...

Cyber Security and Digital Forensics PgDip (Distance Learning)

Select the year

Start Dates

7 September 2026, 18 January 2027, 10 May 2027

Duration

2 years part-time


Recent Awards For Excellence

Computer Science & Information Systems - QS 2025
Find out more about these awards
About this course

Overview

Why choose Huddersfield for this course?

  • Gain advanced expertise across three critical areas: cyber security, digital forensics and artificial intelligence.
  • Learn from our research-active academic staff, who bring real-world insight and the latest research directly into their teaching.
  • Taught 100% online, part-time allowing you to study while working.

Accreditation and Professional Links

Recognised connections to give you an extra edge when you graduate. Read More

Our 100% online Postgraduate Diploma (PgDip) in Cyber Security and Digital Forensics is designed to meet industry demand for experts with advanced skills needed to protect systems, investigate incidents and handle digital evidence.

You will study secure by design engineering, threat modelling, and risk assessment, alongside digital forensics techniques that support the identification, acquisition, preservation and analysis of digital evidence. 

Practical training in ethical hacking and applied cryptography is used to test, strengthen system defences and translate findings into recommendations. 

A defining feature of the course is its integration of cyber security, digital forensics and artificial intelligence, enabling you to develop fluency in the application of AI to security and forensic challenges. You will examine how AI and machine learning can support threat detection, triage and forensic analysis, while critically assessing challenges such as robustness, bias and governance.

This specialist course aims to prepare you for a career in cyber security, digital forensics, information security and related fields.

Learn more about Distance Learning at Huddersfield.

Career opportunities after the course *

Software Engineer

Network Engineer

Security Engineer

Infrastructure Engineer

Solutions Architect

*Lightcast

Who can apply?

Entry Requirements

Entry requirements for this course are normally:

  • A BSc or BEng Honours degree (2:2 or above) in Computing or related subject or an equivalent professional qualification. For applicants who received their degree more than 10 years ago, we will need evidence to demonstrate current knowledge in the subject area, such as reference letters, training certificates or significant relevant work experience.
  • Substantial (3 years) relevant industry experience.
  • Other qualifications and/or experience that demonstrate appropriate knowledge and skills at an Honours degree level.

If your first language is not English, you will need to meet the minimum requirements of an English Language qualification. The minimum for IELTS is 6.0 with a minimum score of 6.0 in writing and a minimum of 5.5 in any single component or Duolingo English certificate, score 105 or above. Read more about the University’s entry requirements for students outside of the UK on our International Entry Requirements page.

What will you learn?

Course Details

Secure System Design is a practical, design led module focused on building software that is secure by default. You will develop a critical grasp of the principles, patterns and processes that underpin secure systems, including security requirements, secure DevOps practices, security architecture patterns, Zero Trust principles, privacy by design, human centred security, secure APIs and interfaces, supply chain security considerations, and formal reasoning concepts for validating security properties. You will apply these in realistic design scenarios: eliciting and prioritising requirements, integrating security into development workflows, selecting and justifying architectural and interface patterns, and addressing systemic risks such as third party dependencies. The module places emphasis on clear risk communication, defensible trade offs between security and usability, and evidence based design rationales. By the end, you will be equipped to plan, design and justify an end to end secure software solution, and explain its security properties to both technical and non technical stakeholders.

Advanced Digital Forensics is a highly practical, hands-on module that explores the lawful identification, preservation, analysis and reporting of digital evidence in criminal, civil and administrative investigations. You will gain a critical understanding of the principles, procedures and legal considerations that underpin digital forensic practice, while applying them directly in realistic investigative scenarios. Using industry-standard tools such as FTK Imager and Autopsy, you will develop practical expertise in techniques including data carving, file system analysis and metadata examination. The module places strong emphasis on conducting investigations in a forensically sound manner, safeguarding evidential integrity, and presenting findings clearly and professionally to both technical and non-technical audiences. By the end, you will be equipped with the knowledge and practical skills to plan, carry out and report on a complete digital forensic investigation, from initial evidence handling through to final documentation.

The primary goal of cryptography is to protect information, ensuring it remains accessible only to authorised and trusted individuals. Cryptography has become critically important in the current digital era, as adversaries continually seek to breach systems that store sensitive information. Cryptography safeguards information by ensuring confidentiality, integrity, and authenticity, making secure communication and data protection possible in modern computing. This module aims to provide you with familiarity and critical understanding of cryptographic principles. You will learn how to apply these key concepts and principles to secure digital systems. This module covers essential cryptographic concepts, including symmetric and asymmetric encryption, digital signatures, and key management. The module also introduces current state of the art, including post-quantum cryptography. To gain comprehensive grasp of the subject, significant emphasis will be placed on understanding both the fundamental principles of cryptography and how these concepts are applied in real-world scenarios. Finally, through this module, you will develop the expertise to design, critically evaluate, and implement cryptographic solutions

In this module, you will learn how ethical hackers think and operate to protect modern computing systems. You will explore how security vulnerabilities are found, exploited, and mitigated using industry-standard tools and frameworks. Through practical labs, case studies, and guided penetration-testing exercises, you will develop hands-on skills in reconnaissance, scanning, exploitation, and post-exploitation, all within legal and ethical boundaries. You will also reflect on the ethical and professional responsibilities of cybersecurity practitioners and learn how to apply these skills to safeguard digital assets in real-world settings.

This module introduces you to the essential principles and practices of cyber security. You’ll explore topics such as digital threats, malware, cryptography, network and software security, and the human and legal aspects of protecting systems. Through a mix of lectures, interactive sessions, and hands-on labs, you’ll learn how cyber attacks happen and how to defend against them using real-world tools and techniques. You’ll also examine the role of governance, privacy rights, and emerging technologies like AI and IoT in shaping the future of cyber security. By the end of the module, you’ll be equipped with the knowledge and practical skills to critically assess security risks and contribute to safeguarding digital environments.

This module provides a theoretical and practical foundation for leveraging artificial intelligence to advance modern cyber security. You will begin by exploring how AI theory can be applied to identify and predict emerging threats, understand adversarial behaviour, and detect deeply hidden malicious patterns that evade traditional defence systems. From there, you will transition to the practical applications of AI in securing digital assets. You will learn how to implement AI-driven solutions for next-level biometric and access control, advanced loss prevention, and the use of anonymization and encryption techniques to protect sensitive data. Through this module, you will gain the skills to move from a reactive security posture to a proactive and intelligent one, using the power of AI to build more resilient and sophisticated cyber defences.

Teaching and Assessment

Discover what to expect from your tutor contact time, assessment methods, and feedback process.

Technology and System Requirements

As a Distance Learning student, you must provide and have access to certain IT equipment and facilities to access your Virtual Learning Environment (VLE) and to fully participate on your course.

Where could this lead you?

Your Career

The top five job titles advertised in the UK for graduate roles associated with Cyber Security and Digital Forensics MSc courses are: Software Engineer, Network Engineer, Security Engineer, Infrastructure Engineer; and Solutions Architect.

98%
Of our postgraduate students go on to work and/or further study within fifteen months of graduating.

* HESA Graduate Outcomes 2022/23, UK domiciled.

£38,500
Average salary of our postgraduate students fifteen months after graduating.

* HESA Graduate Outcomes 2022/23, mean salary, UK domiciled, full-time UK employment as main activity.

The diversity and depth of modules in this course allowed for engaging and comprehensive learning, and enabled me to impart a broad understanding onto my new job in the Incident Response team at BT.

- Eoghan Ó Tiománaidhe
Cyber Security and Digital Forensics MSc Graduate

How much will it cost?

Fees and Finance

£6,600

This information is for Home and International students applying to study at the University of Huddersfield in the academic year 2026/27.

Modules credits can range from 15 to 60, dependent on the content of the module. Read more about total credits required for a range of degrees, to allow you to calculate the potential total cost.

Please note that tuition fees for subsequent years may rise in line with inflation (RPI-X) and/or Government policy and/or to ensure our distance learning fees are competitive.

Tuition fees will cover the cost of your study at the University. Read more about what is and is not covered by Tuition Fees including compliance for Goods and Services Tax for International Students studying an online course. 

For detailed information please visit www.hud.ac.uk/distance-learning/fees-and-finance/

£6,600

This information is for Home and International students applying to study at the University of Huddersfield in the academic year 2026/27.

Modules credits can range from 15 to 60, dependent on the content of the module. Read more about total credits required for a range of degrees, to allow you to calculate the potential total cost.

Please note that tuition fees for subsequent years may rise in line with inflation (RPI-X) and/or Government policy and/or to ensure our distance learning fees are competitive.

Tuition fees will cover the cost of your study at the University. Read more about what is and is not covered by Tuition Fees including compliance for Goods and Services Tax for International Students studying an online course. 

For detailed information please visit www.hud.ac.uk/distance-learning/fees-and-finance/

Flexible payments

Learn how to pay your fees including flexible instalment options

Read more 

Funding options

Explore ways to fund your course with exclusive discounts and government loans

Read more 

If you have any questions about Fees and Finance, please email the Student Finance Team.

Explore More

Why Hud

Explore the unique opportunities and resources that make our institution a top choice for students seeking a well-rounded and future-focused education.