Apply by 28 March 2024 and you could be eligible for a 5% discount on your tuition fees.
Overview
- Start dateSeptember
- DurationMSc: one year full-time and up to five years part-time; PgDip: up to four years part-time; PgCert: up to three years part-time
- DeliveryThe course is delivered via blended learning, with a mixture of residential and online teaching, and assessment is through coursework, group practicals, presentations and (MSc only) an individual dissertation.
- QualificationMSc, PgDip, PgCert
- Study typeFull-time / Part-time
- CampusCranfield University at Shrivenham
Who is it for?
Students will be military personnel, civil servants and defence industry professionals who are one or more of the following:
- Managers or leaders in a cyber environment who need to understand information risk and respond to cyber threats;
- Procurement staff commissioning critical or sensitive projects;
- Policy and planning staff interested in computer network and security operations;
- Those charged with accreditation and assessment of security measures;
- Those holding the positions of, or aspiring to be, Chief Information Officers (CIO) or Chief Information Security Officers (CISO).
Why this course?
The course will specifically focus on responses to serious, present, and emerging threats in the information domain. The course enables the student to gain an organisational view of cyber from a defence and security perspective, the domain, the drivers, and constraints. Whilst a technical understanding is of value, the course is designed to ensure that the bigger, contextual, aspects of cyber is understood thereby enabling decision making in relation to cyber to be undertaken within an organisation.
Informed by industry
The course has an external advisory panel that is selected and chaired by UK MOD.Course details
The course is taught in a series of one-week residential courses at the Cranfield University at the Defence Academy, a military establishment in Shrivenham.
It has two components: a taught component comprising twelve 10-credit modules (PgDip/MSc) (PgDip has six 10-credit modules); and (MSc only) an 80-credit research project assessed by dissertation.
Course delivery
The course is delivered via blended learning, with a mixture of residential and online teaching, and assessment is through coursework, group practicals, presentations and (MSc only) an individual dissertation.
Dissertation
Students taking the MSc must develop and demonstrate their expertise, independent learning abilities and critical appraisal skills by producing a clear and coherent research-based dissertation.
Modules
Keeping our courses up-to-date and current requires constant innovation and change. The modules we offer reflect the needs of business and industry and the research interests of our staff and, as a result, may change or be withdrawn due to research developments, legislation changes or for a variety of other reasons. Changes may also be designed to improve the student learning experience or to respond to feedback from students, external examiners, accreditation bodies and industrial advisory panels.
To give you a taster, we have listed the compulsory and elective (where applicable) modules which are currently affiliated with this course. All modules are indicative only, and may be subject to change for your year of entry.
Course modules
Compulsory modules
All the modules in the following list need to be taken as part of this course.
Foundations of Cyber
Aim |
|
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Elective modules
One of modules from the following list need to be taken as part of this course
Understanding Risk
Aim |
The module develops an understanding of the importance of taking a risk-based approach to Cyber Security and Information Assurance. |
---|---|
Syllabus |
Mapping the Landscape Cyber Security Risk Management in Practice Complexity |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Attack - Threats and Opportunities
Aim |
To develop a broad understanding of the security technologies available to support Information Assurance and security requirements and vulnerabilities corresponding to attack vectors. |
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Social Technologies
Aim |
To develop an understanding of the impact of social media, from the perspective of security, intelligence and cyber influence. |
---|---|
Syllabus |
Overview Social technologies and OSINT Social technologies and influence |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Data-led Decision Support
Aim |
|
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Emerging Technology Monitoring
Module Leader |
|
---|---|
Aim |
To enable you to identify and assess new and emerging technology to provide an on-going assessment of their relevance and potential to defence and security. |
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Incident Management
Aim |
This module will enable you to gain an understanding of threat detection and management at the macro and micro levels. The module will develop both the knowledge of strategic Business Continuity Management and introduce practical approaches to identifying, triaging and responding to threats and attacks. |
---|---|
Syllabus |
Incident Identification Incident Containment Incident Management |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Law
Aim |
To equip you with the awareness and ability to critique different legal and ethical frameworks and factors that need to be considered when designing and delivering cyber operations against a range of adversarial actors or deploying cyber capabilities as part of a Full Spectrum Operation. |
---|---|
Syllabus |
This module will consider the range of different legal regimes that need to be considered when planning or conducting offensive cyber operations. The module will look at the applicable legal framework for intelligence operations, military operations, information operations and propaganda. It will consider the obligations provided through customary international law, international humanitarian law and domestic legislation that need addressing when considering a cyber operation. The module will look at the implication of conducting cyber operations in a range of different contexts, considering cyber as part of a military campaign, prior to the declaration of war and against non-state actors. The applicability of the Laws of Armed Conflict will be explored when considering cyber operations. The applicable legal frameworks and issues will be considered from a range of different perspectives of those actors involved in dealing with cyber operations (both private and public sector). You will be introduced to a range of different concepts that could be considered when developing appropriate courses of action for cyber operations. The concepts include but are not limited to: sovereignty, right to self-defence, espionage, sabotage, subversion, intelligence, ius ad bellum, ius in bello, armed attack, threat or use of force, necessity, proportionality, distinction, targeting, perfidy, ruse and state responsibility. Finally, this module will allow you the opportunity to look at the various proposed legal frameworks for cyber operations and assess their suitability to support operational planners. |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Information Operations
Aim |
This module equips you with a critical understanding of the opportunities and vulnerabilities faced when planning Information Operations as part of an integrated operation to enhance the overall impact achieved through military action or in planning a full spectrum response an adversary. |
---|---|
Syllabus |
This module approaches the domain of professional practice of Information Operations as the need to change the behaviour of target audiences through the coordination of multiple military and civilian capabilities including emerging cyber based activities. This module will be built on three core foundations: These three foundations underpin the module’s recognition of the unique context of seeking behaviour modification in a military context. This context is addressed in the module content through coverage of the following areas: |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Deception
Aim |
To equip you with the awareness and ability to employ cyber deception in both active network defence and computer network exploitation. |
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
The Human Dimension
Module Leader |
|
---|---|
Aim |
To understand the importance and contribution of human dimension when designing and implementing Cyber Defence and Information Assurance (CDIA) measures. |
Syllabus |
Individual level Organisational/stems level Interventions |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Critical Networks and Process Control
Aim |
|
---|---|
Syllabus |
Critical national infrastructure Cyber Physical Systems SCADA and OT IoT and smart technologies Strategic effects |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Systems Thinking for Organisational Viability
Aim |
|
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Teaching team
You will be taught by Cranfield's leading experts with many years' industrial experience as well as external speakers from industry and defence. The Course Director is Ian Owens.
The teaching team includes:
Accreditation
The course is accredited by the Chartered Institute of Library and Information Professionals. (CILIP)Your career
This qualification will take you on to become one of the next generation of managers who can understand and effectively manage and exploit the threats and opportunities of cyberspace at the organisational level. Crucially, it will also enable graduates to communicate cyber issues to senior management or executive board level.
The course is directly relevant to those wishing to improve their knowledge and skills as, or those aspiring to become, a CIO or CISO.
Cranfield Careers and Employability Service
Cranfield’s Career Service is dedicated to helping you meet your career aspirations. You will have access to career coaching and advice, CV development, interview practice, access to hundreds of available jobs via our Symplicity platform and opportunities to meet recruiting employers at our careers fairs. Our strong reputation and links with potential employers provide you with outstanding opportunities to secure interesting jobs and develop successful careers. Support continues after graduation and as a Cranfield alumnus, you have free life-long access to a range of career resources to help you continue your education and enhance your career.
How to apply
Click on the ‘Apply Now’ button to start your online application.
See our Application guide for information on our application process and entry requirements.