Typical programme structures for MSc programmes in the School of Computing Science

Size: px
Start display at page:

Download "Typical programme structures for MSc programmes in the School of Computing Science"

Transcription

1 Typical programme structures for MSc programmes in the School of Computing Science 1

2 If you have a good degree in a subject other than computing: MSc Information Technology MSc Software Development 2

3 MSc Information Technology Requirements Computer Systems and Networks Information Systems and Databases Programming Enterprise Computing, or Human Centred Security, or Safety Critical Systems Professional Skills and Issues Software Project proposal 4 electives Information Technology Project 3

4 MSc Software Development Requirements Computer Systems and Networks Information Systems and Databases Programming Enterprise Computing, or Human Centred Security, or Safety Critical Systems Professional Skills and Issues Software Project proposal Algorithms and Data Structures Advanced Programming 2 electives Software Development Project 4

5 Elective courses for MSc degrees in: Information Technology Software Development 2D Digitization Document Encoding Internet Technology Trends in Information Security Algorithms and Data Structures Advanced Programming Cyber Security Human Computer Interaction: Design and Evaluation The choice of electives offered in each year will depend on staff availability 5

6 If you have a good degree in computing: MSc Computing Science MSc Information Security MSc Mobile Design and MSc Search Engine Technologies MSc Software If you have a very good degree in computing and wish to pursue a research career: MRes Computing Science MRes Information Security MRes Mobile Design and MRes Search Engine Technologies MRes Software 6

7 MSc Computing Science Professional Skills and Issues Requirements Research Methods and Techniques 7 electives Component-based Software Project Proposal Computing Science Project Students with appropriate prior experience may substitute Requirements with another elective course 7

8 MSc Information Security Requirements Research Methods and Techniques Safety Critical Systems Human-centred Security Professional Skills and Issues Component-based Software 3 electives Project proposal Cyber Security Trends in Information Security Information Security Project Students with appropriate prior experience may substitute Requirements with another elective course 8

9 MSc Mobile Design and Professional Skills and Issues Requirements Research Methods and Techniques Human Computer Interaction 5 electives Component-based Software Project proposal Mobile Human Computer Interaction Mobile Design and Project Students with appropriate prior experience may substitute Requirements with another elective course 9

10 MSc Search Engine Technologies Professional Skills and Issues Requirements Research Methods and Techniques Information Retrieval Big Data 4 electives Component-based Software Project proposal Machine Learning Search Engine Technologies project Students with appropriate prior experience may substitute Requirements with another elective course 10

11 MSc Software Professional Skills and Issues Requirements Research Methods and Techniques Enterprise Computing Safety Critical Systems 3 electives Component-based Software Project proposal IT Architecture Financial Software Software Project Students with appropriate prior experience may substitute Requirements with another elective course 11

12 Big Data Constraint Programming Enterprise Computing Advanced Networking & Communications Cyber Security Machine Learning Computer Architecture Functional Programming Advanced Operating Systems Safety Critical Systems Elective courses for MSc degrees in: Computing Science Information Security Mobile Design and Search Engine Technologies Software Distributed Algorithms & Systems Computer Vision & Multimedia Human Computer Interaction Mobile Human Computer Interaction Human Computer Interaction: Design and Evaluation Artificial Intelligence Internet Technology Information Retrieval Modeling Reactive Systems Human-Centred Security IT Architecture Algorithmics Trends in Information Security The choice of electives offered in each year will depend on staff availability 12

13 MRes Computing Science Warm-up project Project Proposal Computing Research Readings in Computing Science Advanced Research Readings in Computing Science Science Project Research Methods and Techniques 2 electives 13

14 MRes Information Security Warm-up project Project Proposal Information Advanced Research Readings in Information Security Security Project Research Readings in Computing Science Research Methods and Techniques Cyber Security 1 elective 14

15 MRes Mobile Design and Warm-up project Project Proposal Mobile Design and Project Research Readings in Computing Science Research Methods and Techniques Advanced Research Readings in Computing Science Mobile Human Computer Interaction Human Computer Interaction 15

16 MRes Search Engine Technologies Warm-up project Project Proposal Search Engine Information Retrieval Technologies Project Research Readings in Computing Science Research Methods and Techniques Advanced Research Readings in Computing Science 1 elective 16

17 MRes Software Warm-up project Project Proposal Component-based Software Software Project Research Readings in Computing Science Research Methods and Techniques Advanced Research Readings in Computing Science 1 elective 17

18 Elective courses for MRes degrees in: Computing Science Information Security Mobile Design and Search Engine Technologies Software Big Data Constraint Programming Enterprise Computing Advanced Networking & Communications Cyber Security IT Architecture Machine Learning Computer Architecture Functional Programming Advanced Operating Systems Safety Critical Systems Distributed Algorithms & Systems Computer Vision & Multimedia Human Computer Interaction Mobile Human Computer Interaction Human Computer Interaction: Design and Evaluation Artificial Intelligence Algorithmics Information Retrieval Modeling Reactive Systems Human-Centred Security Trends in Information Security The choice of electives offered in each year will depend on staff availability 18