Everything you need to know...
-
What is the fee?
Home: £12,440 for the course
International/EU: £20,100 for the course -
How long will I study?
2 Years
-
Where will I study?
-
When do I start?
September 2026
January 2027
-
Placement year available?
Yes
Course summary
- Develop ethical hacking skills to fundamentally understand cyber-attacks.
- Learn and deploy countermeasures that help secure and protect computer systems.
- Implement and manage information security within organisational frameworks.
- Learn the skills needed to undertake the ISO 27001 Lead Auditor certification.
- Accredited by the National Cyber Security Centre (NCSC).
During the MSc Cyber Security course, you will develop your knowledge and skills that are essential for a career as a computing security professional. With the course being accredited by the NCSC, you can be confident that you will graduate with the Cyber-Body of Knowledge (CyBok) industry-standard techniques that employers are seeking.
Accredited by
This course is fully certified by the National Cyber Security Centre NCSC-certified degrees - NCSC.GOV.UK
Come to an open day
Find out more at our postgraduate open days. Book now for your place.
How you learn
The course starts by building your knowledge and skills in network security where you will learn how to secure networks and detect intrusions. This builds into information security that provides further layers of cyber protection including cryptography, access control and risk management. To aid your learning in this area, you will be using real-world case studies and build their solutions.
You will then develop your ethical hacking / pen-testing skills to try and compromise those systems to understand vectors of attack. This includes learning how to identify security vulnerabilities within operating systems, undertake password attacks, and exploit social engineering to gain system access. You will use platforms, such as Hack The Box, to safely practice and develop your skills in this area.
Once the fundamentals principles are covered, you will further your understanding towards security measure compliance by working on case-studies that reflect industry scenarios. This aspect of the course also prepares you for the Lead Auditor certification, for example, determining whether sensitive data is being properly managed with specific reference to Confidentiality, Integrity, and Availability (CIA).
Cyber threat intelligence is another important component of the discipline where you will learn about frameworks (e.g. Mitre Att&ck) and adversary behaviour to help identify attack vectors. Once attacks have happened, you will use digital forensics to better understand their origin and compile evidence to help protect from future threats and support law enforcement agents to tackle the source.
Towards the end of the course, you will undertake a significant dissertation project where you will be researching a relevant topic. This allows you to tailor your learning towards a specific area in the domain, perhaps one that you are keen to pursue into your career. You are supported through your dissertation project by a supervisor, who will be a domain expert.
You learn through:
- tutorials
- workshops
- problem-solving activities
- practical projects
- team work
- reports
- demonstrations
- discussions
- presentations
- structured walk-throughs
Key themes
You'll begin by learning the fundamentals in network security, where you'll learn to secure networks and detect intrusions through real-world case studies. Information security is emphasised, covering cryptography, access control, and risk management for robust cyber protection. The course also focuses on ethical hacking, teaching penetration testing techniques to identify and exploit system vulnerabilities. You'll gain expertise in cyber threat intelligence and digital forensics to understand attack vectors and compile evidence for law enforcement.
The curriculum includes crucial practical real-world work experience as well as preparation for the ISO 27001 Lead Auditor certification, ensuring you are ready to implement and manage information security within organisational frameworks.
Applied learning
Work Experience
You’ll have the opportunity to source a work placement for up to 12 months, where you’ll apply academic theory and your skills in a real-world setting. This hands-on experience will enhance your professional development and help you to make informed career choices after graduation. Throughout your placement, you’ll be supported to reflect on your experience and contribution to the organisation you work for. You'll also share your progress and achievements with your Placement Academic Supervisor as part of your final assessment.
Work placements are competitive and will require you to make formal applications to employers and be successful in securing an opportunity. The application process for placements takes place while you are a student with us. To support you in applying for placements, you’ll complete an additional placement preparation program that introduces you to the UK employment landscape and prepares you for the recruitment and assessment activities you will experience during that process. We also maintain a large database of placement offers that you can search to find opportunities most relevant to your course that you can apply for.
Networking Opportunities
We’re a member of the Chartered Institute of Information Security (CIISec) Academic Partner Programme. The CIISec is the only information and cyber security institution to have been granted Royal Charter status. This means you’ll be able to develop contacts within the cyber security community. You’ll also have access to world-class speakers and the opportunity to network with prospective employers.
As part of the weekly cyber lecture seminar series, we have expert guest lectures that you can network with. This has included previous talks from law enforcement agents (e.g. South Yorkshire Police and FBI), security auditors, pen-testers, and digital forensics experts.
Throughout the course, there are numerous networking opportunities for you to engage with career management, attend career fairs and workshops, participate in employer presentations and visits, and seek guidance from professional advisors.
Competition
Every year, the course runs a Capture the Flag event across UK universities. Using the Hack The Box platform, teams are tasked to hack into vulnerable machines against increasingly harden devices that present more challenging problems.
Course leaders and tutors
Sina Pournouri
Lecturer in Cyber SecurityStaff profile for Sina Pournouri, Lecturer at Sheffield Hallam University
Modules studied may differ depending on when you start your course.
Modules
Module and assessment information for future years is displayed as currently validated and may be liable to change. When selecting electives, your choices will be subject to the core requirements of the course. As a result, selections may be limited to a choice between one of two or more specified electives in some instances.
Modules studied may differ depending on when you start your course.
You will be able to complete a placement year as part of this course. See the modules table below for further information.
Year 1
Compulsory modules
This module will critically evaluate and apply cyber threat intelligence and digital forensics methodologies and principles to reduce organisational risk. This will include developing skills to apply appropriate tools to mitigate adversary tactics, techniques and procedures (TTPs) and effectively conduct digital forensics investigations.
You’ll study topics such as:
- The Mitre Att&ck framework and common TTPs
- Threat actors and operating methods
- Threat intelligence life cycle
- Tracking adversaries
- Common CTI platforms and feeds
- Data analysis for CTI
- Legal and ethical considerations in forensics
- Evidence acquisition and analysis
- Digital storage and network artefacts
- Digital forensics frameworks and techniques
- Incident Response
- Managing investigations and chain of evidence
This module develops proficiency in evaluating the repercussions of computer security vulnerabilities on an organisation to enhance preparedness and responsiveness. This includes systematically reviewing, assessing, and scrutinizing diverse categories of computer incidents to enable the design and implementation of countermeasures. The module also covers penetration testing and advanced techniques and tools utilised by hackers to compromise computer systems.
You’ll study topics such as:
- Reconnaissance
- Scanning
- Vulnerability assessment
- Network-level attacks
- Application and Operating systems-level attacks
- Antivirus evasion
- Password security
- Privilege escalation
- Covering tracks
This module develops a critical understanding and application of appropriate information security management methodologies and principles to reduce organisational risk, and to protect networks from security threats.
You’ll study topics such as:
- Confidentiality, integrity and availability of information and network assets
- Authentication, authorization and access control
- Cryptography
- Cloud security
- Malware detection and analysis
- Network security countermeasures (Security information and event Management, Security orchestration, automation and response, Intrusion Detection Systems, etc.)
- Developing and monitoring secure network infrastructures
- Business continuity planning
- Information security principles, standards and guidelines
- Developing an Information Security Management System (ISMS)
- Information security risk management
- Incident management and response
Module aim:
The aim of this module is to enhance students’ professional development through the completion of, and reflection on meaningful work experience.
A work experience will provide students with opportunities to experience the realities of professional employment and experience how their course can be applied within their chosen industry setting. The placement will:
Allow student to apply the skills, theories and behaviours relevant and in addition to their course.
Enable students to enhance their interpersonal skills in demand by graduate employers – communication, problem solving, creativity, resilience, team work etc.
Grow their student network and relationship building skills.
Provide students with insights into the industry and sector in which their placement occurs.
Help student make informed graduate careers choices.
Indicative Content:
In this module, students will undertake a work experience (minimum duration and expectations as per HESA regulations – clarified on assignment brief/Blackboard) which is integrated, assessed and aligned to their studies and appropriate for their level of study.
Their personal Placement Academic Supervisor (PAS) will be their key point of contact during their work experience and will encourage and support students to reflect on their experience, learning and contribution to the organisation they work for.
To demonstrate gains in professional development, students will be required to share their progress, learning and achievements with their Placement Academic Supervisor and reflect on these for the summative piece of work.
This module develops a critical analysis and review of Information Security management Systems (ISMS) against security-based standards. This includes BS 7799-2, IS27001 and related ISO standards and guidelines for the protection of information. The module also develops skills to undertake the role of an ISMS auditor in accordance with the governing standards.
You’ll study topics such as:
- Assessing security threats and vulnerabilities
- Management of security risks
- Selecting security controls
- Building an Information Security Management System (ISMS)
- Auditing to BS 7799
- Managing and leading a BS 7799 audit team
- Interview techniques
- Audit reporting
Final year
Compulsory modules
This module enables you to identify a cyber security and computer network research problem, investigate the requirements and/or background work, analyse results of research undertaken and design, develop and evaluate a solution to that problem, within the parameters of an individual project scenario, using appropriate tools, techniques, and methodologies.
You’ll study topics such as:
- Information gathering and literature reviews
- Appropriate selection of tools, techniques, and methods
- Testing and user evaluation
- Critical reflection – evaluating the project deliverables and project success/failure
- Structuring presentations and academic papers, including referencing and citation techniques
- Legal, social, and ethical considerations in the design and development of computer networks and cybersecurity-based projects
- Security, confidentiality, and sustainability
This module covers research and effective presentation skills. It will develop a robust foundation for critically identifying and evaluating research materials and publications and an understanding of the methods, techniques, and tools used in conducting impactful research projects in cybersecurity, digital forensic, computer networks and network security based on their degree.
You’ll study topics such as:
- Research Definitions and Types
- The Research Process - Stages of a Research Study
- The Research Question, Aims and Goals
- Planning Your Research
- Searching and Evaluating Literature
- Research Methods
- Research Tools and Techniques
- Research Analysis, Validity and Evaluation
- Writing and Presenting Your Research
Future careers
MSc Cyber Security prepares you for a career in areas such as:
- Pen tester
- Information security officer
- Security consultant
- Threat analyst
- Risk management
Previous graduates of this course have worked for companies that include:
- Airbus
- Deloitte
- HSBC
- DataGuard
- South Yorkshire Police
- Regional Cyber Crime Unit
- British Assessment Bureau
Equipment and facilities
You will learn through teaching in lectures, tutorials and practical laboratory sessions using the University specialist facilities at the Department of Computing.
On the course, you will have access to industry-standard specialist software such as:
- Virtual learning cyber security platforms (e.g. Hack The Box)
- Dedicate Red-Blue Team Cyber Security Lab
- Digital Forensics tools (e.g. FTK, Encase, Axiom, Cellebrite)
Where will I study?
You study at City Campus through a structured mix of lectures, seminars and practical sessions as well as access to digital and online resources to support your learning.
City Campus
City Campus is located in the heart of Sheffield, within minutes of the train and bus stations.
City Campus map | City Campus tour
Adsetts library
Adsetts Library is located on our City Campus. It's open 24 hours a day, every day.
Learn moreEntry requirements
All students
Bachelor’s degree 2:2 or above.
Evidence of some technical computing background (work experience or degree).
IELTS 6 (with all components above 5.5), or equivalent.
Additional information for EU/International students
If you are an International or non-UK European student, you can find out more about the country specific qualifications we accept on our international qualifications page.
For details of English language entry requirements (IELTS), please see the information for 'All students'.
Fees and funding
Home students
Our tuition fee for UK students starting full-time study in 2026/27 is £12,440 for the course. The tuition fee displayed above is for the full course. For this work experience route, your fees will be payable over two years, divided into two annual payments based on credits studied. The fee includes dedicated employability support to help you prepare for and secure work experience. It does not guarantee you a placement and if a placement is not secured the work experience fee will still be charged. If a placement is not secured you will transfer to the standard version of the course to complete your remaining credits, where the balance of your course fees will be due in year one in line with completing the course.
If you are studying an undergraduate course, postgraduate pre-registration course or postgraduate research course over more than one academic year then your tuition fees may increase in subsequent years in line with Government regulations or UK Research and Innovation (UKRI) published fees. More information can be found in our terms and conditions under student fees regulations.
International students
Our tuition fee for International/EU students starting full-time study in 2026/27 is £20,100 for the course. The tuition fee displayed above is for the full course. For this work experience route, your fees will be payable over two years, divided into two annual payments based on credits studied. The fee includes dedicated employability support to help you prepare for and secure work experience. It does not guarantee you a placement and if a placement is not secured the work experience fee will still be charged. If a placement is not secured you will transfer to the standard version of the course to complete your remaining credits, where the balance of your course fees will be due in year one in line with completing the course.
Scholarships and financial support
Find information on scholarships, bursaries and postgraduate student loans.
International scholarships up to £3000 ›
Alumni scholarships up to £2000 ›
Postgraduate loans for UK students ›
Additional course costs
The links below allow you to view estimated general course additional costs, as well as costs associated with key activities on specific courses. These are estimates and are intended only as an indication of potential additional expenses. Actual costs can vary greatly depending on the choices you make during your course.
General course additional costs
Additional costs for School of Computing and Digital Technologies (PDF, 600.1KB)Legal information
Any offer of a place to study is subject to your acceptance of the University’s Terms and Conditions and Student Regulations.
