You are here

BSc (Hons) Cyber Security


It's time to get moving. Join in Clearing to go onwards and upwards.

Call to apply now 

University buildings
UCAS code: 
Institution code: 


Three years full-time.

Typical Offer: 

96 UCAS tariff points (or above)
​​​​CCC (A-Level), MMM (BTEC)

If you don’t meet the above entry requirements, we may still be able to consider you. If you’re interested in applying, call our Clearing Hotline to discuss your suitability for study.

View our range of computing degrees


Cyber security has never been more important. Our society is entirely dependent on information technology. Computers dominate our working lives, personal lives, homes, vehicles, schools and hospitals. These are at constant risk of attack by hackers and cyber criminals.

Our course provides you with expertise in all aspects of cyber security, covering software, networks, systems, people and organisations. We develop your understanding of the motivations and techniques of attackers, and teach you how to successfully defend against them.

Current UK salaries for cyber security jobs are high, and demand for skilled professionals is set to rise. 74% of UK security professionals earn over £47,000 a year, while 39% earn salaries of over £87,000.

It is expected that there will be 350,000+ unfilled cyber security roles across the UK and Europe by 2022, and over 1.8 million globally. Whether you want to work in the UK or overseas, a vast range of career opportunities in cyber security will be available to you.

We also focus on developing your broader computing skills. You will gain additional competencies in secure programming, secure software development, databases, Big Data technologies and data analytics.

By completion of this degree, we prepare you to take the certification exams for (ISC)2’s Certified Secure Software Lifecycle Professional (CSSLP) and Certified Information Systems Security Professional (CISSP) qualifications – should you wish.

Course modules

Full downloadable information regarding all University of Suffolk courses, including Key Facts, Course Aims, Course Structure and Assessment, is available in the Definitive Course Record.


This covers the principles of computer systems, hardware components, the essence of operating systems, and relevant computing-related mathematics. This module will provide the foundational underpinning to enable students to progress deeper into the disciplines of computing and networking, and a grasp of the history of computing, recent developments and its possible future. 

Networking Overview

This module introduces the concepts of communications and networking. It explores the Open Systems Interconnectivity (OSI) 7-layer reference model and TCP/IP Routing Suite (the 5-layer Internet reference model). TCP/IP is the model which is most commonly deployed in the majority of modern-day networks. 

Operating Systems

This module will introduce the concepts of operating systems, including their structure, memory and storage management, protection and security. Designed with software developers in mind, it will look closely at real-world operating systems such as Windows and UNIX. 

Introduction to Programming

This module introduces the concepts of programming and a modern programming language. Through programming practicals, students will become fluent in structured programming constructs, procedural programming and object-oriented programming.

Introduction to Cyber Security

This module provides an understanding of why cyber security matters to business, to society and to individuals, coupled with knowledge of basic concepts, attack techniques, attacker types, and the core elements of cyber assurance.

Cyber Security: Management, Ethics and Law

All cyber security professionals will be involved in the process of management as failures in management can expose organisations and systems to cyber security threats.  This module aims to provide students with the tools necessary to identify, quantify and manage risk, and to do so within an ethical and legal framework.

An Introduction to Relational Databases

Database systems, particularly those based on the Relational Database Model, play a significant role in the world of Information Technology. This module provides essential knowledge and appreciation of the role of relational database systems, including basic principles and practice of design, implementation and development for both system designers and software engineers. It will include practical exercises in Structured Query Language. 

Research Skills

Research skills are an essential set of capabilities in the toolkit of a computing professional. In this module, students will develop knowledge and understanding of the purpose, processes, methods (surveys, experiments, interviews, case studies, etc.), analysis (qualitative and quantitative), and outputs of research and will be able to apply them. 

Software Design Development and Engineering

This module focuses on all phases of the modern software engineering lifecycle and advanced software engineering topics, including critical software, secure software, formal methods and project management from the practitioner’s perspective. This will be put into practice through the requirements gathering, design, implementation and testing of an extensive project that meets the needs of a particular enterprise.

Advanced Networking Concepts

This module provides software engineers with a more in-depth and hands-on understanding of networking concepts, technologies and protocols. The module will cover a number of specific switching and routing techniques and technologies, including those that are intended to provide a measure of security to such networking devices and how these are configured using scripting languages and/or graphical user interfaces (GUIs). 

Human and System Cyber Security

Software, networks and databases do not exist in isolation, but form part of systems. Few systems are purely technical, but are socio-technical and info-socio-technical in nature, where human beings may be central or peripheral to the system, yet be the weakest link in their security. This module introduces, in the context of cyber security, system thinking and human behaviour, and how social engineering and open-source intelligence may be used in both attack and defense of systems and individuals.

Data Structures Algorithms and Advanced Programming

This module focuses on data structures (e.g. linked lists, trees, heaps, hash tables, etc), algorithms (sorting, searching, dynamic programming, greedy, graph, geometric, cryptographic, string matching and compression algorithms, etc), and advanced programming techniques and other language paradigms.

Project and Dissertation

This is a major project in a specialist area of computing, addressing a specific real-world business or research issue, suggested by the student, an employer or a staff member. Projects may be undertaken individually or in groups if the problem topic supports a team approach.

Information Engineering

This covers the full range of skills and knowledge required for “Big Data” including parallel and NoSQL databases, statistical modelling and programming, machine learning, data analytics and visualisation. These skills are essential for making sense of security-related Big Data.

Cyber-Physical Security

There has been a triple convergence of computing, communications and the physical world, leading to the creation of complex cyber-physical systems, a reliance on strong cryptography, and the need to instil security into software and cyber-physical systems ab initio in the face of an ever-evolving threat landscape. This module is the technical capstone for the degree addressing cyber security in depth across multiple domains.

Strategic Cyber Security

Cyber security is now an executive-level concern in most organisations. Cyber security specialists will be required to deliver strategic value to their organisations by ensuring security is intrinsic to system architectures by design and by default, by applying appropriate standards in risk analysis, systems modelling and policy design, and scanning the horizon of emergent threat landscapes to discern new issues. This module is the strategic capstone of the degree.

Cyber Forensics and Intrusion Management

Cyber attacks are increasing in frequency and diversity with hostile actors probing for vulnerabilities, cooperating to develop exploits, and deploying these on an industrial scale. Many organisations are essentially under continuous attack from multiple actors. Eternal vigilance through monitoring and logging is essential for reactive and proactive responses. Inevitably some attacks will be successful and effective actions are required to handle these incidents, limit breaches, and collect evidence for investigation. This module covers the preventive elements of systems monitoring, the reactive elements of incident response and follow up elements of cybercrime investigation

Career opportunities

Students are able to progress in to a range of roles after completing this degree.

By 2022, it is expected that there will be 350,000+ unfilled cyber security roles across the UK and Europe. By 2022, it is predicted that there will be over 1.8 million unfilled cyber security roles globally.

Whether you want to work in the UK or overseas, there will be a range of opportunities in cyber security.

Fees and finance


  • Full-time Tuition fee: £9,250 p.a.
  • Part-time Tuition fee: £1,454 per 20 credit module (Please contact the Student Centre for further information).
  • International Tuition fee: £12,150 p.a. (plus a Lab fee of £1,575) 


  • Full-time tuition fee: £9,250 p.a
  • Part-time tuition fee: £1,454 per 20 credits (please contact the Student Centre for further information)
  • Full-time International tuition fee: £14,598 p.a

Further Information

At University of Suffolk, your tuition fees provide access to all the usual teaching and learning facilities that you would expect. However, there may be additional costs associated with you course that you will need to budget for. 

* 2022-23 tuition fees are subject to change in line with inflation, or a government change in the fee cap.

Entry requirements


Professor of Information Systems Engineering

Senior Lecturer in Information Technology

Lecturer in cyber security

Facilities and Resources

Students studying BSc (Hons) Cyber Security will benefit from dedicated computing suites with access to Microsoft Imagine software library, database servers, web server packages, Integrated Development Environments, and version control software, NoSQL databases and NVIDIA CUDA parallel programming hardware (graphics cards with 1600+ GPU cores). 

As well as this, you will have the use of a network test cabinet including server, routers and switches, Internet of Things hardware and software packages, network simulation software, and software defined network and radio kits.