Cyber Security (Global) (Top-up) - BSc (Hons) *
Currently viewing course to start in 2024/25 Entry.
The BSc Cyber Security course is designed to equip you with state-of-the-art technical knowledge, intellectual know-how, management capabilities and practical skills that will enable you to succeed in meeting the cyber security challenges facing modern organisations....
- Level Undergraduate
- Study mode Full Time
- Location Kaplan, Singapore
- Award BSc (Hons)
- Start date September 2024
- Fees View course fees
- School School of Computing and Digital Technology
- Faculty Faculty of Computing, Engineering and The Built Environment
This course is:
Open to students in Singapore only
Overview
I'm a third year Music Technology student. When I was looking for Music Technology courses, Birmingham City University really stood out to me. I was keen on attending a Bachelor of Science and the course really focussed on the science aspects as well as maintaining the artistic elements of music and sound production. The support of the tutors has been fantastic. The professional standard and the facilities on campus are great due to their accessibility around the clock. The easy access to studios has been extremely helpful in completing my work and keeping on top of deadlines. At BCU, there's been a heavy focus on employability and what I could do with all aspects of my degree. The university has organised the industrial mentor forum, a space where students can communicate with alumni and people within the industry. The Acoustics Special Interest Group also consisted of more bespoke talks from people within the acoustics industry about different aspects of the work and how individual companies run. This is how I developed contact with an acoustic consultancy to complete my placement year. I act as an Acoustic Technician at Dragonfly Consulting. It went so well that I'm returning upon my graduation to continue working with them. The university has given me opportunities I don't think I would have received anywhere else.
I'm a second year computer science student studying at Birmingham City University. As a Computing student, there are plenty of computer labs available. There's entire rooms filled with Cisco networking equipment, as well as laptops that can be rented out to complete your work. Several of the facilities have now moved over to STEAMhouse, which is a £70 million build that is now the new home for Computing and Digital Technology students. One of the main things for me was getting employment at the end of my university degree. And Birmingham City University offers a wealth support for moving into the work environment. The course is a very important focus and a very industry focussed as well. I've been offered roles as a student demonstrator for Python programming. I found that the best way to show that you've understood something is to be able to teach somebody else.
I'm studying Computer Networks and Security. So far, I've really enjoyed my time at BCU. I felt really included within the student community. For the past two years, I've been involved in Innovation Fest. This is an annual event that showcases student work from the faculty. A lot of employers visit this festival, which allows us to widen our professional network. Throughout my time at BCU, I've had some time to
develop a relationship with the Careers+ team and go through tailoring my CV and my cover letters with them. Because of this, I have been presented with many opportunities which they have tailored to me and my needs. Through this, I was encouraged to apply for the women in tech competition.
So it was a one week program and I was working with the team from Cyferd. It's a software company,
and I successfully won and have taken up the placement year with them as a Junior Development Lead.
I look forward to coming back and applying the skills I've learnt throughout my placement and applied them within my studies.
The BSc Cyber Security course is designed to equip you with state-of-the-art technical knowledge, intellectual know-how, management capabilities and practical skills that will enable you to succeed in meeting the cyber security challenges facing modern organisations. In the 21st century, data has become a necessary commodity, which has value in isolation and more so when viewed as a larger data set for trends and habits.
Data is key to the functioning of modern business and the protection of this data is key to the ongoing success of the digital economy. As systems, such as IoT, both generate and consume data grow in capability and complexity, the need to protect the data created, stored and transited across public and private networks intensifies. Due to this, the need for suitably qualified cyber security practitioners has never been greater.
This course will provide you with the knowledge and skills needed by the employers. Our strong links with industry enable us to teach the most demanding and up-to-date topics. You will learn state of the art technical knowledge, intellectual know-how, management capabilities and hands-on practical skills to succeed in meeting the cyber security challenges faced by modern organisations.
Introducing STEAMhouse
STEAMhouse is a centre for technology, innovation, creative thinking, prototyping and business development. Our £70 million pound building is the home for all of our Computing courses.
What's covered in this course?
Secure information technologies form the bedrock of our modern connected mobile society. Our BSc Cyber Security course will equip you to enter this growing and important industry.
The course takes a practice-led approach, making use of equipment and tools found in the industry to give you the best preparation for a successful career. Our approach prioritises the practical skills sought by industry, backing this up with a thorough understanding of theory.
The course delivers a well-rounded curriculum in the security of the communication networks; the security of computer processing and storage equipment and the software that runs on it, both private and public, and both local and cloud based; the security and accuracy of information and information systems; and the forensic analysis of threats and attacks, as well as management-level skills such as project and change management, maximising your career potential.
Studying computing with us puts you at the heart of an exciting, innovative community. Upon graduation you could progress into a career as a cyber security engineer, network administrator, and cyber security analyst or network security architect.
Accredited By
This course is accredited by:
Entry Requirements
Essential requirements
This degree programme accepts a wide range of qualifications, which include:
- Kaplan Diploma in a cognate area with a minimum of 2 years of related work experience1. Applicants admitted to the programme may be required to undertake bridging modules to fulfil the required prerequisite knowledge.
- Local Polytechnic Diploma in a related discipline;
- Other qualifications2 in a related discipline may be considered on an individual basis.
English Requirements
- GCE O-Level English language subject (Grade C6 and above); OR
- IELTS 6.0 or equivalent
- For more information, please click here.
In all cases, the final decision on admission to the programme rests with the University.
1For work experience to be considered, applicants must have been in roles where they are able to demonstrate significant exposure to computing or aspects of information technology
2 Equivalent to RQF Level 4 and RQF Level 5
If you have a qualification that is not listed, please contact us.
Fees & How to Apply
Guidance for UK students
UK students applying for most undergraduate degree courses in the UK will need to apply through UCAS.
The Universities and Colleges Admissions Service (UCAS) is a UK organisation responsible for managing applications to university and college.
Applying through UCAS
- Register with UCAS
- Login to UCAS and complete your details
- Select your course and write a personal statement
- Get a reference
- Pay your application fee and submit your application
Personal statement
UK / EU students are required to submit a personal statement as part of their application for this course.*
The personal statement gives you a crucial opportunity to say why you’re applying and why the institution should accept you.
Here are the key areas you’ll need to address:
- Course choice - Why does this course appeal? What areas are of particular interest?
- Career plans - If you have a specific career in mind, say how your chosen course will help you pursue this goal.
- Work experience - Mention any work that is relevant to your subject, highlighting the skills and experience gained.
- School or college experience - Highlight skills gained at school/college, eg summer schools or mentoring activities.
- Non-accredited skills or achievement - eg Duke of Edinburgh Award, Young Enterprise scheme.
You should also mention your future plans – if you’re planning to take a year out, don't forget to give your reasons. Talk about any subjects you’re studying that don’t have a formal assessment and any sponsorships or placements you’ve applied for. And don't be scared to add in details about your social, sports or leisure interests.
Worried about Personal Statements?
If you've got no idea where to start or just want to check you're on the right track, we’ve got expert advice and real examples from our students to help you nail your personal statement. You can even download our ultimate personal statement guide for free.
*Non-EU students are not required to submit a personal statement when applying for this course.
Course in Depth
Level 6
In order to complete this course, you must successfully complete all the following CORE modules (totalling 120 credits).
The module provides a foundation for developing your computing research skills, preparing you to understand, critique, and engage with literature and methodologies employed in the computing domain. Your learning experience will be enhanced by producing an industrially relevant output that contributes academic value to the research base of your chosen industry.
This module enables you to understand the processes, scope and role when providing guidance or advice in a professional consulting capacity. It will also assist you if you join a larger organisation with the aspiration to become a leader and manager. The module provides awareness on the wider consulting profession and practice, the consulting role in computing and the management of client relationships. The focus will be to analyse and evaluate the frameworks, processes and techniques that computing consultants, managers and leaders apply.
The module provides you with an opportunity to learn and critically reflect on the skills of Ethical Hacking and information security within a global context. This module builds on the knowledge and underpinning theory from the networking modules and reviews the requirements for a secure network communication system.
As cyberattacks grow in volume and complexity, artificial intelligence (AI) is a vital tool assisting security operations analysts to stay ahead of threats. Looking after threat intelligence from millions of research papers, blogs and news stories, AI technologies like machine learning provide rapid insights to cut through the noise of daily alerts, drastically reducing response times. AI is a powerful tool for identifying vulnerabilities, threats, and attacks in cyberspace. AI-based cybersecurity can detect and analyse enormous amounts of data, seeking malicious patterns and providing necessary recommendations.
This module provides students with knowledge and practical skills essential for the acquisition, analysis and interpretation of evidence obtained from wired and wireless networked computers and storage systems. Emphasis is also placed on the evidence harboured by network hardware devices, such as routers and switches.
You will learn how to effectively retrieve valuable information from the Microsoft Windows Server operating systems and analyse the Active Directory for evidence pertaining to user policies, privileges and violations. You will also learn how to formulate and implement a strategy to acquire drive images as evidence files over networked computers.
One of the major objective of the computer science program is to introduce the theory, principles and technologies underlying the construction of modern computing systems. This module introduces, Cloud Computing which is the technology that enables on-demand computing resources (everything from applications to data centres) over the internet.
We think it’s important that you are assessed in a number of different ways during your Cyber Security BSc (Hons) course. These will include including continuous assessment, in-class tests, examinations, laboratory exercises and project work.
Student stories
Can Wang
The course I am studying is part of a four-year joint programme of studies with Nanjing University of Science and Technology (NUST). The first two years were at NUST and the final two years are at Birmingham City University, providing me with a unique opportunity to gain a Bachelor’s degree.
The HOST UK scheme arranges visits for international students to British families’ homes. Birmingham City University will pay the cost for you to apply for a visit. It is a good way to experience British culture. I have really enjoyed it.
Apart from gaining a UK degree and expanding my knowledge, the Computer Networks and Security course has embedded in it the latest vendor-specific curriculum, which offers the opportunity to attain the Cisco Certified Network Associate (CCNA) professional qualification.
Austin Moses
Cisco Certified Internetwork Expert (CCIE) certification
There’s no disputing Austin Moses’ determination to succeed. The tenacious student put himself through university by working full-time in an off-licence – and still found the energy to achieve a first class honours degree, a sought-after prize and a position with Cisco.
Although he has dyslexia, Austin clearly didn’t let it stand in his way. He is full of praise for the University’s support systems. “I received extra tuition and proof reading that not only helped me polish up the work I was handing in but also taught me ‘survival’ skills that I can use to not be so disadvantaged,” he says. He also has great respect for the teaching staff and enjoyed ”learning from people with a passion and experience in the field in which they are teaching”.
Athena Swan Bronze Award
We have successfully secured the Athena SWAN Departmental Bronze Award recognising a commitment to gender equality.
The Athena Swan Charter is a framework which is used across the globe to support and transform gender equality within higher education (HE) and research.
Employability
Enhancing your employability
Your studies here will equip you with the practical and academic skills that will help you to stand out when you look for your first professional role.
Because we have strong links with companies such as SAS, Microsoft, Cisco and Capgemini, you have the chance to work with and understand the workings of real-life industry from early on in your degree studies.
You will have access to world-class facilities throughout your time here and these will help you to be a highly employable graduate.
The University has a Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.
Placements
You have the option undertake an assessed sandwich year between your second and third year, which will provide you with valuable work experience and give you the real-life skills you need.
Facilities & Staff
Our Facilities
We are constantly investing in our estate and are currently in the process of spending £260 million on new learning facilities. This course will be taught at Millennium Point at the City Centre Campus.
The course is supported with a wide range of cutting-edge facilities in the City Centre Campus. We have a state-of-the-art computer games technology lab which contains high-performance PCs, Sony PlayStation development kits and a range of industry standard software including Unity, Unreal and a suite of professional Microsoft development tools.
We also have many open access areas where students can study together and even hire out laptops for use in these spaces and others within the university.
Within the University there are many internationally recognised research teams giving you the opportunity to collaborate with them on exciting interdisciplinary projects.
Computer networking
The laboratories are well-equipped for all our computer networking courses, as well as specialist areas for practical work such as voice-over internet protocol (VoIP), forensic and ethical hacking technologies, wireless and mobile technologies and radio frequency identification technologies to name but a few.
Software development and computer programming
There are a number of open access, software development and computer programming laboratories that can be used to develop systems and programmes, including database management systems such as MySQL, to name but a few.
Systems laboratories
Our embedded systems laboratories are used to develop real-time systems, such as specialist hardware training and development resources, and industrial-standard software development and simulation tools. These include microcontroller software and robotics design and development, to name but a few.
Electronic systems
To underpin the basic principles of electronic systems, we have a well-equipped laboratory of general and specialist test and measurement kits, including powered prototyping development boards, dual power supplies, frequency generators and counters and digital multi-meters to name but a few.
Forensic computing
Our successful development of forensic computing has led to a specialist forensics laboratory that is fully equipped with essential hardware and software for this sensitive area of study. The laboratory includes high-spec PCs with built-in multi interface Tableau write blockers, EnCase and FTK computer forensic software and steganography detection and analysis software, to name but a few.
More on our facilities
Our staff
Dr Yussuf Ahmed
Senior Lecturer in Cyber Security
Dr Yussuf Ahmed is a Senior Lecturer in Cyber Security and Director of the BSc/MSci Cyber Security Programmes at Birmingham City University. He is a Senior Fellow of the Higher Education Academy (SFHEA) and specialises in Information Security, Cyber Assurance, Network Security, Cyber risks, and Security Governance. Yussuf is an experienced Cyber...
More about YussufRon Austin
Associate Professor
Senior lecturer Ron Austin is the Associate Professor of the MSc Advanced Computer Networks course and teaches all network-related courses. His expertise and areas of interest include: Voice Over Internet Protocol (VoIP), security technologies, and forensic and ethical hacking.
More about Ron