Overview
- Start dateSeptember
- DurationMSc: 11 months full-time or up to three years part-time; PgDip: up to two years part-time; PgCert: up to two years part-time
- DeliveryThe course is delivered via blended learning, with a mixture of residential and online teaching, and project based learning
- QualificationMSc, PgDip, PgCert
- Study typeFull time MOD students only / Part-time
- CampusߣߣÊÓƵ at Shrivenham
Who is it for?
Students will be Military and other Government personnel charged with supporting operations in cyberspace, in their current or anticipated role. These staff may also be one or more of the following:
- Managers or leaders in a cyber environment who need to understand information risk and respond to cyber threats,
- Procurement staff commissioning critical or sensitive projects,
- Policy and planning staff interested in computer network and security operations,
- Personnel interested in social media and associated concepts such as cyber mobilisation,
- Those charged with accreditation and assessment of security measures.
Why this course?
The course will specifically focus on responses to serious present and emerging threats in the information domain. The course enables the student to understand the context of the cyber domain from a military perspective. Whilst a technical understanding is an advantage, this course enables students from a variety of backgrounds to understand the drivers and constraints within cyber operations and how many roles need to integrate to provide an effective and cohesive operation.
The course specifically evaluates the current military doctrine and planning procedures across a variety of military and civilian contexts. It also evaluates the impact of cyber on control systems, leadership and decision making in the command and control environment.
Informed by industry
The course has an external advisory panel that is selected and chaired by UK MOD.Course details
The course is taught through a flexible blend of compulsory residential courses, online Virtual Learning Environment (VLE) activities and interaction and project based learning.
It has two components: a taught component comprising twelve 10-credit modules (PgCert/PgDip/MSc) and a dissertation (MSc).
Course delivery
The course is delivered via blended learning, with a mixture of residential and online teaching, and project based learning
Dissertation
Students taking the MSc must develop and demonstrate their expertise, independent learning abilities and critical appraisal skills by producing a clear and coherent research-based dissertation.
Modules
Keeping our courses up-to-date and current requires constant innovation and change. The modules we offer reflect the needs of business and industry and the research interests of our staff and, as a result, may change or be withdrawn due to research developments, legislation changes or for a variety of other reasons. Changes may also be designed to improve the student learning experience or to respond to feedback from students, external examiners, accreditation bodies and industrial advisory panels.
To give you a taster, we have listed the compulsory and elective (where applicable) modules which are currently affiliated with this course. All modules are indicative only, and may be subject to change for your year of entry.
Course modules
Compulsory modules
All the modules in the following list need to be taken as part of this course.
Foundations of Cyber
Aim |
|
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyberwarfare in Intelligence and Military Operations
Aim |
|
---|---|
Syllabus |
Doctrine to be considered could include that of the UK and her allies, along with National cyber security strategies and other national concepts of operation for Cyber and the associated organisation of Cyber capabilities. Concepts to be considered could include: Cyber domain and the Information Environment, Cyber power, Cyberwar, Computer Network Operations (CNO), Electronic warfare, Cyber Electromagnetic Activities (CEMA) Information warfare and operations, Cyber Influence, Command and control warfare, Media operations and public affairs, Cyber intelligence, Integrated planning, Defence in depth, Commander’s responsibilities Example theories could include: Asymmetric and Contested Warfare & threat actor motivations, Attribution, Collective Security, Defence, Deterrence, Deception (Military deception, cyber deception, camouflage, concealment & denial), Espionage, Sabotage and Subversion, Intelligence and Information Requirements, the Security Dilemma, Sense-making and decision-making, and Sovereignty. This could cover topics such as: Full Spectrum Operations, Hybrid Warfare, Fusion Warfare, Effects (for example: Cognitive effects and behaviour change, Deny, degrade, disrupt, destroy, deter, etc). The applicability of concepts in cyberspace such as Attack, Defend and Exploit, Manoeuvre & Lethality, Legality, Ethics, proportionality & collateral damage, Target Systems Analysis, Target Audience Analysis, Targeting and Intelligence. Covering topics such as Autonomy and Artificial Intelligence, Active Defence, Offensive Cyber, SCADA and communications systems, Anonymity, Ubiquity, Scale and Reach. |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Law
Aim |
To equip you with the awareness and ability to critique different legal and ethical frameworks and factors that need to be considered when designing and delivering cyber operations against a range of adversarial actors or deploying cyber capabilities as part of a Full Spectrum Operation. |
---|---|
Syllabus |
This module will consider the range of different legal regimes that need to be considered when planning or conducting offensive cyber operations. The module will look at the applicable legal framework for intelligence operations, military operations, information operations and propaganda. It will consider the obligations provided through customary international law, international humanitarian law and domestic legislation that need addressing when considering a cyber operation. The module will look at the implication of conducting cyber operations in a range of different contexts, considering cyber as part of a military campaign, prior to the declaration of war and against non-state actors. The applicability of the Laws of Armed Conflict will be explored when considering cyber operations. The applicable legal frameworks and issues will be considered from a range of different perspectives of those actors involved in dealing with cyber operations (both private and public sector). You will be introduced to a range of different concepts that could be considered when developing appropriate courses of action for cyber operations. The concepts include but are not limited to: sovereignty, right to self-defence, espionage, sabotage, subversion, intelligence, ius ad bellum, ius in bello, armed attack, threat or use of force, necessity, proportionality, distinction, targeting, perfidy, ruse and state responsibility. Finally, this module will allow you the opportunity to look at the various proposed legal frameworks for cyber operations and assess their suitability to support operational planners. |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Deception
Aim |
To equip you with the awareness and ability to employ cyber deception in both active network defence and computer network exploitation. |
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Information Operations
Aim |
This module equips you with a critical understanding of the opportunities and vulnerabilities faced when planning Information Operations as part of an integrated operation to enhance the overall impact achieved through military action or in planning a full spectrum response an adversary. |
---|---|
Syllabus |
This module approaches the domain of professional practice of Information Operations as the need to change the behaviour of target audiences through the coordination of multiple military and civilian capabilities including emerging cyber based activities. This module will be built on three core foundations: These three foundations underpin the module’s recognition of the unique context of seeking behaviour modification in a military context. This context is addressed in the module content through coverage of the following areas: |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Elective modules
One of the modules from the following list needs to be taken as part of this course.
Understanding Risk
Aim |
The module develops an understanding of the importance of taking a risk-based approach to Cyber Security and Information Assurance. |
---|---|
Syllabus |
Mapping the Landscape Cyber Security Risk Management in Practice Complexity |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Cyber Attack - Threats and Opportunities
Aim |
To develop a broad understanding of the security technologies available to support Information Assurance and security requirements and vulnerabilities corresponding to attack vectors. |
---|---|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Social Technologies
Aim |
To develop an understanding of the impact of social media, from the perspective of security, intelligence and cyber influence. |
---|---|
Syllabus |
Overview Social technologies and OSINT Social technologies and influence |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Data-led Decision Support & Artificial Intelligence
Module Leader |
|
---|---|
Aim |
|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Emerging Technology Monitoring
Module Leader |
|
---|---|
Aim |
To enable you to identify and assess new and emerging technology to provide an on-going assessment of their relevance and potential to defence and security. |
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Incident Management
Aim |
This module will enable you to gain an understanding of threat detection and management at the macro and micro levels. The module will develop both the knowledge of strategic Business Continuity Management and introduce practical approaches to identifying, triaging and responding to threats and attacks. |
---|---|
Syllabus |
Incident Identification Incident Containment Incident Management |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
The Human Dimension
Module Leader |
|
---|---|
Aim |
To understand the importance and contribution of human dimension when designing and implementing Cyber Defence and Information Assurance (CDIA) measures. |
Syllabus |
Individual level Organisational/stems level Interventions |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Critical Networks and Process Control
Aim |
|
---|---|
Syllabus |
Critical national infrastructure Cyber Physical Systems SCADA and OT IoT and smart technologies Strategic effects |
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Systems Thinking for Organisational Viability
Module Leader |
|
---|---|
Aim |
|
Syllabus |
|
Intended learning outcomes |
On successful completion of this module you will be able to:
|
Teaching team
You will be taught by ߣߣÊÓƵ's leading experts with many years' defence and industry experience as well as external speakers from those same sectors. The Course Director is Darren Lawrence. The teaching team includes:
Your career
This qualification will take you on to become one of the next generation of operators who can support manoeuvres in cyberspace, in contested operations and as part of integrated planning. Additionally, it provides you with both the theoretical and practical understanding of cyberspace within an organisation, thereby enabling you to become one of the next generation of military leaders.
ߣߣÊÓƵ Careers and Employability Service
ߣߣÊÓƵ’s Career Service is dedicated to helping you meet your career aspirations. You will have access to career coaching and advice, CV development, interview practice, access to hundreds of available jobs via our Symplicity platform and opportunities to meet recruiting employers at our careers fairs. Our strong reputation and links with potential employers provide you with outstanding opportunities to secure interesting jobs and develop successful careers. Support continues after graduation and as a ߣߣÊÓƵ alumnus, you have free life-long access to a range of career resources to help you continue your education and enhance your career.
How to apply
See our Application guide for information on our application process and entry requirements.
Part-time applications
Click on the ‘Apply Now’ button to start your online application.
Full-time applications (MOD only)
Please contact Admissions at cdsadmissionsoffice@cranfield.ac.uk for further information.