Work on live business cases to defend against cyber security risks. You will study the cyber environments of banks, high-security digital environments like GCHQ, ecommerce and social media platforms, graduating well-equipped to protect cyber environments across business sectors. If you choose the four-year study option, you’ll have the opportunity to undertake a work placement. Our students have recently worked at IBM Security, Hewlett-Packard and Intel.
You’ll learn to identify security breaches and implement solutions using the latest industry tools and techniques. Through hands-on experience of analysing secure networks and websites, you’ll develop skills around penetration testing, malware identification and ethical hacking. From network design (the physical securing of network components) and operating systems security with a focus on Windows, MAC OS and Linux, to information security (keeping cyber information secure in a business environment), you will graduate well prepared for your next step.
Our Cyber and Computing Security degree focuses on protecting against cybercrime before it happens. You will develop specialisms through module choices to match your career goals. Optional subjects include data analytics, information security and digital crime scene investigation. You'll also examine ‘hot’ cybercrime topics. These include the latest security crimes in the news, as well as big data and Cloud systems which have both significantly increased commercial security risks.
The course is underpinned by strong ethical and legal foundations. These foundations are paramount to you moving into and progressing through a successful computer security career.
You'll learn in our new purpose-built School of Computing and Technology. This includes: a dedicated cyber security lab where you can practice your skills in a digitally protected environment with an isolated network; purpose-built break-out areas for workshop sessions; games consoles and screens in social areas; and the latest computing technology and software. There is a strong sense of community, with staff and students sharing both work and relaxation space. You can check these spaces out at our open day.
Find out what our Cyber and Computer Security students are up to and be inspired.
The majority of your learning will be practical, using industry-standard tools, techniques and practices. Alongside lectures, you’ll undertake group work and individual projects. There are no exams on this course; all assessments are done through individual or group-based coursework.
Take a look at the course map for a breakdown of modules that you'll study to complete the course. Some modules are compulsory, but in some cases you can also choose modules which interest you from outside your core area of study.
Tariff information for 2018 entry
112 tariff points
BBC at A levels, DMM at BTEC or use a combination of your qualifications to achieve the required tariff total.
2018 UCAS tariff table
Mature Applicants: We welcome applications from mature students (aged 21 and over) and do not necessarily require the same academic qualifications as school leaving applicants. To find out more, please email our enquiries team.
International Students: Please see the full details of entry requirements in your country.
If you do not meet the academic and English language requirements, you should consider a preparation course at INTO University of Gloucestershire, which will help to prepare you for study on this degree. INTO University of Gloucestershire is based at our Park campus and offers a range of courses including International Foundation Business, Hospitality and Tourism.
Grade C in GCSE English and Mathematics (or equivalent) are normally required.
If you don't meet your tariff points total we may still consider your application.
Please email our admissions team for further information.
Check your UCAS tariff points
If you are unsure whether your predicted grades will carry enough points to study the course, we can help. Whether you’re taking A levels or BTECs, Access courses or anything else the tariff calculator will let you know whether you currently have the grades and advise on what to do next.
See the further details of fees and potential extra costs when studying a course at the University of Gloucestershire.
|UCAS codes available for this subject|
|BSc (Hons) - 3 years full-time||G502|
|BSc (Hons) - 4 years placement||G501|
- Penetration testing
- Systems security
- Information security management
"The vast number of placements was simply outstanding." Andrew Shelton, Graduate
12 months, full-time (minimum 35 hours per week)
Placements can be carried out in the UK or overseas; popular overseas placement destinations include the USA, China and Europe. You may even wish to source your own placement in other countries.
If carrying out a placement abroad, there may be a visa requirement.
On your placement year you will pay a reduced tuition fee and are still eligible to apply for a maintenance loan. Financial support is also available from the Student Finance Team by contacting email@example.com.
You will have access to guidance from the Placements Team throughout your placement search, and for the duration of your placement year. You can contact the Placements Team on firstname.lastname@example.org.
Our connections with the following organisations mean our students benefit from leading professionals in lectures, exciting work placement opportunities and networking events in preparation for their graduate careers: Raytheon, Northrop Drummond, GE Aviation, GlaxoSmithKline, Kraft, Zurich Insurance, Hewlett-Packard, Intel, Gloucester Constabulary, GCHQ and CGI. If you choose the four year course, you will do a one year work placement as part of your course.
Develop skills in cyber forensics, from crime scene to courtroom
Learn how to gather, recover and present digital evidence to court or civil hearing. You will follow the Association of Chief Police Officers' guidelines which lead the development of cyber forensic investigation practices across the UK.
Use the cyber forensic tools used by law enforcement
Gain the edge by using industry-standard software including AccessData FTK, the global standard in digital investigation technology, and CelleBrite which analyses and recovers information from mobile devices.
Be inspired by experts from industry
As well as being taught by staff with impressive industry experience, you'll hear from inspirational guest speakers. Previous visitors have included Andrea Simmons from Hewlett Packard and David Hopkins from the Intellectual Property Office.