13.07.2015 Views

PROSPECTUS - Study in the UK

PROSPECTUS - Study in the UK

PROSPECTUS - Study in the UK

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Forensic Comput<strong>in</strong>gMSc/PG Dip/PG CertTECHNOLOGYKey <strong>in</strong>formationDuration:One year full-time (with optionalone year placement available),two or more years part-time orby distance learn<strong>in</strong>gLocation:Gateway House,De Montfort UniversityStart date:September 2013Entry requirements:You should have <strong>the</strong> equivalentof a British Honours degree(2:2 m<strong>in</strong>imum) <strong>in</strong> a relevantsubject. If you don’t haveformal academic qualificationsbut have extensive <strong>in</strong>dustryexperience you will beconsidered <strong>in</strong>dividuallyEnglish language requirements:IELTS 6.0 with no componentbelow 5.5 or equivalentTuiTION feeS:Please visit dmu.ac.uk/pgfeesfor <strong>in</strong>formationhow TO APPLY:Please visit dmu.ac.uk/pgapplyCONTACT DETAILS:Technology AdmissionsT: +44 (0)116 257 7456E: pgtech@dmu.ac.ukW: dmu.ac.uk/technologyCourse overviewForensic comput<strong>in</strong>g is one of <strong>the</strong>fastest grow<strong>in</strong>g areas <strong>in</strong> <strong>the</strong> IT<strong>in</strong>dustry. Almost all crimes now<strong>in</strong>clude an element of computerforensics s<strong>in</strong>ce almost all suspectsuse digital devices such ascomputers and mobile phones.The need for companies to complywith <strong>the</strong> regulations concern<strong>in</strong>g dataprotection and adequate <strong>in</strong>cidentresponse means that most largeorganisations now need forensiccomput<strong>in</strong>g specialists. With its highmedia profile and high demand forforensic comput<strong>in</strong>g specialists <strong>the</strong>rehas never been a better time tostudy one of <strong>the</strong> most excit<strong>in</strong>gareas of comput<strong>in</strong>g.Developed <strong>in</strong> consultation wi<strong>the</strong>lectronic crime law enforcementspecialists, you will be taught byexpert staff with strong l<strong>in</strong>ks toleaders <strong>in</strong> <strong>the</strong> forensic comput<strong>in</strong>gfield. <strong>Study</strong> <strong>in</strong> purpose-built, stateof-<strong>the</strong>-artcomputer forensics andsecurity laboratories and learn <strong>the</strong>latest skills to detect, preserve,analyse and present digital evidence.Course modulesFirst semester(September to January)Fundamentals of Forensicsand SecurityForensic Tools and TechniquesLive Forensics and Revers<strong>in</strong>gResearch Methods,Computer Law and EthicsOptional placementWe offer a great opportunityfor you to boost your careerprospects through an optional 12month placement as part of yourpostgraduate studies. Our dedicatedPlacement Unit will help you obta<strong>in</strong>this. Once on your placement, youwill be supported by your visit<strong>in</strong>gtutor, placements beg<strong>in</strong> after <strong>the</strong>taught component of <strong>the</strong> coursearound June, you will complete yourdissertation when you return.Teach<strong>in</strong>g and asseSSMentTeach<strong>in</strong>g methods <strong>in</strong>clude lectures,tutorials and laboratory work. Astrong emphasis is given to realworld problems. Assessment is by acomb<strong>in</strong>ation of coursework, projectsand laboratory-based assessments.ExpertiseThe course teams with<strong>in</strong> <strong>the</strong> CyberSecurity Centre have unrivalledexpertise <strong>in</strong> both computerforensics and security. The team<strong>in</strong>cludes former Chief InformationSecurity Officers (CISOs) of largetelecommunications companies,<strong>in</strong>ternet banks and cloud serviceproviders, an ex-Vice Presidentof one of <strong>the</strong> largest computersecurity companies <strong>in</strong> <strong>the</strong> world,<strong>in</strong>formation assurance specialistswith extensive experience work<strong>in</strong>g<strong>in</strong> various uk defence organisations,lead<strong>in</strong>g digital forensics experts andrespected government advisors.Several of <strong>the</strong> team are regularmedia commentators on forensicsand security.Second semester(February to May)Advanced Topics <strong>in</strong>Forensics and SecurityDigital Evidence and IncidentResponseSecure Web SystemsProfessional Practiceand ResponsibilitiesGraduate careersGraduates are likely to be employedas forensic comput<strong>in</strong>g specialistswith<strong>in</strong> law enforcement or o<strong>the</strong>rspecialist consultancies, as forensicsand/or security specialists <strong>in</strong> ITdepartments of larger organisations,and <strong>in</strong> o<strong>the</strong>r careers where computerforensic <strong>in</strong>cident response isrequired. Opportunities also exist forfur<strong>the</strong>r academic study towards aPhD and a career <strong>in</strong> research.Suitable for aPPlicants from:EUWorldThird semester(June to September)Forensic Comput<strong>in</strong>gProject (Dissertation)Similar couRSesComputer SecurityProfessional Practice <strong>in</strong>Digital Forensics and Security256Please note: Course modules are correct at <strong>the</strong> time of go<strong>in</strong>g to pr<strong>in</strong>t and are subject to review so may vary.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!