Have you considered a career at the cutting-edge of the fight against cyber crime? There is an increasing demand for skilled cyber security professionals with expertise that this course offers.
On this course, you'll study how computers can be used to prevent and solve crime. You'll develop web technology programming skills and study specialised tools and operating system environments. You'll examine encryption algorithms, public-key cryptography, network security, endpoint security and digital forensics. Through research and development projects you'll be able to showcase your knowledge and skills to employers. Project themes include security and vulnerability analysis, mobile app security and cyber intelligence analysis.
Practical studies include ethical hacking (such as password cracking, vulnerability scanning, social engineering and system exploits) and Security Operations Centre (SOC) functions, such as threat intelligence, threat hunting, SIEMs and incident response.
All of our undergraduate computing and information system courses are ranked 2nd in London and 18th in the UK (Guardian League Table 2021).
Please note: this course was previously called Cyber Security & Computer Forensics BSc (Hons).
Attendance | UCAS code/apply | Year of entry |
---|---|---|
3 years full time | G4N1 | 2021 |
4 years full time including sandwich year | G4NC | 2021 |
4 years full time including foundation year | G4NX | 2021 |
6 years part time | Apply direct to the University | 2021 |
Location | Penrhyn Road |
If you are planning to join this course in September 2020, please view the information about changes to courses for 2020/21 due to Covid-19.
Students who are continuing their studies with Kingston University in 2020/21 should refer to their Course Handbook for information about specific changes that have been, or may be, made to their course or modules being delivered in 2020/21. Course Handbooks are located within the Canvas course page.
Please note that this is an indicative list of modules and is not intended as a definitive list as these could change before your year of entry.
In the first year of this degree, students are introduced to computer security, digital forensics and legal aspects of forensic investigative processes. They will also develop web technology (eg Javascript, HTML, CSS), Java and Python programming skills; and gain a practical insight into the use of specialised tools and operating system environments. Examples of which include hex editors, hash functions, Forensic Tool Kit (FTK), Windows 10, Linux, Android, iOS and more.
30 credits
This module is taken by all first year undergraduate students undertaking a degree in the computing subject area. Previous experience of programming is not assumed. The module seeks to introduce a foundation for programming that can be built on in subsequent years and that accommodates specialist practice within computing eg games, software engineering, media, UX etc.
Teaching and learning is split between a variety of different units to ensure the module is flexible enough to accommodate each cohort and student's needs. As befits a practical discipline like programming, a hands-on approach is used that facilitates self-paced and self-directed learning. Students are encouraged to engage with, develop and experiment with programs in a constructivist fashion inspired by bricolage (Stiller, 2009; Stiller, 2017).
The intent is to build students' confidence as they learn to program, and provide a foundation that can be built on so that in later years they can go beyond simple solutions to problems and be ready to engage in full-fledged application development.
30 credits
This module introduces students to the principles behind hardware and software systems, and the important concepts related to modern computer systems.
First, following a review of the relevant mathematical principles, students will acquire an understanding of computer architecture, how data are represented, stored and processed, and how the operating system manages hardware and software resources. Second, they will understand the main concepts behind databases, network communication, and social media. Finally, they will learn about the essential technologies supporting web development and database management.
The assessment strategy involves an exam and the development of a portfolio reporting both theoretical and practical knowledge of the fundamental concepts addressed in the module. The module will also offer scope for students to be challenged and extended by developing deeper skills.
30 credits
The Cyber Crime and Digital Forensics module will introduce you to the principles and practices of cyber forensics, providing a contextual setting for further modules. In particular, the module has a theoretical perspective (introducing core security concepts and principles, and covering legal, professional and ethical issues, the nature of digital crime and the role of the forensic investigator) as well as a practical technical perspective (gathering, reserving and presenting digital evidence using forensic toolkits).
30 credits
The goal of the Professional Environments module is to prepare students for professional practice firstly by ensuring they acquire suitable employability assets and secondly by equipping them with an understanding of the role of a professional in society and the role of professional bodies.
While the bulk of the taught programme focuses primarily on domain knowledge, the Professional Environments module focuses on developing key skills (as enumerated in the Programme Specification), personal qualities (eg commercial awareness, reliability and punctuality, understanding the centrality of customers and clients), and professional knowledge including the need to engage with continuing professional development. With such assets, students will generate a CV, an employment portfolio, and a professional online presence.
Being a professional also means understanding the key legal, ethical and societal issues pertinent to the domain, and understanding the need for continuing professional development (CPD) especially when technology develops at such a rapid pace. The module is designed to support different domain areas and to integrate experience from other professions. The subject areas being studied demand a global perspective which encourages the inclusion of our diverse of communities and national practices.
Reflecting the fact that team working is ubiquitous in the modern workplace, a significant proportion of the assessment work on the course is group-work based. There is considerable evidence that group work promotes a much deeper engagement with taught content. It also encourages the development of diverse learning communities. This module will therefore introduce students to best practice in group working covering how to approach group work, how to deal with different types of people, and methods of selecting and managing groups.
In the second year, students will study ethical hacking through practical activities (eg password cracking, port scanning, anonymous browsing, keyboard logging, screen capture, packet interception, social engineering and malware).
30 credits
The highly technical Ethical Hacking module commences by introducing you to the fundamental steps and frameworks needed for practical and ethical hacking exercises. You are then introduced to the Python programming language and the use of Python scripts for various ethical hacking activities, examples of which include; password cracking, port scanning, anonymous browsing, keyboard logging, screen capture and packet interception.
30 credits
The module aims to enhance your understanding of how modern computer systems are implemented from the perspectives of architecture, networking, operating system, parallel programming and algorithm complexity. You will explore the essential features and operations of modern computer architectures and acquire both theoretical and practical knowledge of the principles and major functions of modern operating systems. You will also develop knowledge of parallel programming and algorithm complexity so that you will be able to make use of new parallel computer architectures. Physical networks and their associated address schemes will also be explored.
30 credits
Following a project-based pedagogic approach, students will undertake a major inter-disciplinary team-work project drawn from a list of authentic industrial problems. Achieving the goals of the project will require students, firstly, to apply the various development methodologies they have acquired on their course and, secondly, to develop professional skills in project management and team working.
While the bulk of the taught programme focuses primarily on the learning of domain knowledge, the goal of the Professional Environments 2 module is to prepare students for professional practice in their respective domains. They will develop the necessary project management and team-working skills, and, by working as a team on an authentic industrial project, they will gain a high degree of familiarity with the typical requirements capture, design, and development methodologies relevant to their discipline. With the focus on making real-world artefacts, the students will integrate their work into an employment focused portfolio.
Being a professional practitioner also mean critically assessing both goals and solutions from legal, ethical and societal perspectives as well as addressing security and safety concerns. Students are also encouraged to consider their continuing professional development needs and to engage with their professional bodies. To encourage career management skills and promote employability after graduation, students are expected to integrate the artefacts they produce and reflective practice narratives into their employability portfolios and personal development plans.
The module is designed to support different domain areas and to integrate experience from other professions. The subject areas being studied demand a global perspective which encourages the inclusion of our diverse of communities and national practices.
30 credits
This module seeks to establish the skills required to build full-stack database-driven web applications. You will learn how to design, build and query databases according to user information needs using logical data models and structured query language (SQL). You will also learn how to design and build scalable interactive applications that are delivered over the web and integrated with a backend database.
30 credits
With a strong emphasis on understanding the Internet protocols, the Networking Concepts module will develop your understanding of the basic principles of networking.
You will become familiar with current LAN and WAN technologies and their role in building domestic and corporate networks. This knowledge will underpin the skills required to design and simulate small company networks including identifying the physical components required and to design an appropriate IP addressing schemes for such network.
It will also underpin your understanding of how network services such as mobile apps and network-based games are implemented.
60 credits
This module is an essential course programme component for students on the sandwich route of an honours degree "with professional placement". It is a key element in providing an extended period in industry gaining real world employability skills. Students are supported both before and through their placement by the SEC Placement team. Students that successfully complete their placement year will graduate with a 4 year sandwich degree.
In the final year, students will study encryption algorithms, public-key cryptography systems, network security techniques, security policies as well as live, network and mobile forensics in the context of a security operations centre. They will also complete an individual ‘capstone' project. This project is a showcase opportunity in which students undertake a research and development project of their choice. They will develop a tangible and noteworthy artefact, that can be showcased during interviews for placements, internships or full-time roles. Examples topic themes include crypto currencies, mobile privacy, blockchain technologies, malware etc.
30 credits
This is a core module in the Cyber Security and Computer Forensics field which explores the major challenges to computer security. It familiarises you with a range of cryptographic algorithms and protocols, firewall and access-control architectures and methods to assess and improve network and application security. This knowledge will allow you to implement and evaluate security controls and develop secure policies for corporate networks.
30 credits
This is a core module in the Cyber Security and Digital Forensics field. You will apply methodologies for acquiring, preserving, analysing and documenting digital evidence discovered in the Cyber Crime and Digital Forensics module (CI4315), to network and mobile environments. This includes acquiring volatile digital evidence running on live computers, forensically processing data packets from networks and extracting digital evidence from mobile devices.
30 credits
The goal of the module is to further develop skills in organisation, timekeeping, research literature, developing and critically analysing results as well as reporting work verbally and in a written format. The end result will be an artefact or artefacts which demonstrate creativity and technical competence as well as a technical report.
30 credits
This module focuses on enterprise networks; the internet protocols and services which will develop the understanding of how the TCP/IP internet protocol suite achieves the interconnection of geographically separate computers over networks of arbitrary topology and technology. This knowledge will underpin the design skills required to design such company networks including identifying the physical components required and designing appropriate IP addressing schemes. The module introduces wireless and high-speed networks and how these are used to deliver a variety of business applications.
On successful completion of the module, you will be able to:
30 credits
This module aims to provide a strong theoretical and practical background necessary for you to build high quality scalable software and to operate effectively as an industry professional. It examines software quality concepts necessary to build high quality software architecture. The module introduces you to the concept of software architecture and architectural patterns as part of software design and reuse which can be viewed as components and interfaces. At a lower level, programming models and paradigms are explored, as well as design patterns and anti-patterns. Testing strategies and other software quality principles will also be covered, and you will explore these principles in the context of practical projects which expose you to industry tools, practices and management methodologies.
30 credits
Entrepreneurship is a major driving force in creating economic growth and this module illustrates how to work in an entrepreneurial fashion. At the heart of entrepreneurship is innovation which can come in many forms. Sometimes this can be an incremental but generally gives significant improvement to the customer or alternatively as a new breakthrough or transformational innovation. Incremental innovation is aimed at increasing the value of a product or service, to add more value and thereby creating new and superior value chains. Breakthrough innovation often creates new categories of product or transforms the historical ways of doing things.
From this foundation, the module proceeds to explain how to develop a strategy not only to satisfy the critical needs that organizations have, but also aims to explore the application and use of improved value chains using the concepts of corporate venturing (spin-out/intrapreneurship) and Entrepreneurship (new venture creation). However it is not simple to start a new company. Especially the Tech branch is characterized by fast developments, shifts of focus and low barriers to entry, where holding back from "bleeding edge" is essential and is one of the important differentiating factors between Tech Entrepreneurship and other forms of entrepreneurship. This means that one can no longer count on "good luck", but insight, understanding, knowledge and a systematic approach all have to be learnt.
This module will equip participants with the concepts needed for roles in analysis, consultancy and management in technology environments, plus the necessary knowledge to work successfully in an innovative company, as well as providing a good background for new venture creation (Entrepreneurship) for those considering self-employment or founding new technology firms
The information above reflects the currently intended course structure and module details. Updates may be made on an annual basis and revised details will be published through Programme Specifications ahead of each academic year. The regulations governing this course are available on our website. If we have insufficient numbers of students interested in an optional module, this may not be offered.
Foundation year
If you would like to study computing or mathematics at Kingston University but are not yet ready to join the first year of a BSc (Hons) course, you can include an extra foundation year within your chosen degree. Please see the foundation year course page for details of modules.
The learning, teaching and assessment strategies reflect the programme aims and learning outcomes, student background, potential employer requirements, and the need to develop a broad range of technical skills with the ability to apply them appropriately.
Assessment includes coursework, which could be group or individual involving design, development, documentation and presentation tasks and exams.
Teaching approaches include studio practices; project-based learning through workshops and group work, scalable, context driven lectures, and problem based learning sessions. Ample opportunities are given to students for formative assessment with rapid feedback.
The course is taught at the Faculty of Science, Engineering and Computing. Faculty staff have a wide range of experience across research and industry and continue to practice and research at the cutting edge of their discipline. This ensures that our courses are current and industry informed ensuring you get the most relevant and up to date education possible.
Staff will use their experience and professional networks to hone your skills and shape you into the next generation of science, technology, engineering and mathematics (STEM) graduates.
Postgraduate students may run or assist in lab sessions and may also contribute to the teaching of seminars under the supervision of the module leader.
There is a wide range of facilities at our Penrhyn Road campus, where this course is based.
The new dedicated cyber lab provides the student with Linux/ Windows dual-boot computers, access to the internet, digital forensic hardware and professional software such as the full commercial version of Forensic Toolkit (FTK).
Students are able to experiment within an unconstrained environment in terms of computer administration and networking access. There are opportunities to gain vendor certification for mobile forensics (XRY Logical) and FTK.
You will have access to a modern environment with the latest equipment, including:
Read about our games lab, which includes the latest Sony and Microsoft software as well as high-tech equipment such as PSPs and large screens.
Our dedicated team of IT technicians support the labs and are always on hand to provide assistance.
Cyber security career opportunities are diverse and exist across many sectors. Examples include government, finance, entertainment, media, law and intelligence services.
Computing qualifications are amongst the most versatile and enable graduates to find employment in a wide spectrum of careers ranging from systems and business analysts, and software engineers, through to programmers and network specialists in a wide range of public and private sector industries.
Our curriculum is largely applied in nature with many case studies chosen for their topicality and relevance to industry such as information systems design, programming, networking, and implementation issues. Working on case studies designed to simulate the working environment, typically in teams, gives students experience of applying their skills to real-world problems.
To further set the material in context as well as inspire our students leading practitioners from industry, such as Google and IBM are invited to give guest lectures and workshops. The school hosts a local BCS chapter and several members of the School are involved with the institute at corporate level.
Embedded within the academic year are two Enrichment Activity Weeks. The first is in week 6 of Teaching Block 1 and the second in week 12 of Teaching Block 2, which include Careers and Employability events. These provide students typically with the opportunity to explore their CV and interview skills and look forward and plan for both industrial placement and their employment after university.
Our award-winning careers service offers a range of events, which include; employers on campus to promote internship, placement and graduate opportunities; profiling specific roles within industry; and exposing students to employers and building skills and knowledge. The current set of events include Part-time jobs fair, Guest lectures, The Big Kingston Careers Fair, Enrichment Week activity, Creative Conference, Work abroad fair.
In addition a range of software development competitions and hackathon type events are organised by the staff and various societies.
Placement company: Ernst & Young
Placements:
"To be successful, tomorrow's leaders will need to be far more rounded individuals than ever before. They will collaborate in pursuit of shared goals. They will guide, challenge and support...They will have an appetite for change and a hunger for continuous improvement, and they will have an ethos of learning and development..." Jeremy Darroch, Former Chief Executive, Sky.
"Doing a placement year effectively gives you one foot in the door of a future job and to stand out from the crowd... as well as enhancing my CV... and future interviews. It's a great motivator to be successful in my studies as it only serves to open even more doors and gain more skills." Placement student at Jagex Games Studios Ltd.
There is a lot of support available for students looking to secure a placement (eg a jobs board with placement vacancies, help with writing CVs and mock interviews). Getting a placement and passing the placement year are ultimately the student's responsibility.
For further information please contact the placements team by telephone 020 8417 2969 or email secplace@kingston.ac.uk.
Placements can be with large multinational companies, international companies, local companies and small start ups; offering a diverse range of posts. Here are some examples of employers and roles:
Construction-based placement employers | Construction-based placement roles |
---|---|
RG Group Multiplex Costain Willmott Dixon Fluor |
Assistant site manager Assistant trades package manager Assistant logistics manager Health and safety officer Construction engineer |
Science-based placement employers | Science-based placement roles |
Reckitt and Benckiser GSK Drug Control Centre Minton Treharne and Davies Ltd Various local and international hospitals |
Bioanalytical sciences Lab assistant Pharmacy assistant Sports coach |
Engineering-based placement employers | Engineering-based placement roles |
Airbus BAM Nuttall Nissan Bosch Wozair |
Analysis of aircraft structure Construction resources specialist Site engineer assistant |
Computing and IS-based placement employers | Computing and IS-based placement roles |
Disney Sony Interactive Entertainment Europe IBM McKinsey Intel |
Database coordinator Software developer Website developer App developer |
Mathematics-based placement employers | Mathematics-based placement roles |
Lloyds Banking Group AXA Allianz PAU Education, Spain |
Analyst Investment solutions Research analyst Accounts assistant |
The scrolling banner(s) below display some key factual data about this course (including different course combinations or delivery modes of this course where relevant).