Why Study this course?
Msc IT & Applied Security programme allows students to shape their theoretical, technical and practical competencies which being compulsory in this current area of economic growth. It focuses in one of the two distinct areas: Data Analytics and Computer Networking and Cyber Security by initiating opportunities to educate and enhance skills in academic environment by completing a work experience programme.
This programme initiates teaching and learning strategies and methods that are organised around direct contact time with the teaching team and tutor-directed activities. Students will be practicing their reading and critical appreciation of material suggested in teaching sessions; Individual and group work on research and development projects; Regular practice of software tools to gain proficiency; Individual directed research on current developments in the subject area.
A second lower-class Honours IT-related degree from any recognised university or IT-related degree graduates from Tribhuvan, Kathmandu, and Pokhara University with a Minimum GPA 3.0. All other qualifications are evaluated on a case-to-case basis and subjected to approval by London Metropolitan University.
A related undergraduate degrees plus related employment, or consultancy within the field can be considered alongside the portfolio and statement.
The module develops an understanding of project management issues in the context of software development – including the consideration of a standard method, software development frameworks, financial evaluation, planning, monitoring, control and team management – together with the ability to apply these as appropriate to a business case study.
The module aims to provide students with the opportunity to gain work experience and explore career opportunities. It focuses on work related projects and helps to enhance their learning experience by implementing their academic skills to tackle real life problems in workplace.
This module enables students to gain understanding of programming principles, develop students’ knowledge and skills in programming design and coding, expertise in data manipulation and presentation for data analysis, and enhance students’ skills for integrative reasoning, problem-solving and critical thinking.
This module provides students with knowledge of the fundamental principles and techniques employed in auditing and creating awareness of the need for security in computer, communication systems, appraises a security policy and network security posture.
The aims of this module are to enable students to gain understanding of fundamental concepts in data analysis and visualisation, develop student expertise in descriptive statistics, correlation analysis, and linear regression model.
This module aims to provide students with an appreciation of the benefits of Cybersecurity Management within a business environment and over cyber space. This includes the choice and application of appropriate risk assessment and risk control techniques, the understanding of security standards & procedures, coupled with the application of cybersecurity technology & security measures in a business setting.
The module aims to widen opportunities to stimulate the knowledge students gain in their course and extend knowledge to new area of application. It directs student to determine framework of the project according to a set of specifications relevant to the subject of study.
The module will primarily provide students with a good understanding of database concepts and management system in reference to modern enterprise-level database development. Most importantly, this module will deliver students a broad understanding of Big Data technologies including Hadoop based architectures, data ingestion, data transformation, data management, analytics and predictive analytics for manipulating and discovering insight. Topics include Hadoop, HDFS, MapReduce, Spark, Sqoop, Hive, Pig and MLlib.
This module helps to provide a firm understanding of Security Policy design and management. It also helps students to protect the infrastructure and network by using network security technologies such as firewalls, router security and discuss VPN and AAA (Authentication, Authorization and Accounting) implementation.
The aim of this module is to provide students with the knowledge of preservation and extraction of relevant digital evidence from digital equipment, including computers, computer networks (including the cyber space/Internet), and other digital devices in appropriate procedures, tools and techniques. It further develops the students’ skills in using computers as a crime investigative tool.
How this course will help
Take the next step towards
Our admission couselors will contact you soon.
No new notice found.