Bachelor of Science (Honours) Cyber Security – DRAFT

Intake DateProgramme TypeCourse Fees
Click here to know more Bachelor’s Degree Click here to know more

Beacon International College and its partner reserve the rights, at its discretion, to change, modify, add or remove the course information at any time without prior notice. Please check the course information periodically for changes.

Introduction

Cyber security is essentially about the protection of information and information systems. On this course, students will learn how to perform this protective role, exploring different security technologies and studying management processes and control systems.

As studying for the course, students will:

  • build the skills you need to design and develop modern secure systems;
  • develop their appreciation of commercial and open-source cyber security equipment, software and services;
  • learn management and applications central to cyber security issues;
  • develop interpersonal skills and business acumen.

The course will begin with an introduction to cyber security. Students will also learn about computing principles, including the essentials of programming and algorithms, software engineering, and mathematics and computer architecture.

Students will go on to build their knowledge in specialist modules that examine key topics in security. The computing modules will focus on skills in AI which has a close connection to security, while a group project will help them to develop team-working skills.

Finally, students will focus on advanced cyber security topics. This will help them to direct their studies so they reflect their interests and career ambitions. At the end of your course, students will design and develop a security-related project.

After completing the course, students will have the necessary knowledge and skills to embark on a career in cyber security.

Course Content

The Bachelor of Science (Honours) Cyber Security comprises of seventeen (17) / 360-credit compulsory modules from the following list determined by the College:

Year 1
Core Modules

This module will help you to learn the basic concepts behind current computer hardware, software and supporting technologies. As you learn these principles, you will understand how computers work beyond the statements of their high-level language, and this will allow you to write more efficient code.

This module will introduce students to problem-solving skills and key programming principles in order to translate a problem description into a sequence of steps to be executed by a computer.

The module will cover basic programming concepts and fundamentals including:

  • an overview of programming paradigms and techniques
  • analysis of problems and design using pseudo-code and flowcharts
  • basic program elements and structure
  • development supported by version-controlled code repositories.

This module will teach you the basic mathematical concepts and techniques of discrete structures. You will study mathematical logic, sets, relations and functions. The module will develop your skills in expressing problems in mathematical language, using mathematical techniques to find solutions to problems and communicating mathematical ideas clearly and succinctly.

You will gain the knowledge and skills to design and implement a relational database. It will cover information security and database management issues and an awareness of the central role of relational and other types of databases.

This module will help you to gain the knowledge and competence to deal with basic data structures and algorithms. You will learn how to specify collections using abstract data types (ADTs) and to implement them using a variety of techniques such as linked lists and trees. You’ll also use a range of algorithms, including searching and sorting.

This module introduces the basic components and concepts of cyber security in modern society, emphasising not only the technical aspects of cyber security, but also its multi-disciplinary natures including legal and crime, business and management, social and human factors, etc.

The topics of the module will include:

  • Cyber security threat landscape
  • Malware and attacks
  • Actors in cyber security and their roles in cyber security affairs
  • Authentication and password security
  • Networking and network security
  • Cryptography and securing digital information
  • Web security and cyber ethics
  • Cyber crime and warfare
  • Cyber law and legislation
  • Analysis and management of cyber risks
  • Cyber security in business and social media.
Year 2
Core Modules

The aim of this module is to provide you with the knowledge and understanding of fundamental concepts of computational theory and computational complexity. You will learn how to examine whether a given problem can be solved computationally. The module aims to introduce computation science, to model complex dynamic systems, and diagramming models.

On this module you will identify fundamental issues in computer networks and their security, and study approaches for addressing these issues. By learning these principles, you will be able to understand emerging network technology more quickly.

In this module you will gain insights into key techniques within the field of artificial intelligence (AI). Aspects of AI you’ll cover include agents, environments and learning as well as techniques such as regression, classification, clustering, reinforcement learning, learning recommendation and decision support systems.

This module is an introduction to modern ideas in cryptology and its applications. Increase of storage, manipulation, and transfer of data on computer networks requires effective encryption techniques. This module will provide insight into some of these techniques, algorithms and their development through history. Part of the course is dedicated to the Number Theory relevant to Cryptography.

The aim of the module is to introduce you to programming, and in particular to understanding, writing, modifying, debugging and assessing the design quality of simple applications.

You do not need any previous programming experience to take this module, as it is suitable for absolute beginners.

This module is focused on analysing potential cyber security vulnerabilities/threats within diverse platforms such as; web and mobile applications. It will emphasise specific security issues for such application domains, with special consideration given to experimentation to identify and assess potential security vulnerabilities within different application domains, followed by an understanding of strategies to mitigate against them.

Year 3
Core Modules

You will investigate a topic of interest and prepare a project proposal. You will then present your ideas to the school for approval and once this has been approved, you will begin a detailed literature review of your chosen field. You will choose and follow a suitable development methodology leading to an implementation which you will evaluate.

Machine learning is an application of artificial intelligence that provides systems with the ability to automatically learn and improve from experience. This module familiarises you with some basic machine learning algorithms and techniques and their applications, as well as general questions related to analysing and handling large data sets. The emphasis will be on machine learning algorithms and applications, with some broad explanation of the underlying principles.

This module aims to introduce you to the twenty-first-century offence of cybercrime and the theoretical suppositions underpinning it. It explores the definition, regulation, typologies, methods, categories and patterns of victimisation. It also critically examines law enforcement, regulation and legal issues in digital forensic acquisition.

Please note, we regularly review our course content to offer relevant, impactful and career-shaping learning. Therefore, the following modules are indicative and subject to change.

The module aims to introduce managerial approaches to information security in modern enterprises. It considers how to manage the use of information assets securely and support the goals and objectives of enterprises through effective information security governance, risk management, and contingency planning.

This module aims to enable students to engage with research on advanced and emerging topics in cyber security.

Students will be able to understand the latest research progress and challenges in these emerging topics and apply the best practices to integrate these research results into developing secure systems.

The topics of the module for this semester will include:

  • Access control;
  • Steganography and digital watermarking;
  • IoT security;
  • Biometrics.
Admission Criteria

Age Requirement

At least 18 years old

Academic Requirement

  • At least GCE A-Level (112 UCAS points and above) or equivalent qualification, along with GCSE, or Level 2 equivalent pass in both English and Maths (at least Grade C).

Exceptional Entry:
Candidates who do not possess the normal minimum entry qualifications are considered on an individual basis by the University. A mature candidate shall be at least 30 years old and possess a minimum of 8 years of working experience.

Admission with Credit (Advanced Standing):
Students with an appropriate HND/C in the relevant discipline or equivalent can transfer directly onto the degree. Other students wishing to enter the course may apply on the basis of RPL and RPEL for admission with Credit

English Entry Requirement

  • Overall IELTS 6.0 with minimum 5.5 in all components, 
  • or the equivalent
Key Facts
Accredited by: University of West London

Course Length:

36 Months (Full-Time & Part-Time)

Minimum Class Enrollment Requirements:

Master’s Degree: 10 students
Bachelor’s Degree: 10 students
Higher Diploma: 6 students
Diploma: 6 students
English Courses: 6 students

Please note that classes will only commence once the minimum enrollment requirement for each programme is met.

Support for students and their learning:

  • All students studying in Beacon benefit from the team of dedicated tutors who provide a point of personal and regular contact for students
  • An induction programme both for first year students and direct entry year two or three students
  • Student handbook, programme handbook  and individual module handbooks
  • Module content and materials via  Moodle Virtual Learning Environment
  • Library and study skills packages
  • Library and learning resources of both Cardiff Metropolitan University and Beacon
  • 24 hour wifi, photocopying & printing services, library with PCs and laptop recommendation services
  • Unlimited worldwide web access
  • Access to student services including those offered by careers, welfare and counselling.

Teacher-Student Ratio

Students may refer to the here for more information.

About University of West London

The University of East London is founded in 1898 and located in the East London boroughs of Stratford and Docklands. It is ranked:

  • 80% of our research is rated as world-leading (4*) or internationally excellent (3*) in the latest Government Research Excellence Framework (REF) assessment

Find out more about the University of East London: https://www.uwl.ac.uk