Logo of Royal Holloway University of London

BScComputer Science (Information Security)

Tuition fee To be confirmed
More information

Expenses, accommodation, working etc.

royalholloway.ac.uk/..mation-security.aspx 

Overview

The creation, transmission and storage of huge volumes of electronic data is one of the defining features of our age. It brings us untold benefits but it also exposes businesses, governments and individuals to repeated threats such as cyber theft, sabotage and blackmail. As a result, societies increasingly rely on the expertise and innovations of information security specialists, without which many aspects of our daily lives would grind to a halt.

This three-year programme with a specialism in information security will give you the skills you need to pursue a computer science career, and the knowledge and practical experience to manage and improve the smooth running and security of systems, applications and organisations. You will learn from leading researchers in the field, covering topics such as cryptography, computer security, fraud detection and the study of how security itself can best be managed. All this will be underpinned by a solid grounding in the fundamentals of computing and all the essentials of application development, from programming to software engineering, databases to web development, computer graphics to robotics. From the outset you will be experimenting with programming games, robots, Gadgeteer kits, Subversion, JUnit testing, Scrum-based Agile software and more, in our well-equipped laboratories. Alongside our core modules you will have the flexibility to tailor your studies to your own interests in your final year.

We are a highly respected, research-focused department with a friendly approach and award-winning teaching. We offer a summer work placement programme and a dedicated personal adviser to guide you through your studies. You will also be welcome to join our Computing Society, a thriving community of more than 400 computer enthusiasts from across the College. We are one of only seven departments in the UK to hold the Athena SWAN bronze award for our commitment to increasing female participation in computer science. You will graduate with an advanced knowledge of computer science and information security theories and methodologies, as well as transferrable skills such as team working, communication, time management and self-motivation.

Programme structure

Year 1

Computing Lab (Games)
In this module you will develop an understanding of the basic concepts of 2D game design and apply them to the development of simple games using an objected-oriented approach. You will look at the nature of graphics, animation, and motion, considering the usage of vectors in these techniques. You will also examine the fundamentals of game physics, such as collisions, gravity and ballistics.

Computing Lab (Robotics)
In this module you will develop an understanding of the building of computer systems. You will learn about the elementary concepts of robotics, gaining practical experience in programming mobile robots to execute pre-defined movements using Java and Lego NXT. You will also consider the basics of sensors, proportional-integral-derivative (PID) feedback systems, and the principles of localisation.

Internet Services
In this module you will develop an understanding of how the internet works and its key protocols. You will look at the technologies used for web development, including scripting languages and their potential for adding dynamic content to web sites and applications. You will consider the role of web services and related technologies, and will examine the fundamental principles of network security.

Machine Fundamentals
In this module you will develop an understanding of the handling of large and infinite objects within a programming environment. You will learn how to use formal logic to design, reason about and minimise switching circuits, and write basic programs in assembly language. You will consider the binary representations of signed and unsigned integers and how to write regular expressions to describe sets and build deterministic automata to recognise these. You will also examine the use of automata machines in the design and reasoning of sequential flow systems.

Mathematical Structures
In this module you will develop an understanding of the formal resoning for sets, relations, functions and cardinality. You will look at the structures for program data and representation and learn to write and reason recursive definitions and prove results by induction and contradiction. You will consider the representation and reasoning of problems using graphs and the use of vectors and transformations for defining and manipulating graphical objects. You will also examine the usage of probability and statistics in analysing data.

Object Oriented Programming 1
In this module you will develop an understanding of programming and object-orientation concepts. You will learn about program basics, control flow, data structures, objects, exceptions, and file input and output. You will consider how to solve basic programming tasks and the need for program documentation, testing, readability and modifiability.

Object Oriented Programming 2

Software Design
In this module you will develop an understanding of software design and engineering processes, including the Waterfall and Agile methodologies. You will learn how to identify common software requirements and see how these have been considered in existing systems. You will look the techniques of software design and how software engineers communicate their design ideas. You will consider the importance of documentation and the usage of current industry-standard notations such as user stories and the unified modeling language (UML). You will also analyse and critique the design of existing sotware looking at the user experience as a measure of its fitness for purpose.

Year 2

Algorithms and Complexity
In this module you will develop an understanding of the design of algorithms, with a focus on time and space complexity. You will examine basic algorithms, looking at the implementation and analysis of linear search, binary search, and basic sorting, including inerstion sort, selection sort, merger sort, quick sort, and heap sort. You will consider alternative data structure representations, such as binary search trees, hash tables, and binary heaps, and will gain an insight into the basics of graph algorithms.

Computer and Network Security
In this module you will develop an understanding of computer and network security. You will look at software vulnerabilities, hands-on hacking-oriented attacks, memory errors, and web and network security. You will learn how to identify such vulnerabilities, and consider the countermeasures that can mitigate their exploitation. You will also examine malicious software (malware) as a typical consequence of a successful software exploitation.

Databases
In this module you will develop an understanding of the basic concepts of database technology, including the need for database integrity and robustness, and the use of a modern database system in a web-based environment. You will look at database design and the theory of the relational view of data, learn to describe the crucial issues concerning database integrity and recovery from failure, and write search query language (SQL) queries. You will also consider the process of designing and implementing a database, from the user specifications to the final design, and implement an interface to an SQL database using an application programming interface (API).

Introduction to Information Security
In this module you will develop an understanding of how information security may be influenced by real world design and implementation decisions. You will will look at the different cryptographic algorithms, considering their use, advantages and disadvantages. You will use these cryptographic primitives to review and evaluate cryptographic protocols, and examine the rational decisions in the design of tokens and secure elements.

Operating Systems
In this module you will develop an understanding of the function and architecture of network operating systems. You will look at the role of an operating system, considering processes, memory and file systems. You will learn to write basic shell scripts, see how services are used at the operating system-level, and evaluate the theory and practice of existing operating systems. You will also examine the UNIX shell, including starting programs, input and output steams, pipes, filters, and utilities.

Software Engineering
In this module you will develop an understanding of software engineering techniques and the managerial discipline required to work as part of a team. You will look at basic object-oriented concepts and consider the need for effective program documentation, testing, readability, and modifiability. You will consider the tools used to support software development, such as version controllers, debuggers, and code style checkers, and see how these are integrated into an industry-standard development environment (IDE). You will deliver a small-scale project using test-driven development.

Team Project
In this module you will develop an understanding of the role of the computer professional, gaining practical experience in developing medium scale software as part of a team using Scrum-based Agile development. You will apply managerial discipline and learn about the software lifecycle, team development, standard industrial software engineering, project management, use of version control, and integrated development enironments (IDEs). You will see why project cost and effort is hard to estimate, and consider why project quality is hard to prescribe.

Year 3

Individual Project
In this module you will have the opportunity to plan and organise a large project, analysing complex ideas, identifying problems, and coming up with solutions. You will apply scientific principles and use a range of software and hardware techniques. You will analyse the effectiveness of your solutions and evaluate the results. You will also consider legal, social, ethical and professional issues. You can design your own project or choose a topic from a suggested list.

Applications of Cryptography
In this module you will develop an undestanding of cryptography and how it is deployed in real systems. You will look at security services, security models, and basic attacks on cryptosystems, considering the full range of security services that can be provided by cryptography. You will compare different cryptographic mechanisms and the nature of the architecture within which cryptography is deployed. You will also examine the cryptographic standards that should be followed when implementing cryptography and the rationale for the design decisions taken in several widely deployed cryptographic systems.

Malicious Software
In this module you will develop an understanding of mailicious software and the malware landscape. You will look at the key challenges the antivirus industry has faced in fighting malware threats, considering the traditional methods used by cybercriminals to infect user and enterprise hosts to gain access to their private, financial, and intellectual property data. You will learn how traditional and mobile malware work, how they are analysed and detected, and examine the underground ecosystem that drives this profitable but illegal business. You will also assess the research trends that are likely to influence the future of software security.

Optional modules

In addition to these mandatory course units there are a number of optional course units available during your degree studies. The following is a selection of optional course units that are likely to be available. Please note that although the College will keep changes to a minimum, new units may be offered or existing units may be withdrawn, for example, in response to a change in staff. Applicants will be informed if any significant changes need to be made.

Career opportunities

Information security specialists are in demand across a wide range of sectors, from private companies to banking, telecommunications, security consultancies, the civil service, public utilities, retail, the military and more. They work in a rapidly developing and expanding field, with lucrative job opportunities. At Royal Holloway, University of London we have particularly strong links with the information security industry and our graduates are highly employable.

This programme will give you a solid grounding in the knowledge, skills and practical experience required for a successful career in computing and information security or related fields. You will learn to analyse and solve problems with creativity, to translate technological innovations into programming solutions, to design, implement, test and maintain software systems, and to digest and explain complex technical information. You will also develop valuable transferrable skills such as: team working, advanced IT skills, critical thinking, data handling, communication, time management and self-motivation.

Our partners in industry advise us on our curriculum, to make sure it responds to the latest market needs and trends. This means our graduates are up-to-speed with all the latest trends and developments. We run jobs fairs and a short-term work placement scheme, and your personal adviser and the campus Careers team will be on hand to offer advice on career opportunities. We also maintain strong links with our alumni, who can often provide advice, contacts and networking opportunities. In recent years, our computer science graduates have launched careers in everything from network systems design and web development, to business management and finance. They work in organisations such as: Amazon, American Express, Apple, Bupa, Capita, CGI-Logica, Goldman Sachs, Microsoft, Symantec, among many others.

Apply now! Fall semester 2021/22
This intake is not applicable

We are currently NOT ACCEPTING applications from NON-EU countries, except Georgia and Serbia.

Application deadlines apply to citizens of: United States

Apply now! Fall semester 2021/22
This intake is not applicable

We are currently NOT ACCEPTING applications from NON-EU countries, except Georgia and Serbia.

Application deadlines apply to citizens of: United States