This program is taught postgraduate course is aimed at students who may not have studied computing exclusively but who have studied a considerable amount of computing already. If students want to become a specialist in a particular area of computing, this course will provide the first crucial step towards that goal. This course specialises in the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorised access.