MSc Construction Project Management
The MSc Construction Project Management program at Birmingham City University is a high...
City centre, Millenium Point
INTAKE: September
The BSc (Hons) Computer Networks and Security program at Birmingham City University is designed to equip students with the knowledge and skills needed to build, manage, and secure computer networks in today's digital landscape. This program covers a wide range of topics, including network protocols, cyber security principles, cryptography, ethical hacking, and network administration. Students learn about the design and implementation of network infrastructure, as well as strategies for protecting networks and data from cyber threats. Through practical labs, simulations, and industry collaborations, students gain hands-on experience with networking technologies and security tools, preparing them for careers in network engineering, cyber security analysis, and information technology (IT) management roles.
Networking Fundamentals: Students acquire a solid understanding of networking fundamentals, including network architecture, protocols, addressing, and routing. They learn how data is transmitted across networks and the technologies used to establish and maintain network connections.
Cyber Security Principles: The program covers cyber security principles, concepts, and best practices for safeguarding computer systems, networks, and data from cyber threats. Students learn about common cyber attacks, vulnerabilities, and risk mitigation strategies.
Cryptography and Data Protection: Students study cryptographic techniques for securing data transmission and storage, including encryption algorithms, key management, digital signatures, and secure communication protocols.
Ethical Hacking and Penetration Testing: The curriculum includes modules on ethical hacking and penetration testing, where students learn how to identify and exploit vulnerabilities in computer networks and applications to assess their security posture and recommend countermeasures.
Network Administration and Management: Students gain practical skills in network administration and management, learning how to configure, monitor, and troubleshoot network devices such as routers, switches, firewalls, and intrusion detection systems.
Industry-Relevant Certifications: The program prepares students for industry-relevant certifications such as Cisco Certified Network Associate (CCNA), CompTIA Security+, Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker (CEH), enhancing their employability and credibility in the job market.
City centre, Millenium Point
IELTS: 6
£ 13980
Undergraduate Entry Requirements
Academic Qualifications: International students applying for undergraduate programs are required to have completed their secondary education with a minimum academic achievement of 60-65% or above.
English Language Proficiency:
Students must provide:
It is important to note that meeting the minimum entry requirements does not guarantee admission, as the university considers factors such as availability of places and competition for the program. Additionally, some courses may have higher entry requirements or additional selection criteria, such as interviews or portfolio submissions.
These scholarships provide opportunities for talented students to pursue their studies at Birmingham City University
Vice-Chancellor's International Scholarship:This scholarship is available to international students applying for full-time undergraduate or postgraduate programs at Birmingham City University.The scholarship covers a portion of the tuition fees, providing a financial boost to successful applicants.Eligibility criteria, application deadlines, and the scholarship amount may vary, so it is important to check the university's official website for the most up-to-date information.
Academic Merit Scholarship:Birmingham City University offers the Academic Merit Scholarship to high-achieving international students who demonstrate exceptional academic performance.The scholarship is available for both undergraduate and postgraduate programs.Eligibility criteria, application procedures, and the scholarship amount may differ based on the level of study and program, so it is advisable to visit the university's official website for specific details.
Country-Specific Scholarships:Birmingham City University provides scholarships specifically tailored to students from certain countries or regions.These scholarships aim to promote diversity and cultural exchange, and the eligibility criteria, application requirements, and scholarship amounts can vary depending on the country or region.International students should check the university's website or contact the admissions office to find out if there are any country-specific scholarships available for their nationality.
External Scholarships and Funding:Birmingham City University also encourages international students to explore external scholarship opportunities offered by governmental and non-governmental organizations, as well as corporate sponsors.The university's dedicated scholarship and funding team can provide guidance and support in identifying and applying for external scholarships.
It is important to note that scholarship availability, eligibility criteria, and application deadlines may vary from year to year.
Graduates of Birmingham City University's BSc (Hons) Computer Networks and Security program have excellent career prospects in the rapidly growing fields of computer networking and cyber security. This program equips students with specialized skills and knowledge in network administration, cyber defense, and information security, preparing them for diverse roles in technology-driven industries.
Network Engineer/Administrator: Graduates can work as network engineers or administrators, responsible for designing, implementing, and managing computer networks within organizations. They configure network devices, troubleshoot connectivity issues, and optimize network performance.
Cyber Security Analyst: Graduates can pursue roles as cyber security analysts, focusing on monitoring network traffic, detecting security incidents, and responding to cyber threats. They implement security measures to protect networks and data from unauthorized access and attacks.
Information Security Consultant: Graduates can work as information security consultants, advising organizations on security best practices, risk assessments, and compliance with regulatory standards. They develop security policies and procedures to mitigate cyber risks.
Penetration Tester (Ethical Hacker): Graduates with expertise in ethical hacking and penetration testing can work as security consultants or penetration testers, identifying vulnerabilities in computer systems and networks to assess their security posture and recommend remediation strategies.
Security Operations Center (SOC) Analyst: Graduates can join security operations centers (SOCs) as analysts, monitoring and analyzing security alerts, conducting investigations into security incidents, and providing incident response and remediation.
Network Security Engineer: Graduates can specialize in network security engineering, focusing on implementing and maintaining security measures such as firewalls, intrusion detection/prevention systems (IDS/IPS), and virtual private networks (VPNs).
Cyber Threat Intelligence Analyst: Graduates can work as cyber threat intelligence analysts, gathering and analyzing threat intelligence data to identify emerging cyber threats and develop proactive security measures.
Forensic Computer Analyst: Graduates interested in digital forensics can pursue roles as forensic computer analysts, conducting investigations into cybercrimes, gathering digital evidence, and providing expert testimony in legal proceedings.
Cloud Security Specialist: Graduates can specialize in cloud security, focusing on securing cloud-based infrastructures, services, and applications to protect data stored in cloud environments.
IT Security Manager/Director: With experience and leadership skills, graduates can advance to managerial or directorial roles in IT security, overseeing security operations, strategy development, and team management within organizations.