STUDY

Undergraduate

BSc (Hons) Computing (Cyber Security)

Rack server with lights
Institution code: S82
UCAS code: I103
Start date: September 2024
Duration: Three years full-time, four and a half to nine years part-time
Location: Ipswich
Typical Offer: 112 UCAS tariff points (or above) BBC (A-Level) DMM (BTEC), Merit (T Level)
Institution code: S82
UCAS code: I103
Start date: September 2024
Duration: Three years full-time, four and a half to nine years part-time
Location: Ipswich
Typical Offer: 112 UCAS tariff points (or above) BBC (A-Level) DMM (BTEC), Merit (T Level)
Course information table
Institution code: S82
UCAS code: I103
Start date: September 2025
Duration: Three years full-time, four and a half to nine years part-time
Location: Ipswich
Typical Offer: 112 UCAS tariff points (or above) BBC (A-Level) DMM (BTEC), Merit (T Level)
Course information table
Institution code: S82
UCAS code: I103
Start date: September 2025
Course information table
Duration: Three years full-time, four and a half to nine years part-time
Location: Ipswich
Typical Offer: 112 UCAS tariff points (or above) BBC (A-Level) DMM (BTEC), Merit (T Level)

Overview

This course is provided as a pathway on our BSc (Hons) Computing degree. All students begin their studies on the BSc (Hons) Computing degree before choosing the cyber security pathway towards the end of their first year of study. Students who complete this pathway will receive the specialist BSc (Hons) Computing (Cyber Security) award at graduation.

 

Introduction

As more time is spent online, the amount of data we create increases. Often this data contains personal or sensitive information that is vulnerable to cyber-attacks. The networks and systems themselves can also be disrupted causing millions in damages and lost revenue. The cyber security pathway on our BSc (Hons) Computing degree provides you with the skills and knowledge to prevent and defend from these attacks.

There has never been a better time to begin your career as a cyber security professional. Global spending on cyber security alone is expected to exceed £68 billion by 2025. Here in the UK, the National Cyber Security Centre (NCSC) reports around 60 ‘high-level’ cyber-attacks a month, many of which threaten national security.

 

Course Highlights

  • Access to our state-of-the-art cyber security range allowing students to simulate attack and defence scenarios.
  • Learn how to secure enterprise computer networks in our new Juniper Networking Lab.
  • Access to resources from some of the largest tech companies including Amazon Web Services, Juniper, Oracle and our new Google Student Club.
  • An opportunity to start your own cyber security business with the University of Suffolk’s Innovation Labs (ILABS) and gain guidance from business leaders and academics.

Our cyber security pathway combines a solid grounding in computer systems with the expertise required for a successful career in the field of cyber security.

By completion of this degree, we prepare you to take the certification exams for (ISC)2’s Certified Secure Software Lifecycle Professional (CSSLP) and Certified Information Systems Security Professional (CISSP) qualifications – should you wish.

 

How will you be taught?

You will be taught by experienced lecturers who use their years of industry and research knowledge to demonstrate best practice, industry standards and innovative technologies. You will experience a variety of teaching methods including lectures and seminar sessions, totalling at least 12 hours of contact time per week. You will also have access to our virtual learning environment, Brightspace, allowing you 24/7 access to lecture material and activities, both on and off campus.

Students also have access to our computing Slack channel allowing them to collaborate and chat with each other. New computing students joining the University will receive access to our ‘New Student’ Slack channel in the weeks before the course commences. This allows new students to get to know each other and make friends before they arrive on campus.

 

How will you be assessed?

Throughout the course, the emphasis is placed on students completing hands-on projects that they can later present in their professional portfolio to employers. A variety of assessment methods are used, including individual and group-based practical projects, quizzes, technical reports and presentations. There are opportunities for feedback on your work throughout and you will receive the support you need through your lecturers and our academic support and library services teams.

 

The University of Suffolk is world-class and committed to our region. We are proudly modern and innovative and we believe in transformative education. We are on the rise with a focus on student satisfaction, graduate prospects, spending on academic services and student facilities.

10th

in the UK for feedback satisfaction in Computer Science and Information Systems

(The Guardian University Guide 2023)

2nd

in the East of England for graduate prospects

(The Complete University Guide 2024)

11th

in the UK for social inclusion

(The Good University Guide 2023)

Course Modules

Our undergraduate programmes are delivered as 'block and blend', more information can be found on Why Suffolk? You can also watch our Block and Blend video.   

Downloadable information regarding all University of Suffolk courses, including Key Facts, Course Aims, Course Structure and Assessment, is available in the Definitive Course Record 

This module covers the principles of computer systems, hardware components, the essence of operating systems, and relevant computing-related mathematics. This module will provide the foundational underpinning to enable students to progress deeper into different computing specialisms, and a grasp of the history of computing, recent developments and its possible future. 

This module introduces the concepts of communications and networking. It explores the Open Systems Interconnectivity (OSI) 7-layer reference model and TCP/IP Routing Suite (the 5-layer Internet reference model). TCP/IP is the model which is most commonly deployed in the majority of modern-day networks.

The module introduces the concepts of web design, with a focus on designing responsive websites that are targeted at mobile platforms. Students are introduced to HTML, CSS and JavaScript to provide them with an understanding of what goes into the front-end of modern websites. Using a series of case studies, students will analyse the design and layout of a range of existing sites using a number of common analysis techniques.

This module introduces students to the concepts and practice of computer programming.  It is aimed at providing students with an understanding of the fundamentals of computer programming by having them work through a range of tasks focused on layout, structure and functionality.

This module provides an understanding of why cyber security matters to businesses, to society and to individuals, coupled with knowledge of basic concepts, attack techniques, attacker types, and the core elements of cyber assurance.

This module provides an introduction to the artificial intelligence and data science fields, covering the history of the discipline, and exploring a variety of “classical AI” topics.

This module focuses on all phases of the modern software engineering lifecycle and advanced software engineering topics, including critical software, secure software, formal methods and project management from the practitioner’s perspective. This will be put into practice through the requirements gathering, design, implementation and testing of an extensive project that meets the needs of a particular enterprise.

This module provides essential knowledge and appreciation of the role of relational database systems, including basic principles and practice of design, implementation and development for both system designers and software engineers. It will include practical exercises in Structured Query Language. 

Research skills are an essential set of capabilities in the toolkit of a professional software engineer. In this module, students will develop knowledge and understanding of the purpose, processes, methods (surveys, experiments, interviews, case studies, etc.), analysis (qualitative and quantitative), and outputs of research and will be able to apply them. This module also delves into the professional, legal and ethical standards and guidelines that inform and guide best practice in business and computing.

This module focuses on data structures (e.g. linked lists, trees, heaps, hash tables, etc), algorithms (sorting, searching, dynamic programming, greedy, graph, geometric, cryptographic, string matching and compression algorithms, etc), and advanced programming techniques and other language paradigms.

Software, networks and databases do not exist in isolation, but form part of systems. Few systems are purely technical, but are socio-technical and info-socio-technical in nature, where human beings may be central or peripheral to the system, yet be the weakest link in their security. This module introduces, in the context of cyber security, system thinking and human behaviour, and how social engineering and open-source intelligence may be used in both attack and defence of systems and individuals.

This module covers basic and advanced security concepts related to wired and wireless networks, and builds upon the network knowledge previously covered in Level 4 study. Students will learn about the main challenges faced by a variety of wired and wireless environments. Further, the module presents common defence techniques and tools used to counter different security threats, and also explores some of the latest network security challenges posed by recent technology developments.

The module provides the opportunity for students to apply and develop some of the knowledge and skills acquired in their degree by engaging in a significant project in a specialist area of computing, typically software or networks. It will enable and require students to utilise practical, intellectual and decision-making skills in novel situations and develop their autonomy and self-direction. 

There has been a triple convergence of computing, communications and the physical world, leading to the creation of complex cyber-physical systems, a reliance on strong cryptography, and the need to instil security into software and cyber-physical systems in the face of an ever-evolving threat landscape.

Cyber security is now an executive-level concern in most organisations. Cyber security specialists will be required to deliver strategic value to their organisations by ensuring security is intrinsic to system architectures by design and by default, by applying appropriate standards in risk analysis, systems modelling and policy design, and scanning the horizon of emergent threat landscapes to discern new issues.

Cyber attacks are increasing in frequency and diversity with hostile actors probing for vulnerabilities, cooperating to develop exploits, and deploying these on an industrial scale. Many organisations are essentially under continuous attack from multiple actors. Eternal vigilance through monitoring and logging is essential for reactive and proactive responses. Inevitably some attacks will be successful and effective actions are required to handle these incidents, limit breaches, and collect evidence for investigation.

This covers the full range of skills and knowledge required for “Big Data” including parallel and NoSQL databases, statistical modelling and programming, machine learning, data analytics and visualisation. These skills are essential for making sense of security-related Big Data.

This module provides a systematic understanding of distributed operating systems, software services and applications in terms of their architectures, functionality and behaviour. It includes case studies on the “Internet of Things” and cloud computing as well as topics on parallel programming.

The module is intended to provide students with an understanding of development for mobile devices with a focus on the constraints of mobile hardware, including interface and networking. Students will learn to integrate input from hardware sensors and work with networked data and services.

Course Modules

Our undergraduate programmes are delivered as 'block and blend', more information can be found on Why Suffolk? You can also watch our Block and Blend video.   

Downloadable information regarding all University of Suffolk courses, including Key Facts, Course Aims, Course Structure and Assessment, is available in the Definitive Course Record 

This module covers the principles of computer systems, hardware components, the essence of operating systems, and relevant computing-related mathematics. This module will provide the foundational underpinning to enable students to progress deeper into different computing specialisms, and a grasp of the history of computing, recent developments and its possible future. 

This module introduces the concepts of communications and networking. It explores the Open Systems Interconnectivity (OSI) 7-layer reference model and TCP/IP Routing Suite (the 5-layer Internet reference model). TCP/IP is the model which is most commonly deployed in the majority of modern-day networks.

The module introduces the concepts of web design, with a focus on designing responsive websites that are targeted at mobile platforms. Students are introduced to HTML, CSS and JavaScript to provide them with an understanding of what goes into the front-end of modern websites. Using a series of case studies, students will analyse the design and layout of a range of existing sites using a number of common analysis techniques.

This module introduces students to the concepts and practice of computer programming.  It is aimed at providing students with an understanding of the fundamentals of computer programming by having them work through a range of tasks focused on layout, structure and functionality.

This module provides an understanding of why cyber security matters to businesses, to society and to individuals, coupled with knowledge of basic concepts, attack techniques, attacker types, and the core elements of cyber assurance.

This module provides an introduction to the artificial intelligence and data science fields, covering the history of the discipline, and exploring a variety of “classical AI” topics.

This module focuses on all phases of the modern software engineering lifecycle and advanced software engineering topics, including critical software, secure software, formal methods and project management from the practitioner’s perspective. This will be put into practice through the requirements gathering, design, implementation and testing of an extensive project that meets the needs of a particular enterprise.

This module provides essential knowledge and appreciation of the role of relational database systems, including basic principles and practice of design, implementation and development for both system designers and software engineers. It will include practical exercises in Structured Query Language. 

Research skills are an essential set of capabilities in the toolkit of a professional software engineer. In this module, students will develop knowledge and understanding of the purpose, processes, methods (surveys, experiments, interviews, case studies, etc.), analysis (qualitative and quantitative), and outputs of research and will be able to apply them. This module also delves into the professional, legal and ethical standards and guidelines that inform and guide best practice in business and computing.

This module focuses on data structures (e.g. linked lists, trees, heaps, hash tables, etc), algorithms (sorting, searching, dynamic programming, greedy, graph, geometric, cryptographic, string matching and compression algorithms, etc), and advanced programming techniques and other language paradigms.

Software, networks and databases do not exist in isolation, but form part of systems. Few systems are purely technical, but are socio-technical and info-socio-technical in nature, where human beings may be central or peripheral to the system, yet be the weakest link in their security. This module introduces, in the context of cyber security, system thinking and human behaviour, and how social engineering and open-source intelligence may be used in both attack and defence of systems and individuals.

This module covers basic and advanced security concepts related to wired and wireless networks, and builds upon the network knowledge previously covered in Level 4 study. Students will learn about the main challenges faced by a variety of wired and wireless environments. Further, the module presents common defence techniques and tools used to counter different security threats, and also explores some of the latest network security challenges posed by recent technology developments.

The module provides the opportunity for students to apply and develop some of the knowledge and skills acquired in their degree by engaging in a significant project in a specialist area of computing, typically software or networks. It will enable and require students to utilise practical, intellectual and decision-making skills in novel situations and develop their autonomy and self-direction. 

There has been a triple convergence of computing, communications and the physical world, leading to the creation of complex cyber-physical systems, a reliance on strong cryptography, and the need to instil security into software and cyber-physical systems in the face of an ever-evolving threat landscape.

Cyber security is now an executive-level concern in most organisations. Cyber security specialists will be required to deliver strategic value to their organisations by ensuring security is intrinsic to system architectures by design and by default, by applying appropriate standards in risk analysis, systems modelling and policy design, and scanning the horizon of emergent threat landscapes to discern new issues.

Cyber attacks are increasing in frequency and diversity with hostile actors probing for vulnerabilities, cooperating to develop exploits, and deploying these on an industrial scale. Many organisations are essentially under continuous attack from multiple actors. Eternal vigilance through monitoring and logging is essential for reactive and proactive responses. Inevitably some attacks will be successful and effective actions are required to handle these incidents, limit breaches, and collect evidence for investigation.

This covers the full range of skills and knowledge required for “Big Data” including parallel and NoSQL databases, statistical modelling and programming, machine learning, data analytics and visualisation. These skills are essential for making sense of security-related Big Data.

This module provides a systematic understanding of distributed operating systems, software services and applications in terms of their architectures, functionality and behaviour. It includes case studies on the “Internet of Things” and cloud computing as well as topics on parallel programming.

The module is intended to provide students with an understanding of development for mobile devices with a focus on the constraints of mobile hardware, including interface and networking. Students will learn to integrate input from hardware sensors and work with networked data and services.

Waterfront Building reflecting in the marina

WHY SUFFOLK

16th place in the Whatuni Student Choice Awards for Best Facilities 2023

WUSCA 2023

5th place in the Whatuni Student Choice Awards for Career Prospects 2023

WUSCA 2023

14th place in the Whatuni Student Choice Awards for Student Support 2023

WUSCA 2023
A student sitting with a laptop
Student at The DigiTech Centre
Three students gaming in classroom
Computing students
Two students working at a computer
Students at The DigiTech Centre
Logo of the DigiTech Centre on wall
Inside The DigiTech Centre

Entry Requirements

Entry Requirements

home-masthead-th

Career Opportunities

Our pathway in cyber security will provide you with the knowledge and skills required to become a career-ready graduate. The University of Suffolk’s Innovation Labs (ILABS) provides students will the opportunity to start a business with business and academic guidance, facilities and support. Students who graduate on this pathway could also pursue a career in one of the following roles:

  • Cyber Security Expert

  • Cyber Security Analyst

  • Cyber Security Consultant

  • IT Security Administrator

  • IT Security Engineer

  • Information Security Analyst

  • IT Security Manager

  • Penetration Tester

  • SOC Analyst

Your Course Team

Ali Alhaj

Ali Alhaj joined the University in July 2020 and is a Lecturer of Cyber Security and course leader of BSc (Hons) Computing.

Ali Alhaj staff profile photo

Associate Professor Sean Preston

Sean Preston is an Associate Professor in Computing and the Associate Dean for Learning, Teaching and Student Experience for the School of Technology, Business.

Sean Preston staff profile photo

Dr Felix Ngobigha

Dr Felix Ngobigha is a Senior Lecturer in Network Engineering and had previously been Scientific Officer with the Centre for Satellite Technology Development.

Felix Ngobigha staff profile photo

Mark Power

At Suffolk, Mark is a Lecturer in Computing and teaches on the BSc (Hons) Computing Degree. Prior to that he worked for a FTSE100 company in telecoms.

Mark Power staff profile photo

Steven Harris

Steve maintains an active interest in 'serious games' including, gaming for the visually impaired and early years educational games.

Steven Harris staff profile photo

Professor Nicholas Caldwell

Professor Nicholas Caldwell is Professor of Information Systems Engineering at the University of Suffolk.

Nicholas Caldwell staff profile photo

Dr Kakia Chatsiou

Kakia is a Lecturer in Computing with expertise in machine learning, information management systems and data science.

Kakia Chatsiou staff profile photo

Dr Chris Lewington

Dr Chris Lewington is a Senior Lecturer in Cyber Security, joining us in June 2019 after a successful career in finance, telecoms, defence and biotechnology.

Dr Adnane Ez-zizi

Dr Adnane Ez-zizi is a Senior Lecturer in Artificial Intelligence and Course Leader for the MSc Data Science and Artificial Intelligence.

Adnane Ez-Zizi staff profile photo

Fees and Funding

UK Full-time Tuition Fee

£9,250

per year
UK Part-time Tuition Fee

£1,454*

per 20 credit module
International Full-time Tuition Fee

£15,210

per year

*Please contact the Student Centre for further details

The decision to study a degree is an investment into your future, there are various means of support available to you in order to help fund your tuition fees and living costs. You can apply for funding from the Spring before your course starts.

UK Fees and Finance UK Bursaries and Scholarships International Fees and Scholarships

Fees and Funding

UK Full-time Tuition Fee*

£9,250

per year
UK Part-time Tuition Fee*

£1,454*

per 20 credit module

* Maximum tuition fees chargeable to Home-fee students are set by the UK Government normally in the autumn or early winter in the year prior to the year of entry (e.g. autumn 2024 for entry in 2025/26). The University of Suffolk reserves the right to increase tuition fees for 2025/26 if the UK Government increases the maximum annual fee. International tuition fees for 2025/26 will be confirmed and updated here in May 2024.

The decision to study a degree is an investment into your future, there are various means of support available to you in order to help fund your tuition fees and living costs. You can apply for funding from the Spring before your course starts.

UK Fees and Finance UK Bursaries and Scholarships International Fees and Scholarships

Ipswich Award

The University of Suffolk is offering a £1,000 Award for students joining the University of Suffolk’s Ipswich campus. The Award is based on specific eligibility criteria based on your year of entry.

More information
A group of students walking down a stairwell

How to Apply

To study this course on a full-time basis, you can apply through UCAS. As well as providing your academic qualifications, you’ll be able to showcase your skills, qualities and passion for the subject.

Apply Now Further Information on Applying
A silhouette of a student in their cap and gown

Karina Karushkova, BSc (Hons) Computing graduate

"The University has a high reputation within the fields of technology especially in relation to the degrees it offers for programming and system design."

read more
Student looking at the camera

Related Courses

Computer keyboard
BSc (Hons) Computing (Web and Mobile Development)

Stand out with expert-led learning, real-world projects, and specialized modules. Access tech resources, acquire new skills, and develop your portfolio.

Circuit board
BSc (Hons) Computing

Chose a tailored pathway or create your own. Cyber security, Web and Mobile Development, and AI. Industry connections, real-world projects, and innovation opportunities. Your future starts here.

Binary code flying through a vortex
BSc (Hons) Computing (Artificial Intelligence)

Master data science and AI, gain industry insights, launch AI business, and develop skills through hands-on projects and advanced modules. Engage with experts, real-world briefs, and seminars.

Games controller
BSc (Hons) Games Development

Shape your games development future with our integrated degree. Industry mentors, cutting-edge skills, and collaborations with gaming giants. Join us now for game creation excellence.

Unibuddy: Chat to our Students and Staff

Aerial view of the Abbey Gardens in Bury St Edmunds

Destination Suffolk