On this course, you'll study how computers and technology can be used to investigate, prevent and manage cyber attacks. You'll develop web technology programming skills and study specialised tools and operating system environments.
You'll examine encryption algorithms, public-key cryptography, network security, endpoint security and digital forensics. Project themes include security and vulnerability analysis, mobile app security and cyber intelligence analysis.
Practical studies include ethical hacking (such as password cracking, vulnerability scanning, social engineering and system exploits) and Security Operations Centre (SOC) functions, such as threat intelligence, threat hunting, SIEMs and incident response.
Have you considered a career at the cutting-edge of the fight against cybercrime? There's an increasing demand for skilled cyber security professionals with the expertise that this course offers.
Teaching Excellence Framework (TEF) Gold award
- Our commitment to high quality teaching has been recognised with a TEF Gold rating. The University has received an overall rating of Gold, as well as securing a Gold award in the framework's two new student experience and student outcomes categories.
Reasons to choose Kingston University
- Academic Centre of Excellence in Cyber Security Education (ACE-CSE) Silver Award recognition by NCSC – part of GCHQ and leading towards the Gold Award.
- Kingston University has a dedicated cyber security and digital forensics lab where you'll have access to industry standards software and tools, such as Splunk, Nessus, Kali Linux, Autopsy, FTK (Forensic Tool Kit), etc.
- This degree is aligned with industry-recognised certifications (i.e. CompTIA, EC-Council, Splunk and more), giving your career a head start.
Year 1
- In the first year of this degree, students are introduced to computer security, digital forensics and legal aspects of forensic investigative processes. They will also develop web technology (e.g. Javascript, HTML, CSS), Java and Python programming skills; and gain a practical insight into the use of specialised tools and operating system environments. Examples include hex editors, hash functions, Forensic Tool Kit (FTK), Windows 10, Linux, Android, iOS and more.
Core modules
- Programming I: Thinking Like a Programmer
- Computing Fundamentals
- Cyber Crime and Digital Forensics
- Professional Environments 1
Year 2
- In the second year, students will study ethical hacking through practical activities (e.g. password cracking, port scanning, anonymous browsing, keyboard logging, screen capture, packet interception, social engineering and malware).
Core modules
- Ethical Hacking
- Computing Systems
- Professional Environments 2
Optional modules
- Database Driven Application Development
- Networking Concepts
Optional professional placement year
Core modules
Please note
- Optional modules only run if there is enough demand. If we have an insufficient number of students interested in an optional module, that module will not be offered for this course.
Foundation year
- If you would like to study computing at Kingston University but are not yet ready to join the first year of a BSc (Hons) course, you can include an extra foundation year within your chosen degree. Please see the foundation year course page for details of modules.
Year 3-4
- In the final year, students will study encryption algorithms, public-key cryptography systems, network security techniques, security policies as well as live, network and mobile forensics in the context of a security operations centre. They will also complete an individual 'capstone' project. This project is a showcase opportunity in which students undertake a research and development project of their choice. They will develop a tangible and noteworthy artefact, that can be showcased during interviews for placements, internships or full-time roles. Examples topic themes include crypto currencies, mobile privacy, blockchain technologies, malware etc.
Core modules
- Cryptography and Network Security
- Threat Hunting, Analysis and Mitigation
- Individual Project
Optional modules
- Internet Protocols and Services
- Software Development Practice
- Digital Entrepreneurship
Future Skills
Knowledge to give you the edge
- Embedded within every course curriculum and throughout the whole Kingston experience, Future Skills will play a role in shaping you to become a future-proof graduate, providing you with the skills most valued by employers such as problem-solving, digital competency, and adaptability.
- As you progress through your degree, you'll learn to navigate, explore and apply these graduate skills, learning to demonstrate and articulate to employers how future skills give you the edge.
- At Kingston University, we're not just keeping up with change, we're creating it.
Accreditation
- This degree has been accredited by BCS, The Chartered Institute for IT. Accreditation is a mark of assurance that the degree meets the standards set by BCS. An accredited degree entitles you to professional membership of BCS, which is an important part of the criteria for achieving Chartered IT Professional (CITP) status through the Institute. Some employers recruit preferentially from accredited degrees, and an accredited degree is likely to be recognised by other countries that are signatories to international accords. This degree is accredited by BCS for the purposes of fully meeting the academic requirement for registration as a Chartered IT Professional.
- This degree has been accredited by BCS, on behalf of the Engineering Council for the purposes of partially meeting the academic requirement for a Chartered Engineer (CEng). Accreditation is a mark of assurance that the degree meets the standards set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC). An accredited degree will provide you with some or all of the underpinning knowledge, understanding and skills for eventual registration as an Incorporated (IEng) or Chartered Engineer (CEng).
Teaching and assessment
- Scheduled learning and teaching on this course includes timetabled activities including lectures, seminars and small group tutorials.
- It may also include placements, project work, workshops, workshops in computer labs, and laboratory workshops