Why Study this course?
The MSc IT and Applied Security with specialisation in Cyber Intelligence is designed to transform your cybersecurity knowledge into expertise in predictive threat detection and mitigation, preparing you to tackle evolving cyber threats. The programme emphasises the Cyber Threat Intelligence Lifecycle, providing comprehensive training in the collection, processing, analysis, and dissemination of threat intelligence, enabling you to convert raw data into actionable insights.
With a focus on leadership, it equips you to lead cyber threat intelligence teams in complex, global IT environments. Industry-centric learning includes hands-on exposure to tools like SIEM, IDS, and penetration testing platforms, engaging you in simulated cyberattacks and incident response drills to sharpen your skills.
Additionally, the programme covers global standards and regulatory compliance, including ISO 27001, NIST, HIPAA, and GDPR, ensuring you are well-versed in cybersecurity governance frameworks. Key technologies such as Splunk for SIEM, Nessus, OpenVAS, and Metasploit for penetration testing, and OSINT methodologies are integral to the curriculum, providing a robust foundation for a career in cyber intelligence.
*The full course is delivered by Islington College in direct partnership with London Metropolitan University.
Entry Requirement
A complete bachelor’s degree with a minimum of 2.2 CGPA or equivalent.
Students should have completed their higher secondary and previous higher education (e.g. bachelor’s degree) where the medium of instruction and assessment is in English.

Course Content
Semester 1
The module develops an understanding of project management issues in the context of software development – including the consideration of a standard method, software development frameworks, financial evaluation, planning, monitoring, control and team management – together with the ability to apply these as appropriate to a business case study.
This module aims to provide students with an appreciation of the benefits of Cybersecurity Management within a business environment and over cyber space. This includes the choice and application of appropriate risk assessment and risk control techniques, the understanding of security standards & procedures, coupled with the application of cybersecurity technology & security measures in a business setting.
Semester 2
This module provides students with knowledge of the fundamental principles and techniques employed in auditing and creating awareness of the need for security in computer, communication systems, appraises a security policy and network security posture.
This module helps to provide a firm understanding of Security Policy design and management. It also helps students to protect the infrastructure and network by using network security technologies such as firewalls, router security and discuss VPN and AAA (Authentication, Authorization and Accounting) implementation.
Semester 3
The module aims to provide students with the opportunity to gain work experience and explore career opportunities. It focuses on work related projects and helps to enhance their learning experience by implementing their academic skills to tackle real life problems in workplace.
The aim of this module is to provide students with the knowledge of preservation and extraction of relevant digital evidence from digital equipment, including computers, computer networks (including the cyber space/Internet), and other digital devices in appropriate procedures, tools and techniques. It further develops the students’ skills in using computers as a crime investigative tool.
Semester 4
The module aims to widen opportunities to stimulate the knowledge students gain in their course and extend knowledge to new area of application. It directs student to determine framework of the project according to a set of specifications relevant to the subject of study.
How this course will help
the students?



Career Prospects
Threat Intelligence Specialist/Lead | Cybersecurity Analyst | Incident Response Lead | Cybersecurity consultant


Take the next step towards
your career.
Our admission counsellors will contact you soon.