Search our site
Search our site

Cyber Security & Computer Forensics with Business BSc(Hons)

Attendance UCAS code/apply Year of entry
3 years full time G4N1 2017
4 years full time including sandwich year G4NC 2017
4 years full time including foundation year G4NX 2017
6 years part time Apply direct to the University 2017

Why choose this course?

As technology increasingly dominates the way we experience our world whether in gaming, communications, or commerce, so the opportunities for and impact of cybercrime dramatically increase. People with talent and passion for computing forensics and cyber security are increasingly valued by government, law enforcement agencies and businesses.

Accreditation

This course is accredited by BCS, The Chartered Institute for IT.

What you will study

This joint honours course with Business introduces computer security, encryption, cryptography, and digital forensics, plus ethical and legal frameworks. It examines fundamental principles and threats which underpin computer systems, e-commerce systems, networks and the software development process.

Year 1 examines computer architectures and the range of tools and techniques used to build systems. Developing programming concepts and skills, you will become familiar with software development tools. You will also study and examine industrial-leading software for forensics, and be introduced to the investigation cycle and legal aspects of the computer forensic process. On your first business module you will learn basic business and economic concepts.

Year 2 continues core themes introduced in Year 1, emphasising networking and computer forensics. The Computer Forensics and Ethical Hacking module introduces legal and technical issues related to criminal computer investigations. You will be introduced to the basic principles of networking and data communications with developing practical skills in network and IP addressing design. Based on a thorough knowledge of Internet protocols, you will learn the structure and implementation of network services.

Data modelling is fundamental to the design of effective computer systems. You will learn to use UML design models to capture system requirements and learn to develop relational models and use SQL to develop database systems. Your second business module addresses the efficient and effective management of human and financial resources for commercial advantage.

Year 3 explores protection of systems and data against various types of threat. You will study encryption algorithms, public-key cryptography systems, and network security techniques, as well as security policies for organisations. The Live and Network Forensics module investigates the recovery and analysis of forensic evidence from running computers and servers.

The project module gives you the opportunity to show the knowledge and skills you have gained, applying them to a project of your choice and creating a key artefact for your CV. Topics could be from cyber security or computer forensics, or you may combine both. Past students have investigated malware, data mined twitter data and built honeypots. The business module explores leadership and decision in organisations.

 

Module listing

Please note that this is an indicative list of modules and is not intended as a definitive list. Those listed here may also be a mixture of core and optional modules.

Year 1

  • This module will be taken by first year (Level 4) students enrolled on Computer Science, Software Engineering, Information Systems and joint honours degrees. It is not assumed that you have prior programming experience. The teaching and learning is split between several units, that will be directed at specific subsets of the above cohorts. This provides each cohort with a schedule of activity that is appropriate for their background and future needs, while allowing a general visibility and structure of material for the entire year.

    Read full module description

     
  • This module is designed to provide the necessary underpinning of computer architecture as well as a wide range of tools and techniques to enable students to use and build systems, and to evaluate systems based on emerging technologies.

    On successful completion of the module, you will be able to:

    • Produce personal demonstrations of the application of a range of modern IT technologies.
    • Describe the basic processes, principles and technologies working behind the scenes in current online IT environments including layers of abstraction in computing systems.
    • Discuss how current trends in online IT allow individuals, companies and organisations to operate online.
    • Select and use appropriate tools, systems and delivery technologies for web prototyping and developing simple online and mobile applications.
    • Describe some of the social, ethical and legal issues involved with modern IT environments.

    Read full module description

     
  • This module introduces you to the principles and practices of digital forensics and it will provide a contextual setting for further modules. In particular, the module has a theoretical perspective (the legal, professional and ethical issues, the nature of digital crime and the role of the investigator) as well as a technical perspective (gathering, reserving and presenting digital evidence using a commercial forensic toolkit).

    On successful completion of the module, you will be able to:

    • Recognise the nature of crimes committed using digital devices and describe the role of the digital forensics examiner in investigating such incidents.
    • Explain prevailing legal and ethical standards applicable to digital evidence investigation.
    • Illustrate the use of a forensic commercial toolkit in order to capture, analyse and document the findings following procedures that are forensically sound.

    Read full module description

     
  • This module is designed to introduce you to the business function, with specific focus on marketing, data analysis, information systems, economics and the business environment. This module will equip you with the tools and skills to collect and analyse data, and present solutions to real-world problems based on marketing data. You will learn basic business and economic concepts and their application to current issues.

     

Year 2

  • This module is highly technical and introduces the extraction and interpretation of non-volatile computer media for evidentiary forensic analysis using a variety of commercial and open source tools as well as introducing the basic steps and tools needed for a penetration testing process.

    On successful completion of the module you will be able to:

    • Present and perform computing investigations for identifying, securing, cataloguing, verifying and analysing computer evidence by employing the appropriate forensics tools while maintaining professional conduct; and
    • comprehend and deploy the basic steps for penetration testing by utilising the appropriate tools to test security.

    Read full module description

     
  • The concepts of network operation and function are developed with the use of networking models such as the ISO OSI and the TCP/IP models. The structure, architecture and components of the network are described and the roles of protocols, services and applications are introduced. You will be introduced to the configuration of routing protocols and the different types of routing algorithms such as using link state and distance vector routing.

    On successful completion of the module, you will be able to:

    • Explain the importance of data networks and the Internet in supporting business communications and everyday activities.
    • Describe the devices and services that are used to support communications across an internetwork.
    • Explain the role of protocols in a data network.
    • Describe the importance of addressing and naming schemes at various layers of data networks.
    • Distinguish and configure routing protocols.
    • Describe the features of distance vector and link state routing protocols.

    Read full module description

     
  • Requirements and process modelling will be taken through the design stage with the development of different UML design models through to the implementation phase. The development of conceptual data models will be covered in more depth and developed for database design and implementation. Throughout, the module will focus on object-oriented analysis and design.

    Read full module description

     
  • This module considers the extent to which an efficient and effective management of human and financial resources can help organisations to achieve and sustain a competitive advantage. It examines key issues in human and financial resource management, using appropriate conceptual and analytical frameworks which can help to explain the choices available to organisations, and their likely reasons for adopting different approaches to the management of human and financial resources. The module examines key issues in strategic HRM. It demonstrates how various HRM policies and practices can be employed and intertwined to create an environment in which employees are satisfied and perform well. The module also explains the principles and construction of the key financial statements and prepares students to interpret financial information to make appropriate economic decisions and recommendations. In so doing, it provides opportunities for applied learning and professional development.

    Read full module description

     

Optional sandwich year

Year 3/4

  • This module explores the major challenges to computer security and covers ways of protecting systems and data.

    On successful completion of the module, you will be able to:

    • Demonstrate understanding of a range of problems of security by identifying common types of threats and vulnerabilities of computer, network and information security systems, as well as available security-related algorithms and protocols.
    • Analyse and implement a range of controls to minimise risks of security breaches.
    • Apply the basic methodology of computer security in order to assess and improve the security in a range of scenarios.
    • Comprehend, implement and use a range of controls to achieve the main computer security goals of confidentiality, integrity and availability.

    Read full module description

     
  • The aim of this module is to review practices, techniques, and tools for collecting volatile data from live systems and to highlight the importance of collecting volatile data before it is lost or changed on the suspicious system. The module aims to develop an understanding of network forensics and to allow hands-on practice professionally and ethically on investigating networks. The module deals with fundamental methodologies for recovering and analysing evidence, but for volatile data, from running computers and network-based devices. Live response techniques using for example memory acquisition as well as capturing network traffic since it presents a wealth of information, both of forensic value and security/administrative value. 

    On successful completion of the module, you will be able to:

    • Comprehend common threats and vulnerabilities to which a network may be exposed.
    • Develop and practice an advanced knowledge of key live and network forensic principles and methods.
    • Select and configure various open-source tools for live and network forensics analysis and utilise these tools for live and network investigation.

    Read full module description

     
  • This module allows students to demonstrate their skills and understanding gained through the application to a project of their choice. The project requires evidence of managing and developing the process of running a project, creating an artefact and reflecting critically upon the process and outcomes, as well as develop software for a real client.

    On successful completion of the module, you will be able to:

    • Plan, manage and control a substantial project including its critical appraisal.
    • Investigate, analyse and define the problem either for a client or to support their own implementation, as appropriate.
    • Apply relevant techniques in systematically designing a solution to the problem independently identify, research and synthesise literature relevant to the problem.
    • Construction and presentation of a prototype leading to a solution and its suitable testing.
    • Report effectively on what has been achieved and to what extent the objective(s) have been reached.
    • Demonstrate competence in the production of supporting documentation for the work.

    Read full module description

     
  • This module considers the development of the role of management in organisations, the importance of strategic analysis and decision making to enable sustainable development and the different contexts in which organisations might operate. You will develop an understanding of the environment in which organisations operate and how organisations use internal resources and competences to achieve competitive advantage. The module examines the role of culture and management in organisations, and the options for growth and development.

    Read full module description

     

You will have the opportunity to study a foreign language, free of charge, during your time at the University on a not-for-credit basis as part of the Kingston Language Scheme. Options currently include: Arabic, French, German, Italian, Japanese, Mandarin, Portuguese, Russian and Spanish.

Study abroad as part if your degreeMost of our undergraduate courses support studying or working abroad through the University's Study Abroad or Erasmus programme.

Find out more about where you can study abroad:

If you are considering studying abroad, read what our students say about their experiences.

Key information set

The scrolling banner(s) below display some key factual data about this course (including different course combinations or delivery modes of this course where relevant).

We aim to ensure that all courses and modules advertised are delivered. However in some cases courses and modules may not be offered. For more information about why, and when you can expect to be notified, read our Changes to Academic Provision.

Contact us

Admissions team

Location

This course is taught at Penrhyn Road

View Penrhyn Road on our Google Maps

Contact us

Admissions team

Location

This course is taught at Penrhyn Road

View Penrhyn Road on our Google Maps
Favourite this course

Find a course

Course finder

>

Find us on Facebook

Undergraduate study
Site menu