Course Details
BSc Hons Cyber Security with Foundation Year
The professionally oriented degree is developed with a view to delivering the future digital defenders and ensures that students have a technical background and strategic thinking process that would keep the world networks and data infrastructure secure. A broad overview of the offensive and defensive security is provided at the course: ethical hacking and threat intelligence, digital forensics, cloud virtualisation. With a Foundation Year long enough to obtain a minimum level of technical literacy and mathematical reasoning, students proceed through a realistic curriculum of how the real process of the security business works. Such immersion will help graduates to gain the higher degrees of problem solving skills and technical ability to mitigate the effects of sophisticated cyber threats and deliver the digital capability of digital organisations.
- Duration: 4 years inclusive of the Foundation Year
- Study Mode: Full-time
- Assessment: Writing assessment, and interview
The Foundation Year is an important entry level course, which offers students a good technical and academic foundation before joining the full degree. The syllabus is aimed at developing the necessary mathematical reasoning and problem solving skills, which are
essential to security algorithms and analysis of data. The students are exposed to the fundamentals of computing and digital media technologies and, therefore, a uniform technical literacy among the cohort.
Offensive and Defensive Mastery: Not only the training in ethical hacking(penetration testing), but also the training in security operations (Cyber Ops) training, to provide a 360 degree view on digital security.
Infrastructure Expertise: Vast coverage on networking, routing, switching and automation of systems with the intention of seeing that the students are conversant with the environment under which they are operating.
Future Ready Technologies: The practice of new advanced specialties Cloud Computing, Internet of Things (IoT), and Threat Intelligence Analysis.
Research and Consulting: The opportunities to work on industrial consultancy projects and complete dissertations with deep research to identify the solution to the actual problems of security in the world.
Good Employability: Designed to meet the needs of the rising demand of cyber security experts through the creation of portfolios and industrial-based modules.
Foundation Year
Digital Media Technologies – Introduction to electronic applications and systems used in modern computing
Foundation Computing – Study of programming languages, systems and networks
Foundation Mathematics – Development of the mathematical foundations required for security algorithms
Group Technology Project – Collaborative technical work to solve real problems in a team environment
Individual Degree Related Project – Independent student-led project focused on cyber security
Problem Solving – Development of analytical skills to troubleshoot technical issues effectively
Year 1
Problem Solving Through Programming – Learning to write and debug programs for security automation
Cyber Security Essentials – Introduction to threats, risks and protection in cyberspace
Introduction to Databases – Understanding how data is stored, managed and secured in organisational systems
Introduction to Networks and Security – Basics of network structures and digital defence
Network Applications – Overview of interactions between software, protocols and network infrastructure
Routing and Switching – Understanding how data is transmitted across global networks
Year 2
Ethical Hacking and Pen Testing – Study of legal techniques used to identify system vulnerabilities
Network Implementation – Practical experience in installing and maintaining network infrastructure
Network Security – Advanced methods to protect hardware and software from unauthorised access
Network Systems Automation – Use of tools and scripts to manage and secure large networks
Research Methods Project – Development of academic and technical research skills for advanced study
Threat Intelligence Analysis – Methods for identifying, monitoring and predicting cyber threats
Year 3
Cyber Ops – Practical preparation for monitoring and managing Security Operations Centres
Dissertation – Independent specialist research project in cyber security
Industrial Consulting Project – Working with real clients to provide professional security solutions
Cybercrime and Digital Forensics – Investigation of digital evidence and legal aspects of cybercrime
Internet of Things – Study of security risks and protection of interconnected smart devices
Network Management – Monitoring, maintenance and optimisation of enterprise network systems
Cloud Computing and Virtualisation – Security of virtual environments and cloud-based data systems
Career
Ethical Hacker Penetration Tester: This is the job of the vulnerabilities identification and the remedies against them in a simulated legal type of cyber attacks.
Security Operations Centre (SOC) Analyst: This is an activity that is committed to realtime network monitoring with an object to detecting and reacting to the occurrence of security intrusions.
Cyber Security Consultant: Help to organisations to develop and sustain strong digital security.
Digital Forensics Investigator: To study on cybercrimes, it involves retrieval and analysis of documents of electronic devices.
Network Security Engineer: Designing and developing the secure environment that backups the state of contemporary business.
Threat Intelligence Analyst:to detect and report the international cyber threat patterns and motives of the hackers.
Cloud Security Specialist: The specialisation in the special security issues of the virtualised/cloud-based environment.
Incident Response Manager: Heads the team, which responds and resolves major data breaches/attacks.
Apply Here
Category
Latest posts
- All Posts
- Career Guidance
- Consultant
- Education
- Education Consultancy
- Foundation Courses
- HND Programs
- Learning
- Next Consultants
- Student Success
- Student Support
- Study
- Study Opportunities
- UK Study
Tags
Contact Info
Contact us today to schedule your consultation.