BSc (Hons) Computing with Cyber Security Technology

London Campus

 

INTAKE: Jan, May & Sept

Program Overview

The BSc (Hons) Computing with Cyber Security Technology program at Northumbria University is designed to equip students with the knowledge and skills to tackle the challenges of cybersecurity in today's digital world. This program provides students with a comprehensive understanding of computing principles, software development, and cybersecurity techniques. It covers topics such as network security, cryptography, ethical hacking, digital forensics, and risk management. Through a combination of theoretical learning and practical hands-on experience, students develop the expertise to protect organizations' digital assets, detect and respond to cyber threats, and ensure the security and integrity of information systems.

Curriculum: The curriculum of the BSc (Hons) Computing with Cyber Security Technology program at Northumbria University is structured to cover a broad range of topics related to computing and cybersecurity. Courses may include programming fundamentals, computer networks, operating systems, database management, and cybersecurity principles. Students also have the opportunity to specialize in cybersecurity topics such as penetration testing, malware analysis, cryptography, and cyber defense strategies. The program emphasizes practical learning through lab-based projects, simulated cyber-attacks, and industry-relevant case studies to prepare students for real-world cybersecurity challenges.

Research Focus: Northumbria University has a strong research focus in cybersecurity, with faculty members actively engaged in research projects that address current and emerging cybersecurity issues. Students have the opportunity to participate in research initiatives, working alongside faculty mentors to explore topics such as cyber threat intelligence, security analytics, secure software development, and human factors in cybersecurity. This research focus enhances students' critical thinking skills, analytical abilities, and understanding of cybersecurity principles and practices.

Industry Engagement: The BSc (Hons) Computing with Cyber Security Technology program at Northumbria University emphasizes industry engagement and collaboration to ensure that students are equipped with the skills and knowledge needed for careers in cybersecurity. The university has partnerships with leading cybersecurity firms, government agencies, and research organizations, providing students with opportunities for internships, placements, and industry projects. Students have the chance to gain practical experience through work-based learning, industry-sponsored projects, and participation in cybersecurity competitions and hackathons. This industry engagement enhances students' employability and prepares them for successful careers in the cybersecurity field.

Global Perspective: Northumbria University offers students a global perspective on cybersecurity, exploring cybersecurity challenges and solutions from an international standpoint. The BSc (Hons) Computing with Cyber Security Technology program examines global cyber threats, cybercrime trends, and cybersecurity policies and regulations. Students have the opportunity to learn from faculty with diverse international backgrounds, collaborate with peers from around the world, and engage with global cybersecurity organizations and initiatives. The program also addresses cross-border cybersecurity issues, ethical considerations, and cultural differences in cybersecurity practices, preparing students to work in diverse and multicultural environments.

Pollster Education

Location

London Campus

Pollster Education

Score

IELTS 6

Pollster Education

Tuition Fee

£ 19000

Undergraduate Entry Requirements

Academic Qualifications: Applicants should have successfully completed their secondary education with a minimum overall score of 65% or equivalent in their respective country's grading system.

English language proficiency: 

  • IELTS: A minimum overall score of 6.0 with no individual component below 5.5.
  • PTE Academic: A minimum overall score of 54 with no individual score below 51.
  • Some programs may have specific subject prerequisites or additional requirements.

Students must provide:

  • academic marksheets & transcripts
  • letters of recommendation
  • a personal statement - SOP
  • passport
  • other supporting documents as required by the university.

It is important to note that meeting the minimum entry requirements does not guarantee admission, as the university considers factors such as availability of places and competition for the program. Additionally, some courses may have higher entry requirements or additional selection criteria, such as interviews or portfolio submissions.

Northumbria University provides support and opportunities for international students to pursue their education. The university offers a range of scholarships specifically designed to assist international students with their tuition fees and living expenses. These scholarships recognize academic excellence, leadership potential, and contribution to the community.

Northumbria Global Scholarship: The Northumbria Global Scholarship is a merit-based scholarship available to international undergraduate and postgraduate students. It provides a partial tuition fee reduction of up to £6,000 for the first year of study. The scholarship is awarded based on academic achievement, and applicants are automatically considered upon applying for a full-time course at Northumbria University.

Country-Specific Scholarships: Northumbria University also offers scholarships specific to certain countries or regions. These scholarships aim to attract high-achieving students from specific countries or regions and provide financial support for their studies at Northumbria University. The eligibility criteria and application process vary depending on the specific scholarship, and interested students should check the university's official website for more information.

External Scholarships: International students may be eligible for external scholarships provided by government bodies, organizations, or foundations in their home countries. These scholarships are external to the university but can be used to support studies at Northumbria University. 

Graduates of the BSc (Hons) Computing with Cyber Security Technology program from Northumbria University are well-prepared for a variety of exciting career opportunities in the field of cybersecurity. 

Cybersecurity Analyst: Cybersecurity analysts are responsible for monitoring, detecting, and responding to cyber threats and security incidents within an organization's IT infrastructure. They analyze security logs, conduct vulnerability assessments, and implement security controls to protect against cyber attacks and data breaches.

Penetration Tester/Ethical Hacker: Penetration testers, also known as ethical hackers, assess the security of computer systems, networks, and applications by simulating cyber attacks to identify vulnerabilities and weaknesses. They conduct penetration tests, security assessments, and vulnerability scans to evaluate the effectiveness of security controls and recommend remediation measures.

Security Operations Center (SOC) Analyst: SOC analysts work in security operations centers, monitoring and analyzing security alerts and incidents to detect and respond to potential security breaches. They investigate security incidents, analyze threat intelligence, and coordinate incident response efforts to mitigate security risks and minimize the impact of cyber attacks.

Digital Forensics Investigator: Digital forensics investigators specialize in gathering and analyzing digital evidence from computers, mobile devices, and network logs to support investigations into cyber crimes, data breaches, and security incidents. They use forensic tools and techniques to preserve, analyze, and present digital evidence for legal proceedings and incident response.

Security Consultant: Security consultants provide expertise and advisory services to organizations on cybersecurity strategy, risk management, and compliance with security standards and regulations. They assess security risks, develop security policies and procedures, and recommend security solutions to help organizations enhance their security posture and protect against cyber threats.

Cybersecurity Engineer: Cybersecurity engineers design, implement, and maintain security solutions and controls to protect IT systems, networks, and applications from cyber threats. They configure firewalls, intrusion detection systems, and security appliances, and implement security best practices to safeguard against unauthorized access, malware, and other security risks.

Incident Response Manager: Incident response managers oversee and coordinate the response to security incidents and data breaches within an organization. They develop incident response plans, establish communication protocols, and lead incident response teams to investigate security incidents, contain the impact, and restore normal operations in a timely manner.

Security Architect: Security architects design and develop secure IT architectures and systems, incorporating security controls, encryption mechanisms, and access controls to protect against cyber threats and vulnerabilities. They collaborate with IT teams and stakeholders to design security solutions that align with business requirements and compliance standards.

Cybersecurity Trainer/Educator: Cybersecurity trainers and educators provide training and education on cybersecurity best practices, tools, and techniques to IT professionals, employees, and students. They develop training materials, deliver lectures and workshops, and conduct hands-on exercises to enhance cybersecurity awareness and skills across organizations and educational institutions.

Security Compliance Officer: Security compliance officers ensure that organizations comply with relevant cybersecurity laws, regulations, and industry standards. They conduct audits, assess compliance with security policies and regulations, and implement measures to address non-compliance issues and improve security governance.


Similar Courses
WhatsApp Enquiry Call Enquiry