Division of Cyber Security

The world-renowned teaching centre for ethical hacking and cybersecurity.

About us

Our degrees are designed to support the development of technical skills and an offensive approach to cybersecurity. We are Abertay's centre for teaching, research and knowledge exchange in applied computer science and cybersecurity.

We provide exciting opportunities to collaborate closely with industry, lecturers and fellow students. You will devise and learn innovative methods to defend systems from cyber attacks. 

Our staff have substantial expertise in areas including cybersecurity, ethical hacking, penetration testing, digital forensics, human-computer interaction, usable security, IoT, secure software development, artificial intelligence, and parallel programming.

Abertay was the first university to offer degrees in Ethical Hacking and Computer Games Technology, and our degrees maintain an excellent reputation for quality and employability.

Most of our teaching is laboratory-based, and our students have access to well-equipped specialist teaching laboratories for ethical hacking, networking, the Internet of Things and general software development.

We also have close ties to industry in our areas of expertise; our staff and students provide cybersecurity and usability consultancy to businesses around the world.

Head of Division

Dr Natalie Coull

Study with us

Postgraduate Taught Degrees

The Division’s MSc in Ethical Hacking and Cyber Security course equips students with the skills and expertise needed to enter the cyber security industry. Topics include

  • Ethical Hacking
  • Digital Forensics
  • Penetration Testing
  • Information & Network Security Management.

Postgraduate Research Areas


The Division of Cybersecurity offers a specialist computing environment for teaching and research in Cybersecurity.

The Netlab and The Hack Lab are designed to enable  combined lecturing and laboratory practical work. They have an isolated, reconfigurable network and dedicated internet connection.

The Hack Lab is isolated from the main university network, allowing our students to experiment with all aspects of ethical hacking in a safe, controlled environment.

We also use Computing Room 2021. This room has a specialist high power WIFI router to enable the connection Of Internet of Things-enabled devices.  This router has specific facilities not available elsewhere in the University.  The room also has controlled access to allow students to carry out project work, and leave the equipment set up and running if required.

Ethical Hacking Laboratory - room full of Desktop computers

Our Research

Cybersecurity is one of three Divisions in the School of Design and Informatics.

We have developed strong links with government, Police and industry to collaborate on a range of research projects including improving the security of SMEs, training in cybercrime response using games technologies, and cybersecurity into the Software Development Lifecycle.

Research in the Division is a major part of the Security theme, and is structured into four overlapping areas:

  • Responding to prevailing challenges of system security
  • Vulnerability detection and the threats introduced by Internet-connected devices
  • The usability of security prevention measures
  • Using visualisation techniques to improve security.

Secure System Coding

The areas of computer security and software development are often regarded separately, each with minimal consideration for the other. However, a large number of security flaws are caused by a limited understanding of how poor coding practices can be exploited by a malicious hacker. In partnership with industry, we are exploiting design patterns to increase secure coding awareness in software developers.

We have analysed and catalogued security threats and vulnerabilities in order to better understand their root cause and identify appropriate techniques to improve communication of security problems. The academics are Dr Natalie Coull, Dr Ian Ferguson, Dr Gavin Hales and Dr Adam Sampson.

This combination of root cause and the security problem are encapsulated in vulnerability anti-patterns as a means to transfer knowledge from the cybersecurity community to the software development community to ensure that secure software is developed from the outset. Our findings show that these anti-patterns can improve software developers’ ability to recognise vulnerabilities in systems and how they can be exploited. Further research will measure the longer-term impact of this improved awareness on the overall security of the developers’ software.

Threat Detection and Securing the Internet of Things

Any computer network is potentially vulnerable to cyber attacks. Every network has an attack surface, i.e., the set of devices on the network and the ways in which the surface may be attacked, and threats can occur at any point on that landscape. In addition to this general threat, many common household devices are now being connected to the Internet, and newly developed devices are also being introduced into people's homes. The number of devices connected to the Internet is expected to reach 75 billion by 2025. In a number of cases, these devices have security flaws that can compromise the privacy of the owners, or can be subverted to be used as a means to attack other systems.

We are developing novel solutions to effect pervasive security and privacy for networks in general and IoT devices in particular. For example, we have used artificial neural networks, a machine-learning technique, to build an intrusion detection system able to detect a range of Distributed Denial of Service attacks. We are also exploiting off-the-shelf massively parallel architectures such as GPUs by exploring distributed computation approaches and refactoring the underlying data to significantly reduce its size and so improve on existing algorithm performance.

Human-Centred Security

Cybersecurity is in part a technical challenge anda human challenge: it depends on the interplay between users and security technology in societal and industrial contexts.

A key aspect of cybersecurity is encouraging users to behave safely online.

Many online activities attract risks; some of these are known to the user and some are not. We have drawn on techniques from nudge theory and affective computing to encourage safe behaviour online. We have successfully nudged users through visual cues in a web browser into choosing longer and stronger passwords during a system enrolment task. We have developed a system that automatically detects risky online behaviour and provides feedback on risky behaviour in real time.

Extending human-centred security beyond cybersecurity, and in partnership with industry we have investigated the perceived influence of social presence at self-service checkouts by staff and its perceived effect on dishonest customer behavior. Our findings show that the perceived motivational and situational factors contributing to theft are complex, and surveillance in its current form does not appear to provide a sufficient social presence to prevent potential theft at self-service checkouts.

Visual Security

Digital devices play an important role in our everyday lives and the nature of the data stored on these devices will paint a vivid picture of the life of its owner. Patterns of behaviour and social connections are deeply embedded in much of this data. For institutions such as law enforcement, this digital forensic data can serve as invaluable evidence, yet the sheer volume and complexity of these data makes analysis challenging. 

We are combining our expertise in digital forensics with the knowledge in the Division of Computing and Mathematics in augmented and virtual realities to discover new ways of exploring these highly complex digital forensic datasets. The academics are Dr Ethan Bayne, Dr Gavin Hales, Dr Ian Ferguson and Mr Paul Robertson. If we can successfully harness augmented and virtual realities, we will drive marked increases in investigative efficiency.

Games Programming

In our games programming research, we also make use of the rendering and compute functionalities offered by the GPU to increase spatial and temporal scale of simulations. Interpretation of simulation output can be challenging and we advocate the 'built-in' visual simulation afforded by GPGPU implementations that employ optimisations that are standard in the production of real-time interactive scenes.

Our expertise in programming also extends to design patterns and in partnership with the Division of Cybersecurity we have been developing design patterns to improve computer system security.

Job Opportunities


For Job Openings, including Research Fellowships in our School, view the job search section on our website.

For PhD Studentships in any of our Subject areas, check out the Funded research projects and Postgraduate Research Funding sections.


Female Ethical Hacking student Cheryl Torano
ABERTAY NEWS11/09/2020

Abertay alum overcomes 'nightmare' childhood to achieve cybersecurity dream

Cheryl Torano has shared her incredible story in an inspiring new book

Find out more

Female lecturer with five ethical hacking students at Abertay University
ABERTAY NEWS19/08/2020

National Cyber Security Centre certification for Ethical Hacking degree

Dr Natalie Coull says need for skilled cyber graduates has 'never been greater'

Find out more

Ethical Hacking Laboratory - room full of Desktop computers
ABERTAY NEWS05/03/2020

Launch of Ethical Hacking degree voted Abertay's top change-maker

Around 600 people took part in the public poll

Find out more

Armed Forces veterans at Abertay University
ABERTAY NEWS18/02/2020

Military veterans reskilled to fill growing cybersecurity workforce gap

The project will allow former forces personnel to learn ethical hacking skills

Find out more

ABERTAY NEWS19/12/2019

International cybersecurity expert warns of festive smart speaker privacy risk

Professor Karen Renaud shares her top security tips

Find out more

ABERTAY NEWS16/12/2019

Abertay unveils £5.5m videogames and cybersecurity space

New School of Design and Informatics hailed 'an investment in Scotland's future'

Find out more

A photo of Karen Renaud in Abertay's library
ABERTAY NEWS15/11/2019

BLOG: 'Nudging' people towards stronger passwords

Cybersecurity expert Professor Karen Renaud looks at password behaviour

Find out more

A picture of a self-scan checkout, with a digitised face
ABERTAY NEWS11/11/2019

SPOTLIGHT ON: Digitised faces reduce shoplifting risk at self-service checkouts

A study found that human-like face resulted in fewer instances of dishonesty

Find out more

ABERTAY NEWS21/10/2019

SPOTLIGHT ON: Tayyaba Nafees

Tayyaba has gone on to run an extremely successful business

Find out more

A picture of a self-scan checkout, with a digitised face
ABERTAY NEWS11/10/2019

Digitised faces may reduce shoplifting risk at self-service checkouts

A study found that human-like face resulted in fewer instances of dishonesty

Find out more

Lecturer and students working in the Hacklab on Desktop computers
ABERTAY NEWS01/10/2019

SPOTLIGHT ON: The cyberQuarter project

A major upcoming research and development centre

Find out more

Sam, Matilda and their family, smiling
ABERTAY NEWS02/07/2019

Student Sam shares emotional cancer awareness video

His mother has been battling ovarian cancer

Find out more