Everything you need to know...
-
What is the fee?
Home: £10,940 for the course
-
How long will I study?
2 Years
-
Where will I study?
-
When do I start?
September 2026
Course summary
- Develop ethical hacking skills to fundamentally understand cyber-attacks.
- Learn to deploy countermeasures that secure and protect computer systems.
- Apply and manage information security in organisational frameworks.
- Gain skills to undertake ISO 27001 Lead Auditor certification.
During our MSc Cyber Security course, you’ll develop your knowledge and skills to prepare for a career as a computing security professional. With accreditation from the National Cyber Security Centre (NCSC), you can be confident you’ll graduate with the Cyber-Body of Knowledge (CyBok), industry-standard techniques that so many employers are seeking.
Accredited by
This course is fully certified by the National Cyber Security Centre NCSC-certified degrees - NCSC.GOV.UK
Come to an open day
Find out more at our postgraduate open days. Book now for your place.
How you learn
Your lecturer's view
Watch course leader Sina Pournouri talk about this course.
This course explores the fundamentals in network security, where you'll learn to secure networks and detect intrusions through real-world case studies. Your tutorials and workshops will emphasise information security, covering cryptography, access control and risk management for robust cyber protection.
The course also focuses on ethical hacking, teaching you penetration testing techniques to identify and exploit system vulnerabilities. You'll gain expertise in cyber threat intelligence and digital forensics to understand attack vectors and compile evidence for law enforcement. We’ll also prepare you for the ISO 27001 Lead Auditor certification, making sure you’re ready to implement and manage information security within organisational frameworks.
Towards the end of the course, you’ll undertake a significant dissertation project where you’ll be researching a relevant topic. This allows you to tailor your learning towards a specific area – perhaps one you’re keen to pursue as a career. You’ll be supported through your dissertation project by a supervisor, who themselves will be a domain expert.
You learn through:
- Tutorials
- Workshops
- Problem-solving activities
- Practical projects
- Teamwork
- Reports
- Demonstrations
- Real-world case studies
- Discussions
- Presentations
- Structured walk-throughs
Key themes
You’ll start by building your knowledge and skills in network security, where you’ll learn how to secure networks and detect intrusions. This progresses into information security that provides further layers of cyber protection – including cryptography, access control and risk management.
You’ll then develop your ethical hacking / pen-testing skills to try and compromise those systems, to understand vectors of attack. This includes learning how to identify security vulnerabilities within operating systems, undertake password attacks, and exploit social engineering to gain system access. You’ll use platforms such as Hack The Box to safely practise and develop your skills in this area.
Once the fundamentals are covered, you’ll further your understanding towards security-measure compliance by working on case studies that reflect industry scenarios. This also prepares you for the Lead Auditor certification – for example, determining whether sensitive data is being properly managed with specific reference to Confidentiality, Integrity and Availability (CIA).
Cyber threat intelligence is another important component of the discipline, where you’ll learn about frameworks – e.g. Mitre Att&ck – and adversary behaviour to help identify attack vectors. Once attacks have happened, you’ll use digital forensics to better understand their origin, compiling evidence to help protect from future threats, and to help law enforcement agents to tackle the source.
Applied learning
Work experience
This course also has a work experience route that offers a placement in industry of up to 12 months. For further information, please see MSc Cyber Security (Work Experience).
Networking opportunities
We’re a member of the Chartered Institute of Information Security (CIISec) Academic Partner Programme. The CIISec is the only information and cyber security institution to have been granted Royal Charter status. This means you’ll be able to develop contacts within the cyber security community and with prospective employers, as well as gaining insights from world-class speakers.
As part of our weekly cyber lecture seminar series, we have expert guest lectures you can network with. These has previously included talks from law enforcement agents (e.g. South Yorkshire Police and FBI), security auditors, pen-testers and digital forensics experts.
Throughout the course, you’ll be able to develop your career through career fairs and workshops, employer presentations and visits, and by seeking guidance from professional advisers.
Competition
Every year, the course runs a Capture the Flag event across UK universities. Using the Hack The Box platform, you’ll be tasked in teams to hack into vulnerable machines, against increasingly hardened devices that present more challenging problems.
Course leaders and tutors
Sina Pournouri
Lecturer in Cyber SecurityStaff profile for Sina Pournouri, Lecturer at Sheffield Hallam University
Modules
Important notice: The structure of this course is periodically reviewed and enhanced to provide the best possible learning experience for our students and ensure ongoing compliance with any professional, statutory and regulatory body standards. Module structure, content, delivery and assessment may change, but we expect the focus of the course and the learning outcomes to remain as described above. Following any changes, updated module information will be published on this page.
Year 1
Compulsory modules
This module will critically evaluate and apply cyber threat intelligence and digital forensics methodologies and principles to reduce organisational risk. This will include developing skills to apply appropriate tools to mitigate adversary tactics, techniques and procedures (TTPs) and effectively conduct digital forensics investigations.
You’ll study topics such as:
- The Mitre Att&ck framework and common TTPs
- Threat actors and operating methods
- Threat intelligence life cycle
- Tracking adversaries
- Common CTI platforms and feeds
- Data analysis for CTI
- Legal and ethical considerations in forensics
- Evidence acquisition and analysis
- Digital storage and network artefacts
- Digital forensics frameworks and techniques
- Incident Response
- Managing investigations and chain of evidence
This module develops a critical understanding and application of appropriate information security management methodologies and principles to reduce organisational risk, and to protect networks from security threats.
You’ll study topics such as:
- Confidentiality, integrity and availability of information and network assets
- Authentication, authorization and access control
- Cryptography
- Cloud security
- Malware detection and analysis
- Network security countermeasures (Security information and event Management, Security orchestration, automation and response, Intrusion Detection Systems, etc.)
- Developing and monitoring secure network infrastructures
- Business continuity planning
- Information security principles, standards and guidelines
- Developing an Information Security Management System (ISMS)
- Information security risk management
- Incident management and response
This module covers research and effective presentation skills. It will develop a robust foundation for critically identifying and evaluating research materials and publications and an understanding of the methods, techniques, and tools used in conducting impactful research projects in cybersecurity, digital forensic, computer networks and network security based on their degree.
You’ll study topics such as:
- Research Definitions and Types
- The Research Process - Stages of a Research Study
- The Research Question, Aims and Goals
- Planning Your Research
- Searching and Evaluating Literature
- Research Methods
- Research Tools and Techniques
- Research Analysis, Validity and Evaluation
- Writing and Presenting Your Research
Final year
Compulsory modules
This module enables you to identify a cyber security and computer network research problem, investigate the requirements and/or background work, analyse results of research undertaken and design, develop and evaluate a solution to that problem, within the parameters of an individual project scenario, using appropriate tools, techniques, and methodologies.
You’ll study topics such as:
- Information gathering and literature reviews
- Appropriate selection of tools, techniques, and methods
- Testing and user evaluation
- Critical reflection – evaluating the project deliverables and project success/failure
- Structuring presentations and academic papers, including referencing and citation techniques
- Legal, social, and ethical considerations in the design and development of computer networks and cybersecurity-based projects
- Security, confidentiality, and sustainability
This module develops proficiency in evaluating the repercussions of computer security vulnerabilities on an organisation to enhance preparedness and responsiveness. This includes systematically reviewing, assessing, and scrutinizing diverse categories of computer incidents to enable the design and implementation of countermeasures. The module also covers penetration testing and advanced techniques and tools utilised by hackers to compromise computer systems.
You’ll study topics such as:
- Reconnaissance
- Scanning
- Vulnerability assessment
- Network-level attacks
- Application and Operating systems-level attacks
- Antivirus evasion
- Password security
- Privilege escalation
- Covering tracks
This module develops a critical analysis and review of Information Security management Systems (ISMS) against security-based standards. This includes BS 7799-2, IS27001 and related ISO standards and guidelines for the protection of information. The module also develops skills to undertake the role of an ISMS auditor in accordance with the governing standards.
You’ll study topics such as:
- Assessing security threats and vulnerabilities
- Management of security risks
- Selecting security controls
- Building an Information Security Management System (ISMS)
- Auditing to BS 7799
- Managing and leading a BS 7799 audit team
- Interview techniques
- Audit reporting
Future careers
The MSc Cyber Security course prepares you for a career in:
- Pen testing
- Information security
- Security consultancy
- Threat analysis
- Risk management
Previous graduates of this course have worked for:
- Airbus
- Deloitte
- HSBC
- DataGuard
- South Yorkshire Police
- Regional Cyber Crime Unit
- British Assessment Bureau
Equipment and facilities
You’ll learn through teaching in lectures, tutorials and practical laboratory sessions – using the University’s specialist facilities in the School of Computing and Digital Technologies.
You’ll have access to industry-standard specialist software such as:
- Virtual learning cyber security platforms like Hack The Box
- A dedicated red-blue team cyber security lab
- Digital forensics tools like FTK, Encase, Axiom and Cellebrite
Where will I study?
You study at City Campus through a structured mix of lectures, seminars and practical sessions as well as access to digital and online resources to support your learning.
City Campus
City Campus is located in the heart of Sheffield, within minutes of the train and bus stations.
City Campus map | City Campus tour
Adsetts library
Adsetts Library is located on our City Campus. It's open 24 hours a day, every day.
Learn moreEntry requirements
All students
You need:
• A good level of general education with good analytical skills.
• An ambition to develop to a high level in the area of information security.
• A degree 2.2 or above in computing or a closely-related discipline. You may also be able to claim credit points which can reduce the amount of time it takes to complete your qualification at Sheffield Hallam. Find out more.
We will consider your application if you cannot meet the above criteria but have at least one year-s direct work experience in information security or a closely related discipline.
You can apply for prior certificated credit or prior experiential credit for the course if it is appropriate. We consider any professional certification of a suitable level and other criteria related to your application. In some cases we may ask you to take an entrance exam.
Overseas applicants from countries whose first language is not English must normally produce evidence of competence in English. An IELTS score of 6.0 with 5.5 in all skills (or equivalent) is the standard for non-native speakers of English.
Additional information for EU/International students
This course is not open to international students who require a student visa to study in the UK. If you are an international applicant but do not require a student visa, email our Admissions Team to find out whether you’re eligible to apply.
Fees and funding
Home students
Our tuition fee for UK students starting part-time study in 2026/27 is £10,940 for the course. The tuition fee displayed above is for the full course. If the full course is more than one year in duration, the fee will be divided into annual payments which will then be rounded. This may mean the total fee you pay is slightly higher than the fee stated above. If you take a break in study or have to re-take part of the course, you may also be charged an additional fee and will be notified of this at the time.
If you are studying an undergraduate course, postgraduate pre-registration course or postgraduate research course over more than one academic year then your tuition fees may increase in subsequent years in line with Government regulations or UK Research and Innovation (UKRI) published fees. More information can be found in our terms and conditions under student fees regulations.
Scholarships and financial support
Find information on scholarships, bursaries and postgraduate student loans.
International scholarships up to £3000 ›
Alumni scholarships up to £2000 ›
Postgraduate loans for UK students ›
Additional course costs
The links below allow you to view estimated general course additional costs, as well as costs associated with key activities on specific courses. These are estimates and are intended only as an indication of potential additional expenses. Actual costs can vary greatly depending on the choices you make during your course.
General course additional costs
Additional costs for School of Computing and Digital Technologies (PDF, 600.1KB)Legal information
Any offer of a place to study is subject to your acceptance of the University’s Terms and Conditions and Student Regulations.
