Three years full-time.
112 UCAS tariff points (or above)
If you don’t meet the above entry requirements, we may still be able to consider you. If you’re interested in applying, call our Clearing Hotline to discuss your suitability for study.
Cyber security has never been more important. Our society is entirely dependent on information technology. Computers dominate our working lives, personal lives, homes, vehicles, schools and hospitals. These are at constant risk of attack by hackers and cyber criminals.
Our course provides you with expertise in all aspects of cyber security, covering software, networks, systems, people and organisations. We develop your understanding of the motivations and techniques of attackers, and teach you how to successfully defend against them.
Current UK salaries for cyber security jobs are high, and demand for skilled professionals is set to rise. 74% of UK security professionals earn over £47,000 a year, while 39% earn salaries of over £87,000.
It is expected that there will be 350,000+ unfilled cyber security roles across the UK and Europe by 2022, and over 1.8 million globally. Whether you want to work in the UK or overseas, a vast range of career opportunities in cyber security will be available to you.
We also focus on developing your broader computing skills. You will gain additional competencies in secure programming, secure software development, databases, Big Data technologies and data analytics.
By completion of this degree, we prepare you to take the certification exams for (ISC)2’s Certified Secure Software Lifecycle Professional (CSSLP) and Certified Information Systems Security Professional (CISSP) qualifications – should you wish.
Full downloadable information regarding all University of Suffolk courses, including Key Facts, Course Aims, Course Structure and Assessment, is available in the Definitive Course Record.
This covers the principles of computer systems, hardware components, the essence of operating systems, and relevant computing-related mathematics. This module will provide the foundational underpinning to enable students to progress deeper into the disciplines of computing and networking, and a grasp of the history of computing, recent developments and its possible future.
This module introduces the concepts of communications and networking. It explores the Open Systems Interconnectivity (OSI) 7-layer reference model and TCP/IP Routing Suite (the 5-layer Internet reference model). TCP/IP is the model which is most commonly deployed in the majority of modern-day networks.
This module will introduce the concepts of operating systems, including their structure, memory and storage management, protection and security. Designed with software developers in mind, it will look closely at real-world operating systems such as Windows and UNIX.
This module introduces the concepts of programming and a modern programming language. Through programming practicals, students will become fluent in structured programming constructs, procedural programming and object-oriented programming.
This module provides an understanding of why cyber security matters to business, to society and to individuals, coupled with knowledge of basic concepts, attack techniques, attacker types, and the core elements of cyber assurance.
All cyber security professionals will be involved in the process of management as failures in management can expose organisations and systems to cyber security threats. This module aims to provide students with the tools necessary to identify, quantify and manage risk, and to do so within an ethical and legal framework.
Database systems, particularly those based on the Relational Database Model, play a significant role in the world of Information Technology. This module provides essential knowledge and appreciation of the role of relational database systems, including basic principles and practice of design, implementation and development for both system designers and software engineers. It will include practical exercises in Structured Query Language.
Research skills are an essential set of capabilities in the toolkit of a computing professional. In this module, students will develop knowledge and understanding of the purpose, processes, methods (surveys, experiments, interviews, case studies, etc.), analysis (qualitative and quantitative), and outputs of research and will be able to apply them.
This module focuses on all phases of the modern software engineering lifecycle and advanced software engineering topics, including critical software, secure software, formal methods and project management from the practitioner’s perspective. This will be put into practice through the requirements gathering, design, implementation and testing of an extensive project that meets the needs of a particular enterprise.
This module provides software engineers with a more in-depth and hands-on understanding of networking concepts, technologies and protocols. The module will cover a number of specific switching and routing techniques and technologies, including those that are intended to provide a measure of security to such networking devices and how these are configured using scripting languages and/or graphical user interfaces (GUIs).
Software, networks and databases do not exist in isolation, but form part of systems. Few systems are purely technical, but are socio-technical and info-socio-technical in nature, where human beings may be central or peripheral to the system, yet be the weakest link in their security. This module introduces, in the context of cyber security, system thinking and human behaviour, and how social engineering and open-source intelligence may be used in both attack and defense of systems and individuals.
This module focuses on data structures (e.g. linked lists, trees, heaps, hash tables, etc), algorithms (sorting, searching, dynamic programming, greedy, graph, geometric, cryptographic, string matching and compression algorithms, etc), and advanced programming techniques and other language paradigms.
This is a major project in a specialist area of computing, addressing a specific real-world business or research issue, suggested by the student, an employer or a staff member. Projects may be undertaken individually or in groups if the problem topic supports a team approach.
This covers the full range of skills and knowledge required for “Big Data” including parallel and NoSQL databases, statistical modelling and programming, machine learning, data analytics and visualisation. These skills are essential for making sense of security-related Big Data.
There has been a triple convergence of computing, communications and the physical world, leading to the creation of complex cyber-physical systems, a reliance on strong cryptography, and the need to instil security into software and cyber-physical systems ab initio in the face of an ever-evolving threat landscape. This module is the technical capstone for the degree addressing cyber security in depth across multiple domains.
Cyber security is now an executive-level concern in most organisations. Cyber security specialists will be required to deliver strategic value to their organisations by ensuring security is intrinsic to system architectures by design and by default, by applying appropriate standards in risk analysis, systems modelling and policy design, and scanning the horizon of emergent threat landscapes to discern new issues. This module is the strategic capstone of the degree.
Cyber attacks are increasing in frequency and diversity with hostile actors probing for vulnerabilities, cooperating to develop exploits, and deploying these on an industrial scale. Many organisations are essentially under continuous attack from multiple actors. Eternal vigilance through monitoring and logging is essential for reactive and proactive responses. Inevitably some attacks will be successful and effective actions are required to handle these incidents, limit breaches, and collect evidence for investigation. This module covers the preventive elements of systems monitoring, the reactive elements of incident response and follow up elements of cybercrime investigation
Students are able to progress in to a range of roles after completing this degree.
By 2022, it is expected that there will be 350,000+ unfilled cyber security roles across the UK and Europe. By 2022, it is predicted that there will be over 1.8 million unfilled cyber security roles globally.
Whether you want to work in the UK or overseas, there will be a range of opportunities in cyber security.
Fees and finance
- Full-time tuition fee: £9,250 p.a.
- International tuition fee: £13,330 p.a.
At University of Suffolk, your tuition fees provide access to all the usual teaching and learning facilities that you would expect. However, there may be additional costs associated with your course that you will need to budget for.
112 UCAS tariff points (or above), BBC (A-Level), DMM (BTEC).
Applicants are also required to have GCSE maths grade 4/C or above, or equivalent Level 2 qualification. Applicants who do not hold these qualifications may be considered on an individual basis based upon their overall application and the course applied for.
If you do not hold these qualifications please contact Admissions directly on 01473 338348 to discuss.
If you have previously studied at higher education level before you may be able to transfer credits to a related course at the University of Suffolk and reduce the period of study time necessary to achieve your degree.
Facilities and Resources
Students studying BSc (Hons) Cyber Security will benefit from dedicated computing suites with access to Microsoft Imagine software library, database servers, web server packages, Integrated Development Environments, and version control software, NoSQL databases and NVIDIA CUDA parallel programming hardware (graphics cards with 1600+ GPU cores).
As well as this, you will have the use of a network test cabinet including server, routers and switches, Internet of Things hardware and software packages, network simulation software, and software defined network and radio kits.