BSc (Hons) Computer Science (Cyber Security)

Plymouth

 

INTAKE: September

Program Overview

The University of Plymouth offers an innovative BSc (Hons) Computer Science program with a specialization in Cyber Security. This program is designed to provide students with a comprehensive understanding of computer science principles and practices, with a specific focus on cybersecurity. Students learn about various aspects of cybersecurity, including cryptography, network security, ethical hacking, digital forensics, and risk management, preparing them for careers in the rapidly evolving field of cybersecurity.

Curriculum: The curriculum of the BSc (Hons) Computer Science (Cyber Security) program at the University of Plymouth covers a wide range of topics relevant to computer science and cybersecurity. Students study core computer science subjects such as programming, algorithms, data structures, and computer networks, supplemented with specialized courses in cybersecurity. The program includes practical lab sessions, projects, and case studies, allowing students to apply their knowledge and skills to real-world cybersecurity challenges.

Research Focus: The University of Plymouth emphasizes research within the field of cybersecurity. Faculty members are actively engaged in research projects exploring various aspects of cybersecurity, such as threat intelligence, malware analysis, secure software development, and cyber risk assessment. Students have opportunities to participate in research activities, working alongside faculty members on research projects and contributing to advancements in cybersecurity knowledge and technologies.

Industry Engagement: The BSc (Hons) Computer Science (Cyber Security) program at the University of Plymouth emphasizes industry engagement to provide students with practical experience and professional networking opportunities. The university collaborates closely with cybersecurity companies, government agencies, and research institutions. Through guest lectures, industry-sponsored projects, internships, and placement opportunities, students gain insights into the latest cybersecurity trends, tools, and practices, and develop the skills needed to address cybersecurity challenges in their future careers.

Global Perspective: With a focus on global cybersecurity threats and challenges, the BSc (Hons) Computer Science (Cyber Security) program at the University of Plymouth provides students with a global perspective on cybersecurity issues and solutions. Students explore topics such as cyber warfare, cybercrime, information security laws, and international cybersecurity standards. The curriculum may include case studies and simulations that examine cybersecurity incidents and responses from around the world, helping students understand the global impact of cybersecurity threats and the importance of international collaboration in cybersecurity efforts.

Pollster Education

Location

Plymouth

Pollster Education

Score

IELTS 6

Pollster Education

Tuition Fee

£ 14600

Undergraduate Entry Requirements

Academic Qualifications: Applicants should have successfully completed their secondary education with a minimum overall score of 60% or equivalent in their respective country's grading system.

English language proficiency:

  • IELTS: A minimum overall score of 6.0 with no individual component below 5.5.
  • TOEFL: A minimum overall score of 76, with at least 17 in Listening, 18 in Reading, 20 in Speaking, and 18 in Writing.
  • PTE Academic: A minimum overall score of 59 with no individual score below 5.9
  • Some programs may have specific subject prerequisites or additional requirements.

Students must provide:

  • academic marksheets & transcripts
  • letters of recommendation
  • a personal statement - SOP
  • passport
  • other supporting documents as required by the university.

It is important to note that meeting the minimum entry requirements does not guarantee admission, as the university considers factors such as availability of places and competition for the program. Additionally, some courses may have higher entry requirements or additional selection criteria, such as interviews or portfolio submissions.

The University of Plymouth offers various scholarships and financial support options to help students fund their studies. 

Vice-Chancellor's Scholarships: These scholarships are awarded to high-achieving students who demonstrate exceptional academic excellence and potential. The scholarships provide a partial tuition fee waiver for the duration of the program.

International Academic Excellence Scholarships: These scholarships are available for international students who have achieved outstanding academic results. The scholarships offer a partial tuition fee reduction for the first year of study.

International Plymouth Global Scholarships: These scholarships are designed to attract high-caliber international students to the University of Plymouth. The scholarships provide a partial tuition fee reduction for the first year of study.

Sport Scholarships: The university offers sport scholarships to talented athletes who have achieved a high level of sporting excellence. The scholarships provide support in the form of financial assistance, training, and access to sports facilities.

Subject-Specific Scholarships: Some academic departments at the University of Plymouth offer subject-specific scholarships for students enrolled in particular programs or disciplines. These scholarships may be based on academic merit, research potential, or other criteria determined by the department.

Graduates of the BSc (Hons) Computer Science (Cyber Security) program at the University of Plymouth have a wide array of career opportunities in the rapidly growing field of cybersecurity. 

Cyber Security Analyst: Graduates can pursue careers as cyber security analysts, responsible for monitoring and analyzing security threats, vulnerabilities, and breaches in computer networks and systems. They conduct risk assessments, develop security protocols, and implement security measures to protect organizations from cyber attacks. Cyber security analysts work for companies, government agencies, financial institutions, and cybersecurity firms.

Security Consultant: Graduates can work as security consultants, providing expert advice and solutions to organizations on cybersecurity strategies, risk management, and compliance with security regulations. They assess security requirements, conduct security audits, and recommend security technologies and practices to enhance the security posture of organizations. Security consultants may work for consulting firms, technology vendors, or as independent consultants.

Penetration Tester (Ethical Hacker): Graduates with strong technical skills can pursue careers as penetration testers or ethical hackers, responsible for identifying and exploiting vulnerabilities in computer systems and networks to assess their security. They conduct penetration tests, vulnerability assessments, and security audits, and provide recommendations for remediation. Penetration testers may work for cybersecurity firms, government agencies, or as independent contractors.

Incident Responder: Graduates can work as incident responders, handling security incidents and breaches in organizations. They investigate security incidents, analyze security logs, and coordinate incident response efforts to contain and mitigate the impact of security breaches. Incident responders work closely with cybersecurity teams, law enforcement agencies, and legal counsel to manage security incidents effectively.

Security Architect: Graduates with strong design and architecture skills can pursue careers as security architects, responsible for designing and implementing secure IT architectures and systems. They develop security frameworks, define security requirements, and integrate security controls into IT infrastructure and applications. Security architects work for technology companies, cloud service providers, and large enterprises.

Digital Forensics Analyst: Graduates can specialize in digital forensics, investigating cyber crimes and incidents by analyzing digital evidence such as computer files, network traffic, and mobile devices. They use forensic tools and techniques to collect, preserve, and analyze digital evidence for legal proceedings and incident response. Digital forensics analysts work for law enforcement agencies, cybersecurity firms, and corporate security departments.

Security Operations Center (SOC) Analyst: Graduates can work in security operations centers, monitoring and responding to security alerts and incidents in real-time. They analyze security alerts, triage incidents, and coordinate incident response activities to mitigate security threats. SOC analysts work for managed security service providers (MSSPs), security vendors, and large enterprises with dedicated security operations teams.

Security Manager: Graduates with leadership skills can pursue careers as security managers, overseeing cybersecurity programs and initiatives within organizations. They develop security policies, manage security teams, and coordinate security activities to protect organizational assets and data. Security managers work for companies, government agencies, and organizations with dedicated cybersecurity departments.


Similar Courses
WhatsApp Enquiry Call Enquiry