|Study location||United Kingdom, Leicester, Campus Centre|
|Type||Bachelor courses, full-time|
|Nominal duration||3 years|
|Tuition fee||To be confirmed|
High school / secondary education (or higher)
The entry qualification documents are accepted in the following languages: English.
Often you can get a suitable transcript from your school. If this is not the case, you will need official translations along with verified copies of the original.
IELTS: 6.0 (with a minimum of 5.5 in each component)
At least 1 reference(s) must be provided.
A motivation letter must be added to your application.
This is a specialist course within the broad field of computer science, with particular emphasis on the CIA triad: confidentiality, integrity and availability of information. Computer security is about the appropriate access to digital assets, and this course covers a mix of technical computing and professional practice in a modern and varied curriculum.
Misuses of digital technology are studied, along with the skills needed to investigate them. Computational theory is exercised in a range of experimental playgrounds, and you will learn to interpret complex scenarios and explain them to non-specialists. Expert guest lectures will be given by a wide range of professionals in the forensics and security sector, ensuring learning is relevant to cutting-edge developments in the field.
This course has been designed for students who want to pursue a career in cyber security, or related fields.
Programming in C – this module covers general programming skills and applies them to a widely-used programming language. The syntax and semantics of the program structures is covered and practical experience gained through weekly lab exercises
Computer Ethics, Law and Portfolio – computer ethics explores the ethical and moral underpinnings of UK society and how these impact on the use of interconnected computer systems. The Computer law component explores the historical basis of UK and EU law, substantive law relating particularly to computers, and procedural law concerning the handling of digital evidence. The portfolio work concentrates on the development of client-side web applications
Elements of Computing – this module covers three related themes of computer architecture, operating systems and networks. Aspects of computer security are discussed appropriately within the topics. Operating systems mediate between the user and the underlying machine.
Topics include processes, file systems, memory management, and shell scripting. The computer networks topics include network architectures, data communication fundamentals, transmission schemes and technologies, LAN protocols, and Internet Protocols. The computer architecture topics include CPU components, number representation systems, and an appreciation of assembler programming.
Computational Modelling –this module covers a number of related topic areas. The underlying discrete mathematics supports the practical subjects of functional programming and SQL. The topics covered include discrete mathematics (including logic and set theory), hypothesis testing – applying the scientific method, functional programming – an important, contemporary programming paradigm, SQL (querying relational database tables) and software testing techniques
Organisations, Project Management and Research – topics include: the business context within which IT projects are procured and developed; major components of the software lifecycle from requirements analysis to system maintenance; software project management including the analysis of risk and metrics for software quality, reliability; compliance and assurance standards; software tools for supporting the management and development process. The module includes a group project element in which a relevant topic is researched and presented to a professional standard
Forensics and Security – you will study the principles of digital forensics and security as abstract concepts, and use Windows to learn how to acquire non-volatile digital residue which has evidential value. You will also learn techniques that enhance the security of Linux servers
System Defence Strategies – topics to be considered include Incident Response and Penetration Testing, considered to be key knowledge for a Cyber Security specialist. You will learn a range of skills and strategies to protect and defend the information systems within an organisation.
Advanced Topics in Security – this topic gives you the opportunity to penetration test, investigate or respond to realistic mock scenarios; presenting findings in a manner expected of a professional security consultant
Professionalism in Forensics and Security – explores the framework within which the professional security consultant works
Individual Project – this is where you will have the chance to truly show your ability by defining a research question, conducting experimental research and presenting your findings. Regular supervision meetings will help you to maintain focus and momentum.
Secure Web Application Development
Web Application Penetration Testing
Functional Software Development
Front-End Web Development
Database Management and Programming
Fuzzy Logic and Knowledge Based Systems
Privacy and Data Protection
Graduates pursue careers as forensic computing specialists for government agencies, security consultancies and commercial IT departments.
Recent graduates have been working as software consultants, web developers, security consultants, surveillance assistants, IT officers and more.
Graduates are also well positioned to continue their academic careers by embarking on postgraduate study, in either research or taught areas, which offers the opportunity for further specialisation and enhances their existing skills.
We are currently NOT ACCEPTING applications from NON-EU countries, except Georgia and Serbia.