Search

Chat With Us

    Cyber Security (Staffordshire University London) BSc (Hons)
    Go to Staffordshire University
    Staffordshire University

    Cyber Security (Staffordshire University London) BSc (Hons)

    Staffordshire University

    Staffordshire University

    flag

    United Kingdom, Stoke-on-Trent

    Key Facts

    Program Level

    Bachelor

    Study Type

    Full Time

    Delivery

    On Campus

    Campuses

    Main Site

    Program Language

    English

    Start & Deadlines

    Next Intake Deadlines25-Sep-2023
    Apply to this program

    Go to the official application for the university

    Duration 4 year(s)
    Tuition Fee
    GBP 16,750  / year
    Next Intake 25-Sep-2023

    Cyber Security (Staffordshire University London) BSc (Hons)

    About

    Become a protector of cyberspace and modern technology in our specialist computer science degree and become an ultra-employable expert in cyber security and forensic computing.

    This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so youâre fully prepared to work in the industry upon graduation.

    We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PCâ based investigations, as well as mobile forensics (on smartphones, and sat navâs etc).

    This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so youâre fully prepared to work in the industry upon graduation.

    We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PCâ based investigations, as well as mobile forensics (on smartphones, and sat navâs etc).

    This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so youâre fully prepared to work in the industry upon graduation.

    We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PCâ based investigations, as well as mobile forensics (on smartphones, and sat navâs etc).

    On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

    On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

    On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

    • Enquire about this course
    • Book an Open Day
    • Apply now

    Over three years of study youll become a specialist in the field of cyber security. In your first year youll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

    In the second year youll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. Youll also expand your foundational knowledge in computer science, looking at commercial computing.

    In your final year, youll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

    Over three years of study youll become a specialist in the field of cyber security. In your first year youll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

    In the second year youll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. Youll also expand your foundational knowledge in computer science, looking at commercial computing.

    In your final year, youll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

    Over three years of study youll become a specialist in the field of cyber security. In your first year youll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

    In the second year youll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. Youll also expand your foundational knowledge in computer science, looking at commercial computing.

    In your final year, youll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

    Teaching

    This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

    This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

    This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

    Assessment

    Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that youll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

    Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that youll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

    Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that youll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

    Learning support

    In addition to the excellent support you will receive from your course teaching team, our central Academic Skills team provides group and one-to-one help to support your learning in a number of areas. These include study skills (including reading, note-taking and presentation skills); written English (including punctuation and grammatical accuracy); academic writing (including how to reference); research skills; critical thinking and understanding arguments; and revision, assessment and examination skills (including time management).

    Additional support

    Our Student Inclusion Services support students with additional needs such as sensory impairment, or learning difficulties such as dyslexia.

    Feedback

    Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

    Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

    Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

    Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

    Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

    Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

    Requirements

    Entry Requirements

    Undergraduate

    Undergraduate (bachelors) degrees

    To apply for an undergraduate (bachelors) degree you need one of the following qualifications:

    • Community College Diploma / Associate Degree with a minimum grade GPA of 2.5
    • International Baccalaureate (IB) Diploma with 28 points overall
    • Successful completion of a relevant International Foundation Year from a recognised UK Institution
    • For A-Level requirements, please see the ‘entry requirements’ section on the relevant course page

    Integrated masters and two-year accelerated degrees

    To apply for an integrated masters or two-year accelerated degree you need one of the following qualifications:

    •  Community College Diploma / Associate Degree with a minimum grade of 2.8
    • International Baccalaureate (IB) Diploma with 30 points overall
    • Successful completion of a relevant International Foundation Year from a recognised UK Institution
    • For A-Level requirements, please see the ‘entry requirements’ section on the relevant course page

    English Program Requirements

    The majority of our undergraduate bachelor degree courses require a minimum overall IELTS score of 6.0, with 5.5 in reading, writing, speaking and listening. However, we also accept a wide range of qualifications from around the world. The following qualifications are acceptable for most of our Bachelor degree courses.

    Career

    Careers

    You’ll find graduates from our Computer Science disciplines working in many computing areas – Graduates from our Computer Science degrees have gone on to work in a whole range of related occupations. Previous roles include:  chief information security officer, forensic computer analyst, information security analyst, penetration tester, security architect, IT security engineer, security systems administrator, and IT security consultant.

    All students have access to Career Connect, our dedicated careers team.

    Fee Information

    Tuition Fee

    GBP 16,750 

    How to Apply

    • Contact one of our approved overseas education representatives in your country

    • Use the ‘apply now’ button on the undergraduate course pages to apply through UCAS. (Visit the UCAS website for more information). To do this, you'll need:

      • UCAS course code - you’ll find the four-digit code (e.g. P500) in our prospectus, on the course page or on the UCAS website.

      • An institution code for the university – it's S72 for Staffordshire University.

    Staffordshire University

    Cyber Security (Staffordshire University London) BSc (Hons)

    Staffordshire University

    [object Object]

    United Kingdom,

    Stoke-on-Trent

    Similar Programs

    Other interesting programs for you

    Find More Programs
    Wishlist