Academic IELTS of 6.0, with no element below 5.5.
We will consider a range of alternative Level 3 qualifications such as an Access Course in a relevant science, computing, mathematics or engineering subject which has been passed with 112 UCAS points.
Applications from those that have undertaken a Computing foundation year will also be considered.
Have you considered a career at the cutting-edge of the fight against cybercrime? There's an increasing demand for skilled cyber security professionals with the expertise that this course offers.
On this course, you'll study how computers and technology can be used to investigate, prevent and manage cyber attacks. You'll develop web technology programming skills and study specialised tools and operating system environments. You'll examine encryption algorithms, public-key cryptography, network security, endpoint security and digital forensics. Project themes include security and vulnerability analysis, mobile app security and cyber intelligence analysis.
Practical studies include ethical hacking (such as password cracking, vulnerability scanning, social engineering and system exploits) and Security Operations Centre (SOC) functions, such as threat intelligence, threat hunting, SIEMs and incident response.
More information:click here
Year 1
In the first year of this degree, students are introduced to computer security, digital forensics and legal aspects of forensic investigative processes. They will also develop web technology (eg Javascript, HTML, CSS), Java and Python programming skills; and gain a practical insight into the use of specialised tools and operating system environments. Examples of which include hex editors, hash functions, Forensic Tool Kit (FTK), Windows 10, Linux, Android, iOS and more.
Core modules
Programming I Thinking Like a Programmer
Computing Fundamentals
Cyber Crime and Digital Forensics
Professional Environments 1
Year 2
In the second year, students will study ethical hacking through practical activities (eg password cracking, port scanning, anonymous browsing, keyboard logging, screen capture, packet interception, social engineering and malware).
Core modules
Ethical Hacking
Computing Systems
Professional Environments 2
Optional modules
Database Driven Application Development
Networking Concepts
Year 3/4
In the final year, students will study encryption algorithms, public-key cryptography systems, network security techniques, security policies as well as live, network and mobile forensics in the context of a security operations centre. They will also complete an individual ‘capstone' project. This project is a showcase opportunity in which students undertake a research and development project of their choice. They will develop a tangible and noteworthy artefact, that can be showcased during interviews for placements, internships or full-time roles. Examples topic themes include crypto currencies, mobile privacy, blockchain technologies, malware etc.
Core modules
Cyptography and Network Security
Threat Hunting, Analysis and Mitigation
Individual Project
Optional modules
Internet Protocols and Services
Software Development Practice
Digital Entrepreneurship
I work within eDiscovery (electronic discovery) which, in simple terms, means we assist our clients manage litigation or government investigations which deal with the exchange of information in electronic/digital format. My department provides a number of digital forensic solutions to solve problems like civil litigation investigations, criminal investigations, and internal investigations.
For me, this means every day I am dealing with lots of confidential client data. Emails, PowerPoints, word documents, PDFs, you name it. During my time at EY I have been exposed to many elements of eDiscovery, so day to day has varied a great deal.
Insurance - Single: 300 (£) per year