MSc in Computer Science

General Information:

Course Title:Master of Science in Computer Science

Awarded by:University of Bedfordshire, U.K.

Approved by the Ministry of Higher Education, Research and Innovation. Oman

Duration of the Course: 2 Years / 4 Semesters (5-6 weekends in a semester)

Mode of Study: Part - Time in a blended learning format (5-6 Weekends in a Semester)

Start of Application Process: October 29, 2023

End of Application Process:January 31, 2024

Start of Registration:January 28, 2024

End of Registration: February 7, 2024

Classes commence:February 16, 2024

Faculty: Lead Faculty from Univ. of Bedfordshire, U.K.,Tutorial support by Faculty members of Majan College (Univ. College).

Entry Criteria:

  • A good first degree - 2.2 Hons. or equivalent , with a significant (generally one third or more) element in Computing.
  • Applicants must have IELTS 6.0 or equivalent.

Course Structure:

8 Units (of 15 Credits each) + 1 Project (of 60 Credits) = Total 180 Credits

The Pathways:

MSc Computer Science (Information Management and Security)

This unit will expose you to state-of-the-art applicable current emerging technologies and concepts in a range of areas. Such technologies will be analysed to determine their applicability and appropriateness for, and impact from, their adoption in the real world.
Managing data is an area of crucial importance in any field. Its application facilitates the rational decision-making process that is the basis for successful operations within any environment. To this end, the purpose of this unit is to discuss, through a mixture of relevant topics, how data should be managed during data lifecycle. This includes development tools and techniques for data capture, modelling, storing and retrieval to serve as the mechanisms for making effective and efficient use of available data. The approach will be based on exploring applied principles and practices to enable you to develop a relational database system as a solution to a problem for a particular field of application. These are fully informed from practices employed in small to middle and, middle to large sized companies.
This unit explores the area of project management with specific reference to the IT and telecommunications industry. During this unit you will explore a selection of project management tools, techniques within a sound project management framework. As well as looking at specific tools and techniques you will explore the general areas of human resources management as well as time and risk management and see how the various frameworks address these key areas. Professional and ethical considerations are a key part of the project management area and these will be covered at the appropriate points during the unit.
Information Systems (IS) strategy is highly relevant to corporate strategy in commerce, industry, and academia. The focu is on the role that ISs play in leveraging IT resources to support short-, medium- and long-term organisational objectives; as well as an understanding of threats that may attack systems and how to minimise their effects through effective Risk Management and IS continuity planning. Organisations face increasing pressure to be durable, innovative, competitive and move into new markets; IT is seen as an enabler in this context. The intrinsic concepts of Iss, how they relate to organisational objectives, key processes, roles that affect IS strategy are studied and it also explores security risk analysis and new technologies organisations can use to ensure their effectiveness. Modern case studies demonstrating application are used to highlight the role that ISs, continuity planning and Security Risk Management offer within the realm of organisational strategy.
This unit is intended to extend students’ knowledge in relation to administering servers running under a multi-user operating system. The unit covers both server administration and security of servers used for networking services.
The purpose of this unit is to develop and extend your knowledge in relation to e-Governance within organisational contexts such as large corporate bodies and publicly owned organisations such as the NHS. E-Governance encompasses the management across data silos, repositories, and integrated systems so as to ensure compliance with legal standards, in-house or national privacy and Data Protection norms. These areas will be covered using realistic scenarios and case studies (e.g. the NHS will be used as a case). Practical aspects such as the creation and management of ontologies, schemas and trust and security aspects will be covered in laboratory sessions. Where appropriate emergent paradigms will underpin aspects of good practice.
The purpose of this unit is to develop and extend your knowledge in relation to computer security techniques and countermeasures. The unit covers fundamental principles as well as leading edge computer security topics. Concepts, terminologies, models, principles, hardening methods will be covered from an applied perspective supported by theoretical underpinning. The aim is to provide you with the basic understanding and the background knowledge of fundamental computer security.
The purpose of this unit is to provide an in-depth and specialized knowledge around the advanced security issues and countermeasures techniques. This unit provides you with a hands-on experience on security testing, vulnerability detection/ analysis and threat and risk assessment. Security concepts and methodologies (e.g. penetration testing) are extensively covered in this unit as part of the technical skills required. The theoretical material including those aspects is also articulated in the curriculum

MSc Computer Science (Computer Security and Forensics)

This unit is intended to extend students’ knowledge in relation to administering servers running under a multi-user operating system. The unit covers both server administration and security of servers used for networking services.
The purpose of this unit is to develop and extend your knowledge in relation to computer security techniques and countermeasures. The unit covers fundamental principles as well as leading edge computer security topics. Concepts, terminologies, models, principles, hardening methods will be covered from an applied perspective supported by theoretical underpinning. The aim is to provide you with the basic understanding and the background knowledge of fundamental computer security.
The unit develops your understanding of computer network systems, their functionality, management, underlying technology, and implementation. These are presented in the context of the importance of networks in the business environment. The content of this unit covers Local and Wide Area Networks, their protocols, configuration, and management. Emphasis will be placed upon network core communication techniques, protocols, operating systems, and emerging network technologies. On successful completion you will be able to critically evaluate existing network technologies, network configuration management and functionality, within the context of business client requirements.
This unit explores the area of project management with specific reference to the IT and telecommunications industry. During this unit you will explore a selection of project management tools, techniques within a sound project management framework. As well as looking at specific tools and techniques you will explore the general areas of human resources management as well as time and risk management and see how the various frameworks address these key areas. Professional and ethical considerations are a key part of the project management area, and these will be covered at the appropriate points during the unit.
The purpose of this unit is to provide an in-depth and specialized knowledge around the forensic data acquisition process and techniques. This unit provides you with fundamental and advanced topics related to forensic operations including recent developments in the field. All the methods and mechanisms for a complete forensic data analysis are also delivered in the core of this unit. You will learn the core methods and strategies followed in order to collect, safeguard, and transport physical evidence. The theoretical material including those aspects is also articulated in the curriculum.
The purpose of this unit is to provide an in-depth and specialized knowledge around the cryptography concepts and methods. This unit provides you with fundamental and advanced topics related to cryptographic algorithms’ operations including recent developments in the field. All the methods and mechanisms for cryptanalysis are also delivered in the core of this unit. The theoretical material including those aspects is also articulated in the curriculum. More precisely, Cryptography development from Caesar cipher, Vigenère’s encryption scheme to Hash family, Steganography and Quantum cryptography are core elements taught in this unit.
The purpose of this unit is to provide an in-depth and specialized knowledge around the advanced security issues and countermeasures techniques. This unit provides you with a hands-on experience on security testing, vulnerability detection/ analysis and threat and risk assessment. Security concepts and methodologies (e.g. penetration testing) are extensively covered in this unit as part of the technical skills required. The theoretical material including those aspects is also articulated in the curriculum.
The purpose of this unit is to provide an in-depth and specialized knowledge around the digital forensic process and techniques. This unit provides you with fundamental and advanced topics related to digital forensic strategies and steps including recent developments in the field. All the methods and mechanisms for a complete digital forensic analysis are also delivered in the core of this unit. You will learn the core methods and strategies followed in order to carry out a complete forensic analysis.

Fees Structure

For the complete details of the fees, please refer to the Fees Structure

Application procedure:

  • Contact the PG Office (This email address is being protected from spambots. You need JavaScript enabled to view it.) at Majan University College and receive the Course Information & the Application Pack by email.
  • Submit the application form along with supporting documents at Majan College.
  • The University will process the application and notify the decision by email, within 10 working days.
  • MOHERI processes and approves the applications. This takes 1 to 2 weeks.
  • The PG office at Majan College will notify the decision via email to the candidate.

For further information, contact the Postgraduate Center:

Toll Free: 80071000 | Phone: 24730409

Are you interested in our MSc in Computer Science Programme?

Student Lead Source
First Name*
Last Name*
Mobile*
Email*
Call Status
Rating

OUR PARTNERS



Get in Touch

  • Tel: +968 2473 0400
  • WhatsApp : +968 7235 5500
  • Email: [email protected]
  • Mutrah | Way No. 2621 | Building No. 1986
  • P.O Box: 710, P.C: 112 | Ruwi | Sultanate of Oman
  • Hotline: +968 8007 1000
Top