Our advanced, four-year MSci degree with a dedicated information security pathway is designed to give you the knowledge, skills and practical experience to pursue a high level career. It offers a thorough grounding in computer science as a whole, as well as an in-depth study of the latest trends and technologies in the exciting and rapidly developing world of information security. You will have the chance to showcase your abilities in an extended final year project on an information security topic, and this programme is particularly recommended for students who want to go on to postgraduate study or a high-level technical career. It will also give you a competitive edge over graduates from standard three-year BSc programmes.
The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. It brings us untold benefits but it also exposes businesses, governments and individuals to repeated threats. On this programme you will develop all the skills you need to pursue a career in computing, and the knowledge and practical experience to manage and improve the smooth running and security of systems, applications and organisations. You will learn from leading researchers in the field, covering topics such as cryptography, computer security and fraud detection. All this will be underpinned by a solid grounding in the fundamentals of computing and all the essentials of application development. From the outset you will be experimenting with programming games, robots, Gadgeteer kits, Subversion, JUnit testing, Scrum-based Agile software and more, in our well-equipped laboratories. Alongside our core modules you will have the flexibility to choose from a range of optional courses. There is also the possibility of transferring onto our five-year, year in industry programme subject to good academic progress.
We are a highly respected, research-focused department with a friendly approach and award-winning teaching. We offer a summer work placement programme and a dedicated personal adviser to guide you through your studies. You will also be welcome to join our thriving Computing Society. We are one of only seven departments in the UK to hold the Athena SWAN bronze award for our commitment to increasing female participation in computer science.
- Get ahead of the game by studying at an advanced level, drawing on elements of our postgraduate MSc programmes.
- Prepare yourself with the knowledge, skills and practical experience to pursue a high level career in information security or other branches of computer science and related fields.
- Join an elite department, ranked 11th in the UK for the quality of its research output (Research Exercise Framework 2014).
- 97% of our students said this programme is well organised, and 92% said it is intellectually stimulating (National Student Survey 2015).
- This programme is accredited by BCS, The Chartered Institute for IT, and the European Quality Assurance Network for Informatics Education (EQANIE). It has also received GCHQ provisional certification.
Computing Lab (Games)
In this module you will develop an understanding of the basic concepts of 2D game design and apply them to the development of simple games using an objected-oriented approach. You will look at the nature of graphics, animation, and motion, considering the usage of vectors in these techniques. You will also examine the fundamentals of game physics, such as collisions, gravity and ballistics.
Computing Lab (Robotics)
In this module you will develop an understanding of the building of computer systems. You will learn about the elementary concepts of robotics, gaining practical experience in programming mobile robots to execute pre-defined movements using Java and Lego NXT. You will also consider the basics of sensors, proportional-integral-derivative (PID) feedback systems, and the principles of localisation.
In this module you will develop an understanding of how the internet works and its key protocols. You will look at the technologies used for web development, including scripting languages and their potential for adding dynamic content to web sites and applications. You will consider the role of web services and related technologies, and will examine the fundamental principles of network security.
In this module you will develop an understanding of the handling of large and infinite objects within a programming environment. You will learn how to use formal logic to design, reason about and minimise switching circuits, and write basic programs in assembly language. You will consider the binary representations of signed and unsigned integers and how to write regular expressions to describe sets and build deterministic automata to recognise these. You will also examine the use of automata machines in the design and reasoning of sequential flow systems.
In this module you will develop an understanding of the formal resoning for sets, relations, functions and cardinality. You will look at the structures for program data and representation and learn to write and reason recursive definitions and prove results by induction and contradiction. You will consider the representation and reasoning of problems using graphs and the use of vectors and transformations for defining and manipulating graphical objects. You will also examine the usage of probability and statistics in analysing data.
Object Oriented Programming 1
In this module you will develop an understanding of programming and object-orientation concepts. You will learn about program basics, control flow, data structures, objects, exceptions, and file input and output. You will consider how to solve basic programming tasks and the need for program documentation, testing, readability and modifiability.
Object Oriented Programming 2
In this module you will develop an understanding of software design and engineering processes, including the Waterfall and Agile methodologies. You will learn how to identify common software requirements and see how these have been considered in existing systems. You will look the techniques of software design and how software engineers communicate their design ideas. You will consider the importance of documentation and the usage of current industry-standard notations such as user stories and the unified modeling language (UML). You will also analyse and critique the design of existing sotware looking at the user experience as a measure of its fitness for purpose.
Algorithms and Complexity
In this module you will develop an understanding of the design of algorithms, with a focus on time and space complexity. You will examine basic algorithms, looking at the implementation and analysis of linear search, binary search, and basic sorting, including inerstion sort, selection sort, merger sort, quick sort, and heap sort. You will consider alternative data structure representations, such as binary search trees, hash tables, and binary heaps, and will gain an insight into the basics of graph algorithms.
Computer and Network Security
In this module you will develop an understanding of computer and network security. You will look at software vulnerabilities, hands-on hacking-oriented attacks, memory errors, and web and network security. You will learn how to identify such vulnerabilities, and consider the countermeasures that can mitigate their exploitation. You will also examine malicious software (malware) as a typical consequence of a successful software exploitation.
In this module you will develop an understanding of the basic concepts of database technology, including the need for database integrity and robustness, and the use of a modern database system in a web-based environment. You will look at database design and the theory of the relational view of data, learn to describe the crucial issues concerning database integrity and recovery from failure, and write search query language (SQL) queries. You will also consider the process of designing and implementing a database, from the user specifications to the final design, and implement an interface to an SQL database using an application programming interface (API).
Introduction to Information Security
In this module you will develop an understanding of how information security may be influenced by real world design and implementation decisions. You will will look at the different cryptographic algorithms, considering their use, advantages and disadvantages. You will use these cryptographic primitives to review and evaluate cryptographic protocols, and examine the rational decisions in the design of tokens and secure elements.
In this module you will develop an understanding of the function and architecture of network operating systems. You will look at the role of an operating system, considering processes, memory and file systems. You will learn to write basic shell scripts, see how services are used at the operating system-level, and evaluate the theory and practice of existing operating systems. You will also examine the UNIX shell, including starting programs, input and output steams, pipes, filters, and utilities.
In this module you will develop an understanding of software engineering techniques and the managerial discipline required to work as part of a team. You will look at basic object-oriented concepts and consider the need for effective program documentation, testing, readability, and modifiability. You will consider the tools used to support software development, such as version controllers, debuggers, and code style checkers, and see how these are integrated into an industry-standard development environment (IDE). You will deliver a small-scale project using test-driven development.
In this module you will develop an understanding of the role of the computer professional, gaining practical experience in developing medium scale software as part of a team using Scrum-based Agile development. You will apply managerial discipline and learn about the software lifecycle, team development, standard industrial software engineering, project management, use of version control, and integrated development enironments (IDEs). You will see why project cost and effort is hard to estimate, and consider why project quality is hard to prescribe.
Applications of Cryptography
In this module you will develop an undestanding of cryptography and how it is deployed in real systems. You will look at security services, security models, and basic attacks on cryptosystems, considering the full range of security services that can be provided by cryptography. You will compare different cryptographic mechanisms and the nature of the architecture within which cryptography is deployed. You will also examine the cryptographic standards that should be followed when implementing cryptography and the rationale for the design decisions taken in several widely deployed cryptographic systems.
In this module you will develop an understanding of mailicious software and the malware landscape. You will look at the key challenges the antivirus industry has faced in fighting malware threats, considering the traditional methods used by cybercriminals to infect user and enterprise hosts to gain access to their private, financial, and intellectual property data. You will learn how traditional and mobile malware work, how they are analysed and detected, and examine the underground ecosystem that drives this profitable but illegal business. You will also assess the research trends that are likely to influence the future of software security.
MSci Individual Project
In this module you will have the opportunity to plan and organise a large project, analysing complex ideas, identifying problems, and coming up with solutions. You will apply scientific principles and use a range of software and hardware techniques. You will analyse the effectiveness of your solutions and evaluate the results. You will also consider legal, social, ethical and professional issues. You can design your own project or choose a topic from a suggested list.
Secure Business Architectures
Security Testing Theory and Practice
In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.
Only core modules are taken
Introduction to Artificial Intelligence
Mathematical Methods for Computer Science
Intelligent Agents and Multi-Agent Systems
Visualisation and Exploratory Analysis
Advanced Data Communications
Concurrent and Parallel Programming
Smart Cards, RFIDs and Embedded Systems Security
IT Project Management
Software Language Engineering
Compilers and Code Generation
Digital Audio and Applications
Functional Programming and Applications
Intelligent Agents and Multi-Agent Systems
On-Line Machine Learning
Visualisation and Exploratory Analysis
Advanced Data Communications
Advanced Distributed systems
Large-Scale Data Storage and Processing
Wireless Sensor and Actuator Networks
Smart Cards, RFIDs and Embedded Systems Security
Running a Small Business
Standards, IP and Technology Seminar Series
Digital Audio and Applications
We firmly believe that how we teach you is at least as important as what we teach, and we know the importance of giving you the time and space to experiment and put theory into practice. We encourage you to use your creativity, both in project teams and independently, and to have fun while you learn. We use a variety of teaching methods, including lectures, small-group tutorials, supervised computer lab classes and problem-solving sessions. You will also be expected to complete guided independent study and group work. Our programming and software engineering teaching is very hands on, allowing you to learn at your own pace, whatever your previous level of experience. You will also attend laboratory classes on games and robotics in year 1, giving you the chance to develop real applications with imagination and creativity from the outset.
We are proud of our award-winning teaching. Professor Dave Cohen won a College Excellence Teaching Prize for the re-design of our second-year software engineering courses, and he was shortlisted for a Times Higher Education Award for Most Innovative Teacher of the Year. The British Computer Society (BCS) has distinguished our software engineering teaching as an exemplar of 'best practice' in computer science education.
Assessment is through a mixture of examinations and coursework. Most course units have a two or three-hour written examination taken at the end of the year in which they are taught, but around half of your final award will come from assessed coursework, which could include project reports, essays, oral presentations and software submissions.
Proportions of study time will vary depending on modules taken, but typically:
You will spend 31% of your study time in scheduled learning and teaching activities, and 69% in guided independent study.
You will spend 24% of your study time in scheduled learning and teaching activities, and 76% in guided independent study.
You will spend 22% of your study time in scheduled learning and teaching activities, and 78% in guided independent study.
You will spend 11% of your study time in scheduled learning and teaching activities, and 89% in guided independent study.
Proportions of assessment types will vary depending on modules taken, but typically:
Written exams account for 61% of the total assessment for this year of study, and 39% will be assessed through coursework.
Written exams account for 70% of the total assessment for this year of study, and 30% will be assessed through coursework.
Written exams account for 65% of the total assessment for this year of study, and 35% will be assessed through coursework.
Written exams account for 43% of the total assessment for this year of study, and 58% will be assessed through coursework.
How we assess your application: predicted grades lower than our typical offers are considered. Read more about what we look for here.
- Where an Applicant is taking the EPQ alongside A-levels, the EPQ will be taken into consideration and result in lower A-level grades being required.
- Socio-economics factors which may have impacted an applicant's education will be taken into consideration and alternative offers may be made to these applicants.
Required subject: either Physics, Computer Science or Mathematics
At least five GCSEs at grade A*-C or 9-4 including English and Mathematics. For applicants studying a BTEC Extended Diploma, a grade B or 6 in Mathematics is required.
Other UK Qualifications
6,5,5 at Higher Level including either Higher Level Mathematics or Higher Level Computer Science or Higher Level Physics, with a minimum of 32 points overall.
|BTEC National Extended Diploma
Distinction, Distinction, Distinction in a relevant subject (with significant programming content) and at least B or 6 in GCSE Maths
Distinction, Distinction plus A-level grade B in either Mathematics or Physics or Computer Science.
|BTEC National Extended Certificate
Distinction plus A-level grades BB including one of Mathematics or Physics or Computer Science.
Requirements are as for A-levels where one non-subject-specified A-level can be replaced by the same grade in the Welsh Baccalaureate - Advanced Skills Challenge Certificate.
|Scottish Advanced Highers
AAB-ABB including either Mathematics, Physics or Computer Science
AAABB including either Mathematics, Physics or Computer Science
|Irish Leaving Certificate
H2,H2,H3,H3,H3 including H3 in either Mathematics or H3 in Physics
|Access to Higher Education Diploma
Pass in a relevant subject with at least 24 level 3 credits at Distinction and the remaining level 3 credits at Merit.
Please note that the Access to Higher Education Diploma will only be acceptable if the applicant has had a considerable break from education.
Other UK qualifications
Please select your UK qualification from the drop-down list below
Please select a qualification
Please select a qualification
International and EU entry requirements
Please select your country from the drop-down list below
IELTS 6.5 overall and a minimum of 5.5 in each subscore. For equivalencies, see here.
For more information about entry requirements for your country please visit our International pages. For international students who do not meet the direct entry requirements, we offer an International Foundation Year, run by Study Group at the Royal Holloway International Study Centre. Upon successful completion, students can progress on to selected undergraduate degree programmes at Royal Holloway, University of London.
Our MSci graduates are highly employable, with a depth of knowledge and practical skills that set them apart from BSc students. Information security specialists are in demand across a wide range of sectors, from private companies to banking, telecommunications, security consultancies, the civil service, public utilities, retail, the military and more. They work in a rapidly developing and expanding field, with lucrative job opportunities. We have particularly strong links with the information security industry and after four years of studying you will be well prepared to take your career to the highest levels.
This programme will give you a solid grounding in the knowledge, skills and practical experience required for a successful career in computing and information security or related fields. You will learn to analyse and solve problems with creativity, to translate technological innovations into programming solutions, to design, implement, test and maintain software systems, and to digest and explain complex technical information. You will also showcase your abilities in an extended independent research project, study modules at master level, and develop valuable transferrable skills such as: team working, advanced IT skills, critical thinking, data handling, communication, time management and self-motivation.
Our partners in industry advise us on our curriculum, to make sure it responds to the latest market needs and trends. This means our graduates are up-to-speed with all the latest trends and developments. We run jobs fairs and a short-term work placement scheme, and your personal adviser and the campus Careers team will be on hand to offer advice on career opportunities. We also maintain strong links with our alumni, who can often provide advice, contacts and networking opportunities. In recent years, our computer science graduates have launched careers in everything from network systems design and web development, to business management and finance. They work in organisations such as: Amazon, American Express, Apple, Bupa, Capita, CGI-Logica, Goldman Sachs, Microsoft, Symantec, among many others. Find out more about what some of our graduates are doing, here.
- Gain a competitive edge by completing an advanced four-year curriculum with a specialism in information security, including an extended independent project to showcase your abilities.
- 85% of our computer science graduates are in work or further study within six months of leaving (Unistats 2015).
- Our strong ties with industry mean we understand the latest market trends and can introduce you to all the newest developments.
- Add professional prestige to your qualification with membership of the BCS, The Chartered Institute for IT and the European Quality Assurance Network for Informatics Education (EQANIE), after you graduate.
Home and EU students tuition fee per year 2018/19*: £9,250
International students tuition fee per year 2018/19**: £17,500
Other essential costs***: There are no single associated costs greater than £50 per item on this course
How do I pay for it? Find out more about funding options, including loans, grants, scholarships and bursaries.
*The tuition fee for UK and EU undergraduates is controlled by Government regulations, and for students starting a degree in the academic year 2018/19 will be £9,250 for that year. The UK Government has confirmed that EU students starting an undergraduate degree in 2018/19 will pay the same level of fee as a UK student for the duration of their degree.
**Fees for international students may increase year-on-year in line with the rate of inflation. The policy at Royal Holloway is that any increases in fees will not exceed 5% for continuing students. For further information see fees and funding and our terms and conditions.
***These estimated costs relate to studying this particular degree programme at Royal Holloway. Costs, such as accommodation, food, books and other learning materials and printing etc., have not been included.