Cyber Risk for Business (MSc)Back
The MSc in Cyber Risk for Business provides students with the skills they need to become IS security analysts, IS risk auditors and to understand IS and data governance and project management.
The MSc in Cyber Risk for Business (MSc CRB) provides students with a portfolio of business and project management skills, as well as enhancing knowledge of IS concepts and core technical skills. At the core of this programme is a selection of topics covering cloud technologies, IT performance management, data management as well as IT project management. Additionally, students specialize in the topic of Information Systems (IS) Cyber Risk. This allows students to fulfil the industry need for professionals who can establish and manage robust systems that are secure against data loss and data breach. A research project will allow students to explore and develop an IS solution to a specific business problem in the domain of information security and risk management.
The MSc (CRB) is designed to provide students with the skillset to be successful in roles such as Data Protection Officer, IT Risk Analyst, Security Analyst and Threat Intelligence Analyst.
Students take a total of 90 credits. Part I consists of 70 credits and Part II consists of 20 credits.
- BU6005 Applied Research Methods
- BU6510 Professional Development and Research Communication
- IS6017 Enterprise Business Processes and Applications
- IS6025 Design Thinking for Business Analysis
- IS6027 Information Systems Project Planning
- IS6028 Information Systems Project Tracking and Oversight
- IS6050 Business Data Strategy and Management
- IS6060 Cloud Technologies
- IS6061 Programming for Data and Business Analytics
- IS6062 Security Architectures
- IS6063 Information Systems Risk Control Auditing
- IS6065 Information Systems Governance
- IS6066 Breach Management and Recovery
- IS6067 Ethical Hacking and Threat Response
- IS6620 Applied Research in Cyber Risk
Why Choose This Course
This course is strongly associated with the Information Systems industry, and with organisations where Information Systems play a critical part. Active input on course content and specialisms is continuously incorporated from both local and multinational industry leaders. The Cyber Risk for Business study path is aligned in part with the ISACA curriculum for Information Systems and Data Governance and Audit.
Skills and Careers Information
What can I do after I graduate with an MSc Cyber Risk for Business?
MSc Cyber Risk for Business graduates can look forward to positions in multiple industry sectors, as risk analysts, threat intelligence analysts, risk auditors, data privacy officers, business analysts and project managers. Graduates will also find positions in business analysis and general management open to them in the IT sector.
Occupations associated with this MSc Cyber Risk for Business
The Information Technology, Pharmaceutical, Financial Services, Manufacturing and Public Services sectors all require graduates from this programme. Typical roles include Project Manager, Business Analyst, Risk Analyst, Data Analyst, Threat Analyst, Data Protection Officer, Operations Research and IT Manager.
What are our graduates doing?
At least one graduate has gone on to work in the IT security sector. Another has secured a position as an account manager in a US-based firm.
Practicalities & Assessment
16 lecture hours per week, with 2 hours of lab work per week. Between 3 and 5 field trips will be organised throughout the year. Group project work continues to early July, concluding formal course content. However, students may be required to complete an individual essay in their own time up late July/early August.
Full module information is detailed in the section below.
A hybrid approach to assessment is used in this programme. Assessments methods include formal written exams, essays, group and individual project work and some lab practicals. Some modules are 100% continuous assessment and most modules have a minimum of 40% continuous assessment. During the programme, students will work individually and in groups. Some of the learning and assessment is structured around industry standard blue team / red team defence and attack techniques. A strong emphasis is placed on oral presentation of work.
Enterprise Business Processes and Applications 1
Enterprise Business Processes and Applications 1 (IS6017)
To provide students with an overview of key issues organisations have to address when implementing new business processes and enterprise applications.More Information
Design Thinking for Business Analysis
Design Thinking for Business Analysis (IS6025)
The module provides an advanced treatment of business analysis and systems design using service design and design thinking concepts and tools.More Information
Applied Research Methods
Applied Research Methods (BU6005)
To develop students' applied research skills enabling them to navigate the practical realities of undertaking a high quality applied research project in addition to designing, conducting and presenting research in a chosen topic.More Information
Professional Development and Research Communication
Professional Development and Research Communication (BU6510)
To ensure students have the necessary professional skills to enter the workplace and meet the professional expectations of employersMore Information
Information Systems Project Planning
Information Systems Project Planning (IS6027)
The objective of the module is to teach students the skills necessary to plan information systems development (ISD) projects. Students will be familiarised with the area of ISD project planning from both a theoretical and practical viewpoint. The fundamenMore Information
Information Systems Project Tracking and Oversight
Information Systems Project Tracking and Oversight (IS6028)
The objective of the module is to teach students the skills necessary to track and oversee information systems development (ISD) projects. Students will be familiarised with the area of ISD project tracking and oversight from both a theoretical and practiMore Information
Business Data Strategy
Business Data Strategy (IS6050)
The objective of this module is to enable students to critically evaluate and establish a business data strategy that will facilitate the full exploitation of organisation dataMore Information
Cloud Technologies (IS6060)
Students will identify, assess and apply Cloud technologies, and in so doing, assimilate the needed concepts and skills involved in evaluating deployment of Cloud technologies securely in an organisational context.More Information
Secure Data Acquisition and Management
Secure Data Acquisition and Management (IS6061)
Students will assimilate, compare and evaluate processes, techniques, prerequisites and standards for the secure acquisition and management of data in organisations.More Information
Security Architectures (IS6062)
Students will analyse and evaluate the core concepts of Information Systems security and the technologies, structures, processes and architectures required to secure Information Systems in an organisational context.More Information
Information Systems Risk Control Auditing Foundations
Information Systems Risk Control Auditing Foundations (IS6063)
Students will develop the skills and knowledge necessary to determine and assess audit services, in accordance with Information Systems audit standards, to assist organisations with protecting and controlling information systems.More Information
Information Systems Governance
Information Systems Governance (IS6065)
Students will formulate and assess assurance processes for ensuring that an organisation has the structure, policies, accountability mechanisms and monitoring practices in place to achieve the requirements of corporate governance of Information Systems anMore Information
Breach Management and Recovery
Breach Management and Recovery (IS6066)More Information
Ethical Hacking and Threat Analysis
Ethical Hacking and Threat Analysis (IS6067)
To enable students to detect and evaluate security threats to information systems and to use ethical hacking techniques to identify weakness in and improve the security of such systeMore Information
Information Systems Risk Project
Information Systems Risk Project (IS6620)
The objective of the module is to give the students the opportunity to undertake a group based project centred on Information Systems Risk Management or to get involved in a substantial IS Risk Management project in a commercial environment.More Information
For full programme requirements, please refer to the University College Cork Academic Calendar hereBack to top
Candidates to have a 2.2 primary degree at NFQ Level 8 Honours Degree or equivalent, with appropriate information systems or computing technology skills content. You may also be admitted to the course on the basis of extensive practical or professional experience, as deemed appropriate by the Professor of Business Information Systems and Cork University Business School. Typical students are from technical disciplines such as Management Information Systems (MIS) or Business Information Systems (BIS), engineering, computer science and mathematics. It is also suitable for business and humanities graduates who have studied Computer Science and Business Information Systems (BIS) subjects and who have some object-oriented programming knowledge.
If you are applying with Qualifications obtained outside Ireland and you wish to verify if you meet the minimum academic and English language requirements for this programme please view the grades comparison site.
Non-EU candidates are expected to have educational qualifications of a standard equivalent to Irish university primary degree level. In addition, where such candidates are non-native speakers of the English language they must satisfy the university of their competency in the English language. To verify if you meet the minimum academic requirements for this programme please visit our qualification comparison pages.
For more detailed entry requirement information please refer to the International website .
1. Choose Course
Firstly choose your course. Applicants can apply for up to three courses under one application. Details of taught courses are available on our online prospectus.
2. Apply Online
Once you have chosen your course you can apply online at the Postgraduate Applications Centre (PAC). Applicants will need to apply before the course closing date. There is a €50 application fee.
3. Gather Supporting Documents
Scanned copies of the following documents will need to be uploaded to PAC in support of your application. Applicants may need to produce the original documents if you are accepted onto a course and register at UCC.
- Original qualification documents listed on your application including transcripts of results from institutions other than UCC
- Any supplementary forms requested for your course.
Please log into PAC for more details.
4. Application processing timeline
Our online application system PAC opens for applications in early November of each year.
Questions on how to apply?
EU students contact email@example.com
International students contact firstname.lastname@example.org
Additional Requirements (All Applicants)
Please note that you will be asked to fill in a supplementary form as part of the application process for this programme. A copy of this form is available here CKL52 Supplementary Form MSc Cyber Risk for Business
The closing date for non-EU applications is 30 June
Applicants who are interested in applying for the programme can also apply online at PAC.
For full details of the non-EU application procedure please visit our how to apply pages for international students.
**All Applicants please note: modules listed in the course outline above are indicative of the current set of modules for this course, but these are subject to change from year to year. Please check the college calendar for the full academic content of any given course for the current year.
In UCC, we use the term programme and course interchangeably to describe what a person has registered to study in UCC and its constituent colleges, schools and departments.