BSc (Hons) Cyber Security

Park, Cheltenham

 

INTAKE: September

Program Overview

This NCSC-certified BSc (Hons) Cyber Security program at the University of Gloucestershire provides a robust foundation in the principles and practices of cyber security. It focuses on developing students' ability to protect against and respond to cyber threats across various digital environments, including those found in banking, e-commerce, and social media platforms. A significant feature of the program is its hands-on approach, with approximately 50% of the teaching dedicated to practical application using industry-standard tools and techniques in specialized labs. The program also offers an optional sandwich year, allowing students to gain valuable real-world experience through a year-long placement in the industry, further enhancing their employability.

Curriculum: The curriculum is structured to provide a comprehensive understanding of the cyber security domain. Core modules typically include foundational topics such as Computers and Security, Principles of Cyber Forensics, Principles of Programming, and Network Design. As students progress, they delve into more specialized areas. The final year often includes a dissertation allowing for in-depth research on a chosen topic, alongside advanced modules like Advanced Networking & Security. Students also have the opportunity to tailor their learning to their career aspirations through a range of optional modules, which may include Data Analytics, Information Security Management, Digital Crime Scene Investigation, Penetration Testing, Cloud Computing, and Malware Analysis. A notable aspect of the assessment is the absence of traditional exams, with evaluation primarily based on coursework, assignments, and practical projects.

Research Focus: The School of Computing & Engineering at the University of Gloucestershire has a strong focus on applied research. The research endeavors are particularly concerned with addressing the needs of businesses and the rapid advancements within the IT and engineering sectors. Specific areas of research interest within the school, which often inform the teaching and project opportunities within the Cyber Security program, include artificial intelligence, big data and data mining, business intelligence, e-business technology, the Internet of Things (IoT), and digital forensics. Students benefit from being part of a research-active environment, gaining insights into cutting-edge developments and potentially contributing to research projects, especially at the postgraduate level.

Industry Engagement: The University of Gloucestershire places a strong emphasis on industry engagement to ensure the program remains relevant and graduates are industry-ready. The program benefits from excellent links with major cyber employers in the UK's 'cyber capital' region, including GCHQ, Intel, IBM Security, Raytheon, Northrop Grumman, BAE Systems, GE Aviation, GlaxoSmithKline, Kraft, and Zurich Insurance. These connections often translate into exciting placement options for students undertaking the sandwich year. The curriculum is also informed by these industry partnerships, and students have opportunities to network with professionals through guest speakers and sector events. The dedicated cyber security labs provide a realistic environment to practice skills using the same tools and technologies used by industry professionals, such as Kali Linux and Cisco Network Packet Tracer. The University's Cyber Security and Digital Innovation Centre (C11) in Berkeley further solidifies its industry links, offering a hub for training, research, and collaboration between students and businesses.

Global Perspective: While the program is based in the UK, the nature of cyber security inherently involves a global perspective. The threats and challenges in the cyber world transcend geographical boundaries. The curriculum is designed to address global cybercrime topics and the security risks associated with globally adopted technologies like big data and cloud systems. Students gain an understanding of international information security standards and legal frameworks, preparing them for potential careers with multinational corporations or international organizations. Although the primary focus is on the UK context, the fundamental principles and technical skills learned are highly transferable and applicable to the global cybersecurity landscape.

Pollster Education

Location

Park, Cheltenham

Pollster Education

Score

IELTS 6

Pollster Education

Tuition Fee

£ 16600

Undergraduate Entry Requirements

Academic Qualifications: Applicants should have successfully completed their secondary education with a minimum overall score of 65% or equivalent in their respective country's grading system.

English language proficiency:

  • IELTS: A minimum overall score of 6.0 or 6.5 with no individual component below 5.5.
  • TOEFL: A minimum overall score of 80.
  • PTE Academic: A minimum overall score of 64.
  • Some programs may have specific subject prerequisites or additional requirements.

The University of Gloucestershire offers a range of scholarships designed to support international students in their academic journey. These scholarships are aimed at making education more accessible and affordable, allowing students to focus on their studies and enjoy their time in the UK without financial stress. The university provides several merit-based, need-based, and country-specific scholarships to help ease the cost of tuition fees for international students.

International Scholarships: The University of Gloucestershire offers International Scholarships for students coming from various countries across the globe. These scholarships typically range from £1,000 to £3,000 per year, based on academic achievement and the chosen course of study. The scholarship is automatically awarded to eligible students upon acceptance of their offer to study at the university. These awards are designed to make studying in the UK more affordable and are available for both undergraduate and postgraduate international students.

Excellence Scholarships: For international students who demonstrate outstanding academic performance, the University of Gloucestershire offers Excellence Scholarships. These scholarships are awarded to students who have achieved exceptional academic results in their previous studies. The Excellence Scholarship can be worth up to £3,000 and is designed to recognize and support high-achieving students who show great potential in their chosen field of study.

Country-Specific Scholarships: In addition to general international scholarships, the University of Gloucestershire offers country-specific scholarships to students from certain regions. These scholarships are tailored to students from specific countries, helping to promote international diversity at the university. The scholarships vary in amount, eligibility criteria, and application processes.

Graduating with a BSc (Hons) in Cyber Security from the University of Gloucestershire opens doors to a wide array of in-demand and future-proof career opportunities within the rapidly expanding cybersecurity industry. The program's blend of theoretical knowledge, practical skills, and strong industry connections ensures graduates are well-equipped to make a significant contribution to protecting digital assets across various sectors. 

Cyber Security Analyst: This is a common entry-level role where graduates monitor computer networks and systems for security threats, analyze security breaches, and implement security measures. The program's hands-on training in identifying and responding to incidents is directly applicable.

Penetration Tester: Often referred to as an "ethical hacker," a penetration tester legally attempts to breach an organization's computer systems to identify vulnerabilities. The University of Gloucestershire's curriculum, which may include ethical hacking techniques, provides a solid foundation for this exciting and critical role.

Information Security Officer/Analyst: Focusing on the broader aspects of information security within an organization, this role involves developing and enforcing security policies, procedures, and best practices to protect sensitive data. The program's coverage of information security management prepares graduates for this responsibility.

Security Consultant: Graduates can work for specialized cybersecurity consulting firms or independently, providing expert advice to organizations on their security posture, risk management, and compliance with relevant regulations like GDPR.

Network Security Engineer: This specialization focuses on securing an organization's network infrastructure. Graduates with a strong understanding of network protocols and security technologies, gained from the program's relevant modules, are well-suited for this role.

Digital Forensic Analyst: In the event of a cybercrime, digital forensic analysts investigate the incident, collect and analyze digital evidence, and may provide expert testimony in legal proceedings. The program's potential for modules in digital crime scene investigation provides crucial skills for this path.

Cloud Security Specialist: With the increasing migration to cloud computing, there's a growing need for professionals who can secure cloud-based environments and data. The program's exploration of cloud systems and their security implications is beneficial for this specialization.

Security Architect: While often requiring some initial experience, the program provides a strong foundational understanding for graduates to progress into a Security Architect role. These professionals design the overall security architecture for an organization's IT systems.

Malware Analyst: Specializing in the analysis of malicious software (malware), this role involves understanding how malware works, identifying its origins, and developing strategies to combat it. Relevant modules in the program can introduce students to the principles of malware analysis.

Cyber Threat Intelligence Analyst: These analysts gather and analyze information on potential and current cyber threats to help organizations anticipate and prevent attacks. The program's focus on the evolving threat landscape provides a strong basis for this analytical role.


Similar Courses
WhatsApp Enquiry Call Enquiry