Cyber Security BSc (Hons)

UCAS code I302

Duration

3 Years

4 Years

4 Years

Become a protector of cyberspace and modern technology in our specialist computer science degree and become an ultra-employable expert in cyber security and forensic computing.

This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so you’re fully prepared to work in the industry upon graduation.

We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PC’ based investigations, as well as mobile forensics (on smartphones, and sat nav’s etc).

This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so you’re fully prepared to work in the industry upon graduation.

We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PC’ based investigations, as well as mobile forensics (on smartphones, and sat nav’s etc).

This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so you’re fully prepared to work in the industry upon graduation.

We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software. We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions. The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PC’ based investigations, as well as mobile forensics (on smartphones, and sat nav’s etc).

On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security

Course content

Over three years of study you’ll become a specialist in the field of cyber security. In your first year you’ll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

In the second year you’ll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. You’ll also expand your foundational knowledge in computer science, looking at commercial computing.

In your final year, you’ll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

Over three years of study you’ll become a specialist in the field of cyber security. In your first year you’ll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

In the second year you’ll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. You’ll also expand your foundational knowledge in computer science, looking at commercial computing.

In your final year, you’ll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

Over three years of study you’ll become a specialist in the field of cyber security. In your first year you’ll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

In the second year you’ll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. You’ll also expand your foundational knowledge in computer science, looking at commercial computing.

In your final year, you’ll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.

NSS shows positive improvement in teaching

News

Teaching provision has improved across the University’s extensive course portfolio in this year’s National Student Survey results.

Modules

The tables provide an indicative list of the modules that make up the course for the current academic year. Each module is worth a specified number of credits. Our teaching is informed by research, and modules change periodically to reflect developments in the discipline. We aim to ensure that all modules run as scheduled. If for any reason a module cannot be run we will advise you as soon as possible and will provide guidance on selecting an appropriate alternative module.

Year 2 compulsory modules
Year 2 compulsory modules
Cloud Infrastructure And Design 20 credits
Cyber Security 20 credits
Data Analytics 20 credits
Digital Forensics Fundamentals 20 credits
Ethical Hacking 20 credits
Professional Practice And Project Management 20 credits
Year 3 compulsory modules
Year 3 compulsory modules
Cryptography And Ai 20 credits
Dissertation 40 credits
Low-Level, Hardware, And Iot Security 20 credits
Negotiated Studies 20 credits
Network And Infrastructure Security 20 credits

Modules

The tables provide an indicative list of the modules that make up the course for the current academic year. Each module is worth a specified number of credits. Our teaching is informed by research, and modules change periodically to reflect developments in the discipline. We aim to ensure that all modules run as scheduled. If for any reason a module cannot be run we will advise you as soon as possible and will provide guidance on selecting an appropriate alternative module.

Entry requirements

112-120 UCAS Tariff points

  • GCE A Levels - grades BBC or equivalent
  • Pearson BTEC National Extended Diploma - grade DMM
  • Access to HE Diploma - Pass Access with a minimum of 80 UCAS tariff points. Applicants to Staffs who are taking the Access to HE Diploma receive a reduced tariff point offer as part of our access and participation plan activity
  • UAL Level 3 Extended Diploma - grade of Merit overall
  • OCR Cambridge Technical Extended Diploma - grade DMM
  • T Levels - Eligible T Level applications will be asked to achieve a minimum overall grade of P (A*-C) or Higher Pass as a condition of offer

112-120 UCAS Tariff points

  • GCE A Levels - grades BBC or equivalent
  • Pearson BTEC National Extended Diploma - grade DMM
  • Access to HE Diploma - Pass Access with a minimum of 80 UCAS tariff points. Applicants to Staffs who are taking the Access to HE Diploma receive a reduced tariff point offer as part of our access and participation plan activity
  • UAL Level 3 Extended Diploma - grade of Merit overall
  • OCR Cambridge Technical Extended Diploma - grade DMM
  • T Levels - Eligible T Level applications will be asked to achieve a minimum overall grade of P (A*-C) or Higher Pass as a condition of offer
  • UCAS tariff : 48 points
  • A level: DD
  • Pearson BTEC Level 3 National Extended Diploma (first teaching from September 2016): PPP

For equivalent entry requirements in your home country, please see the information on our country pages.

Choose your country

Check our entry and English language requirements for your country.

GO

Facilities

Data Junction

Housing our Computer Science and Cyber Security programmes, this mega laboratory is truly ‘plugged in'. Read more

This is one of our new units and is designed to accelerate our commitment to digitally-focused academic areas. Housing our Computer Science and Cyber Security programmes, this mega laboratory is truly ‘plugged in’. In addition to advanced wireless casting and presenting facilities, new teaching and learning technology will allow for synchronous delivery of different classes and activities and encourage working across subject areas so that students benefit from peer-to-peer working, as reflected in industry. We also have a dedicated cyber and networking laboratory as well as additional meeting spaces.

The Den

Everyone needs a space to relax, wind down, and take a break from study, and we have just that. In our den you'll find all the things you need to help chill you out including lockers, comfy booths, food prep space and more. Read more

The Den includes:

  • Lockers to store your personal items
  • Comfy booths to sit, chat and eat in
  • Electrical sockets to plug in your devices
  • Wireless pads that charge the latest smartphones
  • A prep area for food and drinks
  • Fridges to keep snacks in
  • Low, soft seating for kicking band and unwinding

The Hall

Integrate yourself with the buzz of digital technologies in The Hall, a space dedicated to discussion and meetings. This flexible space can be configured to suit the needs of up to 30 students, with electrical points and multiple seating areas.

Careers

You’ll find graduates from our Computer Science disciplines working in many computing areas – Graduates from our Computer Science degrees have gone on to work in a whole range of related occupations. Previous roles include:  chief information security officer, forensic computer analyst, information security analyst, penetration tester, security architect, IT security engineer, security systems administrator, and IT security consultant.

All students have access to Career Connect, our dedicated careers team.

Teaching and assessment

Teaching

This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

Assessment

Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that you’ll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that you’ll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that you’ll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

Learning support

In addition to the excellent support you will receive from your course teaching team, our central Academic Skills team provides group and one-to-one help to support your learning in a number of areas. These include study skills (including reading, note-taking and presentation skills); written English (including punctuation and grammatical accuracy); academic writing (including how to reference); research skills; critical thinking and understanding arguments; and revision, assessment and examination skills (including time management).

Additional support

Our Student Inclusion Services support students with additional needs such as sensory impairment, or learning difficulties such as dyslexia.

Feedback

Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

Independent learning

All students are encouraged to build on their independent capabilities in relation to their own learning development. Tutors will mentor, support and guide students with clear direction in relation to ‘out of classroom’ activities and expectations in order to allow students the capacity to meet the learning objectives of their modules and course of study.

All students are encouraged to build on their independent capabilities in relation to their own learning development. Tutors will mentor, support and guide students with clear direction in relation to ‘out of classroom’ activities and expectations in order to allow students the capacity to meet the learning objectives of their modules and course of study.

All students are encouraged to build on their independent capabilities in relation to their own learning development. Tutors will mentor, support and guide students with clear direction in relation to ‘out of classroom’ activities and expectations in order to allow students the capacity to meet the learning objectives of their modules and course of study.

Staff

Dr Vahid Heydari Fami Tafreshi

Course Director - Computer Science

Vahid is a passionate researcher and course director specialising in Computing courses at the London campus. He leads the BSc and MSc Cyber Security courses, focusing on Internet Protocols, Architectures, Cybersecurity, and IoT Security.

Vahid's profile

Dr Maryam Shahpasand

Senior Lecturer

Maryam is a lecturer with over 15 years of intensive experience in cyber security teaching and research, professional training, security consultation, forensics investigation, malware analysis, penetration testing, and incident handling.

Dr Viraj Dawarka

Lecturer

Viraj is a lecturer in computer science/cyber security as well as an active researcher in cloud robotics. His main area of interest is towards the energy efficiency of cloud robotics using educational robots.

Dr Mahsa Zolfaghari

Lecturer

Mahsa is a lecturer in Computer Science and Cyber Security. Her research interests are Systems Design enhancements by Artificial Intelligence (AI), NET ZERO Technologies’ applications and IoT.

Dr Russell Campion

Head Of Department - Computing & Esports

Russell started at the University in 1990, studying a BA, then MRes, and finally a PhD before going into full-time teaching. He currently runs the Department of Computing. Previously he has managed the Information Systems group at Stafford befor…

Russell's profile

Fees

For the course starting on 22 September 2025 the tuition fees are:

Tuition fees for BSc (Hons)-Full-time, Staffordshire University London
Study option UK / Channel Islands International
Full-time £9,535 per year of study £16,750 per year of study

For the course starting on 22 September 2025 the tuition fees are:

Tuition fees for BSc (Hons)-Full-time, Staffordshire University London
Study option UK / Channel Islands International
Full-time £9,250 per year of study £16,750 per year of study

For the course starting on 22 September 2025 the tuition fees are:

Tuition fees for BSc (Hons)-Full-time, Staffordshire University London
Study option International
Full-time £16,750 for your first year subsequent years will be charged at the University standard rate

UK and Channel Island students: This tuition fee is agreed subject to UK government policy and parliamentary regulation. If the UK government passes appropriate legislation, the fee for subsequent years of study may increase in each academic year. But this increase will not exceed the rate of inflation as measured by RPIX**. Any change in fees will apply to both new and continuing students. The University will notify students of any change as early as possible. Further information about fee changes would be posted on the University’s website once this becomes available.

**RPIX is a measure of inflation equivalent to all the items in the Retail Price Index (RPI) excluding mortgage interest payments.

Not included in tuition fees
Not included in the fees:
  • You are expected to have access to an appropriate PC/Laptop with admin rights so that you can install software in order to complete this course.
  • Certified Ethical Hacker, XRY Mobile Forensics and Cybercrime Analysis Certification are available for an additional fee.
  • You are expected to have access to an appropriate PC/Laptop with admin rights so that you can install software in order to complete this course.
  • Certified Ethical Hacker, XRY Mobile Forensics and Cybercrime Analysis Certification are available for an additional fee.
  • You are expected to have access to an appropriate PC/Laptop with admin rights so that you can install software in order to complete this course.
  • Certified Ethical Hacker, XRY Mobile Forensics and Cybercrime Analysis Certification are available for an additional fee.
Accommodation and living costs
Accommodation and living costs

Accommodation and living costs are not included in our fees.

Sources of financial support

If you receive funding from Student Finance you may be eligible to apply for additional benefits. Details can be obtained by visiting: www.gov.uk

Scholarships and additional funding

As an undergraduate student at Staffordshire, you may be eligible for additional financial support through one of our scholarships and bursaries. You can visit our funding page to find out more and check your eligibility.

Scholarships and additional funding

As an undergraduate student at Staffordshire, you may be eligible for additional financial support through one of our scholarships and bursaries. You can visit our funding page to find out more and check your eligibility.

Scholarships and additional funding

As an undergraduate student at Staffordshire, you may be eligible for additional financial support through one of our scholarships and bursaries. You can visit our funding page to find out more and check your eligibility.

Our students

The lectures and coursework were both enjoyable and thorough with a mixture of individual work as well as group tasks

I graduated from my BSc Cyber course with a first class degree and successfully got a job in digital forensics as a mobile phone forensic analyst. I found all of the staff to be extremely knowledgeable in the field as well as having their own area of expertise. This meant there were plenty of people on hand to speak to if there was something I was unsure of. The lectures and coursework were both enjoyable and thorough with a mixture of individual work as well as group tasks. I completed a placement year which I found to be invaluable in helping with my studies and even interviews for my current role in a different company.

Kelly Ashman

Mobile Phone Forensic Analyst

Apply

Location Award Study option Start date Apply Link
Staffordshire University London BSc (Hons) Full-time, Staffordshire University London 22 September 2025 Apply now

Rules and regulations

If you are offered a place at University of Staffordshire, your offer will be subject to our rules, regulations and enrolment conditions, which may vary from time to time.

Students of University of Staffordshire enter into a contract with us and are bound by these rules and regulations, which are subject to change. For more information, please see: University Policies and Regulations.

Information from discover uni

for Career Prospects

Whatuni Student Choice Awards 2023

for Facilities

Whatuni Student Choice Awards 2023

for Social Inclusion

The Times and The Sunday Times Good University Guide 2023

of Research Impact is ‘Outstanding’ or ‘Very Considerable’

Research Excellence Framework 2021

of Research is “Internationally Excellent” or “World Leading”

Research Excellence Framework 2021

Four Star Rating

QS Star Ratings 2021