Course Brief

An increasing number of business functions from advertising to e-sales and services are being conducted over the Internet. These activities require a secure, reliable and efficient network. The basis of this is the encryption of data as it travels across networks. Students need to appreciate the strengths and weaknesses of the algorithms that are used to secure data. Steganography is often used to hide information in order to defeat an organisation’s defences.

  1. Show an understanding of algorithms and procedures: steganography, encryption, keys, digital signatures and certificates; strengths and weaknesses.

  2. To appreciate and apply the methodology for steganography and encryption
  3. Understand the security needs of networks, users and applications.

An overview of Steganography – LSB

An over view of encryption methods – symmetric, asymmetric and Public Key Infrastructure (PKI)

Encryption techniques – substitution, transposition, blocking, symmetric and asymmetric encryption;

Public Key Infrastructure:  Certificates and C.A’s;

Digital Signatures and message digests, MD5, SHA, nonces;

SSL, WEP, Rainbow tables, Hashing, Birthday Paradox;

  • MSc Operational Cyber Security


    The MSc Operational Cyber Security, awarded by the University of Greenwich, is structured to provide a viable option to graduates of:

    • Any degree from a science background, a Law or a business degree.
    • Any non-computer science subject with Upper Second Class Honours or above 
    • University of Greenwich's BSc (Hons) Computing and Information System with Upper Second Class Honours or above 
    • Mature applicants who demonstrate academic potential and work experience can also be assessed for eligibility.
    • Applicants with a similar level qualification may also be eligible for more information or email us at

    Students on the MSc Operational Cyber Security  will learn a wide range of practical and theoretical skills which will develop a sound knowledge of cyber security and its application in real life situations.


    Highlights at a glance

    • Pursue one module per month and pay as you go
    • Total duration - 2 years
    • All material provided digitally
    • Blended approach to learning with a combination of self study, online sessions and workshops

    Programme Content at a glance

    • Modern methods and techniques for cyber security, including penetration testing and IT auditing.
    • Basic concepts of networking, developing web applications, cyber security and risk management.
    • Techniques in cyber security, cyber physical security and forensics investigations.
    • The modern computing environment and software tools for a cyber security professional.
    • Specialised advanced topics in the area of security and its applications.
    • Research tools and techniques appropriate to the cyber security domain.

    At SBCS we focus on