Cyber Security

Study options

Award

BSc (Hons)

Key facts

UCAS code:
I302
UCAS code:
I303
UCAS code:
I771
Study option:
Full-time, Staffordshire University London
Study option:
Full-time, Staffordshire University London, with a placement year
Study option:
Full-time, with a foundation year at Capital City Colleges Group t/a WKCIC GROUP - Soho
Duration:
3 Years
Duration:
4 Years
Duration:
4 Years
Start date:
23 September 2024

Innovative partnerships

Undertake projects with real-world businesses

Work placements

Choose to complete an optional 12-month work placement

Recognised qualifications

Gain certifications related to EnCase, MicroSystemation XRY, and Cellebrite UFED

Become a protector of cyberspace and modern technology in our specialist computer science degree and become an ultra-employable expert in cyber security and forensic computing.

This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so you’re fully prepared to work in the industry upon graduation.

We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PC’ based investigations, as well as mobile forensics (on smartphones, and sat nav’s etc).

This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so you’re fully prepared to work in the industry upon graduation.

We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PC’ based investigations, as well as mobile forensics (on smartphones, and sat nav’s etc).

This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so you’re fully prepared to work in the industry upon graduation.

We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PC’ based investigations, as well as mobile forensics (on smartphones, and sat nav’s etc).

On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

Course content

Over three years of study you’ll become a specialist in the field of cyber security. In your first year you’ll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

In the second year you’ll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. You’ll also expand your foundational knowledge in computer science, looking at commercial computing.

In your final year, you’ll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

Over three years of study you’ll become a specialist in the field of cyber security. In your first year you’ll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

In the second year you’ll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. You’ll also expand your foundational knowledge in computer science, looking at commercial computing.

In your final year, you’ll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

Over three years of study you’ll become a specialist in the field of cyber security. In your first year you’ll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

In the second year you’ll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. You’ll also expand your foundational knowledge in computer science, looking at commercial computing.

In your final year, you’ll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

From Newham to New Balance Athletics: A Cyber Security Success Story

News

Ade Adeyemi, a Cyber Security student at Staffordshire University London, boosted New Balance's digital progress as an IT Infrastructure Intern.

Entry requirements

112-120 UCAS Tariff points

  • GCE A Levels - grades BBC or equivalent
  • Pearson BTEC National Extended Diploma - grade DMM
  • Access to HE Diploma - Pass Access with a minimum of 80 UCAS tariff points. Applicants to Staffs who are taking the Access to HE Diploma receive a reduced tariff point offer as part of our access and participation plan activity
  • UAL Level 3 Extended Diploma - grade of Merit overall
  • OCR Cambridge Technical Extended Diploma - grade DMM
  • T Levels - Eligible T Level applications will be asked to achieve a minimum overall grade of P (A*-C) or Higher Pass as a condition of offer

112-120 UCAS Tariff points

  • GCE A Levels - grades BBC or equivalent
  • Pearson BTEC National Extended Diploma - grade DMM
  • Access to HE Diploma - Pass Access with a minimum of 80 UCAS tariff points. Applicants to Staffs who are taking the Access to HE Diploma receive a reduced tariff point offer as part of our access and participation plan activity
  • UAL Level 3 Extended Diploma - grade of Merit overall
  • OCR Cambridge Technical Extended Diploma - grade DMM
  • T Levels - Eligible T Level applications will be asked to achieve a minimum overall grade of P (A*-C) or Higher Pass as a condition of offer
  • UCAS tariff : 48 points
  • A level: DD
  • Pearson BTEC Level 3 National Extended Diploma (first teaching from September 2016): PPP

For equivalent entry requirements in your home country, please see the information on our country pages.

Choose your country

Check our entry and English language requirements for your country.

GO

Facilities

Careers

You’ll find graduates from our Computer Science disciplines working in many computing areas – Graduates from our Computer Science degrees have gone on to work in a whole range of related occupations. Previous roles include:  chief information security officer, forensic computer analyst, information security analyst, penetration tester, security architect, IT security engineer, security systems administrator, and IT security consultant.

All students have access to Career Connect, our dedicated careers team.

Teaching and assessment

Teaching

This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

Assessment

Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that you’ll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that you’ll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that you’ll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

Learning support

In addition to the excellent support you will receive from your course teaching team, our central Academic Skills team provides group and one-to-one help to support your learning in a number of areas. These include study skills (including reading, note-taking and presentation skills); written English (including punctuation and grammatical accuracy); academic writing (including how to reference); research skills; critical thinking and understanding arguments; and revision, assessment and examination skills (including time management).

Additional support

Our Student Inclusion Services support students with additional needs such as sensory impairment, or learning difficulties such as dyslexia.

Feedback

Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

Independent learning

All students are encouraged to build on their independent capabilities in relation to their own learning development. Tutors will mentor, support and guide students with clear direction in relation to ‘out of classroom’ activities and expectations in order to allow students the capacity to meet the learning objectives of their modules and course of study.

All students are encouraged to build on their independent capabilities in relation to their own learning development. Tutors will mentor, support and guide students with clear direction in relation to ‘out of classroom’ activities and expectations in order to allow students the capacity to meet the learning objectives of their modules and course of study.

All students are encouraged to build on their independent capabilities in relation to their own learning development. Tutors will mentor, support and guide students with clear direction in relation to ‘out of classroom’ activities and expectations in order to allow students the capacity to meet the learning objectives of their modules and course of study.

Staff

Dr Vahid Heydari Fami Tafreshi

Course Director - Computer Science

An enthusiastic researcher & senior lecturer in Cybersecurity & Networks at Staffordshire University London (SUL). BSc & MSc Cybersecurity Subject Lead. Interests lie in the field of Internet Protocols & Architectures, Cybersecurity, & IoT Security.

Vahid's profile

Dr Maryam Shahpasand

Senior Lecturer

Maryam is a lecturer with over 15 years of intensive experience in cyber security teaching and research, professional training, security consultation, forensics investigation, malware analysis, penetration testing, and incident handling.

Dr Viraj Dawarka

Lecturer

Viraj is a lecturer in computer science/cyber security as well as an active researcher in cloud robotics. His main area of interest is towards the energy efficiency of cloud robotics using educational robots.

Dr Mahsa Zolfaghari

Lecturer

Mahsa is a lecturer in Computer Science and Cyber Security. Her research interests are Systems Design enhancements by Artificial Intelligence (AI), NET ZERO Technologies’ applications and IoT.

Dr Russell Campion

Head Of Department - Computing & Esports

Russell started at the University in 1990, studying a BA, then MRes, and finally a PhD before going into full-time teaching. He currently runs the Department of Computing. Previously he has managed the Information Systems group at Stafford befor…

Russell's profile

Fees

For the course starting on 23 September 2024 the tuition fees are:

Tuition fees for BSc (Hons)-Full-time, Staffordshire University London
Study option UK / Channel Islands International
Full-time £9,250 per year of study £16,750 per year of study

For the course starting on 23 September 2024 the tuition fees are:

Tuition fees for BSc (Hons) Full-time, Staffordshire University London, with a placement year
Study option UK / Channel Islands International
Full-time £9,250 per year of study £16,750 per year of study

For the course starting on 23 September 2024 the tuition fees are:

Tuition fees for BSc (Hons) Full-time, with a foundation year at Capital City Colleges Group t/a WKCIC GROUP - Soho
Study option UK / Channel Islands International
Full-time £9,250 for your first year subsequent years will be charged at the University standard rate £16,750 for your first year subsequent years will be charged at the University standard rate

UK and Channel Island students: This tuition fee is agreed subject to UK government policy and parliamentary regulation. If the UK government passes appropriate legislation, the fee for subsequent years of study may increase in each academic year. But this increase will not exceed the rate of inflation as measured by RPIX**. Any change in fees will apply to both new and continuing students. The University will notify students of any change as early as possible. Further information about fee changes would be posted on the University’s website once this becomes available.

**RPIX is a measure of inflation equivalent to all the items in the Retail Price Index (RPI) excluding mortgage interest payments.

International students: Tuition fees will remain the same for each year of your course, as long as you complete it in the normal time-frame (i.e. no repeat years or breaks in study).

Not included in tuition fees
Not included in the fees:
  • You are expected to have access to an appropriate PC/Laptop with admin rights so that you can install software in order to complete this course.
  • Certified Ethical Hacker, XRY Mobile Forensics and Cybercrime Analysis Certification are available for an additional fee.
  • You are expected to have access to an appropriate PC/Laptop with admin rights so that you can install software in order to complete this course.
  • Certified Ethical Hacker, XRY Mobile Forensics and Cybercrime Analysis Certification are available for an additional fee.
  • You are expected to have access to an appropriate PC/Laptop with admin rights so that you can install software in order to complete this course.
  • Certified Ethical Hacker, XRY Mobile Forensics and Cybercrime Analysis Certification are available for an additional fee.
Accommodation and living costs
Accommodation and living costs

Accommodation and living costs are not included in our fees.

Sources of financial support

If you receive funding from Student Finance you may be eligible to apply for additional benefits. Details can be obtained by visiting: www.gov.uk

Scholarships and additional funding

As an undergraduate student at Staffordshire, you may be eligible for additional financial support through one of our scholarships and bursaries. You can visit our funding page to find out more and check your eligibility.

Scholarships and additional funding

As an undergraduate student at Staffordshire, you may be eligible for additional financial support through one of our scholarships and bursaries. You can visit our funding page to find out more and check your eligibility.

Scholarships and additional funding

As an undergraduate student at Staffordshire, you may be eligible for additional financial support through one of our scholarships and bursaries. You can visit our funding page to find out more and check your eligibility.

Our students

The lectures and coursework were both enjoyable and thorough with a mixture of individual work as well as group tasks

I graduated from my BSc Cyber course with a first class degree and successfully got a job in digital forensics as a mobile phone forensic analyst. I found all of the staff to be extremely knowledgeable in the field as well as having their own area of expertise. This meant there were plenty of people on hand to speak to if there was something I was unsure of. The lectures and coursework were both enjoyable and thorough with a mixture of individual work as well as group tasks. I completed a placement year which I found to be invaluable in helping with my studies and even interviews for my current role in a different company.

Kelly Ashman

Mobile Phone Forensic Analyst

Apply

Location Award Study option Start date Apply Link
Staffordshire University London BSc (Hons) Full-time, Staffordshire University London 23 September 2024 Apply now

Rules and regulations

If you are offered a place at Staffordshire University, your offer will be subject to our rules, regulations and enrolment conditions, which may vary from time to time.

Students of Staffordshire University enter into a contract with us and are bound by these rules and regulations, which are subject to change. For more information, please see: University Policies and Regulations.

Information from discover uni

in the UK for Quality Education

Sustainable Development Goal 4, Times Higher Education Impact Rankings 2023

for Career Prospects

Whatuni Student Choice Awards 2023

for Facilities

Whatuni Student Choice Awards 2023

for Social Inclusion

The Times and The Sunday Times Good University Guide 2023

of Research Impact is ‘Outstanding’ or ‘Very Considerable’

Research Excellence Framework 2021

of Research is “Internationally Excellent” or “World Leading”

Research Excellence Framework 2021

Four Star Rating

QS Star Ratings 2021