{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-business\"\u003e\u003ci class=\"ma-business material-icons icon--medium\"\u003ebusiness\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003cdiv class=\"as-h3\"\u003eAlso for your organisation\u003c/div\u003e\u003cp\u003eVolume discount, in-house training, and social learning with your colleagues.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e21 Postgraduate / Master Internet Security Training Courses\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eSee also: \u003ca title=\"51 Network Management Training Courses\" rel=\"nofollow\" href=\"/it/network-management/postgraduate-master\"\u003eNetwork Management\u003c/a\u003e, \u003ca title=\"500 CompTIA A+ / Network+ / Security+ Training Courses\" rel=\"nofollow\" href=\"/it/a-comptia/postgraduate-master\"\u003eCompTIA A+ / Network+ / Security+\u003c/a\u003e, \u003ca title=\"53 IT Security Training Courses\" rel=\"nofollow\" href=\"/it/it-secutiry/postgraduate-master\"\u003eIT Security\u003c/a\u003e, \u003ca title=\"2 Internet project management Training Courses\" rel=\"nofollow\" href=\"/design-internet/internet-project-management/postgraduate-master\"\u003eInternet project management\u003c/a\u003e, \u003ca title=\"2 Internet Systems Training Courses\" rel=\"nofollow\" href=\"/design-internet/internet-systems/postgraduate-master\"\u003eInternet Systems\u003c/a\u003e, \u003ca title=\"33 IT Service Management Training Courses\" rel=\"nofollow\" href=\"/it/it-service-management/postgraduate-master\"\u003eIT Service Management\u003c/a\u003e, and \u003ca title=\"7 Internet Skills Training Courses\" rel=\"nofollow\" href=\"/design-internet/internet-skills/postgraduate-master\"\u003eInternet Skills\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eSee also: \u003ca title=\"51 Network Management Training Courses\" rel=\"nofollow\" href=\"/it/network-management/postgraduate-master\"\u003eNetwork Management\u003c/a\u003e, \u003ca title=\"500 CompTIA A+ / Network+ / Security+ Training Courses\" rel=\"nofollow\" href=\"/it/a-comptia/postgraduate-master\"\u003eCompTIA A+ / Network+ / Security+\u003c/a\u003e, and \u003ca title=\"53 IT Security Training Courses\" rel=\"nofollow\" href=\"/it/it-secutiry/postgraduate-master\"\u003eIT Security\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e 1 active filter\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sorting\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"mobile-filter__active-filters\"\u003e\u003cspan class=\"label--filter\"\u003ePostgraduate / Master\u003c/span\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__edit\" href=\"#\"\u003eChange filters\u003ci class=\"ma-keyboard_arrow_right material-icons \"\u003ekeyboard_arrow_right\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Compare\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eChange sorting\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSort overview\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/it/internet-security/postgraduate-master\" data-link-type=\"sort\" href=\"#\"\u003eRelevance and reviews\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/internet-security/postgraduate-master/price-high-low\" data-link-type=\"sort\" href=\"#\"\u003ePrice (high \u0026gt; low)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/internet-security/postgraduate-master/price-low-high\" data-link-type=\"sort\" href=\"#\"\u003ePrice (low \u0026gt; high)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/internet-security/postgraduate-master/duration-high-low\" data-link-type=\"sort\" href=\"#\"\u003eDuration (high \u0026gt; low)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/internet-security/postgraduate-master/duration-low-high\" data-link-type=\"sort\" href=\"#\"\u003eDuration (low \u0026gt; high)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-125809\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-125809\" id=\"training-125809\" value=\"125809\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: International Law \u0026amp; Security [LLM]\" href=\"/university-of-glasgow/international-law-security-llm\"\u003eInternational Law \u0026amp; Security [LLM]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Glasgow\" title=\"Logo University of Glasgow\" src=\"https://static-3.springest.com/uploads/institute/logo/10109/thumb_university-of-glasgow.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThe LLM in International Law \u0026amp; Security is an innovative programme. Designed to provide you with a critical understanding of the role of in…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Glasgow\" title=\"Logo University of Glasgow\" src=\"https://static-3.springest.com/uploads/institute/logo/10109/thumb_university-of-glasgow.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-125793\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-125793\" id=\"training-125793\" value=\"125793\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Information Security [MSc]\" href=\"/university-of-glasgow/information-security-msc\"\u003eInformation Security [MSc]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Glasgow\" title=\"Logo University of Glasgow\" src=\"https://static-3.springest.com/uploads/institute/logo/10109/thumb_university-of-glasgow.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThe Masters in Information Security provides you with a thorough grounding in professional software development, together with experience of…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Glasgow\" title=\"Logo University of Glasgow\" src=\"https://static-3.springest.com/uploads/institute/logo/10109/thumb_university-of-glasgow.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-132428\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-132428\" id=\"training-132428\" value=\"132428\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Internet and Security, MSc\" href=\"/nottingham-trent-university/internet-and-security-msc\"\u003eInternet and Security, MSc\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Nottingham Trent University\" title=\"Logo Nottingham Trent University\" src=\"https://static-4.springest.com/uploads/institute/logo/9991/thumb_nottingham-trent-university.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThe course is taught by active researchers in the Internet and Security fields. On completion of the course you will be well qualified for w…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Nottingham Trent University\" title=\"Logo Nottingham Trent University\" src=\"https://static-4.springest.com/uploads/institute/logo/9991/thumb_nottingham-trent-university.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-125792\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-125792\" id=\"training-125792\" value=\"125792\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Information Security [MRes]\" href=\"/university-of-glasgow/information-security-mres\"\u003eInformation Security [MRes]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Glasgow\" title=\"Logo University of Glasgow\" src=\"https://static-3.springest.com/uploads/institute/logo/10109/thumb_university-of-glasgow.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThe Masters in Information Security provides you with a thorough grounding in research methods, together with experience of developing a res…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Glasgow\" title=\"Logo University of Glasgow\" src=\"https://static-3.springest.com/uploads/institute/logo/10109/thumb_university-of-glasgow.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-125766\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-125766\" id=\"training-125766\" value=\"125766\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Global Security [MSc]\" href=\"/university-of-glasgow/global-security-msc\"\u003eGlobal Security [MSc]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Glasgow\" title=\"Logo University of Glasgow\" src=\"https://static-3.springest.com/uploads/institute/logo/10109/thumb_university-of-glasgow.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThe traditional military threats which defined global security matters for the best part of the 20th century have been quickly replaced by n…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Glasgow\" title=\"Logo University of Glasgow\" src=\"https://static-3.springest.com/uploads/institute/logo/10109/thumb_university-of-glasgow.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-133922\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-133922\" id=\"training-133922\" value=\"133922\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: International Politics \u0026amp; Security\" href=\"/university-dundee/international-politics-security\"\u003eInternational Politics \u0026amp; Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Dundee\" title=\"Logo University of Dundee\" src=\"https://static-2.springest.com/uploads/institute/logo/8383/thumb_university-dundee.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eWhy study International Politics \u0026amp; Security at Dundee? This course offers a comprehensive analysis of international and global political is…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Dundee\" title=\"Logo University of Dundee\" src=\"https://static-2.springest.com/uploads/institute/logo/8383/thumb_university-dundee.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-96413\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-96413\" id=\"training-96413\" value=\"96413\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Information Security and Audit\" href=\"/university-of-greenwich/information-security-and-audit\"\u003eInformation Security and Audit\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eN/A\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThis programme is suitable for both the newcomer to computer security and auditing and the practitioner who wishes to further their skills.…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"duration\"\u003e1 year\u003c/span\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-96410\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-96410\" id=\"training-96410\" value=\"96410\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Computer Forensics and Security Management\" href=\"/university-of-greenwich/computer-forensics-and-security-management-2\"\u003eComputer Forensics and Security Management\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eN/A\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThis programme is designed for graduates with a good first degree in an information systems or computing-related subject. It is suitable fo…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 1 people can participate in this course.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 1\u003c/span\u003e\u003cspan class=\"duration\"\u003e1 year\u003c/span\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-96416\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-96416\" id=\"training-96416\" value=\"96416\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Information Technology with Security\" href=\"/university-of-greenwich/information-technology-with-security\"\u003eInformation Technology with Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eN/A\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThis programme is designed for graduates with a good first degree who have had no formal academic training in computing. It is especially u…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"duration\"\u003e1 year\u003c/span\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-96420\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-96420\" id=\"training-96420\" value=\"96420\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Computer Forensics and Systems Security\" href=\"/university-of-greenwich/computer-forensics-and-systems-security\"\u003eComputer Forensics and Systems Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eN/A\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThis programme is suitable for both newcomers to computer security and computer forensics and practitioner who wish to further their skills…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"duration\"\u003e1 year\u003c/span\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-96415\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-96415\" id=\"training-96415\" value=\"96415\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Information Technology with E-Business MSc\" href=\"/university-of-greenwich/information-technology-with-e-business-msc\"\u003eInformation Technology with E-Business MSc\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eN/A\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThis exciting suite of programmes is designed for graduates with a good first degree who have had no formal academic training in computing.…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"duration\"\u003e1 year\u003c/span\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-96419\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-96419\" id=\"training-96419\" value=\"96419\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: Computer Forensics and Security Management\" href=\"/university-of-greenwich/computer-forensics-and-security-management\"\u003eComputer Forensics and Security Management\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eN/A\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThis programme is designed for graduates with a good first degree in an information systems or computing-related subject. It is suitable fo…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 1 people can participate in this course.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 1\u003c/span\u003e\u003cspan class=\"duration\"\u003e1 year\u003c/span\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-96403\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-96403\" id=\"training-96403\" value=\"96403\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: E-Logistics and Supply Chain Management\" href=\"/university-of-greenwich/e-logistics-and-supply-chain-management\"\u003eE-Logistics and Supply Chain Management\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eSupply chain networks and e-supply chain networks may be designed for services or manufacturing and be global or domestic in scale. They en…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 1 people can participate in this course.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 1\u003c/span\u003e\u003cspan class=\"duration\"\u003e1 year\u003c/span\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Greenwich\" title=\"Logo University of Greenwich\" src=\"https://static-4.springest.com/uploads/institute/logo/9237/thumb_university-of-greenwich.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-88843\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-88843\" id=\"training-88843\" value=\"88843\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: E-Learning for Educationalists  MA part-time\" href=\"/university-bolton/e-learning-for-educationalists-c-au-ma-part-time\"\u003eE-Learning for Educationalists  MA part-time\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Bolton\" title=\"Logo University of Bolton\" src=\"https://static-3.springest.com/uploads/institute/logo/9228/thumb_university-bolton.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eE-learning has changed the face of education, training and vocational learning forever.E-learning practitioners can be involved in all aspe…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eProvider rating: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7.8 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eUniversity of Bolton has an average rating of \u003cstrong\u003e7.8\u003c/strong\u003e (out of \u003cstrong\u003e4\u003c/strong\u003e reviews)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Bolton\" title=\"Logo University of Bolton\" src=\"https://static-3.springest.com/uploads/institute/logo/9228/thumb_university-bolton.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-88890\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-88890\" id=\"training-88890\" value=\"88890\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Classroom: E-Business  MSc part-time\" href=\"/university-bolton/e-business-c-au-msc-part-time\"\u003eE-Business  MSc part-time\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Bolton\" title=\"Logo University of Bolton\" src=\"https://static-3.springest.com/uploads/institute/logo/9228/thumb_university-bolton.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThe MSc in E-Business will support the development of your professional career in the field of electronic business and business information…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"product-level\"\u003ePostgraduate\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eProvider rating: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7.8 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eUniversity of Bolton has an average rating of \u003cstrong\u003e7.8\u003c/strong\u003e (out of \u003cstrong\u003e4\u003c/strong\u003e reviews)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo University of Bolton\" title=\"Logo University of Bolton\" src=\"https://static-3.springest.com/uploads/institute/logo/9228/thumb_university-bolton.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Compare\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003cli class=\"pagination__item\"\u003e\u003cspan class=\"pagination__current-page\"\u003e1\u003cspan class=\"pagination__max-pages\"\u003e of 2\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Page 2\" href=\"/it/internet-security/postgraduate-master/2\"\u003e2\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item--next\"\u003e\u003ca title=\"Next\" data-link-type=\"pagination\" class=\"pagination__button button--link\" rel=\"next\" href=\"/it/internet-security/postgraduate-master/2\"\u003eNext \u003ci class=\"ma-chevron_right material-icons icon--small\"\u003echevron_right\u003c/i\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section ad-box\"\u003e\u003c/section\u003e\u003cdiv class=\"message--session-filters\"\u003eYour preferences are currently applied to filter the search results.\u003c/div\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eAdd filters\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003ca class=\"filter__remove\" data-link-type=\"filter-clear\" href=\"/it/internet-security\"\u003eRemove all filters\u003c/a\u003e\u003cdiv class=\"filter filter--price is-first\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003ePrice\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"£500 to £1,000 - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/postgraduate-master/500-1000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e£500 to £1,000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eRegion\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"N/A - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/postgraduate-master/n-a\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eN/A\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eLevel\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Vocational - 142\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/vocational/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVocational\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e142\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Vocational: Level 2 - 33\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/vocational-level-2/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVocational: Level 2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e33\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-active\"\u003e\u003ca title=\"Postgraduate / Master - 21\" data-link-type=\"filter-remove\" class=\"filter__link\" href=\"/it/internet-security\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-checked\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePostgraduate / Master\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e21\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Undergraduate / Bachelor - 16\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/undergraduate-bachelor/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUndergraduate / Bachelor\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"A/AS Level - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/a-as-level/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eA/AS Level\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Vocational: Level 1 - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/vocational-level-1/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVocational: Level 1\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link is-expanded\" data-target=\"filter--meta_levels\" data-expand-title=\"More\" data-collapse-title=\"Fewer\" href=\"#\"\u003eFewer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eProduct type\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Classroom - 20\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/classroom/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eClassroom\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e20\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Distance learning - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/distance-learning/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDistance learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eDuration\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 day - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/1-day/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 day\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"1 year and longer - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/365-days-and-longer/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 year and longer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eMaximal number of participants\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"1 participant - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/1-participant/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 participant\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eProvider\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"University of Glasgow - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/university-of-glasgow/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUniversity of Glasgow\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"University of Greenwich - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/university-of-greenwich/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUniversity of Greenwich\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"University of Bolton - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/university-bolton/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUniversity of Bolton\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Nottingham Trent University - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/nottingham-trent-university/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNottingham Trent University\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"University of Dundee - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/university-dundee/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUniversity of Dundee\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Shared Services \u0026amp; Outsourcing Network - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/internet-security/shared-services-outsourcing-network/postgraduate-master\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eShared Services \u0026amp; Outsourcing Network\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"More\" data-collapse-title=\"Fewer\" href=\"#\"\u003eMore\u003c/a\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section usp-box\"\u003e\u003cdiv class=\"as-h3\"\u003eLearn more? It starts at Springest.co.uk\u003c/div\u003e\u003cul class=\"usp-list--colored usp-list--default\"\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"school\"\u003e\u003cdiv class=\"usp-list__title as-h4\"\u003eAll ways of learning\u003c/div\u003e\u003cspan class=\"is-meta-text\"\u003eMore than 38,000 training programmes and courses.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"phone\"\u003e\u003cdiv class=\"usp-list__title as-h4\"\u003eHelp with searching and enrolling\u003c/div\u003e\u003cspan class=\"is-meta-text\"\u003eAsk your question, use our \u003ca href='https://helpdesk.springest.com'\u003ecustomer service\u003c/a\u003e or call one of our learning advisors.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"thumb_up\"\u003e\u003cdiv class=\"usp-list__title as-h4\"\u003eFree information requests\u003c/div\u003e\u003cspan class=\"is-meta-text\"\u003eCompare and discuss with your colleagues, you're getting instant access to the PDF brochure.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"star\"\u003e\u003cdiv class=\"usp-list__title as-h4\"\u003eReviews and participants\u003c/div\u003e\u003cspan class=\"is-meta-text\"\u003eMore than 7,000 independent reviews help you choose the best provider.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"business\"\u003e\u003cdiv class=\"usp-list__title as-h4\"\u003eAlso for your organisation\u003c/div\u003e\u003cspan class=\"is-meta-text\"\u003eVolume discount, in-company training, social learning with your colleagues and always real time insights.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"event_available\"\u003e\u003cdiv class=\"usp-list__title as-h4\"\u003eBook a course\u003c/div\u003e\u003cspan class=\"is-meta-text\"\u003eReady to learn? Directly book a course, cancellation is always free of charge!\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/section\u003e\u003csection class=\"aside__section q-and-a-box\"\u003e\u003cdiv class=\"panel with-border with-background--white\"\u003e\u003cdiv class=\"panel__content\"\u003e\u003cdiv class=\"with-border--bottom\"\u003e\u003cdiv class=\"as-h3 panel__content-title\"\u003e\u003cspan\u003e4\u003c/span\u003e question about IT\u003c/div\u003e\u003c/div\u003e\u003cul class=\"faq-list\"\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"What\u0026#39;s the difference between bookkeeping and accounting?\" href=\"/qa/what-s-the-difference-between-bookkeeping-and-accounting\"\u003eWhat\u0026#39;s the difference between bookkeeping and accounting?\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonymous (1 comment)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"What\u0026#39;s the best bookkeeping software?\" href=\"/qa/what-s-the-best-bookkeeping-software\"\u003eWhat\u0026#39;s the best bookkeeping software?\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonymous (1 comment)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Are there any courses for programmers to teach problem analysis and solving skills?\" href=\"/qa/are-there-any-courses-for-programmers-to-teach-problem-analysis-and-solving-skills\"\u003eAre there any courses for programmers to teach problem analysis and solving skills?\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonymous\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"/questions/it\"\u003eView all IT questions\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003cdiv class=\"as-h3 panel__heading-title--aside\"\u003eLearning Trends\u003c/div\u003e\u003cabbr class=\"item fn\" title=\"Internet Security\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e500\u003c/strong\u003e Courses\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e69\u003c/strong\u003e Training Providers\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003cstrong class=\"count\"\u003e22\u003c/strong\u003e Reviews\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e9.5\u003c/strong\u003e Rating \u003cspan class=\"meta-info\"\u003e(avg.)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e£2.50 - £12,388.33\u003c/strong\u003e Price range\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2026-05-01T11:19:19.297Z","subject_id":5947,"subject_name":"Internet Security","category_name":"IT","filter_size":1,"filter_types":["meta_levels"],"filters":["postgraduate-master"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation"}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2026-05-01T11:19:19.297Z","subject_id":5947,"subject_name":"Internet Security","category_name":"IT","filter_size":1,"filter_types":["meta_levels"],"filters":["postgraduate-master"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation"}}],"filters":"/postgraduate-master"}