Skip to content

Cyber & technical computing

Discover our range of cyber & technical computing courses, find out more about our facilities and hear from current students about their experience at University of Gloucestershire.

a student examining engineering equipment

Postgraduate research degrees

Research degrees including PhDs, Doctorates or Masters by Research enable you to pursue your own research enquiry.

Two men looking at something on a laptop screen

Higher and degree apprenticeships

Higher and degree apprenticeships are a great and cost-effective way for employers to upskill their staff, and for individual learners to obtain both a higher qualification and professional skills.

95.4% of UoG graduates in employment or further study

HESA Graduate Outcomes Survey 2019/20

Come and explore

Experience our amazing facilities including our labs and industry links.

White arrow facing down

School and facilities

Student on Computer Science course using tool on mobile phone at Park campus

Computing and cyber lab

Our facilities include a high performance computing cluster, highly secure research and training suite and a cyber ‘dirty’ lab, which allows sensitive product testing, recreating viruses and attacks from hackers within a secure environment.

C11, Cyber Security and Digital Innovation Centre building and sign

C11

We’re home to the region’s leading Cyber Security and Digital Innovation Centre. The secure zone is a government-grade controlled space designed for discretion and security.

Student leaning on railing

Placements

Students have the opportunity to undertake a placement as part of their studies. Take advantage of our partnerships with local businesses including Government security departments (GCHQ), Intel, IBM Security, Raytheon, GE Aviation, Gloucester Constabulary and Hewlett Packard.

Cyber & technical computing FAQs

We’ve compiled a list of frequently asked questions about cyber & technical computing degrees.

Got questions about studying cyber security? Check out our helpful cyber security guide.

Related stories