hacker coding at night cybersecurity concept hacker coding at night cybersecurity concept

Available with:

  • Foundation Year

Accreditations


Course Summary

Gain the much-sought-after skills you need to understand and react to security threats on information systems in a connected world. 

The security of computers, systems and information is of paramount importance to all nations. In response to security dangers, this course will give you knowledge of the threats, and provide you with the chance to gain the skills and expertise to investigate, police, and react accordingly, and to protect systems and organisations. 

Our teaching material keeps up with the latest developments in the industry and our teaching techniques include real-world examples and practices. 

Why you'll Love it


What You'llStudy

Module content:

  • Reading and writing critically.
  • Constructing and evaluating an argument.
  • Note-taking techniques for reading and listening.
  • Understanding plagiarism and academic integrity.
  • Introduction to reflective practice.
  • Preparing for, and delivering, powerpoint presentations.
  • Referencing and citation.
  • Summarising and paraphrasing written sources.
  • Literature searching.
  • Report writing.
  • The culture and expectations of higher education.
  • The assessment process including the role of assessment criteria and feedback.
  • The nature of research journal publishing.

Whilst much of the content above is generic, students will be encouraged to situate skills within the context of the undergraduate discipline they are entering, which leads to some variation in emphasis for certain skills.


Module aims:

1.To raise awareness of the range of study skills required for successful higher education studies, including the process of academic writing, reading strategies, seminar skills, organisation of time and materials, planning for and meeting deadlines, understanding and responding to feedback.

2. To introduce students to concepts such as plagiarism, academic integrity and appropriate use of artificial intelligence tools.

3. To facilitate an effective transition into higher education by exploring, and providing guidance in, the key elements of successful undergraduate studentship including students' understanding of taking responsibility for their own learning.

4. To teach students how to undertake a literature, visual or data review for their discipline and be able to differentiate between a valid, reliable source and an unsubstantiated or irrelevant source.  

Module content:

  • Research and planning skills.
  • Becoming familiar with topics that comprise their undergraduate degree subject.
  • Developing a knowledge base for a discipline of study.
  • Identifying areas of interest.
  • Application and development of critical analytical skills.
  • Development of self-directed study.
  • Use of learning resources.

Module aims:

1. To develop students' skills in planning and writing an essay.

2. To familiarise students with the process of tutor supervision for a written piece of work.

3. To give students an opportunity to focus on a topic within their undergraduate degree subject.

4. To write a piece of work that allows the student to broaden and deepen knowledge on a topic of their choice.

5. To prepare and deliver an academic poster presentation outlining the student's research topic.

Module content:

  • Binary and Hexadecimal number systems, including conversions and mathematical functions.
  • Introduction to set and graph theory.
  • The Fetch-Decode-Execute cycle
  • CPU architecture
  • Hardware components in a computer system.
  • Key algorithms for searching and sorting
  • Introduction to formal languages used to describe algorithms
  • Assessing algorithm efficiency with Big O notation
  • Website creation with HTML and CSS with an introduction to website hosting.
  • Network protocols and data transmission techniques.
  • Boolean Algebra and the use of logic gates within the computer system.

Module aims:

To introduce the purpose of the processor and breakdown the steps taken to execute a single instruction in a computer program

To develop familiarity with key algorithms that search through or sort data, and to become aware of how an algorithms efficiency can be measured.

To be aware of the different number systems utilised by computers and be able to convert numbers between the respective number systems

To develop an awareness of how websites are created using HTML and learn how website data is transferred between a server and the end-users computer.

Module content:

  • Cybersecurity terminology
  • Cybersecurity tools and technical security solutions
  • Programming from a cybersecurity perspective
  • Introduction to Information and System Security
  • Core threats to Information and System Security (technical, social engineering, organisational structures) 
  • Introduction to Information Security Management Systems (ISMS) e.g. the CIA triad, risk management, security policies and standards
  • Introduction to penetration testing
  • Social engineering

Module aims:

1. To provide students with an understanding of the core concepts within cybersecurity.

2. To identify core threats and their impact.

3. To familiarise students with the basics of Information Security Management Systems (ISMS).

4. To present how hackers operate and cybersecurity tools. 

 

 

Module content:

Algebra

Geometry

Trigonometry

Calculus

Matrices

Vectors

Probability

Statistics


Module aims:

  1. To provide a good grounding in mathematical application, method and technique.
  2. To prepare students with the mathematical skill required for undergraduate degrees in Computing.

Module content:

  • Understanding the full software development lifecycle from requirements definition to implementation 
  • Focusing on developing Python programming techniques.
  • The use of Artificial Intelligence as an aid to faster and higher quality programming.
  • Developing an understanding of different data and collection types.
  • Utilising control flow, loops and functions.
  • Working with the NumPy and Pandas libraries for Data Science
  • Exploring data visualisation with Seaborn and Matplotlib
  • Data pre-processing for machine learning
  • Building regression models to explore and utilise trends within data
  • Using a range of common techniques to measure performance of machine learning models
  • Exploring real life uses and practical examples of machine learning

Module aims:

To understand the full software development lifecycle from business requirements definition, to functional specification, programming, quality assurance (testing) and implementation

To develop an understanding of programming in Python and to be able to code to a high degree of fluency independently and with assistance from AI tools where appropriate

To be able to use popular data science libraries in Python in order to be able to process and analyse real world data.

To understand the difference between regression and classification algorithms and be able to utilise their outcomes to make accurate predictions with data sets.

To develop technical skills in the Seaborn graphing library in order to show charts and graphs to visualise data and to show accuracies of models.

You will examine: computer networking and system security; legal/ethical issues that concern data privacy; professional investigation; and programming in Python/C++.

Module content:

  • Defining user experience design and the various subsets; including usability.
  • An introduction to human factors and human-centred design standards.
  • History of HCI and issues surrounding technology and innovation.
  • Practical design and prototyping of user interface solutions to solve 'real world' problems.
  • Experimenting with iterative team-based design and development exercises covering insights gathering, design processes, industry-approved frameworks, and user testing and evaluation.
  • Introduction to careers in UX.

Module aims:

  • To encourage critical reflection on the needs of humans as users/consumers, and the demands and relevant constraints imposed.
  • To ensure awareness of the rate of technological change, the effects on users/consumers, and the issues relevant to user experience designers.
  • To promote inquiry into current leading digital technologies and possible future developments in ubiquitous computing.
  • To give practice in the design and prototyping of user experiences and user interfaces, especially for web-based, console, desktop systems, and mobile devices.
  • Gain "real-world" experience of taking part as a team member in a software development project.

Module content:

  • Internet and web terminology, protocols and infrastructure
  • Web document structure and content (e.g. HTML)
  • Web aesthetics (e.g. CSS)
  • Web scripting (e.g. JavaScript)
  • Web requests (e.g. use of HTTP verbs)
  • Using Internet and Web tools (e.g. IDEs, FTP clients)

Module aims:

  • To provide the student with a firm foundation for continuing study in the area of the web and Internet.
  • To make students aware of the range of tools available for developing Website content.
  • To put the Website/Web application development process in context within the infrastructure of the Internet.
  • To enable students to develop static web sites in line with web standards

Module content:

  • Multi-tier architectures.
  • Software design best practices and design patterns.
  • Security risks, threats and vulnerabilities (for example buffer overflows, integer overflows and race conditions) to systems as well as security standards.
  • Computer ethics and the law in relation to information systems.
  • Common pitfalls and mitigations in software engineering. 

Module aims:

  • To be able to develop software, we first need to understand some of the theories and approaches that will need to be applied in subsequent modules. This module will enable you to understand software architecture, security, and the law that governs information systems.

Module content:

  • Referencing
  • Plagiarism
  • Literature searching
  • Professional Bodies
  • Employability
  • Ethics
  • Law (data protection, computer misuse act)
  • Copyright and intellectual property
  • Personal reflection
  • CPD
  • Feedback
  • Questionnaire design: Likert scale, numerical data, coding,
  • Correlation
  • Parametric and non-parametric tests

Module aims:

To introduce the key skills required of the computing professional, comprising oral and written communication, along with an awareness of professional aspects of computing practice.

The two components of the module address respectively:

  • Introducing students to the concept of professional ethics and behaviour, the place of computers in society and the legal aspects of computing;
  • Developing skills in summarising, quoting, paraphrasing, critical analysis, grammar, referencing, poster construction and oral presentation, and teaching writing as a process approach to composing academic papers.

Module content:

• Linear algebra: Vectors, Matrices (2D and 3D);
• Geometric and trigonometric problem solving;
• Logarithmic functions;
• Simple differential equations;
• Set theory;
• Simultaneous equations;


Module aims:

A good mathematical grounding is essential for all computing scientists. The mathematics in this syllabus provides the foundation for deeper analysis and understanding of computing subjects, and enhances the student’s ability to make sound judgements regarding the appropriate technology that they will use in the course of their career.  Wherever possible, mathematical theory is taught by considering a real example, to provide students with the context for the mathematical tools they will use.  Solutions are considered by both analytical and numerical techniques. Where basic principles are involved, some proofs will also be taught.

Module content:

  • SQL - Structured Query Language
  • CRUD Operations - Create Read Update and Delete
  • Queries
  • Normalisation
  • Database design
  • Data types
  • Relational databases
  • Keys
  • Entity relationship diagrams
  • Database Security
  • Database Administration

Module aims:

To increase awareness of different models of database management systems, and of their potential uses.

To make the student aware of the need for rigorous methods for the design of database systems.

To give the student further opportunities to gain practical skills in the design and implementation of database systems.

Module content:

  • Computer architecture
  • State machines
  • Basic computing mathematics - binary and hexadecimal number systems; simple uses of binary/hexadecimal; basic probability and random numbers
  • Computer systems components, data representation, fetch-execute cycle, logic gates and Boolean algebra, how computer systems work, interrupts and Input/Output
  • Levels and types of software, memory and secondary storage, operating systems (local and network), user interfaces, process management, memory management, file management
  • Computer performance, modern computer systems and concepts
  • Foundations of networking (Routing, IP Addressing, Network topologies, OSI model, TCP/IP)
  • Network traffic, packets, headers, encapsulation
  • Virtual Private Networks

Module aims:

To gain a knowledge and understanding of how various software and hardware components interact to produce working computer systems.

To gain an understanding of the fundamentals of networking

Module content:

  • Integrated Development Environments
  • Syntax, semantics, basic debugging
  • Data Types - primitives and objects
  • Control Flow - conditional and iterative (including collection iterators)
  • Basic Collection types, e.g. Arrays
  • Input and Output (Console and File based)
  • Method calls and parameter passing
  • Object Orientation - Behaviour and State
  • Class implementation - properties, methods and constructors
  • Static methods and variables
  • Unit testing
  • Inheritance, subtyping and method overriding
  • Basic refactoring
  • Recursion
  • GUIs, Event handlers and event driven programming

Module aims:

  • To introduce a high level programming language, such as Java
  • To introduce the concept of Object Oriented Programming
  • To enable students to gain familiarity with the key constructs of a programming language
  • To enable students to recognise and differentiate between different types of errors in programming code
  • To introduce event-driven programming in the context of a Graphical User Interface

Module content:

An introduction to the Cybersecurity realm:

  • Foundations of computer systems, software, and networking, with respect to the Cybersecurity perspective
  • Threats, resolutions, and auditing, relating to IT systems and governance
  • Speaking Cyber - Core understanding of Cybersecurity terminologies
  • Implementing secure systems. Illustrative of what may be covered include:
    • Design and development considerations
    • Selecting and applying core technologies
    • Cryptography
    • Human factors
    • Auditing (security audits, logging, digital investigation
      etc.)
    • Defense-in-depth
    • Pentesting
    • Access control

Module aims:

  • To give a solid whole-picture foundation which can then be harnessed later in CO5606 and CO5607 where the modules build upon challenging concepts
  • To empower the students with core understanding of the key terminologies in cybersecurity
  • To provide students with the understanding of the common cybersecurity concepts and technical security controls available to prevent, detect and recover from security incidents

Will extend your theoretical knowledge and develop your ability to apply it to real-world problems, continuing the core themes started in Year 1.

Module content:

The traditional academic programme structure is not applicable. The placement content is freely structured and determined by negotiation between the student, placement supervisor and host organisation. It is generally informed by the aims and learning outcomes and by the objective of optimising added value for both the host organisation and the student experience.


Module aims:

  • To practise software development skills and apply the knowledge already acquired in a realistic, working environment.

Module content:

  • Application of the software engineering life-cycle: analysis, design, implementation, testing, documentation, maintenance.
  • Team building & organisation; collective and individual responsibilities; negotiation & collaboration on attainable goals.
  • Self management of teams; Agile project management; quality assurance; delivering to agreed standards and deadlines.
  • Industry tools and techniques such as version control, collaborative working software, continuous integration
    etc
  • Application and development of professional skills

Module aims:

  • To prepare those students progressing to a Level 6 project/dissertation in a Computing related discipline for the process of undertaking a major piece of work involving the software engineering life-cycle.
  • To prepare those students progressing to a Year in Industry placement.
  • To give the student the opportunity to take an active part in planning and shaping a development project by participating in realistic individual and group activities.
  • To reinforce the theoretical and practical elements of the fundamental modules studied earlier.
  • To give the student a "real-world" experience of taking part as a team member in a major software development project.

Module content:

  • Further Boolean algebra and data representation.
  • Logic optimisation
  • Microarchitecture
  • Network redundancy
  • Spanning-Tree Protocol
  • Virtual LANs
  • Wireless LANs

Module aims:

  • To enable students to develop a critical understanding and appreciation of the fundamental building blocks of computer systems and their internal structure and organisation.
  • To encourage students to explore the nature of data and the techniques used to store, process and transport it.
  • Students will develop an understanding of wired and wireless Ethernet LAN configuration and the protocols and devices used in their operation.

Module content:

  • Project management methodologies covering both Waterfall and Agile approaches.
  • Assessing technical feasibility and commercial viability of ideas exploiting new technologies.
  • Business planning including cost estimation and technology roadmaps.
  • Risk management and business continuity management (including information security management)
  • Eliciting, negotiating and clearly documenting requirements both functional and non-functional.
  • People management including dealing with change and working with remote teams.
  • Quality Management and Information Security Management systems, including ISO standards and continuous improvement mechanisms.
  • Legacy architectures and technologies (for example COBOL and mainframes).

Module aims:

  • For students to be aware of all aspects of software management and be competent in managing a project.    

Module content:

  • Malware analysis and investigation
  • Low-level concepts of Operating Systems
  • Understanding endpoints (smartphones, servers, PC/Mac/smartphones) and how they are configured
  • Data collection and mitigation of surveillance

Module aims:

  • To understand and use data collection tools
  • To be able to capture data and audit computer systems
  • To be able to process, analyse, and categorise logged entries to determine causes and effects
  • To be able to perform live/dynamic analysis of programs and malware to understand its operation
  • To understand the workings of encryption and its effect on digital forensics analysis and identification

Module content:

  • Software attack techniques, approaches, and methodologies
  • Exposure to exploitation techniques, including for example, buffer overflow, stack overflow, heap attacks, and UAF (Use After Free), amongst others.
  • Attack methods including system, host, network, and web-based attacks.
  • Social engineering awareness and mitigation
  • Network security and attacks
  • Use of penetration testing tools
  • Network tapping/sniffing and detection
  • Wireless and mobile hacking
  • Ethical issues in software exploitation and penetrations testing

Module aims:

  • To understand basic assembly code of a given program
  • To practice previously acquired skills in theory and apply them using software tools
  • To plan and develop attacks on systems
  • To understand the inner working of common technologies and demonstrate the flaws that exist
  • To understand network attacks and security, and to be able to critique the security of a network

Module content:

This module will have an underlying theme on investigative interviewing with both victims and witnesses as part of a serious and complex cybercrime investigation.  It involves;

  • The Investigatory Mind-set and recording rational.
  • Core Investigative Doctrine.
  • Decision Making (National Decision Making Model) in the criminal investigation.
  • Investigating the Internet and the use of open source research.
  • Introduction of role & impact of Artificial Intelligence in Policing
  • Understanding and investigating the dark web.
  • Intelligence and the National Intelligence Model.
  • The Regulation of Investigatory Powers Act 2000 (RIPA).
  • The role of communications data within the cyber investigation.
  • Enhanced and practical application of ACPO Good Practice and Principles for Digital Evidence.
  • Enhanced and practical application of methodology and good practice relating to Cyber Crime Scene Investigation.
  • The PEACE Interview Framework. Planning and preparation for interviews with victims of Cyber Crime, identifying the requirements of relevant others including prosecutors and the court.
  • Understanding the purpose of the Achieving Best Evidence Guidance.
  • Presenting evidence in criminal proceedings and the role of the expert witness and defence.
  • Students will be introduced to the latest developments and implications of Artificial Intelligence for Law Enforcement.

Module aims:

  • To provide students with the knowledge, understanding and practical skills to plan, prepare and conduct interviews with witnesses to Cyber Crime and to achieve best evidence in Cyber Crime investigations.
  • To give students opportunities to use and develop their skills, to exercise appropriate judgment in making professional decisions underpinned with academic theory and to record and present rationale and evidence that would withstand scrutiny in the criminal justice system.
  • To broaden the student’s skills to effectively investigate the Internet and to understand how intelligence can be acquired, submitted and used in cyber investigations.
  • To introduce the development of Artificial Intelligence and its application by Law Enforcement and Criminal Justice Agencies.

Module content:

  • Time complexity and Big O notation
  • Data structures and algorithms including linked lists, arrays, stacks, queues, heaps, hash tables, binary search trees, searching and sorting.
  • Memory management
  • Scope based resource management and RAII
  • Code reuse (e.g. object orientation, templates/generics, functional programming)
  • Multithreaded programming and synchronisation 
  • Pseudorandom number generation, inc. algorithms and thread safety
  • Exception handling
  • Organisation, documentation and management of larger codebases

Module aims:

  • To introduce students to established methods for resolving common programming problems
  • To develop further competence in the use of relevant programming paradigms and principles.
  • To develop skill in the use of industry standard software tools, libraries and patterns

Module content:

Pre-placement:

  • Structured approaches to researching, selecting and securing a suitable work placement relevant to the student’s interests and career aspirations*.
  • Writing an effective CV. Constructing a letter of application.*
  • Interview skills.*

 *Note: Students are required to undertake these pre-placement tasks during term 1 level 5, as part of the placement acquisition process and will be supported by the Work Based Learning team and the Careers and Employability department.

 Induction Programme and Placement:

  • The organisational context: research-informed analysis of the placement organisation’s aims, structure, culture.
  • Self- assessment of needs: identification of the range of transferable skills, competencies and attitudes employees need and employers expect graduates to possess. (Employability Skills: e.g. verbal and written communication, analytical / problem solving capabilities; self-management; team working behaviours; negotiation skills; influencing people; positive attitude, resilience, building rapport).
  • Devising a strategy for integrating into the workplace and work based teams
  • Completion of online assignment tasks covering sourcing and obtaining placement; health and safety procedures in general; general workplace integrity; placement requirements. 

During and post-placement: Learning effectively in and from the workplace:- 

  • Devising and implementing strategies to improve own approach and performance
  • Critical analysis/evaluation of approach to skill development and performance in the workplace;
  • Influencing the Placement Provider’s appraisal;
  • Devising an action plan to develop gaps in transferable skills based on the placement experiences;

Module aims:

This module aims to enhance students’ prospects of gaining graduate level employment through engagement with a University approved work placement**, which will enable them to:

  • Develop their understanding of workplace practice and lifelong learning;
  • Enhance their work readiness and employability prospects through development of transferable skills;
  • Take responsibility for their own learning and acquisition of workplace employability skills;
  • Articulate, in writing, their employability skills.

By the time you reach Year 3, you will be ready to choose which themes are most relevant to your future needs.

Module content:

  • The student will undertake a large self-directed software project usually defined by the project supervisor. Projects can also be based at the Informatics Centre or with an industry partner.
  • Assessing commercial viability and feasibility of innovative ideas and/or researching the current state-of-the-art.
  • Business planning (assessment of business benefits, impacts, risks and return on investment, technology roadmap).
  • Project documentation.
  • Complete an innovative software development project following the software development life cycle, using project management techniques.

Module aims:

  • The aim of this module is for a student to undertake a large software development project that contributes to the research of the project supervisor, or in collaboration with an industry partner or based within the Informatics Centre. This module encourages the student to explore current and emerging technologies to develop innovative solutions that will keep up with the ever-changing requirements of the industry.

Module content:

Recap on graph theory, algorithms and complexity

Principles of routing, switching and traffic engineering

Data communications, signal encoding

Optical, wireless, cellular and ad-hoc networking

Encryption and network security.


Module aims:

  • To establish a grounding in fundamental concepts for network algorithm design
  • To develop knowledge required to evaluate the performance of network processes
  • To design processes and standards to solve specific networking problems
  • To review current and emerging protocols

Module content:

  • Design patterns - Architectural, Creational, Structural and Behavioural
  • Open Closed Principle, Dependency Inversion Principle, Interface Segregation principle
  • Functional programming, functions as parameters, function closures
  • Generics, Class extensions
  • Pattern matching
  • Concurrent programming
  • Programme translation and execution (interpreters, compilers)
  • Layout and management of memory (e.g. allocation / stack / heap)
  • Continuous integration

Module aims:

  • To analyse, understand and contribute to existing software
  • To understand the processes governing the execution of programming code
  • To investigate alternate programming paradigms to object orientation

Module content:

  • Evaluation of the principles of automated intelligence.
  • Scientific and Engineering goals of intelligent technologies.
  • Approaches to the development of intelligent software.
  • Application domains for intelligent technologies.

Module aims:

  • To introduce the concept of artificial intelligence (AI) and to evaluate its role in the development of advanced software systems.
  • To introduce theoretical approaches to the development of intelligent software.
  • To undertake practical tasks to demonstrate how AI techniques can be implemented.
  • To analyse methods for designing and deploying intelligent technologies.
  • To critically evaluate the ways in which intelligent technologies can be used in various domains: e.g. business, medical, educational, legal, government and scientific.

Module content:

  • Public/private key composition and usage
  • Certificates – for code signing and identify management
  • Block/stream ciphers
  • Cryptographic algorithms
  • History of and modern day cryptography
  • Modern day tools for enterprise and personal use for protection of data and relevant confidential information
  • Encryption attacks (e.g. Ransomware) and attacks against encryption (anti-encryption)

Module aims:

  • To give an understanding and usage of symmetric/asymmetric encryption
  • To explore basic cryptographic calculations
  • To understand how cryptographic algorithms work
  • To give an appreciation to system and data security using cryptography
  • To explore case studies and advise on the right actions to take to ensure continued data protection
  • To explore the history of cryptography and cryptographic attacks

Module content:

  • Open Source Intelligence (OSINT)
  • Social Media Intelligence (SOCMINT)
  • Human Intelligence (HUMINT)
  • Cyber crime
  • Cyber activism
  • Cyber espionage
  • Information Operations (INFO-OPS)
  • Incident Response

Module aims:

  • To discuss the various methods by which intelligence can be applied from various sources
  • To understand and critically evaluate strategic and tactical intelligence
  • Develop understanding of complex cyber-warfare techniques and mitigations
  • Apply a variety of incident response techniques

Module content:

  • This module builds upon modules CO4608 Cyber Legislation and Introduction to Professional Investigation module and CO5608 Conducting Cyber Investigations.
  • The student will critically examine the investigative techniques and information associated with professional cybercrime investigation identifying the limitations and legislative restrictions.
  • The student will understand and then conduct the role of the analyst in gathering information and intelligence during cybercrime investigations and then critically examine the data and present information in a manner that would stand robust scrutiny with the criminal justice system.
  • The student will critically examine the case law surrounding cybercrime investigation and its application enabling specialist investigators to conduct professional investigations and present their findings.
  • Students will be introduced to the latest developments and implications of Artificial Intelligence for Law Enforcement.

Module aims:

  • This module aims to provide the student with the opportunity to utilise their skills and knowledge to enable them to gather and critically examine source data and intelligence gathered during a professional investigation and present findings within a court setting.
  • To further develop the student’s knowledge and practical skills in relation to professional investigation by critically analysing their investigation and exercising appropriate judgment by making professional policy decisions, underpinned with academic theory that would provide control and direction to the investigation.
  • Develop student skills in more focussed research and presenting written communication.
  • The module will progress to look at specialist network and forensic investigation used by the industry.
  • The student will be able to critically examine relevant case law relating to Cybercrime and identify the implications for policing cybercrime.
  • Introduce an understanding of the developments and implications of Artificial Intelligence in law enforcement.

Who you'll Learn from

Dr Nabeel Khan

Senior Lecturer
A dark grey silhouette on a light grey background

How you'll Learn

Our modules are varied in their teaching methods. The majority of your time will be spent in computer laboratories for the practical subjects. Small group discussions, tutorials, and student-led seminars also figure prominently.

Assessment employs assignments, project work and examinations. In line with the requirements of industry, all our modules have been designed from the ground up to incorporate assessment of key skills, as well as subject-related skills. 

Beyond the Classroom

On this course, you have the opportunity to spend five weeks working for a host organisation via our innovative Work Based Learning module. You’ll have the chance to test-drive a future career, boost your CV and gain real work experience. 

On this course, you’ll have the opportunity to undertake an Experiential Learning module, where you become part of a production company and spend up to five weeks working on a full-time theatre project. 

Our Experiential Overseas Learning module offers a unique opportunity to participate in a short-term placement around the world. 

This course offers the exciting opportunity to study abroad for a full academic year at one of our bilateral exchange partners or through ISEP (International Student Exchange Programs), a network of over 300 additional higher education institutions worldwide. 

This course offers the opportunity to complete a year in industry, where you’ll experience the workplace, apply your learning and build connections for your future. 

Entry Requirements

112 UCAS Points

UCAS Tariff

112 points

GCE A Level

Typical offer – BCC-BBC

BTEC

BTEC Extended Diploma: DMM

International Baccalaureate

26 points

Irish / Scottish Highers

Irish Highers - H3 H3 H3 H3 H4

Scottish Highers - BBBB

Access requirements

Access to HE Diploma, to include 45 credits at level 3, of which 30 must be at Merit or above

T Level

T Level - Merit

OCR Cambridge Technicals

OCR Extended Diploma: DMM

Extra Information

GCSE grade C/4 (or above) in Mathematics is required

Welsh Baccalaureate Advanced and A level General Studies will be recognised in our offer.  We will also consider a combination of A Levels and BTECs/OCRs.

Students from countries outside the UK are expected to have entry qualifications roughly equivalent to UK A Level for undergraduate study and British Bachelor's degree (or equivalent) for postgraduate study. To help you to interpret these equivalents, please click on your country of residence to see the corresponding entry qualifications, along with information about your local representatives, events, information and contacts.

We accept a wide range of qualifications and consider all applications individually on merit. We may also consider appropriate work experience.

For more information on our entry requirements, please visit International Entry Requirements

72 UCAS Points

UCAS Tariff

72 points

GCE A level

72 UCAS points from GCE A Levels to include grade D in at least one subject

BTEC

BTEC Extended Diploma: MMP

International Baccalaureate

24 points

Irish / Scottish Highers

Irish Highers: H4 H4 H4 H4 H4

Scottish Highers: CCDD

Access requirements

Access to HE Diploma – Pass overall

T Level

T Level : Pass (D or E on the core)

OCR Cambridge Technicals

OCR Extended Diploma: MMP

Extra Information

GCSE grade C/4 (or above) in Mathematics is required

Welsh Baccalaureate Advanced and A level General Studies will be recognised in our offer.  We will also consider a combination of A Levels and BTECs/OCRs.

If you are a mature student (21 or over) and have been out of education for a while or do not have experience or qualifications at Level 3 (equivalent to A Levels), then our Foundation Year courses will help you to develop the skills and knowledge you will need to succeed in your chosen degree. 

Where you'll study Exton Park, Chester

Fees and Funding

£9,250 per year (2024/25)

Our full-time undergraduate tuition fees for Home students entering University in 2024/25 are £9,250 a year, or £1,540 per 20-credit module for part-time study.

The University may increase these fees at the start of each subsequent year of your course in line with inflation at that time, as measured by the Retail Price Index. These fee levels and increases are subject to any necessary government, and other regulatory, approvals.

Students from the UK, Isle of Man, Guernsey, Jersey and the Republic of Ireland are treated as Home students for tuition fee purposes.

Following the UK’s exit from the EU, students from countries in the European Economic Area and the EU starting in or after the 2021/22 academic year will pay International Tuition Fees.

Students who have been granted Settled Status may be eligible for Home Fee Status and if eligible will be able to apply for Tuition Fee Loans and Maintenance Loans.

Students who have been granted Pre-settled Status may be eligible for Home Fee Status and if eligible will be able to apply for Tuition Fee Loans.

£13,950 per year (2024/25)

The tuition fees for international students studying Undergraduate programmes in 2024/25 are £13,950. 

This fee is set for each year of study. All undergraduate students are eligible for international and merit-based scholarships which are applicable to each year of study.  

For more information, go to our International Fees, Scholarship and Finance section.

Irish Nationals living in the UK or ROI are treated as Home students for Tuition Fee Purposes. 

Your course will involve additional costs not covered by your tuition fees. This may include books, printing, photocopying, educational stationery and related materials, specialist clothing, travel to placements, optional field trips and software. Compulsory field trips are covered by your tuition fees. 

If you are living away from home during your time at university, you will need to cover costs such as accommodation, food, travel and bills. 

Your Future Career

Job Prospects

Cybersecurity graduates are in great demand across a variety of jobs, including in policing, in the government and government-run bodies, in industry from small companies to the very largest, in banking, and in the military and intelligence agencies. 

Careers service

The University has an award-winning Careers and Employability service which provides a variety of employability-enhancing experiences; through the curriculum, through employer contact, tailored group sessions, individual information, advice and guidance.

Careers and Employability aims to deliver a service which is inclusive, impartial, welcoming, informed and tailored to your personal goals and aspirations, to enable you to develop as an individual and contribute to the business and community in which you will live and work.

We are here to help you plan your future, make the most of your time at University and to enhance your employability. We provide access to part-time jobs, extra-curricular employability-enhancing workshops and offer practical one-to-one help with career planning, including help with CVs, applications and mock interviews. We also deliver group sessions on career planning within each course and we have a wide range of extensive information covering graduate jobs and postgraduate study.