Have you considered a career at the cutting-edge of the fight against cybercrime? There's an increasing demand for skilled cyber security professionals with the expertise that this course offers.
On this course, you'll study how computers and technology can be used to investigate, prevent and manage cyber attacks. You'll develop web technology programming skills and study specialised tools and operating system environments. You'll examine encryption algorithms, public-key cryptography, network security, endpoint security and digital forensics. Project themes include security and vulnerability analysis, mobile app security and cyber intelligence analysis.
Practical studies include ethical hacking (such as password cracking, vulnerability scanning, social engineering and system exploits) and Security Operations Centre (SOC) functions, such as threat intelligence, threat hunting, SIEMs and incident response.
Please note: this course was previously called Cyber Security & Computer Forensics BSc (Hons).
Attendance | UCAS code/apply | Year of entry |
---|---|---|
3 years full time | G4N1 | 2023 |
4 years full time including sandwich year | G4NC | 2023 |
4 years full time including foundation year | G4NX | 2023 |
6 years part time | Apply direct to the University | 2023 |
Location | Penrhyn Road |
Kingston has a dedicated cyber security and digital forensics lab.
In the first year of this degree, students are introduced to computer security, digital forensics and legal aspects of forensic investigative processes. They will also develop web technology (e.g. Javascript, HTML, CSS), Java and Python programming skills; and gain a practical insight into the use of specialised tools and operating system environments. Examples include hex editors, hash functions, Forensic Tool Kit (FTK), Windows 10, Linux, Android, iOS and more.
30 credits
This module is taken by all first year undergraduate students undertaking a degree in the computing subject area. Previous experience of programming is not assumed. The module seeks to introduce a foundation for programming that can be built on in subsequent years and that accommodates specialist practice within computing, e.g. games, software engineering, media, UX etc.
Teaching and learning is split between a variety of different units to ensure the module is flexible enough to accommodate each cohort and student's needs. As befits a practical discipline like programming, a hands-on approach is used that facilitates self-paced and self-directed learning. Students are encouraged to engage with, develop and experiment with programs in a constructivist fashion inspired by bricolage (Stiller, 2009; Stiller, 2017).
The intent is to build students' confidence as they learn to program, and provide a foundation that can be built on so that in later years they can go beyond simple solutions to problems and be ready to engage in fully-fledged application development.
30 credits
This module introduces students to the principles behind hardware and software systems, and the important concepts related to modern computer systems.
Firstly, following a review of the relevant mathematical principles, students will acquire an understanding of computer architecture, how data are represented, stored and processed, and how the operating system manages hardware and software resources.
Secondly, students will understand the main concepts behind databases, network communication, and social media. Finally, they will learn about the essential technologies supporting web development and database management.
30 credits
The Cyber Crime and Digital Forensics module will introduce you to the principles and practices of cyber forensics, providing a contextual setting for further modules. In particular, the module has a theoretical perspective (introducing core security concepts and principles, and covering legal, professional and ethical issues, the nature of digital crime and the role of the forensic investigator) as well as a practical technical perspective (gathering, reserving and presenting digital evidence using forensic toolkits).
30 credits
The goal of the Professional Environments module is to prepare students for professional practice. It will firstly ensure they acquire suitable employability assets and secondly equip them with an understanding of the role of a professional in society and the role of professional bodies.
While the bulk of the taught programme focuses primarily on domain knowledge, the Professional Environments module focuses on developing key skills, personal qualities (e.g. commercial awareness, reliability and punctuality, understanding the centrality of customers and clients), and professional knowledge including the need to engage with continuing professional development. With such assets, students will generate a CV, an employment portfolio, and a professional online presence.
Being a professional also means understanding the key legal, ethical and societal issues pertinent to the domain, and understanding the need for continuing professional development (CPD) especially when technology develops at such a rapid pace. The module is designed to support different domain areas and to integrate experience from other professions. The subject areas being studied demand a global perspective which encourages the inclusion of our diverse of communities and national practices.
Reflecting the fact that team working is ubiquitous in the modern workplace, a significant proportion of the assessment work on the course is based around group work. There is considerable evidence that group work promotes a much deeper engagement with taught content and the Future Skills report shows how it is embedded in working practices. It also encourages the development of diverse learning communities with computer science, cybersecurity and digital media students working in close proximity. This module will therefore introduce students to best practice in group working covering how to approach group work, how to understand yourself, how to deal with different types of people, and methods of selecting and managing groups.
In the second year, students will study ethical hacking through practical activities (e.g. password cracking, port scanning, anonymous browsing, keyboard logging, screen capture, packet interception, social engineering and malware).
30 credits
The highly technical Ethical Hacking module begins by introducing you to the fundamental steps and frameworks needed for practical and ethical hacking exercises. You will then be introduced to the Python programming language and the use of Python scripts for various ethical hacking activities; examples include password cracking, port scanning, anonymous browsing, keyboard logging, screen capture and packet interception.
30 credits
The module will enhance your understanding of how modern computer systems are implemented from the perspectives of architecture, networking, operating system, parallel programming and algorithm complexity. You will explore the essential features and operations of modern computer architectures and acquire both theoretical and practical knowledge of the principles and major functions of modern operating systems. You will also develop knowledge of parallel programming and algorithm complexity so that you will be able to make use of new parallel computer architectures. Physical networks and their associated address schemes will also be explored.
30 credits
Following a project-based pedagogic approach, students will undertake a major inter-disciplinary team-work project drawn from a list of authentic industrial problems. Achieving the goals of the project will require students, firstly, to apply the various development methodologies they have acquired on their course and, secondly, to develop professional skills in project management and team working.
While the bulk of the taught programme focuses primarily on the learning of domain knowledge, the goal of the Professional Environments 2 module is to prepare students for professional practice in their respective domains. They will develop the necessary project management and team-working skills. By working as a team on an authentic industrial project, they will gain a high degree of familiarity with the capture, design, and development methodologies relevant to their discipline. With the focus on making real-world artefacts, the students will integrate their work into an employment-focused portfolio.
Being a professional practitioner also means critically assessing goals and solutions from legal, ethical and societal perspectives as well as addressing security and safety concerns. Students are encouraged to consider their continuing professional development needs and to engage with their professional bodies. To encourage career management skills and promote employability after graduation, students are expected to integrate the artefacts they produce and reflective practice narratives into their employability portfolios and personal development plans.
The module is designed to support different domain areas and to integrate experience from other professions. The subject areas being studied demand a global perspective which encourages the inclusion of our diverse of communities and national practices.
30 credits
This module seeks to establish the skills required to build full-stack database-driven web applications. You will learn how to design, build and query databases according to user information needs using logical data models and structured query language (SQL). You will also learn how to design and build scalable interactive applications that are delivered over the web and integrated with a backend database.
30 credits
With a strong emphasis on understanding the Internet protocols, the Networking Concepts module will develop your understanding of the basic principles of networking.
You will become familiar with current LAN and WAN technologies and their role in building domestic and corporate networks. This knowledge will underpin the skills required to design and simulate small company networks including identifying the physical components required and to design an appropriate IP addressing schemes for such network.
It will also underpin your understanding of how network services such as mobile apps and network-based games are implemented.
60 credits
This module is an essential course programme component for students on the sandwich route of an honours degree "with professional placement". It is a key element in providing an extended period in industry gaining real world employability skills. Students are supported both before and through their placement by the SEC Placement team. Students that successfully complete their placement year will graduate with a 4-year sandwich degree.
In the final year, students will study encryption algorithms, public-key cryptography systems, network security techniques, security policies as well as live, network and mobile forensics in the context of a security operations centre. They will also complete an individual 'capstone' project. This project is a showcase opportunity in which students undertake a research and development project of their choice. They will develop a tangible and noteworthy artefact, that can be showcased during interviews for placements, internships or full-time roles. Examples topic themes include crypto currencies, mobile privacy, blockchain technologies, malware etc.
30 credits
This is a core module in the Cyber Security and Computer Forensics field which explores the major challenges to computer security. It familiarises you with a range of cryptographic algorithms and protocols, firewall and access-control architectures and methods to assess and improve network and application security. This knowledge will allow you to implement and evaluate security controls and develop secure policies for corporate networks.
30 credits
This highly technical and practical module, provides students with an insight to the essential functions of a Security Operations Centre (SOC), to which network and mobile security are important components. Within the context of a SOC, students will acquire, preserve, analyse and document digital evidence from live, network and mobile environments.
Additionally, students will experience other essential SOC functions that include network monitoring, collating threat intelligence, analysing threat intelligence and undertaking essential incident response tasks.
30 credits
The goal of the module is to further develop skills in organisation, timekeeping, research literature, developing and critically analysing results as well as reporting work verbally and in a written format. The end result will be an artefact or artefacts which demonstrate creativity and technical competence as well as a technical report.
30 credits
This module focuses on enterprise networks; the internet protocols and services which will develop the understanding of how the TCP/IP internet protocol suite achieves the interconnection of geographically separate computers over networks of arbitrary topology and technology. This knowledge will underpin the design skills required to design such company networks including identifying the physical components required and designing appropriate IP addressing schemes. The module introduces wireless and high-speed networks and how these are used to deliver a variety of business applications.
On successful completion of the module, you will be able to:
30 credits
This module aims to provide a strong theoretical and practical background necessary for you to build high quality scalable software and to operate effectively as an industry professional. It examines software quality concepts necessary to build high quality software architecture. The module introduces you to the concept of software architecture and architectural patterns as part of software design and reuse which can be viewed as components and interfaces. At a lower level, programming models and paradigms are explored, as well as design patterns and anti-patterns. Testing strategies and other software quality principles will also be covered, and you will explore these principles in the context of practical projects which expose you to industry tools, practices and management methodologies.
30 credits
Entrepreneurship is a major driving force in creating economic growth and this module illustrates how to work in an entrepreneurial fashion. At the heart of entrepreneurship is innovation, which can come in many forms. Sometimes this can be an incremental but generally gives significant improvement to the customer. Alternatively it is a new breakthrough or transformational innovation. Incremental innovation is aimed at increasing the value of a product or service, to add more value and thereby creating new and superior value chains. Breakthrough innovation often creates new categories of product, or transforms the historical ways of doing things.
From this foundation, the module proceeds to explain how to develop a strategy, not only to satisfy the critical needs that organisations have, but also to explore the application and use of improved value chains using the concepts of corporate venturing (spin-out/intrapreneurship) and entrepreneurship (new venture creation).
However it is not simple to start a new company. Especially the tech branch is characterised by fast developments, shifts of focus and low barriers to entry, where holding back from "bleeding edge" is essential and is one of the important differentiating factors between Tech Entrepreneurship and other forms of entrepreneurship. This means that one can no longer count on "good luck", and insight, understanding, knowledge and a systematic approach all have to be learnt.
This module will convey the concepts needed for roles in analysis, consultancy and management in technology environments, plus the necessary knowledge to work successfully in an innovative company, as well as providing a good background for new venture creation (Entrepreneurship) for those considering self-employment or founding new technology firms
Optional modules only run if there is enough demand. If we have an insufficient number of students interested in an optional module, that module will not be offered for this course.
If you would like to study computing or mathematics at Kingston University but are not yet ready to join the first year of a BSc (Hons) course, you can include an extra foundation year within your chosen degree. Please see the foundation year course page for details of modules.
Embedded within every course curriculum and throughout the whole Kingston experience, Future Skills will play a role in shaping you to become a future-proof graduate, providing you with the skills most valued by employers such as problem-solving, digital competency, and adaptability.
As you progress through your degree, you'll learn to navigate, explore and apply these graduate skills, learning to demonstrate and articulate to employers how future skills give you the edge.
At Kingston University, we're not just keeping up with change, we're creating it.
This degree has been accredited by BCS, The Chartered Institute for IT. Accreditation is a mark of assurance that the degree meets the standards set by BCS. An accredited degree entitles you to professional membership of BCS, which is an important part of the criteria for achieving Chartered IT Professional (CITP) status through the Institute. Some employers recruit preferentially from accredited degrees, and an accredited degree is likely to be recognised by other countries that are signatories to international accords. This degree is accredited by BCS for the purposes of fully meeting the academic requirement for registration as a Chartered IT Professional.
This degree has been accredited by BCS, on behalf of the Engineering Council for the purposes of partially meeting the academic requirement for a Chartered Engineer (CEng). Accreditation is a mark of assurance that the degree meets the standards set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC). An accredited degree will provide you with some or all of the underpinning knowledge, understanding and skills for eventual registration as an Incorporated (IEng) or Chartered Engineer (CEng).
The learning, teaching and assessment strategies reflect the programme aims and learning outcomes, student background, potential employer requirements, and the need to develop a broad range of technical skills with the ability to apply them appropriately.
Assessment includes coursework, which could be group or individual involving design, development, documentation and presentation tasks and exams.
Teaching approaches include studio practices; project-based learning through workshops and group work, scalable, context driven lectures, and problem based learning sessions. Ample opportunities are given to students for formative assessment with rapid feedback.
The course is taught at the School of Computer Science and Mathematics.
The School of Computer Science and Mathematics is driven by the philosophy of 'learning through making'; we focus strongly on facilitating a hands-on experience, student led and owned product portfolios and producing industry-ready graduates.
We utilise a range of innovating teaching and learning approaches in our invigorated and modernised degree programmes; combining studio practices, project-based learning, and context driven lectures to facilitate an informed approach to problem solving.
Postgraduate students may run or assist in lab sessions and may also contribute to the teaching of seminars under the supervision of the module leader.
There is a wide range of facilities at our Penrhyn Road campus, where this course is based.
The new dedicated cyber lab provides the student with Linux/ Windows dual-boot computers, access to the internet, digital forensic hardware and professional software such as the full commercial version of Forensic Toolkit (FTK).
Students are able to experiment within an unconstrained environment in terms of computer administration and networking access. There are opportunities to gain vendor certification for mobile forensics (XRY Logical) and FTK.
You will have access to a modern environment with the latest equipment, including:
Read about our games lab, which includes the latest Sony and Microsoft software as well as high-tech equipment such as PSPs and large screens.
Our dedicated team of IT technicians support the labs and are always on hand to provide assistance.
Depending on the programme of study, there may be extra costs that are not covered by tuition fees which students will need to consider when planning their studies. Tuition fees cover the cost of your teaching, assessment and operating University facilities such as the library, access to shared IT equipment and other support services. Accommodation and living costs are not included in our fees.
Where a course has additional expenses, we make every effort to highlight them. These may include optional field trips, materials (e.g. art, design, engineering), security checks such as DBS, uniforms, specialist clothing or professional memberships.
Kingston University's commitment to promoting excellent cyber security education has been recognised with a prestigious silver award from the National Cyber Security Centre (NCSC), which is part of GCHQ.
The recognition means the University has been named an Academic Centre of Excellence in Cyber Security Education (ACE-CSE) by the UK's lead technical authority on cyber security – a feat achieved by only 11 other higher education institutions across the United Kingdom. The ACE-CSE programme aims to help close the UK's cyber skills gap by supporting the next generation of cyber experts.
Find out more about the University's Cyber Centre.
Cyber security career opportunities are diverse and exist across many sectors. Examples include government, finance, entertainment, media, law and intelligence services.
Computing qualifications are amongst the most versatile and enable graduates to find employment in a wide spectrum of careers ranging from systems and business analysts, and software engineers, through to programmers and network specialists in a wide range of public and private sector industries.
Our curriculum is largely applied in nature with many case studies chosen for their topicality and relevance to industry such as information systems design, programming, networking, and implementation issues. Working on case studies designed to simulate the working environment, typically in teams, gives students experience of applying their skills to real-world problems.
To further set the material in context as well as inspire our students leading practitioners from industry, such as Google and IBM are invited to give guest lectures and workshops. The school hosts a local BCS chapter and several members of the School are involved with the institute at corporate level.
Embedded within the academic year are two Enrichment Activity Weeks. The first is in week 6 of Teaching Block 1 and the second in week 12 of Teaching Block 2, which include Careers and Employability events. These provide students typically with the opportunity to explore their CV and interview skills and look forward and plan for both industrial placement and their employment after university.
Our award-winning careers service offers a range of events, which include; employers on campus to promote internship, placement and graduate opportunities; profiling specific roles within industry; and exposing students to employers and building skills and knowledge. The current set of events include Part-time jobs fair, Guest lectures, The Big Kingston Careers Fair, Enrichment Week activity, Creative Conference, Work abroad fair.
In addition a range of software development competitions and hackathon type events are organised by the staff and various societies.
Placement company: Ernst & Young
Placements:
"To be successful, tomorrow's leaders will need to be far more rounded individuals than ever before. They will collaborate in pursuit of shared goals. They will guide, challenge and support...They will have an appetite for change and a hunger for continuous improvement, and they will have an ethos of learning and development..." Jeremy Darroch, Former Chief Executive, Sky.
"Doing a placement year effectively gives you one foot in the door of a future job and to stand out from the crowd... as well as enhancing my CV... and future interviews. It's a great motivator to be successful in my studies as it only serves to open even more doors and gain more skills." Placement student at Jagex Games Studios Ltd.
There is a lot of support available for students looking to secure a placement (e.g. a jobs board with placement vacancies, help with writing CVs and mock interviews). Getting a placement and passing the placement year are ultimately the student's responsibility.
Placements can be with large multinational companies, international companies, local companies and small start-ups; offering a diverse range of posts. Here are some examples of employers and roles:
Construction-based placement employers | Construction-based placement roles |
---|---|
RG Group Multiplex Costain Willmott Dixon Fluor |
Assistant site manager Assistant trades package manager Assistant logistics manager Health and safety officer Construction engineer |
Science-based placement employers | Science-based placement roles |
Reckitt and Benckiser GSK Drug Control Centre Minton Treharne and Davies Ltd Various local and international hospitals |
Bioanalytical sciences Lab assistant Pharmacy assistant Sports coach |
Engineering-based placement employers | Engineering-based placement roles |
Airbus BAM Nuttall Nissan Bosch Wozair |
Analysis of aircraft structure Construction resources specialist Site engineer assistant |
Computing and IS-based placement employers | Computing and IS-based placement roles |
Disney Sony Interactive Entertainment Europe IBM McKinsey Intel |
Database coordinator Software developer Website developer App developer |
Mathematics-based placement employers | Mathematics-based placement roles |
Lloyds Banking Group AXA Allianz PAU Education, Spain |
Analyst Investment solutions Research analyst Accounts assistant |
Up until 31 July 2022, this course was taught in the Faculty of Science Engineering and Computing. For students enrolling from September 2022, the course will be delivered by the Faculty of Engineering, Computing, and the Environment. There will be no impact on the teaching or the award of the degree.
The scrolling banner(s) below display some key factual data about this course (including different course combinations or delivery modes of this course where relevant).
The information on this page reflects the currently intended course structure and module details. To improve your student experience and the quality of your degree, we may review and change the material information of this course. Course changes explained.
Programme Specifications for the course are published ahead of each academic year.
Regulations governing this course can be found on our website.