SlideShare a Scribd company logo
1 of 19
Download to read offline
Ranked Top 5 Most Preferred Private Education Provider for Postgraduate Degrees in Singapore
(JobsCentral Learning Survey 2016)
Master of Science
in Cyber Security
10MonthsPart-Time|QAAAccredited
The Guardian University League Tables 2020
12th in UK for Computer Science & Information Systems
Welcome
We aim to inspire you to become a creative
professional and connect you to an exciting
and rewarding career.
Based in the heart of one of the UK’s most
successful business regions, we have highly
qualified staff with a wealth of experience
in their respective disciplines and strong
connections with key industries.
The University has acquired a remarkable
reputation for high-quality education
closely linked to employment. Many of our
graduates go on to achieve great success
within their chosen discipline and professions.
Welcome to the career university.
Professor Peter John
Vice-Chancellor
Established in 1860, The University of West London (UWL) draws on a heritage of 150 years in teaching and
professional education. Based in the heart of one of the UK’s most successful business regions, with strong
connections to many national and multinational organisations such as Heathrow Airport, BBC, Hewlett-
Packard (HP) Ltd, Middlesex Law Society and the Savoy Education Trust, UWL has a reputation for high-quality
education closely linked to employment.
The University of West London offers a high-quality UK education experience to over 10,000 students and it
has more than 115,000 graduates in over 50 countries. The university also offers over 140 undergraduate and
postgraduate courses with a strong focus on employability and practical experience. Boasting of high-quality
teaching and impressive graduate employment rates, The University of West London prides itself on being
‘The Career University’, with 98% of students in work or further study within six months of graduation.
The University has highly qualied staff with a wealth of experience in their respective disciplines and strong
connections to their industries, equipping students with both the academic knowledge, relevant expertise
and practical career skills. Recent graduates have secured jobs in a range of high-profile businesses and
corporations, including Microsoft and IBM.
THE UNIVERSITY OF WEST LONDON, UK
A postgraduate degree can enhance your career prospects, setting you apart in today’s highly competitive
job market. If you are considering a new career path, it is a way to enhance and build on your current
qualifications, and learn new, essential skills. You may also want to explore your passion for, and commitment
to a field of study.
VALUE OF A POSTGRADUATE QUALIFICATION
Image Source: https://www.uwl.ac.uk/news-events/news/uwl-named-top-modern-university-london
The University has highly qualified staff with a wealth of experience in their respective disciplines and strong
connections to their industries, equipping students with both the academic knowledge, relevant expertise,
and practical career skills. Recent graduates have secured jobs in a range of high-profile businesses and
corporations, including Microsoft and IBM.
UNIVERSITY OF WEST LONDON’S SCHOOL OF COMPUTING AND ENGINEERING
Get to grips with the ground-breaking technology that is transforming society and business. Whether you
are interested in computer science, software development, security and networking, information systems,
information management, engineering or the built environment, our internationally respected School of
Computing and Engineering (SCE) is here to help you progress
FOR PROFESSIONALS WHO WANT TO LEAD THE WAY
Home to several research centres such as the Cybersecurity and Criminology Centre, UWL provides leading
education and research in the fields of computing, built environment and engineering. The close collaborations
with organizations in both the private and public sector also ensure courses are always employment focused.
CUTTING EDGE RESEARCH CENTRES
“Our students are aware of the latest trends in the industry when they enter the workplace and receive an
excellent learning experience, with small manageable cohorts that encourage student interaction.”
- Indira Chauhan, Senior Lecturer
UWL’S CYBERSECURITY AND
CRIMINOLOGY CENTRE
The UWL’s Cybersecurity and Criminology Centre (CCC) was established to examine, analyze and assess current and future
criminal threats to individuals, organizations and national security. Modern security threats, require a cross-disciplinary
approach and the centre researches and investigates a broad range of contemporary issues such as:
Outcomes from UWL’s research make a positive impact on cybersecurity and policing and real-world problems, drawing
on its close ties with businesses and industry as well as the expertise of the university. The UWL’s Cybersecurity and
Criminology Centre is honored to have partnered with many exceptional organizations such as:
•	 The Home Office, UK
•	 Metropolitan Police
•	 Ministry of Justice, UK
•	 European Health Care Fraud and Corruption Network (EHFCN)
•	 Eversheds Sunderland Legal Services
•	 Ecorys
•	 College of Policing
•	 Mayor’s Office for Policing and Crime (MOPAC), London
•	 Her Majesty’s Inspectorate of Constabulary and Fire & Rescue Services (HMICFRS)
Security
Developing online and physical security
measures for law enforcement, personal
and commercial entities, cybersecurity
capacity and deterrence, analysis
of current and future national and
international security threats and
managing major events
Policing
Development of education packages for
law enforcement and the security sectors,
protection of public systems such as the
NHS, computing language processing tools,
exposing and preventing organized crime
and terrorism threats
Cybercrime
Prevention of cybercrime, working with law
enforcement and the computing industry
to develop analytic systems and data sets,
systems of reporting and recording online
crimes, dissemination of techniques for
prevention and data sharing
RECOGNITION
University of West London complies with the academic standards monitored by the Quality Assurance Agency for Higher
Education (QAA), UK. This means you’ll receive the same standard of education as UWL students studying on campus and
have the opportunity to join the graduation in London to celebrate your achievement.
All University of West London degrees are recognised by the UK government
1
.
The highest climber in The Times and The Sunday Times Good
University Guide
Friday, September 20, 2019
The University of West London (UWL) has recorded the biggest rise of any university in the UK in the prestigious The Times
and The Sunday Times Good University Guide 2020, climbing an impressive 31 places to number 52 nationally and entering
the top 10 London universities in 8th place.
These excellent results come on the back of the career-focused University achieving record rates of student satisfaction
in this year’s National Student Survey.
1
https://www.gov.uk/check-a-university-is-officially-recognised/recognised-bodies
Image Source: https://www.uwl.ac.uk/news-events/news/uwl-named-top-modern-university-london
•	 4th in UK for both student experience and
student satisfaction with teaching quality
•	 8th among London universities
•	 52nd overall in UK, the biggest rise of any
university in the country
Times and The Sunday Times Good University Guide 2020 The Guardian University League Tables 2020
The Guardian University League Tables 2019
•	 12th in UK for Computer Science & Information Systems
•	 57th overall in UK
•	 21st in UK for Computer Science & Information Systems
•	 50th overall in UK
ACCOLADES
The Complete University Guide 2020
• 71st in UK for Computer
Science
• 90th overall in UK
Teaching Excellence Framework 2017
• Awarded silver for teaching
excellence
Times Higher Education (THE) Awards 2019
• Shortlisted for ‘Business School of the
Year’
Times Higher Education (THE) Awards 2018
• Shortlisted for ‘University of the Year’
ACCOLADES
Hackings, data breaches, identity theft and cyberattack are pressing issues for national security, all businesses
and individuals. It affects everything we do today, Cybereconomy research firm Cybersecurity Ventures asserts
that by 2021, global cybercrime damages will exceed $6 trillion/year.
Closer to home, the Singapore Threat Report (Oct 19) released by United States-based cyber-security agency,
Carbon Black showed that as many as 96 per cent of organisations in Singapore have had at least one breach
in the past 12 months due to external cyber-attacks. It also showed that close to 50% of companies affected by
data breaches incurred financial losses, while around eight in 10 saw their reputation taking a hit.
GAIN THE PROFESSIONAL CREDENTIAL THAT WILL HELP YOU PROPEL
YOUR CAREER
As demand for cyber security professionals continues to surge, securing the right professional credential and
postgraduate qualification will prepare you for a rewarding and satisfying career where digital data is constantly
under attack. Cyber security roles can be found across all companies and sectors, from government agencies
to telco, banks, retailers, SMEs and NGOs.
Start exploring some of these exciting cyber careers:
•	 SECURITY SPECIALIST | An entry-level role with high advancement potential
•	 INCIDENT RESPONDER | Prevent and protect against threats
•	 SECURITY ADMINISTRATOR | Keep security systems running smoothly every day
•	 VULNERABILITY ASSESSOR | Spot system vulnerabilities and create solutions
•	 CRYPTOGRAPHER & BLOCKCHAIN | Write the code that hackers can’t crack
•	 IT SECURITY MANAGER | Keep systems secure with help from an expert team
•	 SECURITY ARCHITECT| Outsmart criminals by designing tough-to-crack systems
•	 CHIEF INFO SECURITY OFFICER | Expertise in high level computer security system
•	 SECURITY ANALYST | Plan and execute flawless security measures
•	 SECURITY AUDITOR | Find the weak spots in a security system before criminals do
•	 SECURITY DIRECTOR| Make the rules and solve complex problems
•	 DIGITAL FORENSIC EXPERT | Protect the cyber world and assist law enforcement
•	 PENETRATION TESTER | Hack and protect computer systems for good
•	 SECURITY CONSULTANT | Advise and implement security solutions
•	 SECURITY ENGINEER | Build IT security systems for your organization
•	 SOURCE CODE AUDITOR | Ensure code accuracy and safety prior to release
There has never been a better time
to consider a cyber security career.
The Master of Science in Cyber Security programme aims to equip you with a comprehensive understanding
of the latest practice and techniques in cyber security systems development and operations. The programme
offers a strong technical focus in cyber security and you will cover contemporary topics including cyber warfare,
digital forensics, and Network Security defence.
EARN THE PROFESSIONAL CREDENTIAL TO EXCEL IN YOUR CAREER
Designed for working professionals with a strong interest in cybersecurity, the programme aims to develop your
capabilities and skills set to tackle growing industry needs. As a cybersecurity professional, your specialised skills
will be in high demand across Asia. You will discover how cyber security systems are designed and constructed,
and the impact this technology has on organisations.
GAIN PRACTICAL HAND-ON EXPERTISE
Through hands-on learning and authentic project experiences, you will learn the theoretical underpinnings of
cyber security and the technical expertise required to protect data, communications, networks and services.
You will also gain a practical understanding of issues surrounding the design, analysis and implementation of
modern secure IT systems in an industry context.
LEARN FROM INDUSTRY EXPERTS AND LIKEMINDED PEERS
You will be taught by leading industry experts who will equip you with the capabilities to address the issues and
needs of the rapidly growing cyber security sector. You will also learn, exchange and network with likeminded
professionals across the region.
MASTEROFSCIENCEINCYBERSECURITY
LEARNING OUTCOMES
Join Like-Minded Professionals & explore the growing Importance of Organization-Wide Approach Towards
Cybersecurity. Upon graduation from this course, you will.
•	 Gain an appreciation of commercial and open source cyber security equipment, software and services
based on industry standard technologies.
•	 Be equipped with the skills to analyse the legal, social, ethical and professional issues involved in the human
aspects of cyber security, guided by the adoption of appropriate professional, ethical and legal practices.
•	 Gain the skills you need to work effectively in a business environment and provide a solid basis for cyber
security research and development.
•	 Develop a practical understanding of industrial techniques and issues surrounding the design, analysis and
implementation of secure IT systems.
•	 Gather greater insights into how people, technologies, service providers, content providers, government
(laws, regulations, policies) and law enforcement mesh together in the management and delivery of
content and services to users.
•	 Broaden the appreciation of commercial and open source cyber security equipment, software and services
based on industry standard technologies.
•	 Discover how cyber security systems are designed and constructed, and its impact on organizations
•	 Obtain the skills you need to work effectively in a business environment
•	 Build a solid foundation for applied research and development in cyber security
•	 Develop the necessary research competencies and build a solid foundation for applied research in cyber
security, which will create pathways to further study such as PhD
PROGRAMME STRUCTURE
Designed to accommodate and complement the busy commitments of today’s global managers and professionals, this
10 months part-time MSc programme comprises of 6 modules plus a dissertation which are delivered on a modular basis.
•	 Fundamentals of Cyber Security
•	 Security Operations & Assurance
•	 Network & System Security
•	 Principles of Project Management
•	 Consultancy & Technological Innovation
•	 Research Methods
•	 Dissertation
DELIVERY STRUCTURE
Each module spans over 2 consecutive weekends per month (Fridays; 7pm to 10 pm & Saturdays & Sundays; 9am to 5pm)
and includes a comprehensive coverage of 34 hours of face-to-face lectures that is complemented with online course
support, additional readings and resource materials.
Flexible Modular Delivery for Professionals
10 Months
Part-Time
6 Modules + Dissertation
FRI SAT-SUN MON-THU FRI SAT-SUN
7pm - 10pm 9am - 5pm Revision Break 7pm - 10pm 9am - 5pm
COURSEWORK BASED ASSESSMENT
We use a variety of teaching methods including lectures, seminars, laboratory work and report writing, to help you make
the most of your learning experience. You will also have access to specialist networks and software, plus ample space for
private study and meetings.
TAUGHT BY EXCEPTIONAL FACULTY
The course is taught by an academic team with extensive research and professional practice directly in cyber
security. All the tutors have the academic and industry knowledge and experiences to support your development.
SAME DEGREE AS CONFERRED ON CAMPUS
Upon successful completion of the programme, you will be awarded a
Master of Science in Cyber Security degree by the University of West London.
Graduation ceremonies are held annually in Singapore and London where
you have a choice to graduate in either of these locations.
SOUGHT-AFTER CAREER OPPORTUNITIES
Cyber security professionals are in high demand. You could work in any
setting that is data and knowledge intensive. Roles include chief information
security officers, network and computer security engineers, security
managers and consultants, penetration testers, security investigators and
researchers. Some security experts also work in media, writing articles for
magazines and papers.
UNIVERSITY OF
WEST LONDON
This is to certify that
Student Name
has been awarded the fJegree of
Master of Science
(with Merit or Distinc�on if applicable)
having followed an approved programme in
Cyber Security
DATE OF AWARD
SIGNATURE OF VICE CHANCELLOR SIGNATURE OF CHANCELLOR
Vice-Chancellor Chancellor
•
The University was granted degree all'ardingpoll'ers on 4June 1992 by Order of the
Privy Co11ncil. exercisingpoll'ers conferred by Section 76 of t/re F11rt/rer and Hig/rer
Ed11catio11Act /992. The University is a recognised body, under the terms of section
2/4(2) (a) of the Education Reform Act /988. as a university w/rich is a111horised
byAct ofParliament to grant degrees.
FUNDAMENTALS OF CYBER SECURITY
On this module you will get an introduction to the key techniques and technologies used in cyber security. The module
covers symmetric and asymmetric encryption, steganography, principles of cryptanalysis, message confidentiality,
message authentication, security protocols and security in distributed systems as well as the application of cryptographic
techniques to authentication and identity management.
SECURITY OPERATIONS AND ASSURANCE
This module will introduce you to security operations and assurance of systems, networks, data and user identities, which
is an essential aspect of organization and information systems.
NETWORK AND SYSTEMS SECURITY
This module will introduce you to network and systems security. You will start by looking at security threats, vulnerabilities
and attack patterns, then progress to firewalls, intrusion detection, and protection systems for networks and computer
systems. Finally, you will examine security management, such as Security Information and Event Management (SIEM)
systems.
PRINCIPLES OF PROJECT MANAGEMENT
During this module you will be introduced to the concepts, principles and techniques needed for effective project
management. The module covers the roles, responsibilities and skills required to work in ever-changing project environments
and how these relate to effective project management.
CONSULTANCY AND TECHNOLOGY INNOVATION
On this module you will explore the skills needed to understand, and work in, the complex multi-sourced environment
that supports business change. Focusing on the strategic management of leading-edge technology, you will examine
the organisational structure of IT, including systems integrators and consultancy, and gain an overview of the IT consulting
world, its principles and practice.
RESEARCH METHODS
You will prepare to carry out master’s-level applied research in computing, with a focus on cyber security. You will learn to
use appropriate research methodologies and tools to support your research ideas and develop your writing skills.
DISSERTATION
With this module, you will have the opportunity to carry out an original piece of research, adding to existing knowledge
and demonstrating an ability to select, define and focus on a cyber security topic at an appropriate level. You will also
develop and apply relevant methodologies to analyse your topic areas, and to develop recommendations and logical
conclusions in the context of existing work in the area.
MODULE OUTLINE
TESTIMONIALS
As an industry professional, I was skeptical about what postgraduate study could offer but the course was fantastic,
with amazing facilities. The course challenged me to think in a different way and helped me to develop a holistic
approach to the industry I work in. After finishing my course, I was promoted to Head of Global Security Operations and
now I am moving to a bigger company with a broader role.
“I am currently working as a Data Quality Specialist at Intelligent Reach, an e-commerce
service in London that helps retailers and brands optimise their product data to increase
product visibility across marketplaces and channels via an augmented product data &
scientific testing that drives conversion.
MSc. Information System course provided by UWL, is a great way to understand the depths
of information and data in the IT and business sector. It helps you understand the structure
of IS and why it is crucial to have a solid IS strategy to increase business value. With a variety
of modules covering essential topics, you also get to understand more about system & data
architecture and how to manage them using supporting technologies along with the study
of effective project and knowledge management.
I loved how the course provided a balance of academic writing and practical work using a case base scenario
which not only enhances your theoretical knowledge but also provides relevant practical skills that are useful in the
workplace. UWL also offers an excellent teaching service with their top-notch teachers, who is always ready to go
beyond to assist you.
Luca Fioravanti
Head of Global Security Operations
Vodafone UK
Binita Ghale
Data Quality Specialist
Intelligent Reach
WHAT OUR
SAY
GRADUATES
“As an industry professional, I was skeptical about what postgraduate
study could offer but the course was fantastic. The course challenged
me to think in a different way and helped me to develop a holistic
approach to the industry I work in. After finishing my course, I was
promoted to Head of Global Security Operations and now I am
moving to an even bigger company with a broader role.“
– Luca Fioravanti, SVP - Head of Group Corporate Security,
UniCredit- European financial Banking Group
TAKE THE
NEXT STEP
YOUR LEARNING JOURNEY IS
JUST STARTING NOW.
ADMISSION CRITIERIA
Candidates are expected to contribute to the class learning experience and participation. You will be assessed based on
experience, aptitude, potential and ability to add value to the interactions between peers and faculty.
WHAT DO YOU NEED TO APPLY?
•	 Completed application form
•	 Application fees of S$200 (excluding prevailing GST)
•	 Photocopied certificates and transcripts
•	 Update professional resume
FINANCING YOUR MSc
Fees Payable
1
st
instalment – upon acceptance
2
nd
instalment (before 3
rd
month)
3
rd
instalment (before 5
th
month)
4
th
instalment (before 7
th
month)
S$ 5,200
S$ 5,200
S$ 5,200
S$ 5,200
The total investment (inclusive of materials, assessment
fees etc.) for the Master of Science in Cyber Security
programme is S$20,800 (before prevailing GST), payable
in 4 instalments:
•	 An honours degree (2:2 or above) in a computing subject.
•	 A business or an engineering degree with a significant level of computing content may also be considered.
•	 Equivalent professional qualifications or a relevant HND with demonstrated relevant work experience
may be considered
•	 Mature candidates above 30 years old with extensive working experience may be considered on a
case-to-case basis.
100 Orchard Road #04-100 Concorde Hotel Singapore 238840 Tel: 6822 2050 Fax: 6720 2222
Co. Reg. No. 200700458M Period: 20 May 2019 - 19 May 2021
www.aventis.edu.sg
Sources quoted are correct as at 22 Jun 2020

More Related Content

Similar to Master of Cyber Security Singapore

University of Lincoln lincoln isc_brochure_1617_lr_single
University of Lincoln lincoln isc_brochure_1617_lr_singleUniversity of Lincoln lincoln isc_brochure_1617_lr_single
University of Lincoln lincoln isc_brochure_1617_lr_singleAbhishek Bajaj
 
Most Widely Known MS Programme in the UK
Most Widely Known MS Programme in the UKMost Widely Known MS Programme in the UK
Most Widely Known MS Programme in the UKAHZ Associates
 
What Conestoga College Has to Offer
What Conestoga College Has to OfferWhat Conestoga College Has to Offer
What Conestoga College Has to OfferShiv Kumar
 
Unveiling the Leadership Journey of Lata Bavisi.pdf
Unveiling the Leadership Journey of Lata Bavisi.pdfUnveiling the Leadership Journey of Lata Bavisi.pdf
Unveiling the Leadership Journey of Lata Bavisi.pdfcxoincmagazine
 
Bachelor of Computer Science & Schools in Malaysia
Bachelor of Computer Science & Schools in MalaysiaBachelor of Computer Science & Schools in Malaysia
Bachelor of Computer Science & Schools in MalaysiaVictoria College
 
saint louis university mis
saint louis university missaint louis university mis
saint louis university misSakshiGusain7
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
Connect with our talent
Connect with our talentConnect with our talent
Connect with our talentCraig D'Souza
 
Level 2 Diploma in Business Beginners in Cyber Security - Delivered Online by...
Level 2 Diploma in Business Beginners in Cyber Security - Delivered Online by...Level 2 Diploma in Business Beginners in Cyber Security - Delivered Online by...
Level 2 Diploma in Business Beginners in Cyber Security - Delivered Online by...London School of Business and Research, UK
 
International College, Ajman Profile
International College, Ajman Profile International College, Ajman Profile
International College, Ajman Profile Rajith Sahadevan
 
University_of_Liverpool_Online_Prospectus
University_of_Liverpool_Online_ProspectusUniversity_of_Liverpool_Online_Prospectus
University_of_Liverpool_Online_ProspectusSamira Al Otaibi
 
Nixon University - School of Computer Sciences
Nixon University - School of Computer SciencesNixon University - School of Computer Sciences
Nixon University - School of Computer SciencesNixon University
 
Brochure bachelor ygrec_2020_2021
Brochure bachelor ygrec_2020_2021Brochure bachelor ygrec_2020_2021
Brochure bachelor ygrec_2020_2021Matthieu Cisel
 
ASI-Capital-Technology-University-Profilep2ADA.pdf
ASI-Capital-Technology-University-Profilep2ADA.pdfASI-Capital-Technology-University-Profilep2ADA.pdf
ASI-Capital-Technology-University-Profilep2ADA.pdfBradford Sims
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair HandbookClearedJobs.Net
 
Coventry University Corporate Master November 18FINAL - Indonesia 0419.pptx
Coventry University Corporate Master November 18FINAL - Indonesia 0419.pptxCoventry University Corporate Master November 18FINAL - Indonesia 0419.pptx
Coventry University Corporate Master November 18FINAL - Indonesia 0419.pptxnataliadjahi1
 
10 Reports on Student Recent Grads on LinkedIn | Talent Pool Report
10 Reports on Student Recent Grads on LinkedIn | Talent Pool Report10 Reports on Student Recent Grads on LinkedIn | Talent Pool Report
10 Reports on Student Recent Grads on LinkedIn | Talent Pool ReportLinkedIn Talent Solutions
 

Similar to Master of Cyber Security Singapore (20)

Master of Science in Cyber Security
Master of Science in Cyber Security Master of Science in Cyber Security
Master of Science in Cyber Security
 
University of Lincoln lincoln isc_brochure_1617_lr_single
University of Lincoln lincoln isc_brochure_1617_lr_singleUniversity of Lincoln lincoln isc_brochure_1617_lr_single
University of Lincoln lincoln isc_brochure_1617_lr_single
 
Most Widely Known MS Programme in the UK
Most Widely Known MS Programme in the UKMost Widely Known MS Programme in the UK
Most Widely Known MS Programme in the UK
 
What Conestoga College Has to Offer
What Conestoga College Has to OfferWhat Conestoga College Has to Offer
What Conestoga College Has to Offer
 
Unveiling the Leadership Journey of Lata Bavisi.pdf
Unveiling the Leadership Journey of Lata Bavisi.pdfUnveiling the Leadership Journey of Lata Bavisi.pdf
Unveiling the Leadership Journey of Lata Bavisi.pdf
 
Bachelor of Computer Science & Schools in Malaysia
Bachelor of Computer Science & Schools in MalaysiaBachelor of Computer Science & Schools in Malaysia
Bachelor of Computer Science & Schools in Malaysia
 
saint louis university mis
saint louis university missaint louis university mis
saint louis university mis
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
mits brochure
mits brochuremits brochure
mits brochure
 
Connect with our talent
Connect with our talentConnect with our talent
Connect with our talent
 
Level 2 Diploma in Business Beginners in Cyber Security - Delivered Online by...
Level 2 Diploma in Business Beginners in Cyber Security - Delivered Online by...Level 2 Diploma in Business Beginners in Cyber Security - Delivered Online by...
Level 2 Diploma in Business Beginners in Cyber Security - Delivered Online by...
 
International College, Ajman Profile
International College, Ajman Profile International College, Ajman Profile
International College, Ajman Profile
 
University_of_Liverpool_Online_Prospectus
University_of_Liverpool_Online_ProspectusUniversity_of_Liverpool_Online_Prospectus
University_of_Liverpool_Online_Prospectus
 
Nixon University - School of Computer Sciences
Nixon University - School of Computer SciencesNixon University - School of Computer Sciences
Nixon University - School of Computer Sciences
 
JNCanhietUALIT
JNCanhietUALITJNCanhietUALIT
JNCanhietUALIT
 
Brochure bachelor ygrec_2020_2021
Brochure bachelor ygrec_2020_2021Brochure bachelor ygrec_2020_2021
Brochure bachelor ygrec_2020_2021
 
ASI-Capital-Technology-University-Profilep2ADA.pdf
ASI-Capital-Technology-University-Profilep2ADA.pdfASI-Capital-Technology-University-Profilep2ADA.pdf
ASI-Capital-Technology-University-Profilep2ADA.pdf
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair Handbook
 
Coventry University Corporate Master November 18FINAL - Indonesia 0419.pptx
Coventry University Corporate Master November 18FINAL - Indonesia 0419.pptxCoventry University Corporate Master November 18FINAL - Indonesia 0419.pptx
Coventry University Corporate Master November 18FINAL - Indonesia 0419.pptx
 
10 Reports on Student Recent Grads on LinkedIn | Talent Pool Report
10 Reports on Student Recent Grads on LinkedIn | Talent Pool Report10 Reports on Student Recent Grads on LinkedIn | Talent Pool Report
10 Reports on Student Recent Grads on LinkedIn | Talent Pool Report
 

More from Aventis School of Management

Aventis Training management (Enterprise design thinking)
Aventis Training management (Enterprise design thinking)Aventis Training management (Enterprise design thinking)
Aventis Training management (Enterprise design thinking)Aventis School of Management
 
Aventis AI Powered Training management system slide deck
Aventis AI Powered Training management system slide deckAventis AI Powered Training management system slide deck
Aventis AI Powered Training management system slide deckAventis School of Management
 
PROFESSIONAL GRADUATE DIPLOMA IN COUNTER TERRORISM AND SECURITY
PROFESSIONAL GRADUATE DIPLOMA IN COUNTER TERRORISM AND SECURITYPROFESSIONAL GRADUATE DIPLOMA IN COUNTER TERRORISM AND SECURITY
PROFESSIONAL GRADUATE DIPLOMA IN COUNTER TERRORISM AND SECURITYAventis School of Management
 
Data driven digital marketing & analytics (june 2020)
Data driven digital marketing & analytics (june 2020)Data driven digital marketing & analytics (june 2020)
Data driven digital marketing & analytics (june 2020)Aventis School of Management
 
California State Univeristy MBA (12 Months Part-time) Singapore
California State Univeristy MBA (12 Months Part-time) SingaporeCalifornia State Univeristy MBA (12 Months Part-time) Singapore
California State Univeristy MBA (12 Months Part-time) SingaporeAventis School of Management
 
London MBA (10 Months Part-Time and Online) Singapore
London MBA (10 Months Part-Time and Online) SingaporeLondon MBA (10 Months Part-Time and Online) Singapore
London MBA (10 Months Part-Time and Online) SingaporeAventis School of Management
 
London Masters of Global financial management (2020)
London Masters of Global financial management (2020)London Masters of Global financial management (2020)
London Masters of Global financial management (2020)Aventis School of Management
 
Grad dip in digital transformation & Innovation (2020)
Grad dip in digital transformation & Innovation (2020)Grad dip in digital transformation & Innovation (2020)
Grad dip in digital transformation & Innovation (2020)Aventis School of Management
 
Digital transformation guide and checklist 2020
Digital transformation guide and checklist 2020 Digital transformation guide and checklist 2020
Digital transformation guide and checklist 2020 Aventis School of Management
 
Digital transformation & innovation (2020)
Digital transformation & innovation (2020)Digital transformation & innovation (2020)
Digital transformation & innovation (2020)Aventis School of Management
 
Master of Arts Integrative Counselling and Psychotherapy
Master of Arts Integrative Counselling and PsychotherapyMaster of Arts Integrative Counselling and Psychotherapy
Master of Arts Integrative Counselling and PsychotherapyAventis School of Management
 
California State University MBA (Singapore) Part-time
California State University MBA (Singapore) Part-timeCalifornia State University MBA (Singapore) Part-time
California State University MBA (Singapore) Part-timeAventis School of Management
 

More from Aventis School of Management (20)

Aventis Training management (Enterprise design thinking)
Aventis Training management (Enterprise design thinking)Aventis Training management (Enterprise design thinking)
Aventis Training management (Enterprise design thinking)
 
Aventis AI Powered Training management system slide deck
Aventis AI Powered Training management system slide deckAventis AI Powered Training management system slide deck
Aventis AI Powered Training management system slide deck
 
HKMA Award for Training & Excellence 2021
HKMA Award for Training & Excellence 2021HKMA Award for Training & Excellence 2021
HKMA Award for Training & Excellence 2021
 
PROFESSIONAL GRADUATE DIPLOMA IN COUNTER TERRORISM AND SECURITY
PROFESSIONAL GRADUATE DIPLOMA IN COUNTER TERRORISM AND SECURITYPROFESSIONAL GRADUATE DIPLOMA IN COUNTER TERRORISM AND SECURITY
PROFESSIONAL GRADUATE DIPLOMA IN COUNTER TERRORISM AND SECURITY
 
Graduate Diploma in Investment & Finance
Graduate Diploma in Investment & FinanceGraduate Diploma in Investment & Finance
Graduate Diploma in Investment & Finance
 
University of dubuque (mba) 2020
University of dubuque (mba) 2020University of dubuque (mba) 2020
University of dubuque (mba) 2020
 
Data driven digital marketing & analytics (june 2020)
Data driven digital marketing & analytics (june 2020)Data driven digital marketing & analytics (june 2020)
Data driven digital marketing & analytics (june 2020)
 
California State Univeristy MBA (12 Months Part-time) Singapore
California State Univeristy MBA (12 Months Part-time) SingaporeCalifornia State Univeristy MBA (12 Months Part-time) Singapore
California State Univeristy MBA (12 Months Part-time) Singapore
 
London MBA (10 Months Part-Time and Online) Singapore
London MBA (10 Months Part-Time and Online) SingaporeLondon MBA (10 Months Part-Time and Online) Singapore
London MBA (10 Months Part-Time and Online) Singapore
 
London Masters of Global financial management (2020)
London Masters of Global financial management (2020)London Masters of Global financial management (2020)
London Masters of Global financial management (2020)
 
Grad dip in digital transformation & Innovation (2020)
Grad dip in digital transformation & Innovation (2020)Grad dip in digital transformation & Innovation (2020)
Grad dip in digital transformation & Innovation (2020)
 
Digital transformation guide and checklist 2020
Digital transformation guide and checklist 2020 Digital transformation guide and checklist 2020
Digital transformation guide and checklist 2020
 
Sun tzu art of strategic leadership 2020
Sun tzu art of strategic leadership 2020Sun tzu art of strategic leadership 2020
Sun tzu art of strategic leadership 2020
 
Digital transformation & innovation (2020)
Digital transformation & innovation (2020)Digital transformation & innovation (2020)
Digital transformation & innovation (2020)
 
Master of Arts Integrative Counselling and Psychotherapy
Master of Arts Integrative Counselling and PsychotherapyMaster of Arts Integrative Counselling and Psychotherapy
Master of Arts Integrative Counselling and Psychotherapy
 
Ma counselling & psychotherapy ppt
Ma counselling & psychotherapy pptMa counselling & psychotherapy ppt
Ma counselling & psychotherapy ppt
 
RU MBA 2018/2019
RU MBA 2018/2019 RU MBA 2018/2019
RU MBA 2018/2019
 
Roehampton London MBA 2018/19
Roehampton London MBA 2018/19 Roehampton London MBA 2018/19
Roehampton London MBA 2018/19
 
Cal State MBA Singapore 2018
Cal State MBA Singapore 2018Cal State MBA Singapore 2018
Cal State MBA Singapore 2018
 
California State University MBA (Singapore) Part-time
California State University MBA (Singapore) Part-timeCalifornia State University MBA (Singapore) Part-time
California State University MBA (Singapore) Part-time
 

Recently uploaded

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Master of Cyber Security Singapore

  • 1. Ranked Top 5 Most Preferred Private Education Provider for Postgraduate Degrees in Singapore (JobsCentral Learning Survey 2016) Master of Science in Cyber Security 10MonthsPart-Time|QAAAccredited The Guardian University League Tables 2020 12th in UK for Computer Science & Information Systems
  • 2. Welcome We aim to inspire you to become a creative professional and connect you to an exciting and rewarding career. Based in the heart of one of the UK’s most successful business regions, we have highly qualified staff with a wealth of experience in their respective disciplines and strong connections with key industries. The University has acquired a remarkable reputation for high-quality education closely linked to employment. Many of our graduates go on to achieve great success within their chosen discipline and professions. Welcome to the career university. Professor Peter John Vice-Chancellor
  • 3. Established in 1860, The University of West London (UWL) draws on a heritage of 150 years in teaching and professional education. Based in the heart of one of the UK’s most successful business regions, with strong connections to many national and multinational organisations such as Heathrow Airport, BBC, Hewlett- Packard (HP) Ltd, Middlesex Law Society and the Savoy Education Trust, UWL has a reputation for high-quality education closely linked to employment. The University of West London offers a high-quality UK education experience to over 10,000 students and it has more than 115,000 graduates in over 50 countries. The university also offers over 140 undergraduate and postgraduate courses with a strong focus on employability and practical experience. Boasting of high-quality teaching and impressive graduate employment rates, The University of West London prides itself on being ‘The Career University’, with 98% of students in work or further study within six months of graduation. The University has highly qualied staff with a wealth of experience in their respective disciplines and strong connections to their industries, equipping students with both the academic knowledge, relevant expertise and practical career skills. Recent graduates have secured jobs in a range of high-profile businesses and corporations, including Microsoft and IBM. THE UNIVERSITY OF WEST LONDON, UK A postgraduate degree can enhance your career prospects, setting you apart in today’s highly competitive job market. If you are considering a new career path, it is a way to enhance and build on your current qualifications, and learn new, essential skills. You may also want to explore your passion for, and commitment to a field of study. VALUE OF A POSTGRADUATE QUALIFICATION Image Source: https://www.uwl.ac.uk/news-events/news/uwl-named-top-modern-university-london
  • 4. The University has highly qualified staff with a wealth of experience in their respective disciplines and strong connections to their industries, equipping students with both the academic knowledge, relevant expertise, and practical career skills. Recent graduates have secured jobs in a range of high-profile businesses and corporations, including Microsoft and IBM. UNIVERSITY OF WEST LONDON’S SCHOOL OF COMPUTING AND ENGINEERING Get to grips with the ground-breaking technology that is transforming society and business. Whether you are interested in computer science, software development, security and networking, information systems, information management, engineering or the built environment, our internationally respected School of Computing and Engineering (SCE) is here to help you progress FOR PROFESSIONALS WHO WANT TO LEAD THE WAY Home to several research centres such as the Cybersecurity and Criminology Centre, UWL provides leading education and research in the fields of computing, built environment and engineering. The close collaborations with organizations in both the private and public sector also ensure courses are always employment focused. CUTTING EDGE RESEARCH CENTRES “Our students are aware of the latest trends in the industry when they enter the workplace and receive an excellent learning experience, with small manageable cohorts that encourage student interaction.” - Indira Chauhan, Senior Lecturer
  • 5. UWL’S CYBERSECURITY AND CRIMINOLOGY CENTRE The UWL’s Cybersecurity and Criminology Centre (CCC) was established to examine, analyze and assess current and future criminal threats to individuals, organizations and national security. Modern security threats, require a cross-disciplinary approach and the centre researches and investigates a broad range of contemporary issues such as: Outcomes from UWL’s research make a positive impact on cybersecurity and policing and real-world problems, drawing on its close ties with businesses and industry as well as the expertise of the university. The UWL’s Cybersecurity and Criminology Centre is honored to have partnered with many exceptional organizations such as: • The Home Office, UK • Metropolitan Police • Ministry of Justice, UK • European Health Care Fraud and Corruption Network (EHFCN) • Eversheds Sunderland Legal Services • Ecorys • College of Policing • Mayor’s Office for Policing and Crime (MOPAC), London • Her Majesty’s Inspectorate of Constabulary and Fire & Rescue Services (HMICFRS) Security Developing online and physical security measures for law enforcement, personal and commercial entities, cybersecurity capacity and deterrence, analysis of current and future national and international security threats and managing major events Policing Development of education packages for law enforcement and the security sectors, protection of public systems such as the NHS, computing language processing tools, exposing and preventing organized crime and terrorism threats Cybercrime Prevention of cybercrime, working with law enforcement and the computing industry to develop analytic systems and data sets, systems of reporting and recording online crimes, dissemination of techniques for prevention and data sharing
  • 6. RECOGNITION University of West London complies with the academic standards monitored by the Quality Assurance Agency for Higher Education (QAA), UK. This means you’ll receive the same standard of education as UWL students studying on campus and have the opportunity to join the graduation in London to celebrate your achievement. All University of West London degrees are recognised by the UK government 1 . The highest climber in The Times and The Sunday Times Good University Guide Friday, September 20, 2019 The University of West London (UWL) has recorded the biggest rise of any university in the UK in the prestigious The Times and The Sunday Times Good University Guide 2020, climbing an impressive 31 places to number 52 nationally and entering the top 10 London universities in 8th place. These excellent results come on the back of the career-focused University achieving record rates of student satisfaction in this year’s National Student Survey. 1 https://www.gov.uk/check-a-university-is-officially-recognised/recognised-bodies Image Source: https://www.uwl.ac.uk/news-events/news/uwl-named-top-modern-university-london
  • 7. • 4th in UK for both student experience and student satisfaction with teaching quality • 8th among London universities • 52nd overall in UK, the biggest rise of any university in the country Times and The Sunday Times Good University Guide 2020 The Guardian University League Tables 2020 The Guardian University League Tables 2019 • 12th in UK for Computer Science & Information Systems • 57th overall in UK • 21st in UK for Computer Science & Information Systems • 50th overall in UK
  • 8. ACCOLADES The Complete University Guide 2020 • 71st in UK for Computer Science • 90th overall in UK Teaching Excellence Framework 2017 • Awarded silver for teaching excellence Times Higher Education (THE) Awards 2019 • Shortlisted for ‘Business School of the Year’ Times Higher Education (THE) Awards 2018 • Shortlisted for ‘University of the Year’ ACCOLADES
  • 9. Hackings, data breaches, identity theft and cyberattack are pressing issues for national security, all businesses and individuals. It affects everything we do today, Cybereconomy research firm Cybersecurity Ventures asserts that by 2021, global cybercrime damages will exceed $6 trillion/year. Closer to home, the Singapore Threat Report (Oct 19) released by United States-based cyber-security agency, Carbon Black showed that as many as 96 per cent of organisations in Singapore have had at least one breach in the past 12 months due to external cyber-attacks. It also showed that close to 50% of companies affected by data breaches incurred financial losses, while around eight in 10 saw their reputation taking a hit. GAIN THE PROFESSIONAL CREDENTIAL THAT WILL HELP YOU PROPEL YOUR CAREER As demand for cyber security professionals continues to surge, securing the right professional credential and postgraduate qualification will prepare you for a rewarding and satisfying career where digital data is constantly under attack. Cyber security roles can be found across all companies and sectors, from government agencies to telco, banks, retailers, SMEs and NGOs. Start exploring some of these exciting cyber careers: • SECURITY SPECIALIST | An entry-level role with high advancement potential • INCIDENT RESPONDER | Prevent and protect against threats • SECURITY ADMINISTRATOR | Keep security systems running smoothly every day • VULNERABILITY ASSESSOR | Spot system vulnerabilities and create solutions • CRYPTOGRAPHER & BLOCKCHAIN | Write the code that hackers can’t crack • IT SECURITY MANAGER | Keep systems secure with help from an expert team • SECURITY ARCHITECT| Outsmart criminals by designing tough-to-crack systems • CHIEF INFO SECURITY OFFICER | Expertise in high level computer security system • SECURITY ANALYST | Plan and execute flawless security measures • SECURITY AUDITOR | Find the weak spots in a security system before criminals do • SECURITY DIRECTOR| Make the rules and solve complex problems • DIGITAL FORENSIC EXPERT | Protect the cyber world and assist law enforcement • PENETRATION TESTER | Hack and protect computer systems for good • SECURITY CONSULTANT | Advise and implement security solutions • SECURITY ENGINEER | Build IT security systems for your organization • SOURCE CODE AUDITOR | Ensure code accuracy and safety prior to release There has never been a better time to consider a cyber security career.
  • 10. The Master of Science in Cyber Security programme aims to equip you with a comprehensive understanding of the latest practice and techniques in cyber security systems development and operations. The programme offers a strong technical focus in cyber security and you will cover contemporary topics including cyber warfare, digital forensics, and Network Security defence. EARN THE PROFESSIONAL CREDENTIAL TO EXCEL IN YOUR CAREER Designed for working professionals with a strong interest in cybersecurity, the programme aims to develop your capabilities and skills set to tackle growing industry needs. As a cybersecurity professional, your specialised skills will be in high demand across Asia. You will discover how cyber security systems are designed and constructed, and the impact this technology has on organisations. GAIN PRACTICAL HAND-ON EXPERTISE Through hands-on learning and authentic project experiences, you will learn the theoretical underpinnings of cyber security and the technical expertise required to protect data, communications, networks and services. You will also gain a practical understanding of issues surrounding the design, analysis and implementation of modern secure IT systems in an industry context. LEARN FROM INDUSTRY EXPERTS AND LIKEMINDED PEERS You will be taught by leading industry experts who will equip you with the capabilities to address the issues and needs of the rapidly growing cyber security sector. You will also learn, exchange and network with likeminded professionals across the region. MASTEROFSCIENCEINCYBERSECURITY
  • 11. LEARNING OUTCOMES Join Like-Minded Professionals & explore the growing Importance of Organization-Wide Approach Towards Cybersecurity. Upon graduation from this course, you will. • Gain an appreciation of commercial and open source cyber security equipment, software and services based on industry standard technologies. • Be equipped with the skills to analyse the legal, social, ethical and professional issues involved in the human aspects of cyber security, guided by the adoption of appropriate professional, ethical and legal practices. • Gain the skills you need to work effectively in a business environment and provide a solid basis for cyber security research and development. • Develop a practical understanding of industrial techniques and issues surrounding the design, analysis and implementation of secure IT systems. • Gather greater insights into how people, technologies, service providers, content providers, government (laws, regulations, policies) and law enforcement mesh together in the management and delivery of content and services to users. • Broaden the appreciation of commercial and open source cyber security equipment, software and services based on industry standard technologies. • Discover how cyber security systems are designed and constructed, and its impact on organizations • Obtain the skills you need to work effectively in a business environment • Build a solid foundation for applied research and development in cyber security • Develop the necessary research competencies and build a solid foundation for applied research in cyber security, which will create pathways to further study such as PhD
  • 12. PROGRAMME STRUCTURE Designed to accommodate and complement the busy commitments of today’s global managers and professionals, this 10 months part-time MSc programme comprises of 6 modules plus a dissertation which are delivered on a modular basis. • Fundamentals of Cyber Security • Security Operations & Assurance • Network & System Security • Principles of Project Management • Consultancy & Technological Innovation • Research Methods • Dissertation DELIVERY STRUCTURE Each module spans over 2 consecutive weekends per month (Fridays; 7pm to 10 pm & Saturdays & Sundays; 9am to 5pm) and includes a comprehensive coverage of 34 hours of face-to-face lectures that is complemented with online course support, additional readings and resource materials. Flexible Modular Delivery for Professionals 10 Months Part-Time 6 Modules + Dissertation FRI SAT-SUN MON-THU FRI SAT-SUN 7pm - 10pm 9am - 5pm Revision Break 7pm - 10pm 9am - 5pm COURSEWORK BASED ASSESSMENT We use a variety of teaching methods including lectures, seminars, laboratory work and report writing, to help you make the most of your learning experience. You will also have access to specialist networks and software, plus ample space for private study and meetings.
  • 13. TAUGHT BY EXCEPTIONAL FACULTY The course is taught by an academic team with extensive research and professional practice directly in cyber security. All the tutors have the academic and industry knowledge and experiences to support your development. SAME DEGREE AS CONFERRED ON CAMPUS Upon successful completion of the programme, you will be awarded a Master of Science in Cyber Security degree by the University of West London. Graduation ceremonies are held annually in Singapore and London where you have a choice to graduate in either of these locations. SOUGHT-AFTER CAREER OPPORTUNITIES Cyber security professionals are in high demand. You could work in any setting that is data and knowledge intensive. Roles include chief information security officers, network and computer security engineers, security managers and consultants, penetration testers, security investigators and researchers. Some security experts also work in media, writing articles for magazines and papers. UNIVERSITY OF WEST LONDON This is to certify that Student Name has been awarded the fJegree of Master of Science (with Merit or Distincďż˝on if applicable) having followed an approved programme in Cyber Security DATE OF AWARD SIGNATURE OF VICE CHANCELLOR SIGNATURE OF CHANCELLOR Vice-Chancellor Chancellor • The University was granted degree all'ardingpoll'ers on 4June 1992 by Order of the Privy Co11ncil. exercisingpoll'ers conferred by Section 76 of t/re F11rt/rer and Hig/rer Ed11catio11Act /992. The University is a recognised body, under the terms of section 2/4(2) (a) of the Education Reform Act /988. as a university w/rich is a111horised byAct ofParliament to grant degrees.
  • 14. FUNDAMENTALS OF CYBER SECURITY On this module you will get an introduction to the key techniques and technologies used in cyber security. The module covers symmetric and asymmetric encryption, steganography, principles of cryptanalysis, message confidentiality, message authentication, security protocols and security in distributed systems as well as the application of cryptographic techniques to authentication and identity management. SECURITY OPERATIONS AND ASSURANCE This module will introduce you to security operations and assurance of systems, networks, data and user identities, which is an essential aspect of organization and information systems. NETWORK AND SYSTEMS SECURITY This module will introduce you to network and systems security. You will start by looking at security threats, vulnerabilities and attack patterns, then progress to firewalls, intrusion detection, and protection systems for networks and computer systems. Finally, you will examine security management, such as Security Information and Event Management (SIEM) systems. PRINCIPLES OF PROJECT MANAGEMENT During this module you will be introduced to the concepts, principles and techniques needed for effective project management. The module covers the roles, responsibilities and skills required to work in ever-changing project environments and how these relate to effective project management. CONSULTANCY AND TECHNOLOGY INNOVATION On this module you will explore the skills needed to understand, and work in, the complex multi-sourced environment that supports business change. Focusing on the strategic management of leading-edge technology, you will examine the organisational structure of IT, including systems integrators and consultancy, and gain an overview of the IT consulting world, its principles and practice. RESEARCH METHODS You will prepare to carry out master’s-level applied research in computing, with a focus on cyber security. You will learn to use appropriate research methodologies and tools to support your research ideas and develop your writing skills. DISSERTATION With this module, you will have the opportunity to carry out an original piece of research, adding to existing knowledge and demonstrating an ability to select, define and focus on a cyber security topic at an appropriate level. You will also develop and apply relevant methodologies to analyse your topic areas, and to develop recommendations and logical conclusions in the context of existing work in the area. MODULE OUTLINE
  • 15. TESTIMONIALS As an industry professional, I was skeptical about what postgraduate study could offer but the course was fantastic, with amazing facilities. The course challenged me to think in a different way and helped me to develop a holistic approach to the industry I work in. After finishing my course, I was promoted to Head of Global Security Operations and now I am moving to a bigger company with a broader role. “I am currently working as a Data Quality Specialist at Intelligent Reach, an e-commerce service in London that helps retailers and brands optimise their product data to increase product visibility across marketplaces and channels via an augmented product data & scientific testing that drives conversion. MSc. Information System course provided by UWL, is a great way to understand the depths of information and data in the IT and business sector. It helps you understand the structure of IS and why it is crucial to have a solid IS strategy to increase business value. With a variety of modules covering essential topics, you also get to understand more about system & data architecture and how to manage them using supporting technologies along with the study of effective project and knowledge management. I loved how the course provided a balance of academic writing and practical work using a case base scenario which not only enhances your theoretical knowledge but also provides relevant practical skills that are useful in the workplace. UWL also offers an excellent teaching service with their top-notch teachers, who is always ready to go beyond to assist you. Luca Fioravanti Head of Global Security Operations Vodafone UK Binita Ghale Data Quality Specialist Intelligent Reach
  • 16. WHAT OUR SAY GRADUATES “As an industry professional, I was skeptical about what postgraduate study could offer but the course was fantastic. The course challenged me to think in a different way and helped me to develop a holistic approach to the industry I work in. After finishing my course, I was promoted to Head of Global Security Operations and now I am moving to an even bigger company with a broader role.“ – Luca Fioravanti, SVP - Head of Group Corporate Security, UniCredit- European financial Banking Group
  • 17. TAKE THE NEXT STEP YOUR LEARNING JOURNEY IS JUST STARTING NOW.
  • 18. ADMISSION CRITIERIA Candidates are expected to contribute to the class learning experience and participation. You will be assessed based on experience, aptitude, potential and ability to add value to the interactions between peers and faculty. WHAT DO YOU NEED TO APPLY? • Completed application form • Application fees of S$200 (excluding prevailing GST) • Photocopied certificates and transcripts • Update professional resume FINANCING YOUR MSc Fees Payable 1 st instalment – upon acceptance 2 nd instalment (before 3 rd month) 3 rd instalment (before 5 th month) 4 th instalment (before 7 th month) S$ 5,200 S$ 5,200 S$ 5,200 S$ 5,200 The total investment (inclusive of materials, assessment fees etc.) for the Master of Science in Cyber Security programme is S$20,800 (before prevailing GST), payable in 4 instalments: • An honours degree (2:2 or above) in a computing subject. • A business or an engineering degree with a significant level of computing content may also be considered. • Equivalent professional qualifications or a relevant HND with demonstrated relevant work experience may be considered • Mature candidates above 30 years old with extensive working experience may be considered on a case-to-case basis.
  • 19. 100 Orchard Road #04-100 Concorde Hotel Singapore 238840 Tel: 6822 2050 Fax: 6720 2222 Co. Reg. No. 200700458M Period: 20 May 2019 - 19 May 2021 www.aventis.edu.sg Sources quoted are correct as at 22 Jun 2020