Overview
- Start dateSeptember
- DurationMSc: 11 months full-time or up to three years part-time; PgDip: up to two years part-time; PgCert: up to two years part-time
- DeliveryThe course is delivered via blended learning, with a mixture of residential and online teaching, and assessment is through coursework, group practicals, presentations and (MSc only) an individual dissertation.
- QualificationMSc, PgDip, PgCert
- SWAG合集 typeFull-time / Part-time
- CampusSWAG合集 at Shrivenham
Who is it for?
Students will be military personnel, civil servants and defence industry professionals who are one or more of the following:
- Managers or leaders in a cyber environment who need to understand information risk and respond to cyber threats;
- Procurement staff commissioning critical or sensitive projects;
- Policy and planning staff interested in computer network and security operations;
- Those charged with accreditation and assessment of security measures;
- Those holding the positions of, or aspiring to be, Chief Information Officers (CIO) or Chief Information Security Officers (CISO).
Why this course?
The course will specifically focus on responses to serious, present, and emerging threats in the information domain. The course enables the student to gain an organisational view of cyber from a defence and security perspective, the domain, the drivers, and constraints. Whilst a technical understanding is of value, the course is designed to ensure that the bigger, contextual, aspects of cyber is understood thereby enabling decision making in relation to cyber to be undertaken within an organisation.
Informed by industry
The course has an external advisory panel that is selected and chaired by SWAG合集 MOD.Course details
The course is taught in a series of one-week residential courses at the SWAG合集 at the Defence Academy, a military establishment in Shrivenham.
It has two components: a taught component comprising twelve 10-credit modules (PgDip/MSc) (PgDip has six 10-credit modules); and (MSc only) an 80-credit research project assessed by dissertation.
Course delivery
The course is delivered via blended learning, with a mixture of residential and online teaching, and assessment is through coursework, group practicals, presentations and (MSc only) an individual dissertation.
Dissertation
Students taking the MSc must develop and demonstrate their expertise, independent learning abilities and critical appraisal skills by producing a clear and coherent research-based dissertation.
Modules
Keeping our courses up-to-date and current requires constant innovation and change. The modules we offer reflect the needs of business and industry and the research interests of our staff and, as a result, may change or be withdrawn due to research developments, legislation changes or for a variety of other reasons. Changes may also be designed to improve the student learning experience or to respond to feedback from students, external examiners, accreditation bodies and industrial advisory panels.
To give you a taster, we have listed the compulsory and elective (where applicable) modules which are currently affiliated with this course. All modules are indicative only, and may be subject to change for your year of entry.
Course modules
Compulsory modules
All the modules in the following list need to be taken as part of this course.
Foundations of Cyber
Aim |
This module aims: |
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Thesis
Module Leader |
|
---|---|
Aim |
|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Elective modules
One of the modules from the following list needs to be taken as part of this course.
Understanding Risk
Aim |
The module develops an understanding of the importance of taking a risk-based approach to Cyber Security and Information Assurance. |
---|---|
Syllabus |
Mapping the Landscape
Cyber Security Risk Management in Practice
Complexity |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Attack - Threats and Opportunities
Aim |
To develop a broad understanding of the security technologies available to support Information Assurance and security requirements and vulnerabilities corresponding to attack vectors. |
---|---|
Syllabus |
Cyber activity
Attacks and vulnerabilities
Defensive TTPs |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Social Technologies
Aim |
To develop an understanding of the impact of social media, from the perspective of security, intelligence and cyber influence. |
---|---|
Syllabus |
Overview
Social technologies and OSINT
Social technologies and influence |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Data-led Decision Support & Artificial Intelligence
Module Leader |
|
---|---|
Aim |
|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Emerging Technology Monitoring
Module Leader |
|
---|---|
Aim |
To enable you to identify and assess new and emerging technology to provide an on-going assessment of their relevance and potential to defence and security. |
Syllabus |
Generic methods and tools:
Emerging technologies: a selection of currently relevant technologies will be studied. |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Incident Management
Aim |
This module will enable you to gain an understanding of threat detection and management at the macro and micro levels. The module will develop both the knowledge of strategic Business Continuity Management and introduce practical approaches to identifying, triaging and responding to threats and attacks. |
---|---|
Syllabus |
Incident Identification
Incident Containment
Incident Management |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Law
Aim |
To equip you with the awareness and ability to critique different legal and ethical frameworks and factors that need to be considered when designing and delivering cyber operations against a range of adversarial actors or deploying cyber capabilities as part of a Full Spectrum Operation. |
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Information Operations
Module Leader |
|
---|---|
Aim |
This module equips you with a critical understanding of the opportunities and vulnerabilities faced when planning Information Operations as part of an integrated operation to enhance the overall impact achieved through military action or in planning a full spectrum response an adversary. |
Syllabus |
This module approaches the domain of professional practice of Information Operations as the need to change the behaviour of target audiences through the coordination of multiple military and civilian capabilities including emerging cyber based activities.
This module will be built on three core foundations:
These three foundations underpin the module’s recognition of the unique context of seeking behaviour modification in a military context. This context is addressed in the module content through coverage of the following areas: |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Deception
Module Leader |
|
---|---|
Aim |
To equip you with the awareness and ability to employ cyber deception in both active network defence and computer network exploitation. |
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
The Human Dimension
Module Leader |
|
---|---|
Aim |
To understand the importance and contribution of human dimension when designing and implementing Cyber Defence and Information Assurance (CDIA) measures. |
Syllabus |
Individual Level
Organisational/stems level
Inventions |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Critical Networks and Process Control
Aim |
|
---|---|
Syllabus |
Critical national infrastructure
Cyber Physical Systems
IoT and smart technologies
Strategic effects |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Systems Thinking for Organisational Viability
Module Leader |
|
---|---|
Aim |
|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Teaching team
You will be taught by Cranfield's leading experts with many years' industrial experience as well as external speakers from industry and defence. The Course Director is Ian Owens.
The teaching team includes:
Accreditation
The course is accredited by the Chartered Institute of Library and Information Professionals. (CILIP)Your career
This qualification will take you on to become one of the next generation of managers who can understand and effectively manage and exploit the threats and opportunities of cyberspace at the organisational level. Crucially, it will also enable graduates to communicate cyber issues to senior management or executive board level.
The course is directly relevant to those wishing to improve their knowledge and skills as, or those aspiring to become, a CIO or CISO.
Cranfield Careers and Employability Service
Cranfield’s Career Service is dedicated to helping you meet your career aspirations. You will have access to career coaching and advice, CV development, interview practice, access to hundreds of available jobs via our Symplicity platform and opportunities to meet recruiting employers at our careers fairs. Our strong reputation and links with potential employers provide you with outstanding opportunities to secure interesting jobs and develop successful careers. Support continues after graduation and as a Cranfield alumnus, you have free life-long access to a range of career resources to help you continue your education and enhance your career.
How to apply
Click on the ‘Apply Now’ button to start your online application.
See our Application guide for information on our application process and entry requirements.