Due to the nature of the subject matter in this course, a SWAG合集 or 5EYES enhanced security clearance will be required.
In partnership with the British Council and the GREAT Britain Campaign, SWAG合集 is offering 5 scholarships of £10,000 to students in Bangladesh, Thailand, Vietnam, Kenya and India applying for postgraduate courses on selected Full time MSc courses.
Overview
- Start dateSeptember
- DurationMSc: 11 months full-time or up to three years part-time; PgDip: up to two years part-time; PgCert: up to two years part-time
- DeliveryThe course is delivered via blended learning, with a mixture of residential and online teaching, and project based learning
- QualificationMSc, PgDip, PgCert
- SWAG合集 typeFull time MOD students only / Part-time
- CampusSWAG合集 at Shrivenham
Who is it for?
Students will be Military and other Government personnel charged with supporting operations in cyberspace, in their current or anticipated role. These staff may also be one or more of the following:
- Managers or leaders in a cyber environment who need to understand information risk and respond to cyber threats,
- Procurement staff commissioning critical or sensitive projects,
- Policy and planning staff interested in computer network and security operations,
- Personnel interested in social media and associated concepts such as cyber mobilisation,
- Those charged with accreditation and assessment of security measures.
Why this course?
The course will specifically focus on responses to serious present and emerging threats in the information domain. The course enables the student to understand the context of the cyber domain from a military perspective. Whilst a technical understanding is an advantage, this course enables students from a variety of backgrounds to understand the drivers and constraints within cyber operations and how many roles need to integrate to provide an effective and cohesive operation.
The course specifically evaluates the current military doctrine and planning procedures across a variety of military and civilian contexts. It also evaluates the impact of cyber on control systems, leadership and decision making in the command and control environment.
Informed by industry
The course has an external advisory panel that is selected and chaired by SWAG合集 MOD.Course details
The course is taught through a flexible blend of compulsory residential courses, online Virtual Learning Environment (VLE) activities and interaction and project based learning.
It has two components: a taught component comprising twelve 10-credit modules (PgCert/PgDip/MSc) and a dissertation (MSc).
Course delivery
The course is delivered via blended learning, with a mixture of residential and online teaching, and project based learning
Dissertation
Students taking the MSc must develop and demonstrate their expertise, independent learning abilities and critical appraisal skills by producing a clear and coherent research-based dissertation.
Modules
Keeping our courses up-to-date and current requires constant innovation and change. The modules we offer reflect the needs of business and industry and the research interests of our staff and, as a result, may change or be withdrawn due to research developments, legislation changes or for a variety of other reasons. Changes may also be designed to improve the student learning experience or to respond to feedback from students, external examiners, accreditation bodies and industrial advisory panels.
To give you a taster, we have listed the compulsory and elective (where applicable) modules which are currently affiliated with this course. All modules are indicative only, and may be subject to change for your year of entry.
Course modules
Compulsory modules
All the modules in the following list need to be taken as part of this course.
Foundations of Cyber
Aim |
This module aims: |
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyberwarfare in Intelligence and Military Operations
Module Leader |
|
---|---|
Aim |
|
Syllabus |
Current doctrine, policy and strategies - assessment:
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Law
Aim |
To equip you with the awareness and ability to critique different legal and ethical frameworks and factors that need to be considered when designing and delivering cyber operations against a range of adversarial actors or deploying cyber capabilities as part of a Full Spectrum Operation. |
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Deception
Module Leader |
|
---|---|
Aim |
To equip you with the awareness and ability to employ cyber deception in both active network defence and computer network exploitation. |
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Information Operations
Module Leader |
|
---|---|
Aim |
This module equips you with a critical understanding of the opportunities and vulnerabilities faced when planning Information Operations as part of an integrated operation to enhance the overall impact achieved through military action or in planning a full spectrum response an adversary. |
Syllabus |
This module approaches the domain of professional practice of Information Operations as the need to change the behaviour of target audiences through the coordination of multiple military and civilian capabilities including emerging cyber based activities.
This module will be built on three core foundations:
These three foundations underpin the module’s recognition of the unique context of seeking behaviour modification in a military context. This context is addressed in the module content through coverage of the following areas: |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Thesis
Module Leader |
|
---|---|
Aim |
|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Elective modules
One of the modules from the following list needs to be taken as part of this course.
Understanding Risk
Aim |
The module develops an understanding of the importance of taking a risk-based approach to Cyber Security and Information Assurance. |
---|---|
Syllabus |
Mapping the Landscape
Cyber Security Risk Management in Practice
Complexity |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Attack - Threats and Opportunities
Aim |
To develop a broad understanding of the security technologies available to support Information Assurance and security requirements and vulnerabilities corresponding to attack vectors. |
---|---|
Syllabus |
Cyber activity
Attacks and vulnerabilities
Defensive TTPs |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Social Technologies
Aim |
To develop an understanding of the impact of social media, from the perspective of security, intelligence and cyber influence. |
---|---|
Syllabus |
Overview
Social technologies and OSINT
Social technologies and influence |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Data-led Decision Support & Artificial Intelligence
Module Leader |
|
---|---|
Aim |
|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Emerging Technology Monitoring
Module Leader |
|
---|---|
Aim |
To enable you to identify and assess new and emerging technology to provide an on-going assessment of their relevance and potential to defence and security. |
Syllabus |
Generic methods and tools:
Emerging technologies: a selection of currently relevant technologies will be studied. |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Incident Management
Aim |
This module will enable you to gain an understanding of threat detection and management at the macro and micro levels. The module will develop both the knowledge of strategic Business Continuity Management and introduce practical approaches to identifying, triaging and responding to threats and attacks. |
---|---|
Syllabus |
Incident Identification
Incident Containment
Incident Management |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
The Human Dimension
Module Leader |
|
---|---|
Aim |
To understand the importance and contribution of human dimension when designing and implementing Cyber Defence and Information Assurance (CDIA) measures. |
Syllabus |
Individual Level
Organisational/stems level
Inventions |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Critical Networks and Process Control
Aim |
|
---|---|
Syllabus |
Critical national infrastructure
Cyber Physical Systems
IoT and smart technologies
Strategic effects |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Systems Thinking for Organisational Viability
Module Leader |
|
---|---|
Aim |
|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Teaching team
You will be taught by Cranfield's leading experts with many years' defence and industry experience as well as external speakers from those same sectors. The Course Director is Darren Lawrence. The teaching team includes:
Your career
This qualification will take you on to become one of the next generation of operators who can support manoeuvres in cyberspace, in contested operations and as part of integrated planning. Additionally, it provides you with both the theoretical and practical understanding of cyberspace within an organisation, thereby enabling you to become one of the next generation of military leaders.
Cranfield Careers and Employability Service
Cranfield’s Career Service is dedicated to helping you meet your career aspirations. You will have access to career coaching and advice, CV development, interview practice, access to hundreds of available jobs via our Symplicity platform and opportunities to meet recruiting employers at our careers fairs. Our strong reputation and links with potential employers provide you with outstanding opportunities to secure interesting jobs and develop successful careers. Support continues after graduation and as a Cranfield alumnus, you have free life-long access to a range of career resources to help you continue your education and enhance your career.
How to apply
See our Application guide for information on our application process and entry requirements.
Part-time applications
Click on the ‘Apply Now’ button to start your online application.
Full-time applications (MOD only)
Please contact Admissions at cdsadmissionsoffice@cranfield.ac.uk for further information.