Liverpool John Moores University

Work-related learning

Translating your academic studies into essential professional experience

Practical, hands-on experience to boost your employability is incorporated into this programme wherever possible. However the best way to really get a taste of working in the cyber security industry or the IT industry in general is to take a year out after your second year and spend 12 months on supervised work placement. This invaluable experience gives you a chance to put into practice the many concepts and techniques you have learnt on the course, as well as developing new skills. We highly recommend that you take up this opportunity, as it will greatly enhance your prospects when you come to negotiate your way around the competitive graduate job market.

Our teaching is supported by high quality research and collaboration with 450 local and national companies such as Corus, Unilever, Sony Computer Entertainment Europe, IBM, Eutechnyx, Jagex, Spiral House, Heinz, Liverpool Direct, Pilkington, MBNA Bank, HM Treasury, Lloyds TSB, Merseyside Police, Thames Water Authority, AstraZeneca, Littlewoods, Vauxhall Motors, GlaxoSmithKline to name but a few. This means that our computing courses are designed and developed to meet the needs of employers today, as well as creating excellent work placements for students.

Share This ArticleTweet about this on TwitterShare on FacebookShare on Google+Share on LinkedInEmail this to someone

Address:

70 Mount Pleasant

Liverpool

L3 5UA

 

Phone:

0151 231 2121

 

Website:

https://www.ljmuisc.com

image

Most Profiles Likely Scraped by Third Parties

Friday, 6 April, 2018 In Featured News, General News

Facebook announces plans to restrict data access after 87 million users’ data was improperly shared with Cambridge Analytica. Data belonging…

How to Build a Cybersecurity Incident Response Plan

Friday, 6 April, 2018 In General News, Other News

Being hit by a cyberattack is going to be painful. But it can be less painful if you’re prepared, and…

Combating seven common threat techniques in 2018

Friday, 6 April, 2018 In Editorial, General News

By Keiron Shepherd, Senior Security Specialist, F5 Networks¬† With automated tools and hackers for hire, cybercrime has turned into a…

780 Days in the Life of a Computer Worm

Wednesday, 28 March, 2018 In Featured News, General News

This is a story of a worm, from the time it was coded and deployed onto the Internet. It is…

Getting Ahead of Internet of Things Security in the …

Wednesday, 28 March, 2018 In Editorial, Featured News, General News

In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all…

image
Latest Videos
Polls
Sorry no Polls available - check back soon