.

* HESA Graduate Outcomes 2022/23, mean salary, UK domiciled, full-time UK employment as main activity.

Studying Cyber Security and Digital Forensics at Huddersfield gave me the research skills and proactive mentality to help me secure a role in the Incident Response team at BT. The diversity and depth of modules in this course enabled me to impart a broad understanding onto my new job.

- Eoghan Tiomanaidhe
Cyber Security and Digital Forensics MSc Graduate

How much will it cost?

Fees and Finance

£9,900 per year

This information is for Home students applying to study at the University of Huddersfield in the academic year 2025/26.

Please note that tuition fees for subsequent years may rise in line with inflation (RPI-X) and/or Government policy. 

For detailed information please visit https://www.hud.ac.uk/study/fees/

This information is for international students applying to study at the University of Huddersfield in the academic year 2025/26.

Please note that tuition fees for subsequent years may rise in line with inflation (RPI-X) and/or Government policy. 

For detailed information please visit https://www.hud.ac.uk/international/fees-and-funding/

Scholarships and Bursaries

Discover what additional help you may be eligible for to support your University studies.

Tuition Fee Loans

Find out more about tuition fee loans available to eligible postgraduate students.

What’s included in your fee?

We want you to understand exactly what your fees will cover and what additional costs you may need to budget for when you decide to become a student with us.

If you have any questions about Fees and Finance, please email the Student Finance Team.

Explore More

Why Hud

Explore the unique opportunities and resources that make our institution a top choice for students seeking a well-rounded and future-focused education.

Need more details?

More Info

Careers support

We know you’re coming to university to study on your chosen subject, meet new people and broaden your horizons. However, we also help you to focus on life after you have graduated to ensure that your hard work pays off and you achieve your ambition.

Find out more about careers support

Student support

At the University of Huddersfield, you’ll find support networks and services to help you get ahead in your studies and social life. Whether you study at undergraduate or postgraduate level, you’ll soon discover that you’re never far away from our dedicated staff and resources to help you to navigate through your personal student journey.

See our support services

Teaching Excellence

Great teaching is engaging and inspiring — it helps you reach your full potential and prepares you for the future. We don’t just teach well — we excel — and we have the awards and recognition to prove it.

Find out more

Inspiring Academics

Our researchers carry out world-leading work that makes a real difference to people’s lives. Staff within the Department of Computer Science may teach you on this course.

Find out more about our staff

Research Excellence

You’ll be taught by staff who want to support your learning and share the latest knowledge and research.

Find out more

Accommodation

Looking for student accommodation? Huddersfield has you covered. HudLets has a variety of accommodation types to choose from, no matter what your preference. HudLets is the University’s approved accommodation service, run by Huddersfield Students’ Union.

Take a look at your options

Further Study

Many of our graduates stay at Huddersfield to complete postgraduate research degrees at Masters or PhD level.

Discover research degrees
Ask us a question