Cyber Security and Privacy
Course options and guidance for Cyber security and privacy
What will I learn from courses in this topic?
Cyber security is concerned with protecting computer systems and their data against malicious or accidental damage. Protection includes methods for prevention, detection and response. Cyber privacy is concerned with protecting privacy in the digital realm, which includes limiting personal information and protecting it from abuse, even when data is shared with another party. The two topics are inter-connected: finding effective notions of privacy management in the digital realm is increasingly critical for cyber security in society at large.
Courses in this topic cover a range of security and privacy issues ranging from theoretical guarantees and design of cryptographic systems to practical issues in implementation and human factors. This topic is core to the MSc in Cyber Security, Privacy, and Trust, but students in other MSc programmes are also welcome to register for these courses.
What courses are available?
Level 11 (MSc) courses
- Case Studies in AI Ethics (10 credits)
- Introduction to Modern Cryptography (10 credits)
- Quantum Cyber Security (10 credits)
- Security Engineering (10 credits)
- The Human Factor: Working with Users (10 credits)
Level 10 courses
Our Level 10 Computer Security course is mainly intended for undergraduates, but may also be taken by MSc students. It provides a broad introduction to various aspects of Computer Security, so it is not appropriate for students who have taken a similar course elsewhere, or who wish to specialize in Computer Security. But if you are mainly focusing on another area and want to know what security and privacy issues to be aware of, this course may be appropriate for you.
- Computer Security (20 credits, Semester 2)
Courses from School of Social and Political Studies
Courses from School of Law
Please note that Law School students on the LLM programmes will be given priority for enrolment, so please enquire as early as possible for these courses. It is requested that a note of interest is emailed to firstname.lastname@example.org, who will confirm if a place is available before enrolment.
This topic can be naturally combined with courses from some other topics, for example to allow:
- studying programming languages and formal methods, which are used to provide stronger, more reliable foundations for systems;
- studying data-driven methods for learning and mining, which are used, for example, for e-crime detection, intrusion detection and malware classification.
- studying distributed systems and databases, where security issues may arise.
The most relevant related course topics are listed below.