Course Brief

Crime involving computing technology is increasing, with the hackers using ever more sophisticated techniques to attack organisations and individuals alike. A computer may hold information that generated during the commission of a crime which must be retrieved in order to follow a prosecution. This new discipline is based on forensic science and computer security technologies, and involves the application of scientific methods for the collection, analysis, interpretation, and presentation of potential evidence. In order to be able to operate as a computer security practitioner, students must be able to conduct a forensic analysis of data for regulatory, internal compliance and legal purposes. This course will equip potential practitioners with the necessary awareness of real-world expertise and competence in the use of technologies used by police and industry for forensic investigations.

  1. Understand the need for and the role of the forensic investigator in various situations
  2. Use and appraise a software forensic tool eg Autopsy.
  3. Use, adapt and appraise diagnostic and investigative techniques to identify and retrieve data from various types of computer media and electronic devices.

Computer systems organisation and ways in which various electronic devices can be involved in a crime;

Operating systems technology – organisation and architecture; NTFS, DOS, OSX

Understanding disk architecture, disk-based Investigations and Procedures;

Physical and logical storage methods for different types of electronic devices;

Incident Response and approaches to conducting an investigation;

Information Hiding Techniques: using Steganography;

The importance of deleted files and the artefacts left by the Windows OS

  • MSc Operational Cyber Security

    Students on the MSc Operational Cyber Security will learn a wide range of practical and theoretical skills. Students will develop a sound knowledge of cyber security and its application in real life situations, while extending their abilities to analyse and solve problems. 

    Applications would be welcomed from students with any numerate degree from a science background, a Law or a business degree. Mature applicants who demonstrate academic potential can also be assessed for eligibility.

    Next available intake is September 2019.


    At SBCS we focus on -

    Highlights at a glance -

    • Can be completed in as little as 2 years
    • Pursue one module per month and pay as you go
    • All material provided digitally
    • Blended approach to learning with a combination of self study, online sessions and workshops

    The programme provides opportunities for students to achieve a knowledge and understanding of:

    • Modern methods and techniques for cyber security, including penetration testing and IT auditing.
    • Basic concepts of networking, developing web applications, cyber security and risk management.
    • Techniques in cyber security, cyber physical security and forensics investigations.
    • The modern computing environment and software tools for a cyber security professional.
    • Specialised advanced topics in the area of security and its applications.
    • Research tools and techniques appropriate to the cyber security domain.