Course details
On this course you will be taught by a range of staff with relevant expertise and knowledge appropriate to the content of the unit. This will include senior academic staff, qualified professional practitioners, demonstrators, technicians and research students. You will also benefit from regular guest lectures from industry.
Contact hours and assessment
Details of the assessment methods and contact hours for each unit of the course can be found in the programme specification.
Year 1
Principles of Programming: Covers the fundamental skills required to implement software solutions. Lab sessions will focus on the application of concepts to real-world problems, and you will test and debug a given program using a suitable strategy.
Computer Fundamentals: Enables you to understand the concepts and terminology of computer systems and computer security. You will do this through group based lab exercises where you will collaborate with other students focusing on problem based learning. This unit sets the foundations for you to further develop your knowledge of computing and cyber security.
Data and Databases: Develop your knowledge and practical expertise in the application of database design techniques, as well as your understanding of data processing.
Networks and Cyber Security: Learn the fundamentals of networks and how to secure them using security controls such as firewalls and intrusion detection & prevention systems. Understand how evolving technology, such as the cloud and IoT, impacts many organisations and how it facilitates their network security.
Application of Programming Principles: Having completed the Principles of Programming unit, you will use your knowledge to gain an insight into more complex system development. Lab sessions will allow you to complete team based exercises.
Business Systems Analysis and Design: Learn and understand the role that computer systems play within organisations, and the value they provide to stakeholders. You will have the opportunity to design, construct, and evaluate interactive systems to meet an organisation’s needs.
Year 2
Digital Forensics Fundamentals: Introduces you to the science of digital forensics and provides technical skills to manage a digital crime scene. Practical sessions will focus on developing skills to recover digital evidence from hard drives.
Ethical Hacking & Countermeasures: Will provide you with opportunities to develop skills in ethical hacking, and associated security techniques and practices. Practical sessions help you gain insight (via practice) of the relationships between security and social and technical techniques used to compromise that security.
Enterprise Security and Privacy: This unit provides a detailed picture of the security and privacy issues surrounding an enterprise, i.e. an entity that incorporates business, information and technology and where its value is greater than the sum of its parts. We will cover a number of services found in a modern organisation and an emphasis will be given to services outsourced in a cloud environment. This emphasis is motivated by the fact that cloud security has been ranked as the greatest challenge of business engagement with cloud service provision.
Project Management & Team Working: You'll gain experience of working in a team on an IT systems development project, which will prepare you for work placement in Year 3.
Security Information and Event Management (SIEM): You will be given state-of-the-art skills and understanding on the need for real-time monitoring and analysis of network hardware and software data feeds in order to provide security intelligence, rapid incident response, and data driven compliance reports.
Tools & Technologies of Data Science: Understand the challenges of Big Data analysis, including ethical, legal and professional implications. Gain knowledge of the most significant computing tools and technologies for dealing with Big Data: Hadoop and noSQL databases, MapReduce programming and other algorithm parallelization approaches.
Optional Placement Year
Although you will be enrolled onto the four-year degree, you can opt out of the placement year. However, the placement year offers you a chance to gain experience and make contacts for the future. You’ll complete a minimum 30-week industrial work placement which can be carried out anywhere in the world.
Final Year
Core units
Advanced Digital Forensics: This unit builds on the knowledge of Digital Forensics Fundamentals and will introduce you contemporaneous issues and challenges of digital forensics. It will provide the competence to identify the history of events that lead to incidents and reconstruct attacks that organisations often face.
Security by Design: Today security is still an afterthought instead of a vital element in system design, often being considered after the realisation of a threat. This unit provides you with the opportunity to ‘build security into’ both the design and specification of secure systems, and the broader socio-technical context within which they are situated.
Individual Project: You will pursue a topic of your choice, demonstrate your ability to study independently and work toward the realization of an artefact that focuses on cyber security and/or digital forensics. The project is a significant piece of work, and will provide invaluable transferable skills.
Option units
Business Continuity Management: You will be introduced to the wider topic of resilience, which is the ability of an organisation to keep functioning during and after an attack, incident or natural disaster.
Cyber Situational Awareness: Cyber security managers should be capable of constructing and understanding the threat landscape in their organisations. Cyber situational awareness is an interdisciplinary, evolving complex topic requiring co-ordinated synergy between technical capabilities and human competencies. The aim of this unit is to provide the learner with the necessary skills and knowledge to manage cyber situational awareness as a main component in the development of a Security Operations Centre.
Cybercrime: Examine the subject from the criminal angle and investigate the history and causes of cybercrime through the experiences of victims and law enforcement. You will also consider the technologies that stand behind certain cybercrimes, namely malware (viruses, worms, Trojan Horses, etc.), email spamming and denial of service (DoS) attacks, and consider how to handle a digital crime scene.
Information Assurance: This unit will introduce you to the management of risk and trust in Information Strategies, Operations and Systems. You will critically evaluate information assurance and security plans, select and execute relevant assurance techniques, as they apply in distributed and non-distributed environments.
Please note that option units require minimum numbers in order to run and may only be available on a semester by semester basis. They may also change from year to year.