The University of Liverpool Online MSc in Big Data Analytics consists of seven core modules and one elective module.
Core modules cover a wide range of topics, including data mining, predictive analytics, data visualisation and warehousing, and professional issues in computing.
In addition, your professional portfolio of evidence will allow you to gather solutions-based artefacts to demonstrate your strategic mindset and showcase your growth and decision-making skills to employers.
The first module takes 10 weeks. Each subsequent module lasts eight weeks.
To lay the foundation for successful study, and provide students with a comprehensive understanding of the key concepts associated with the computing environment.
Start your personal and professional journey with this on-boarding module for the MSc in Cyber Security programme, where you will be introduced to the online learning environment. The module provides a critical "state-of the-art" review of the domain of information technology (IT). It is designed to offer a wide-ranging understanding on topics such as software engineering, cyber security and big data analytics. By completing the module, you will have a comprehensive global view of the current IT landscape in the context of both commercial and non-commercial enterprises. The module blends both theory and practice, so that a solid foundation is provided for future study.
To provide students with a comprehensive understanding of big data tools and techniques, related issues, and the different kinds of big data ecosystems that can be used to support advanced data analytics.
This module will consider big data management frameworks in general, but with a focus on the Hadoop open-source data storage and processing platform and its underpinning sub-systems. It also provides you with a critical awareness of how big data systems support data-driven decision making.
To provide students with a detailed understanding of the concepts of data mining, including the processes involved and the tools and techniques commonly used.
During this module, you will be provided the opportunity to apply the tools and techniques of data mining to a variety of example data sets. This is intended to give you a critical insight into their operation, and an understanding of when and where such tools and techniques can best be applied. You will also be given the chance, using the ‘R’ programming language, to implement several different kinds of data mining algorithms to gain a comprehensive understanding of their operation.
To introduce students to the concepts and challenges of creating data warehouses, and how data visualisation tools can be used to ‘tell a story’.
By taking this module, you will gain practical experience of how to create data warehouses using data from multiple sources. It will also introduce you to best practices in data visualisation and data storytelling, using state-of-the-art data visualisation technology. The module is intended to help you understand the approaches and benefits of data warehousing, and how to quickly gain and communicate insights into the data stored in data warehouses using data visualisation techniques.
To offer students the opportunity to consider, understand and evaluate common non-technical issues faced by IT leaders.
To function effectively, professional IT practitioners need not only the appropriate technical knowledge, skills and experience, but also a broad understanding of the context in which they operate. IT professionals must understand the relationship between technological change, society and the law, and the powerful role that computers and computer professionals play in a technological society. This module is designed to help you operate effectively in work and community situations and to be aware of your environment.
To provide students with an insight into how predictive analytics can be used to help organizations and their customers make better decisions.
Completing this module is designed to give you a comprehensive understanding of how results from predictive analytics can be used by organisations to grow their customer base and run operations more efficiently. This module is oriented towards practical applications of predictive analytics.
To provide students with a comprehensive overview of advances in cloud computing and the possibilities it has unleashed.
Cloud computing is an important new paradigm in information technology that provides a basis for a new wave of technology developments. Cloud computing embodies advances in computing, networking, and storage technologies which individually and collectively include major hardware and software breakthroughs. These include computer virtualisation, distributed and replicated storage, and software-based networking. Cloud computing motivates further technology advancement and changes how modern IT infrastructures are built and evolved. There is a growing demand for specialists with strong technical background and deep knowledge of cloud computing technologies.
This programme allows you to choose 1 elective.
To provide students with an insight into cryptographic algorithms and protocols.
By completing this module, you will acquire a critical understanding of how to use cryptographic algorithms and protocols to solve practical security problems (such as confidentiality, integrity and authenticity). The module also allows you to acquire a systematic understanding of open-source tools to build secure applications, and how best to apply such tools.
Kurose, James and Ross, Keith (2010), Computer Networking: A Top-Down Approach: 5/e, International Edition, Pearson, ISBN-10: 0131365487 ISBN-13: 978-01313654483
To provide students with a deep understanding of the mechanisms and techniques that can be used to prevent, or at least mitigate, cybercrime.
This module considers the motivations for cybercrime, as well as providing a comprehensive understanding of the tools that can be used to prevent it – including the deployment of cybercrime prevention strategies. You will have the opportunity to build an ‘ethical hacking’ environment with which you can experiment. In addition, the module aims to provide you with a hands-on knowledge of cybercrime prevention for application in the workplace.
To give students knowledge of the practice of extracting evidence from computers and digital storage media.
This module provides you with the knowledge that allows you to identify, extract, document, interpret and preserve computer media as digital evidence, as well the understanding of how to analyse the root cause of security breaches. It covers issues including crypto-literacy, data hiding and hostile code.
With database technology developing rapidly, this module analyses the ways in which data is stored, manipulated, queried (with an emphasis on relational databases) and backed up. While studying this module, you will also become acquainted with various paradigms and technologies (parallel as well as distributed) related to database design, implementation and maintenance.
Rob, Peter and Coronel, Carlos, (2008), Database Systems: Design, Implementation, and Management Eighth Edition, Boston, MA: Course Technology. ISBN-10: 1423902017; ISBN-13: 978-1423902010
To promote a broader understanding of leadership and a greater awareness of how leadership choices can impact organisations.
In this module, you will develop a comprehensive understanding of contemporary IT leadership models, as well as knowledge of the role of leadership in shaping IT organisations. You will acquire theoretical and practical knowledge of:
This module shows how technology project management can be applied in the evolution of a computer system from concept to implementation. Students will have the opportunity to master all areas of the subject, including organisation, work breakdown structure and scheduling, resources and project financing, project control and evaluation, management considerations, critical success factors and risk management.
Information Technology Project Management (with Microsoft Project 2007 CD-ROM), Schwalbe, Kathy, 6th ed., Course Technology, 2010, ISBN: 978-0324-78692-7
This module is designed to provide students with a sound foundation (for the non-specialist) in accounting, finance and operations management. Student will gain a critical understanding of mathematical modelling, and learn how to use computer-aided quantitative tools for decision making. Students will also explore topics such as operations strategy, forecasting and materials, supply chain and project management.
Atrill, P., McLaney, E., 2011, Accounting and Finance for Non-Specialists, 7th ed., Prentice Hall, Harlow, England, ISBN: 0-273-74596-4 (Paperback).
In this module students will learn to apply marketing strategies in the context of various high-tech industries and products, where innovation, market uncertainty, abrupt technological shifts and short product lifecycles abound. Students will also study the use of technology in marketing and the marketing of technology-rich products and services, with a focus on international marketing, ethics, sourcing and marketing strategy. As students proceed they will develop a marketing plan.
No fixed texts
This module develops the essential problem solving, and consequent programming skills, required to generate well- structured object-oriented programs in Java. The module also explores important techniques (such as distributed systems and component technology) that have made object-oriented programming today’s predominant software development paradigm.
No fixed texts
This module provides students with a critical understanding of markup languages and related advanced technologies.
On completion of the module students will be able to design and create advanced website applications and will have the knowledge to undertake complex internet projects.
Deitel, H.M., Deitel, P.J., Goldberg, A.B, Internet & World Wide Web How to Program, Prentice Hall, 4th edition, 2008, ISBN 0-13-175242-1
To enable students to assess the roles of individuals and teams within organisations so that they can become proficient leaders and managers.
This module is broadly designed to provide the necessary know-how to allow you to manage people operating in a technology-rich environment. As well as the traditional aspects of organisational behaviour, such as individual/team roles, human resource management and change management, you will examine the use of information technology to support managerial functions, including outsourcing, offshoring and other critical issues fundamental to the way contemporary organisations are run.
To provide students with an in-depth understanding of information security concepts and models.
This module provides an insight into information security principles, security policy models/protocols, industry standards for security compliance, and risk assessment. You will acquire a critical understanding of how to use information security techniques to solve practical security problems. You will also have the opportunity to gain skills for designing/implementing security infrastructure and writing security/incident response polices. Practical, extensive, hands-on project work is designed to ensure you are ready to apply in the workplace the knowledge gained in the module.
To provide students with theoretical and practical knowledge of, and insight into the formal, systemic approaches to, cyber security risk management (CSRM).
Threats to information security are becoming more sophisticated. Laws and regulations impose strict CSRM requirements on all enterprises to prevent, or at least limit, the potential of cyber-attacks. This module aims to provide the theoretical and practical knowledge to deliver a formal, systematic and in-depth approach to the application of the concepts, techniques, methods, approaches and processes of CSRM in a pragmatic manner and in the context of enterprises of all kinds.
The last decade has seen an exponential growth of the concept of social computing as exemplified by platforms such as Facebook, Twitter and LinkedIn. Social computing is a phenomenon that has great potential with respect to both commercial and non-commercial enterprises, especially with respect to marketing and public relations. The aims of this module are to provide students with both an in-depth understanding of the social computing phenomenon and of how the analysis of such social media can be beneficially undertaken. More specifically the module is directed at providing students with the know-how and capabilities to analyse social media while at the same time understanding the social computing context and the legal framework in which it resides.
Shelly, G. and Frydenberg, M. (2011) Web 2.0, Concepts and Application Cengage (ISBN-10: 1439048029; ISBN-13: 9781439048023) (available in Paperback, eBook, Rental or eChapter Editions)
This module encompasses the theoretical foundation and practice of the three key phases of problem definition, software development and maintenance. It covers identification, definition, design, analysis, verification and management of basic requirements, coding, testing, evaluation and quality assurance. You will emerge from this module equipped to lead a programming project and deliver products on time and within budget.
This course provides the theoretical foundation concerning software approaches and provides exposure to the development, implementation and maintenance of the product. The primary goal is to introduce students to the discipline of Software Engineering.
Sommerville,I, Software Engineering (9th Edition), Addison Wesley, ISBN: 0-321-21026-3
This module provides the techniques students need to design and implement software testing procedures, conduct software inspections and employ established release and maintenance QA procedures. The module also addresses key management aspects of the quality assurance process.
Galin, D, 2004, Software Quality Assurance: From Theory to Implementation, Addison-Wesley, ISBN-13: 979-0201709452
To provide comprehensive knowledge of the strategic importance of IT within organisations.
The module is designed to allow you to acquire a detailed understanding of how technology becomes an enabler for business. You will study how IT strategies support organisational goals, and how they help to create a sustained competitive advantage in business. You will also develop your ability to evaluate IT strategies, and how best to deploy such strategies, in the context of systems or business applications within the IT industry.
This module presents the modern object-oriented approach to modelling and designing software systems, packages and products. The module provides students with the knowledge technical skills required to produce effectively designs for software applications following the object- oriented approach, as well as the ability to critically analyse such designs.
Bennett, S., McRobb, S. and Farmer, R. (2006). Object-Oriented Systems Analysis and Design using UML, 3rd edition, Maidenhead, Berkshire: McGraw-Hill Education.
To enable students to build a theoretical and practical academic foundation relating to the techniques and challenges of technology innovation and change management.
This module aims to give you a comprehensive understanding of change models and the impact of change related to technology innovation, adoption and implementation. You will gain both the theoretical and practical knowledge required to be able to manage the design and use of technology to foster growth, innovation and change within organisations. The module will also give you a comprehensive understanding of how innovation can act as a change enabler and the importance of building readiness for change within organisations.
Students refine their dissertation topic in conjunction with their Personal Dissertation Advisor, an academic supervisor who will provide support throughout the writing process.
The dissertation project module commences with a research methods training component during which students will be given instruction and guidance on the planning and organisation of their work. During the course of the research methods training students will also be expected to start formulating their project. The project itself, following on from the research methods training, will be individually supervised via online communication within the learning platform also used for all other online modules. There is an interim assessment point during the course of the project where students submit their project specification and design. At the end of the project students are expected to submit a dissertation describing their project.
Dawson, C.W. (2009) Projects in Computing and Information Systems: A Student's Guide, 2nd ed., Addison-Wesley, Harlow. ISBN: 978-0-273-72131-4
Please note that current scheduling may be subject to change and that we cannot guarantee that all modules will be offered in every calendar year.