On this UK government’s National Cyber Security Centre (NCSC) fully certified programme, you learn the essential skills to support cyber security within commercial and government organisations. This includes technical and socio-technical aspects of cyber security, such as applied cryptography, authentication, authorisation and accountability, network security, information security management, human factors in cyber security, cyber law and privacy.
This MSc is aimed at computing graduates with strong programming skills seeking careers as cyber security professionals or careers that need a systematic and deep understanding of the subject. It would also be an excellent starting point for those wishing to carry out further research in cyber security.
The University of Kent is recognised by the British Government as being an Academic Centre of Excellence in Cyber Security Research, meaning you will be taught by staff who are top researchers in this area.
Kent has also been named Cyber University of the Year in the Real Cyber Awards 2023. The Awards, which were created to recognise those who are making ‘a real difference in the virtual world that has impact in the real world’, represent organisations and individuals from Cyber Security, Data Protection and Information Security.
Your placement
You gain work experience through our industrial placement scheme. We have strong links with industry including IBM, Microsoft and Oracle. Our dedicated placement team help you gain a suitable paid position and provide support throughout.
Accreditation
This degree has been accredited by the National Cyber Security Centre (NCSC, part of the GCHQ). Students of the MSc Cyber Security programme receive two certificates, as NCSC also allows us to issue an NCSC co-stamped certificate.
This course is accredited by BCS (British Computer Society). The course partially meets the requirements for a Chartered Information Technology Professional (CITP).
About the School of Computing
Our world-leading researchers, in key areas such as cyber security, programming languages, and AI and data science earned us an outstanding result in the 2021 Research Excellence Framework (REF); 100% of our Computer Science and Informatics research was classified as either 'world-leading' or 'internationally excellent' for impact.
Strong links with industry underpin all our work, notably with Cisco Systems Inc, Microsoft, Oracle, IBM, Nvidia, Erlang Solutions, GCHQ and Google.
Our courses are taught by leading researchers who are experts in their fields. The School of Computing at Kent is home to several authors of leading computer science textbooks.
We have a large range of equipment providing both Linux and PC-based systems. Our resources include a multicore enterprise server and a virtual machine server that supports computer security experiments.
The School also has a makerspace, Hackspace, which offers exciting teaching and collaboration opportunities. Among other equipment it contains a milling machine, 3D printers, laser cutter and extensive space for building and making digital artefacts.
The course
What you'll study
The following modules are what students will typically study, but this may change year to year in response to new developments and innovations.
You take all compulsory modules and choose one from a list of optional modules. At the end of your course you complete your Project and Dissertation.
Compulsory modules currently include the following
The advance of Information and Communications Technology (ICT), such as the internet, mobile computing, IoT (Internet of Things) and AI, have blurred the boundary between the physical world and cyber space. A massive amount of digital data is now being generated, collected, stored, processed, transmitted and shared constantly across many different systems, people and organisations. In such a 'big data' world, how can we protect our privacy and ensure others respect our privacy? What privacy-enhancing tools and techniques can be used and how well do they work? In addition to privacy concerns, cybercrime and other forms of online harms have increasingly become more prevalent; they are highlighted by many as major threats to all citizens and the society at large. What legal efforts have been made to protect us and what more can be done? What legal considerations do cyber security experts need to know about and how can they utilise and integrate these legal aspects in their work? This module will guide you through all such questions to grasp the latest development on privacy and cyber law and to be able to apply such knowledge in practical scenarios where privacy and legal considerations are important factors.
Nowadays, we live our lives in a highly digitalised and networked world. Similarly, most (if not all) of modern organisations rely on computers, the internet, cloud services or other digital devices and systems to manage their data, processes, workforce and other assets. In such a highly digitalised and networked world, how can organisations manage the security of their data, systems, processes and other assets? You will gain a systematic understanding of many important aspects of information security management, such as what standard processes and practices to follow, how to assess and manage risks, how to manage AAA (authentication, authorisation and accountability), how to understand the complicated cyber law landscape to ensure legal compliance, how to ensure security controls and processes are usable for all, and how to foster a people-centric culture for information security among staff. Such systematic understanding will equip you with crucial socio-technical skills needed for being a confident and well-informed information security manager at any organisation you choose to work for.
Remember the dancing men and how Sherlock Holmes unravelled the cryptic message using the frequency of letters? Such mechanisms are ubiquitous in the digital age -- when you are shopping online, transacting with your bank or simply using an end-to-end secure messaging system on your phone. This module will delve into Cryptology -- the science of creating such secure mechanisms of communication and ways in which they can be used, circumvented or broken. Starting from classical systems to contemporary technological advancements of the post-quantum world, you shall explore the fundamental principles, the nuances of their implementation and applications. Through a blend of theoretical lectures and hands-on exercises of building or attacking systems from the scratch, you shall gain insights into the complexities of cryptographic algorithms, key management, digital signatures, and secure communication channels. Moreover, you shall study the broader aspects of systems security, encompassing topics such as authentication, authorisation, and accountability. You will develop a holistic understanding of cybersecurity challenges and strategies for mitigating risks in contemporary computing environments. Overall, you will not only be equipped with the technical expertise to protect digital assets but also with a broader understanding of the societal implications of cryptology and systems security.
Have you ever wondered what happens to a computer network when it is under cyber-attack? Do you know the different types of cyber-attacks that can be performed on computer networks? Have you thought about the stakeholders involved in cyber-attacks? Do you know how to protect your computer network from possible cyber-attacks? These questions – and many more – will be covered in this module. Various threats and countermeasures will be discussed, along with recent computer network technology trends and novel protocols. It is pretty much impossible to prevent every attack, therefore, we need to learn from past cyber-attacks (e.g., how attackers gained access, what vulnerabilities they exploited, how they moved within the network, what they gained) to be prepared to deal with them when they occur, adopting a defence-in-depth strategy. You will learn about network threats and vulnerabilities, as well as tools and techniques that can help you secure and protect your computer network.
The use of AI has been rapidly increasing in the past years, and AI is now everywhere. The amount of digital data available has helped AI techniques evolve into the age of deep learning and large models. For many years, AI has found many applications in cyber security such as intrusion detection and spam detection. More recently, how to make AI systems securer, privacy-friendly and trustworthy has become an important topic.
Do you want to understand how different AI architectures and models work and how they are applied to address cyber security problems and improve the security of systems and computer networks? Do you want to understand how AI models and pipelines can themselves be subject to attacks that compromise their performance, security, privacy, or trustworthiness?
Using cyber security problems and datasets as examples, the module will equip you with the necessary knowledge and hands-on skills about machine learning and deep learning algorithms, models and architectures, how to apply them in real-world applications, and how to interpret results from AI models. In addition, the module also covers the aspects of secure and trustworthy AI in terms of threat models, attacks on AI models and defences against them.
Engaging in a research project is a fantastic opportunity for computer science students as it offers the chance to work closely with an expert supervisor in a specific discipline. This experience not only allows you to delve deeper into a subject of interest but also helps you develop essential research skills that are transferable across various fields. By embarking on a research project, you can enhance your critical thinking abilities, hone your problem-solving skills, and gain a deeper understanding of the world around you. These skills are highly valuable and will undoubtedly benefit you in your future academic and professional endeavours.
Optional modules may include the following
Quantum technologies are currently being developed that will have a significant impact on society. Here, you will study two particularly promising quantum technologies: quantum computation, and quantum cryptography. We will begin with an overview of the mathematical and theoretical knowledge required to tackle these more specialised and advanced topics. You will then learn the basic principles of quantum algorithms and quantum cryptography. You will gain an understanding of what these technologies can and cannot do, where these technologies are heading, and what the extent of their impact on our society may be.
The increasing reliance on the internet, electronic devices, mobile apps and online resources greatly improve the quality of our daily lives but also escalate the volume of our digital fingerprints. This means that, nowadays, it is impossible to plan or commit an unlawful activity without leaving digital traces scattered across local or remote storage and cyber spaces. Do you want to learn digital forensic skills that contribute to the investigation of suspected wrongdoing?
This module focuses on computer forensics and multimedia forensics, and introduces concepts and best practices relevant to uncover digital evidence on an investigative setting. It introduces tools and techniques for the collection, interpretation and analysis of digital evidence supporting informed reporting of findings. You will gain hands-on experience with investigative tasks and will have the opportunity to apply different tools and techniques to answer investigative questions related, for example, to ‘what’ happened, where, when, why, who and how.
Upon completion of the module, you will have a theoretical and practical appreciation of what ‘digital forensics’ entail.
Have you ever dreamed of belonging to the 'red team' and 'blue team' trying to anticipate what cyber attackers might do to penetrate a network, compromise a system or shutdown a communication infrastructure with the ultimate goal of strengthening security controls? This module will equip you with a mindset to think as an attacker while planning for an ethical and legal course of actions for security assessment and penetration testing of a target (for example, a network or a system). You will learn how attackers exploit different vulnerabilities and launch attacks in practice and how to recommend proactive countermeasures on an evidence-based fashion to minimise cyber security incidents as much as possible. You will analyse and compare cyber attackers’ strategies and tactics, including technical and non-technical approaches, hacking tools and compromise phases to pre-emptively envision which controls are missing and report findings to relevant stakeholders. Upon completion of the module, you will be in a better position to identify attack vectors and act on them using a framework of legal and ethical hacking for continuous improvement of cyber security.
Stage 2
Stage 2 is when you will take your Year in Industry. The chance to gain real industry experience as part of your MSc course gives you a real edge in the job market and boosts your career options.
Compulsory modules currently include the following
The Year in Industry Placement provides students with a structured opportunity to combine work experience or entrepreneurial activity with academic study. The Year in Industry allows students to develop and reflect on managerial and/or professional practice in real and often complex situations, and to integrate this with the study of the relevant subject(s) of your main degree programme. Where relevant, students develop, reinforce and apply professional and/or technical expertise in an employment or entrepreneurial context. The Industry Placement requires students to document their experiences in relation to both their university studies as well as to a wide range of employability skills. To be able to undertake this module it is necessary for the student to secure a placement. The placement should be appropriate to the student’s degree and experience. The length of the placement should normally be at least 44 weeks. It must be completed between the end of Summer Term of Stage 1 and the start of Autumn dissertation. The particular combination of the student’s degree course and choice of modules together with the great variety of increasingly diverse Year in Industry situations make the 'curriculum' of the Year in Industry essentially unique.
The Year in Industry Report provides students with a structured opportunity to combine work experience or entrepreneurial activity with academic study. The Year in Industry allows students to develop and reflect on managerial and/or professional practice in real and often complex situations, and to integrate this with the study of the relevant subject(s) of your main degree programme. Where relevant, students develop, reinforce and apply professional and/or technical expertise in an employment or entrepreneurial context. The Industry Report requires students to reflect on and evidence their experiences in relation to both their university studies as well as to a wide range of employability skills. To be able to undertake this module it is necessary for the student to secure a placement. The placement should be appropriate to the student’s degree and experience. The length of the placement should normally be at least 44 weeks. It must be completed between the end of Summer Term of Stage 1 and the start of dissertation module.
How you'll study
Postgraduate taught modules are designed to give you advanced study skills, a deeper knowledge of the subject, and the confidence to achieve your ambitions.
×
Teaching and assessment
Assessment is through a combination of unseen written examinations, written and practical coursework, student presentations, individual and group projects.
The substantial research project is assessed by dissertation.
We provide an extensive support framework for our research students and encourage involvement in the international research community. We have strong links with industry including Cisco, IBM, Microsoft and Oracle.
Postgraduate resources
The School of Computing has a high performance computing cluster with a number of powerful GPUs and CPUs. There is a multi-user server with 128 hardware threads, running Linux, which is available for all Computing students and an OpenStack cloud offering self-service virtual machines. It has a local GitLab Enterprise instance offering a range of source control and project management features.
All students benefit from a well-stocked library, giving access to e-books and online journals as well as books, and a high bandwidth internet gateway. The School and its research groups hold a series of regular seminars presented by staff as well as by visiting speakers and our students are welcome to attend.
The School of Computing has a makerspace, which offers exciting new teaching and collaboration opportunities. Among other equipment, it contains milling machines, a 3D printer, laser cutter and extensive space for building and making digital artefacts. The School also owns specialist equipment for Internet of Things and media steganography.
Our taught postgraduate students enjoy a high level of access to academic staff and have their own dedicated laboratory and study room. Students whose course includes an industrial placement are supported by a dedicated team which helps them gain a suitable position and provides support throughout the placement.
Links with industry
Strong links with industry underpin all our work, notably with Microsoft, Oracle, IBM, HP, Amazon, BT, Orange, Cisco, Ericson, Vodafone, Lloyds Banking Group, KPMG, ISC2, Cloud Security Alliance, EC-Council, Honda, Pfizer.
Example timetable
Here’s a sample timetable from your first term at Kent. You'll learn through a mix of lectures, seminars and workshops - in both big and small groups with focused teaching blocks and time to work, rest or explore uni life.
Items in green are confirmed, whereas anything marked yellow could be scheduled at a different time or day depending on your group, but this gives a good sense of what to expect.
✅ A balanced timetable that works for you
Plan your week better: at least one free weekday for catching up on course work or just taking a breather.
Focused days without burnout: No isolated 1-hour campus days.
Time to live the uni experience: Space for societies, part-time jobs and downtime.
A first, 2.1 or good 2.2 honours degree (or equivalent) in computing or a related subject with a strong background in programming.
Please see our International Student website for entry requirements by country and other relevant information. Due to visa restrictions, students who require a student visa to study cannot study part-time unless undertaking a distance or blended learning programme with no on-campus provision.
English Language requirements
This course requires a Good level of English language, equivalent to B2 on CEFR.
PTE Academic 63 with a minimum of 59 in each sub-test
A degree from a UK university
A degree from a Majority English Speaking Country
Need help with English?
Please note that if you are required to meet an English language condition, we offer a number of pre-sessional courses in English for Academic Purposes through Kent International Pathways.
All applicants are considered on an individual basis and additional qualifications, professional qualifications and relevant experience may also be taken into account when considering applications.
Fees and funding
The 2026/27 annual tuition fees for this course are:
UK
International
Full-time (UK)
Full-time (International)
Placement Year Fee: Your placement year has a fee of £2,000, making it a cost-effective way to gain a full year of practical experience.
For details of when and how to pay fees and charges, please see our Student Finance Guide.
Tuition fees may be increased in the second and subsequent years of your course. Detailed information on possible future increases in tuition fees is contained in the Tuition Fees Increase Policy.
The 2026/27 annual tuition fees for UK postgraduate research courses have not yet been set by the Research Councils UK. This is ordinarily announced in March. As a guide only, the full-time tuition fee for new and returning UK postgraduate research courses for 2025/26 is £5,006.
Your fee status
The University will assess your fee status as part of the application process. If you are uncertain about your fee status you may wish to seek advice from UKCISA before applying.
You'll need regular access to a desktop computer/laptop with an internet connection to use the University of Kent’s online resources and systems. We've listed some guidelines for the technology and software you'll need for your studies.
Kent is a leading research university, meaning that you will be informed about new discussions and developments by the people making them. This means your work will have real potential to make a difference.
×
Cyber Security Research Group
Members of the Cyber Security Research Group bring their particular expertise in many different aspects of cyber security, in the context of a wide range of real-world problems and solutions. In addition to studying more technological aspects such as authentication, cryptography, IoT security, and software security, many members of the Group also work on socio-technical topics such as privacy, cyber crime, data protection law, online harms and online safety, and cyber security education, which require a synergy of expertise between computer science, social sciences and humanities.
The Group leads cyber security education activities of the University within the Division of Computing, Engineering and Mathematical Sciences (CEMS), being heavily involved with the delivery of programmes at undergraduate and postgraduate levels. The portfolio of programmes includes the MSc in Cyber Security, which achieved the NCSC full certification status for 2020-2025, the conversional course MSc Computer Science (Cyber Security) and the BSc in Computer Science (Cyber Security). All the degree courses also provide placement opportunities, allowing students to gain experience in industry as part of their study. The excellent cyber security education activities of the Group and the wider contributions of iCSS have led to the recognition of the University of Kent as a Academic Centre of Excellence in Cyber Security Education (ACE-CSE) with a Gold award status from 2023 to 2029, jointly recognised by the NCSC and the DSIT (Department for Science, Innovation and Technology) of the UK Government.
Our programmes of study are designed to equip our graduates with the skills and knowledge that make them highly attractive to potential employers, providing a good balance between theoretical studies and real-life applications. The recent REF indicated that the School's research was in the top quartile of 89 Computing departments across the UK. Our graduates therefore benefit from a first-rate academic experience as well as being prepared to face the demands of the economic environment.
Graduate destinations
Our graduates have gone on to work as:
Cyber Security Analyst
Cyber Security Consultant
Cyber Intelligence Analyst
Security Engineer.
Recent graduates have gone on to develop successful careers at leading companies such as:
BAE Systems
Cisco
IBM
The Walt Disney Company
Citigroup
BT.
Help finding a job
The University has a friendly Careers and Employability Service, which can give you advice on how to:
apply for jobs
write a good CV
perform well in interviews.
Your placement
You can gain practical work experience as part of your degree through our industrial placements scheme - we have a dedicated Placement Team who can give advice and guidance. All our placements are in paid roles.
In previous years, students have worked at a wide range of large and small organisations, including well-known names such as:
Accenture
BT
GSK
IBM
Kent Police
Microsoft
Morgan Stanley
The Walt Disney Company.
You can take your work placement abroad. Previous destinations include Hong Kong and the USA.
An industrial placement gives you invaluable workplace experience, which greatly enhances your employment prospects and also helps put your academic learning into a real-world context.
Postgraduates earn
£6,000
more per year than graduates (Graduate Labour Market Statistics, 2021).
A degree can boost average lifetime earnings by over
£300,000
Graduate employment outcomes - Universities UK
Ready to apply?
Learn more about the application process or begin your application by clicking on a link below.
You will be able to choose your preferred year of entry once you have started your application. You can also save and return to your application at any time.