Cyber Security & Digital Forensics BSc (Hons)

by Kingston University Claim Listing

On this course, you'll study how computers and technology can be used to investigate, prevent and manage cyber attacks. You'll develop web technology programming skills and study specialised tools and operating system environments.

£9535

Contact the Institutes

Fill this form

Advertisement

Kingston University Logo

img Duration

3-4 Years

Course Details

On this course, you'll study how computers and technology can be used to investigate, prevent and manage cyber attacks. You'll develop web technology programming skills and study specialised tools and operating system environments.

You'll examine encryption algorithms, public-key cryptography, network security, endpoint security and digital forensics. Project themes include security and vulnerability analysis, mobile app security and cyber intelligence analysis.

Practical studies include ethical hacking (such as password cracking, vulnerability scanning, social engineering and system exploits) and Security Operations Centre (SOC) functions, such as threat intelligence, threat hunting, SIEMs and incident response.

Have you considered a career at the cutting-edge of the fight against cybercrime? There's an increasing demand for skilled cyber security professionals with the expertise that this course offers.

Teaching Excellence Framework (TEF) Gold award

  • Our commitment to high quality teaching has been recognised with a TEF Gold rating. The University has received an overall rating of Gold, as well as securing a Gold award in the framework's two new student experience and student outcomes categories. 

Reasons to choose Kingston University

  • Academic Centre of Excellence in Cyber Security Education (ACE-CSE) Silver Award recognition by NCSC – part of GCHQ and leading towards the Gold Award.
  • Kingston University has a dedicated cyber security and digital forensics lab where you'll have access to industry standards software and tools, such as Splunk, Nessus, Kali Linux, Autopsy, FTK (Forensic Tool Kit), etc.
  • This degree is aligned with industry-recognised certifications (i.e. CompTIA, EC-Council, Splunk and more), giving your career a head start.

Year 1

  • In the first year of this degree, students are introduced to computer security, digital forensics and legal aspects of forensic investigative processes. They will also develop web technology (e.g. Javascript, HTML, CSS), Java and Python programming skills; and gain a practical insight into the use of specialised tools and operating system environments. Examples include hex editors, hash functions, Forensic Tool Kit (FTK), Windows 10, Linux, Android, iOS and more.

Core modules

  • Programming I: Thinking Like a Programmer
  • Computing Fundamentals
  • Cyber Crime and Digital Forensics
  • Professional Environments 1

Year 2

  • In the second year, students will study ethical hacking through practical activities (e.g. password cracking, port scanning, anonymous browsing, keyboard logging, screen capture, packet interception, social engineering and malware).

Core modules

  • Ethical Hacking
  • Computing Systems
  • Professional Environments 2

Optional modules

  • Database Driven Application Development
  • Networking Concepts

Optional professional placement year

Core modules

  • Industrial Placement

Please note

  • Optional modules only run if there is enough demand. If we have an insufficient number of students interested in an optional module, that module will not be offered for this course.

Foundation year

  • If you would like to study computing at Kingston University but are not yet ready to join the first year of a BSc (Hons) course, you can include an extra foundation year within your chosen degree. Please see the foundation year course page for details of modules.

Year 3-4

  • In the final year, students will study encryption algorithms, public-key cryptography systems, network security techniques, security policies as well as live, network and mobile forensics in the context of a security operations centre. They will also complete an individual 'capstone' project. This project is a showcase opportunity in which students undertake a research and development project of their choice. They will develop a tangible and noteworthy artefact, that can be showcased during interviews for placements, internships or full-time roles. Examples topic themes include crypto currencies, mobile privacy, blockchain technologies, malware etc.

Core modules

  • Cryptography and Network Security
  • Threat Hunting, Analysis and Mitigation
  • Individual Project

Optional modules

  • Internet Protocols and Services
  • Software Development Practice
  • Digital Entrepreneurship

Future Skills
Knowledge to give you the edge

  • Embedded within every course curriculum and throughout the whole Kingston experience, Future Skills will play a role in shaping you to become a future-proof graduate, providing you with the skills most valued by employers such as problem-solving, digital competency, and adaptability.
  • As you progress through your degree, you'll learn to navigate, explore and apply these graduate skills, learning to demonstrate and articulate to employers how future skills give you the edge.
  • At Kingston University, we're not just keeping up with change, we're creating it.

Accreditation

  • This degree has been accredited by BCS, The Chartered Institute for IT. Accreditation is a mark of assurance that the degree meets the standards set by BCS. An accredited degree entitles you to professional membership of BCS, which is an important part of the criteria for achieving Chartered IT Professional (CITP) status through the Institute. Some employers recruit preferentially from accredited degrees, and an accredited degree is likely to be recognised by other countries that are signatories to international accords. This degree is accredited by BCS for the purposes of fully meeting the academic requirement for registration as a Chartered IT Professional.
  • This degree has been accredited by BCS, on behalf of the Engineering Council for the purposes of partially meeting the academic requirement for a Chartered Engineer (CEng). Accreditation is a mark of assurance that the degree meets the standards set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC). An accredited degree will provide you with some or all of the underpinning knowledge, understanding and skills for eventual registration as an Incorporated (IEng) or Chartered Engineer (CEng).

Teaching and assessment

  • Scheduled learning and teaching on this course includes timetabled activities including lectures, seminars and small group tutorials.
  • It may also include placements, project work, workshops, workshops in computer labs, and laboratory workshops
  • London Branch

    River House 53–57 High Street, London

Check out more Bachelor of Cybersecurity courses in UK

The Open University Logo

BSc (Honours) Cyber Security

Our cyber security degree combines three sought-after computing streams: networking, cyber security and digital forensics. It gives you a thorough understanding of socio-technical systems and skills to prevent or respond to cyber security incidents.

by The Open University [Claim Listing ]
Teesside University Logo

Cyber Security BSc (Hons)

Network technologies are constantly evolving and underpin almost everything we do. This degree provides a hands-on approach and strong emphasis on network infrastructure, particularly how you can create and manage secure networks.

by Teesside University [Claim Listing ]
  • Price
  • Start Date
  • Duration
University of Roehampton London Logo

Cyber Security BSc (Single Honours)

Equip yourself with the in-demand skills to combat cyber threats with our ncsc-recognised cyber security degree. Protect the digital world and join the forefront of cyber security.

by University of Roehampton London [Claim Listing ]
The University of Central Lancashire Logo

BSc (Hons) Cyber Security

The skills you’ll gain on this course will be in high demand in tomorrow’s world. The cyber security sector is facing a significant skills gap at a time when threats and the legal and commercial consequences of inadequate security are increasing.

by The University of Central Lancashire [Claim Listing ]
University of Plymouth Logo

BSc (Hons) Computer Science (Cyber Security)

Cyber security is an ever-increasing demand within every organisation across the world. This course explores the biggest threats to our data from hackers, malicious coders and social engineers to crackers, viruses, trojans, worms, botnets, zombies, phishing and pharming.

by University of Plymouth [Claim Listing ]
  • Price
  • Start Date
  • Duration

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy