Undertake projects with real-world businesses


Choose to complete an optional 12-month work placement


Gain certifications related to EnCase, MicroSystemation XRY, and Cellebrite UFED

Course Overview

This course is designed to launch your future career in the protection of software and hardware against malicious threats. Our course is designed to not only give you a  theoretical foundation in computer science, but to give you a practical and expert-level knowledge in a specialist area of the field which can range from network security through to ethical hacking, so you’re fully prepared to work in the industry upon graduation.

We focus heavily on the practical element of cyber security, and we back that up with the distinctive facilities we have available to use at the university, including a dedicated, self-contained laboratory, with its own private internal network, containing some of the latest equipment and software.  We have access to external specialists from the Police and industry both for guest lectures and Q&A sessions.  The version of EnCase we use in the lab is the version used by law enforcement. We are equipped to perform both ‘PC’ based investigations, as well as mobile forensics (on smartphones, and sat nav’s etc).

On successful completion of study, we will issue the following award: BSc (Hons) Cyber Security



Institution Code: S72



Study Option

Full Time


3 Years

Start Date

21 September 2020

Course Modules

This map is an indicative list of compulsory modules for 2020/2021 full-time undergraduate courses only. The range of modules available and the content of any individual module are subject to change in future years, and according to the mode of study, entry date, award type. In the event of any full-time 2020-2021 compulsory modules changing, we will contact offer holders as soon as possible to inform or consult them as appropriate.

Software Development and Application Modelling
This module establishes a solid foundation in the basic principles of programming computers. You will learn the essential skills necessary to give you confidence in designing, implementing and testing procedural and object-oriented software solutions ranging from simple text-based command-line applications to more complex interactive applications with a graphical user interface. You will also be encouraged to develop your intellectual, communicative and problem-solving skills. You will also learn skills required for Business analysts and system analysts that are a key component in any company. This module also focuses on modelling software applications and implementing them in an object-oriented programming language.

Digital Technologies
This module extends your Staffordshire graduate skills set enabling you to explore the different areas of technology within computing and identify core elements within the field in order to make an informed choice for purchasing, designing, and developing systems. In addition to these core skills you will consolidate your mathematical skills in order to apply them to your chosen specialism.

Networking Concepts and Cyber Security
This module is intended to equip you with not only the knowledge but also the practical skills to be able to create and understand an enterprise grade network. The Syllabus incorporates the content of the Cisco ICND1 qualification (Network fundamentals and routing/switching fundamentals). It also looks at cyber security which is a growing challenge, in which different stakeholders are involved ranging from individuals up to organisations and governments. Effective information security requires participation, planning, and practice. This part of the module is designed to teach you the essential concepts of cyber security which are considered to be a gate for more advanced topics related to information security.

Web Development and Operating Systems
In this module, you will gain knowledge in web standards and building web applications that are suitable for their purpose. You will specifically gain an insight into the role of web standards bodies such as W3C. You will establish a solid foundation in the basic principles of client-side programming for the web and will learn the essential skills necessary to give you confidence in designing, implementing and testing event-driven software. You will find that the module provides you with theoretical knowledge, as well as design skills and experience for implementing with up to date technologies. You will also learn about the commercial world of Linux which is an increasingly popular Operating System for Internet facing services (OS). In this module you will understand the choices and the configuration which are needed for an application for Internet facing services. We will also look at the details of the Linux OS and the monitoring systems

Commercial Computing
You will work in a small team to produce an application in response to the needs of a third-party client. The module gives you ownership of the project management as well as the development of a solution to the brief, which not only must you aim to satisfy and exceed the clients’ needs, but you must also consider and apply the relevant legal, social, ethical, and professional issues.

Ethical Hacking
Computer systems and network infrastructure are an attractive target to attackers. Hackers often manipulate software vulnerabilities and poor configuration to successfully gain access and steal information. To secure a system it is essential for computer security professionals to understand the structure, configuration, tools and techniques that hackers rely upon to successfully commit their act. It is also important to test the network regularly and discover any vulnerability due to miss configuration or poor patching.

Cyber Operations and Network Security
Today’s organisations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in Security Operations Centers (SOC’s) keep a vigilant eye on security systems, protecting their organisations by detecting and responding to cybersecurity threats. The CCNA Cyber Ops certification prepares you to begin a career working with associate-level cybersecurity analysts within security operations centres. It covers exams: 210-250 (SECFND Understanding Cisco Cybersecurity Fundamentals and 210-255 (SECOPS) Implementing Cisco Cybersecurity Operations. Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure. It maps to the Cisco exam 210-260 (IINS) Implementing Cisco Network Security.

Cyber Security
The unprecedented growth in internet use and coverage is revolutionising society, driving economic growth and giving people new ways to interact and co-operate with one another. This will drive the expansion of cyberspace further and as it grows, so will the value of using it (as identified by The UK Cyber Security Strategy). As with most change, increasing reliance on cyberspace brings new opportunities but also new threats. While cyberspace fosters open markets and open societies, this very openness can make us more vulnerable to those criminals, hackers and foreign intelligence services who want to harm us by compromising or damaging our critical data and systems. The security of Data, Systems and Networks in today’s integrated digital-society is fundamental in ensuring people, businesses and governments are protected. The development of the Cloud, Big Data and the Internet of Things has provided criminals with numerous ways of attacking all sorts of systems. To protect systems and remove vulnerabilities, security specialists need to understand how attacks are carried out, the ways in which vulnerabilities can be identified and exploited and have the tools and knowledge to prevent such attacks and remove any vulnerabilities.

Final Year Project
In this module you will prepare a project proposal at the end of your second year and complete the project itself in year three. This involves: identifying a topic of interest, conducting primary and secondary research, including a critical literature review, planning the residue of the work to be done, modelling, creating and documenting an artefact that is relevant to your course of study and that is a solution to the problem set out in your proposal, writing a report describing the technical aspects of the project’s model and artefact, the processes involved in the performance of the project, and critically reflecting on the project’s findings and outcomes. You will also make a presentation of the technical aspects of the project, including a demonstration of the artefact and a critical evaluation of the project outcomes.

IT Infrastructure Security
This module provides in-depth knowledge on the current technologies and issues in enterprise network architecture. You will study the main infrastructure services and its security that precedes and steers enterprise systems. In this module we will provide you with applicable and practical knowledge to succeed in a future IT Infrastructure based career.

Advanced Topics in Cyber Security
Contemporary topics in information security such as machine learning, artificial immune systems, fuzzy logic and genetic algorithms are now at the heart of everything including cybersecurity. Face recognition, video analytics, anomaly detection and many more are now using one or more of these concepts. In this module we want you to be able to critically evaluate and apply these “relatively” new concepts in the computing and cyber security domain.

Operating Systems Internals and Biometrics
Modern applications typically need to access internal resources (hardware), which may lead to security flaws. Operating systems prevent applications from accessing internal resources directly, instead providing application programming interfaces that these applications can use to access such resources. This module introduces you to the internals and principles of modern operating systems (the underlying layer of modern applications), and aid you to build secure systems. The module also introduces the topic of Biometrics and covers the technology within these systems, the legal and ethical issues often surrounding such systems and security/Hacking considerations in biometric implementation with a potential AI/robotic future.

Over three years of study you’ll become a specialist in the field of cyber security. In your first year you’ll gain a foundation of knowledge of the subject, including aspects of software development and supplication modelling, a foundation of digital technologies, as well as delving into concepts of networking, cyber security and web development.

In the second year you’ll delve deeper into the specialisms of cyber security, tackling the subject of ethical hacking, cyber operations, and further networking technologies relevant to the discipline. You’ll also expand your foundational knowledge in computer science, looking at commercial computing.

In your final year, you’ll focus on your Final Year Project, and study further modules based on operating systems, and IT infrastructure. Your Final Year Project will be negotiated with your course leader and will work to demonstrate the aspects of cyber security and computer science that you have studied during the course.


Entry requirements

Typical UCAS offer: 112 points

A levels: BBC, CCC plus 16 points from other level 3 qualifications e.g. B at AS

BTEC: DMM, MMM plus 16 points from other level 3 qualifications


You’ll find graduates from our Computer Science disciplines working in many computing areas – Graduates from our Computer Science degrees have gone on to work in a whole range of related occupations. Previous roles include:  chief information security officer, forensic computer analyst, information security analyst, penetration tester, security architect, IT security engineer, security systems administrator, and IT security consultant.

Teaching and Assessment

This course has integrated theoretical, technical, and practical modes of study. This means the theoretical underpinning is taught alongside the technical knowledge, with heavy emphasis on practical elements of cyber security.

Assessment is based mainly on coursework, accompanied by a small number of exams. We find this is the best way to assess the integrated approach to theory and practice that you’ll engage in. Your coursework, carried out in response to assignments, project briefs or self-initiated proposals, will be presented in many forms such as practical computing artefact portfolios, word-processed reflective evaluations, essays and case studies. Your approach to the coursework for a given module should be individual and distinctive. Tutors see this work throughout its development thus forming a one-to-one professional working relationship with you throughout each module. Formative assessment is carried out in tutorial and feedback is usually provided to you orally, with a written record kept either by the tutor and/or yourself. This is sometimes produced as the result of peer- or self-assessment exercises.

In addition to the excellent support you will receive from your course teaching team, our central Academic Skills team provides group and one-to-one help to support your learning in a number of areas. These include study skills (including reading, note-taking and presentation skills); written English (including punctuation and grammatical accuracy); academic writing (including how to reference); research skills; critical thinking and understanding arguments; and revision, assessment and examination skills (including time management).

Never be put off applying for a course because you need additional support. We have a team of specialists who can help. Most importantly, make sure you inform the University of your needs at the earliest opportunity and share any current care/support plans with the student support team so we can make sure we are prepared.

Feedback is an important part of the assessment process and not only justifies the mark you receive but guides you on how to improve. Extensive feedback will be available throughout the course that will be constructive, develop your capabilities and motivate you to continue. Feedback will always be given in a timely manner to allow you to reflect on your progress and be a better critic of your own work.

Assessment feedback comes in a variety of forms throughout your studies and in a written format at the end of each period of study. At the end of modules once assessments are complete you will receive feedback in written comments, completed checklists/mark sheets, and in the case of demos and presentations direct feedback from the tutors.

Your study time will consist of class contact hours, self-directed learning, assessment and placements where appropriate. Your actual contact hours will depend on the subject area and the level of study you are undertaking. As a guide you can expect to be in practical sessions, lectures and seminars for 12 hours per week as well as studying for an addition 18 hours outside of this time if studying full-time.

All students are encouraged to build on their independent capabilities in relation to their own learning development. Tutors will mentor, support and guide students with clear direction in relation to ‘out of classroom’ activities and expectations in order to allow students the capacity to meet the learning objectives of their modules and course of study.


For the course starting on 21 September 2020 the tuition fees are:


UK / EU / Channel Islands
£9,250 per year of study

International (Non-EU)
£14,000 per year of study

UK, EU and Channel Island students: This tuition fee is agreed subject to UK government policy and parliamentary regulation. If the UK government passes appropriate legislation, the fee for subsequent years of study may increase in each academic year. But this increase will not exceed the rate of inflation as measured by RPIX**. Any change in fees will apply to both new and continuing students. The University will notify students of any change as early as possible. Further information about fee changes would be posted on the University’s website once this becomes available.

**RPIX is a measure of inflation equivalent to all the items in the Retail Price Index (RPI) excluding mortgage interest payments.

International (Non-EU) students: Tuition fees will remain the same for each year of your course, as long as you complete it in the normal time-frame (i.e. no repeat years or breaks in study).

Accommodation and living costs are not included in our fees.

Sources of financial support

If you receive funding from Student Finance you may be eligible to apply for additional benefits. Details can be obtained by visiting:

Scholarships and additional funding

As an undergraduate student at Digital Institute London, you may be eligible for additional financial support through one of our scholarships and bursaries. You can visit our funding page to find out more and check your eligibility.

I graduated from my BSc Cyber course with a first class degree and successfully got a job in digital forensics as a mobile phone forensic analyst. I found all of the staff to be extremely knowledgeable in the field as well as having their own area of expertise. This meant there were plenty of people on hand to speak to if there was something I was unsure of.

Kelly Ashman, Cyber Security graduate

Rules and regulations

If you are offered a place at Staffordshire University, your offer will be subject to our rules, regulations and enrolment conditions, which may vary from time to time.

Students of Staffordshire University enter into a contract with us and are bound by these rules and regulations, which are subject to change. For more information, please see: University Policies and Regulations


Contact us with any questions you have and we’ll get back to you as soon as possible.

Contact Us