Bachelor of Science with Honours Cyber Security (Global) (Top-up) - BSc (Hons) *
Currently viewing course to start in 2024/25 Entry.
This course is designed to equip you with state-of-the-art technical knowledge, intellectual know-how, management capabilities and practical skills that will enable you to succeed in meeting the cyber security challenges facing modern organisations...
- Level Undergraduate
- Study mode Full Time
- Award BSc (Hons)
- Start date September 2024
- Fees View course fees
- Subject
- Location Kaplan Higher Education Academy, Singapore
This course is:
Open to students in Singapore only
Overview
Course Description
The Bachelor of Science with Honours Cyber Security (Global) course is designed to equip you with state-of-the-art technical knowledge, intellectual know-how, management capabilities and practical skills that will enable you to succeed in meeting the cyber security challenges facing modern organisations. In the 21st century, data has become a necessary commodity, which has value in isolation and more so when viewed as a larger data set for trends and habits. Data is key to the functioning of modern business and the protection of this data is key to the ongoing success of the digital economy. As systems, such as IoT, both generate and consume data grow in capability and complexity, the need to protect the data created, stored and transited across public and private networks intensifies. Due to this, the need for suitably qualified cyber security practitioners has never been greater.
This course will provide you with the knowledge and skills needed by the employers. Our strong links with industry enable us to teach the most demanding and up-to-date topics. You will learn state of the art technical knowledge, intellectual know-how, management capabilities and hands-on practical skills to succeed in meeting the cyber security challenges faced by modern organisations. This course is supported by a vibrant research environment within the centres for Cyber Security and Cloud Computing at BCU and by traditionally strong industrial links with CISCO, Oracle, IBM, Microsoft, UK Fast, Linux Professional Institute and BT.
Secure information technologies form the bedrock of our modern connected mobile society. Our Bachelor of Science with Honours Cyber Security (Global) course will equip you to enter this growing and important industry.
The course takes a practice-led approach, making use of equipment and tools found in the industry to give you the best preparation for a successful career. Our approach prioritises the practical skills sought by industry, backing this up with a thorough understanding of theory. The course delivers the latest in computing, network and security technologies, with the opportunity to gain additional accreditation from Cisco, Juniper, Huawei and the Linux Professional Institute.
The course delivers a well-rounded curriculum in the security of the communication networks; the security of computer processing and storage equipment and the software that runs on it, both private and public, and both local and cloud based; the security and accuracy of information and information systems; and the forensic analysis of threats and attacks, as well as management-level skills such as project and change management, maximising your career potential.
Studying computing with us puts you at the heart of an exciting, innovative community. Upon graduation you could progress into a career as a cyber-security engineer, network administrator, and cyber security analyst or network security architect.
Entry Requirements
Essential requirements
This degree programme accepts a wide range of qualifications, which include:
-
Kaplan Diploma in a related discipline with at least 2 years of relevant work experience.1,2
-
Local Polytechnic Diploma3 in a related discipline;
-
Other qualifications3,4 in a related discipline may be considered on an individual basis.
1 For work experience to be considered, applicants must have been in roles where they are able to demonstrate significant exposure to computing or aspects of information technology.
2 Applicants admitted to the programme will be required to successfully complete bridging modules to fulfil the required prerequisite knowledge at RQF Level 5 equivalent.
3 Applicants admitted to the programme may be required to successfully complete bridging modules to fulfil the required prerequisite knowledge.
4 Equivalent to RQF Level 4 and RQF Level 5.
English requirements
-
GCE O-Level English language subject (Grade C6 and above); OR
-
IELTS 6.0 or equivalent
-
For more information, see accepted qualifications.
In all cases, the final decision on admission to the programme rests with the University.
Fees & How to Apply
Guidance for UK students
UK students applying for most undergraduate degree courses in the UK will need to apply through UCAS.
The Universities and Colleges Admissions Service (UCAS) is a UK organisation responsible for managing applications to university and college.
Applying through UCAS
- Register with UCAS
- Login to UCAS and complete your details
- Select your course and write a personal statement
- Get a reference
- Pay your application fee and submit your application
Personal statement
UK / EU students are required to submit a personal statement as part of their application for this course.*
The personal statement gives you a crucial opportunity to say why you’re applying and why the institution should accept you.
Here are the key areas you’ll need to address:
- Course choice - Why does this course appeal? What areas are of particular interest?
- Career plans - If you have a specific career in mind, say how your chosen course will help you pursue this goal.
- Work experience - Mention any work that is relevant to your subject, highlighting the skills and experience gained.
- School or college experience - Highlight skills gained at school/college, eg summer schools or mentoring activities.
- Non-accredited skills or achievement - eg Duke of Edinburgh Award, Young Enterprise scheme.
You should also mention your future plans – if you’re planning to take a year out, don't forget to give your reasons. Talk about any subjects you’re studying that don’t have a formal assessment and any sponsorships or placements you’ve applied for. And don't be scared to add in details about your social, sports or leisure interests.
Worried about Personal Statements?
If you've got no idea where to start or just want to check you're on the right track, we’ve got expert advice and real examples from our students to help you nail your personal statement. You can even download our ultimate personal statement guide for free.
*Non-EU students are not required to submit a personal statement when applying for this course.
Course in Depth
Level 6
In order to complete this course, you must successfully complete all the following CORE modules (totalling 120 credits).
The module provides a foundation for developing your computing research skills, preparing you to understand, critique, and engage with literature and methodologies employed in the computing domain. Your learning experience will be enhanced by producing an industrially relevant output that contributes academic value to the research base of your chosen industry.
This module enables you to understand the processes, scope and role when providing guidance or advice in a professional consulting capacity. It will also assist you if you join a larger organisation with the aspiration to become a leader and manager. The module provides awareness on the wider consulting profession and practice, the consulting role in computing and the management of client relationships. The focus will be to analyse and evaluate the frameworks, processes and techniques that computing consultants, managers and leaders apply.
The module provides you with an opportunity to learn and critically reflect on the skills of Ethical Hacking and information security within a global context. This module builds on the knowledge and underpinning theory from the networking modules and reviews the requirements for a secure network communication system.
As cyberattacks grow in volume and complexity, artificial intelligence (AI) is a vital tool assisting security operations analysts to stay ahead of threats. Looking after threat intelligence from millions of research papers, blogs and news stories, AI technologies like machine learning provide rapid insights to cut through the noise of daily alerts, drastically reducing response times. AI is a powerful tool for identifying vulnerabilities, threats, and attacks in cyberspace. AI-based cybersecurity can detect and analyse enormous amounts of data, seeking malicious patterns and providing necessary recommendations.
This module provides students with knowledge and practical skills essential for the acquisition, analysis and interpretation of evidence obtained from wired and wireless networked computers and storage systems. Emphasis is also placed on the evidence harboured by network hardware devices, such as routers and switches.
You will learn how to effectively retrieve valuable information from the Microsoft Windows Server operating systems and analyse the Active Directory for evidence pertaining to user policies, privileges and violations. You will also learn how to formulate and implement a strategy to acquire drive images as evidence files over networked computers.
One of the major objective of the computer science program is to introduce the theory, principles and technologies underlying the construction of modern computing systems. This module introduces, Cloud Computing which is the technology that enables on-demand computing resources (everything from applications to data centres) over the internet.