Menu Enquire

Enquire

Register your interest Enquire now Add to my prospectus
Apply now

Cyber Security and Forensic Computing (Top-up) - BSc (Hons)

Add to my prospectus Why study this course? More about this course Entry requirements Modular structure After the course How to apply Meet the team Visit us

Why study this course?

This is a top-up version of our Cyber Security and Forensic Computing BSc degree. A top-up degree is the final year (Level 6) of an undergraduate degree course and is for those who have a foundation degree, Higher National Diploma or equivalent qualification, or those wishing to study the final year of their degree in London.

The Cyber Security and Forensic Computing (Top-up) BSc is an inclusive course that has a strong focus on cyber security and forensic investigation, expanding on the career led BSc programme. You'll have the opportunity to develop skills in cyber security technology, which will lead to an undergraduate degree completion and an entry into the professional world that it brings.

Apply for September 2019

Chat

More about this course

You'll be taught in our Cyber Security Research Centre which offers a unique collaborative environment in the UK. It provides a space for researchers, students and industry experts to develop new approaches and best practice. The course comprises of multiple practical opportunities to carry out projects in the dedicated Cyber Security Research Centre, working with industry-based software. Practical projects may be carried out through topics such as computer networking, cyber security and ethical hacking.

With professionally scrutinised modules by the British Computer Society, this career-focused course will equip you with the key skills necessary to succeed in the cyber security industry. This cutting-edge course is designed to put you at the forefront of computer security, with the curriculum regularly updated to keep up with the industry. You’ll study the prevention, detection, correction and conviction of digital crimes and enhance your essential knowledge of cyber security principles such as digital crime investigation, ethical hacking and security risk management.

As a digital crime-fighter, you’ll have the chance to boost your arsenal through exposure to specialist Forensic Tool Kits (FTK) and Mobile Phone Examiner Plus (MPE+) as well as open-source toolkits such as Kali, Metasploit and Honeypot.

Throughout the course you’ll be supported by highly qualified teaching staff who have strong links with the industry and potential employers. The tutors on your course will provide you with excellent academic guidance and careers advice throughout your studies. You'll learn all about the world of internet fraud on this intensive Cyber Security and Forensic Computing degree course. You’ll also discover techniques for stopping hackers, analysing risks and troubleshooting security issues on the latest gadgets.

Assessment

You'll be assessed through essays, individual and group coursework, exams, research projects and a final dissertation. You'll receive regular supportive feedback throughout the course.

Fees and key information

Course type
Undergraduate
UCAS code GG40
Entry requirements View
Apply now

Entry requirements

In addition to the University's standard entry requirements, you should have one of the following:

  • 240 credits from a Higher National Diploma (HND), Foundation Degree (FdA/ FdSc) or equivalent international qualification in a relevant subject
  • 240 credits from years 1 and 2 of an undergraduate degree (BA/BSc) in a relevant subject at a different institution

To study a degree at London Met, you must be able to demonstrate proficiency in the English language. If you require a Tier 4 student visa you may need to provide the results of a Secure English Language Test (SELT) such as Academic IELTS. For more information about English qualifications please see our English language requirements.

If you need (or wish) to improve your English before starting your degree, the University offers a Pre-sessional Academic English course to help you build your confidence and reach the level of English you require.

Modular structure

The modules listed below are for the academic year 2019/20 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.

Year 3 modules include:

  • This module currently runs:
    • all year (September start) - Monday morning

    Nowadays, digital crimes are far more sophisticated and harder to fight against. It is imperative to explore advanced detective and preventive technology in combating the ever-changing computer crimes. This module provides knowledge of how to detect and prevent digital crimes. In this module, students are also prepared for their career as a professional working in Computer Forensics and IT Security industry. It provides students with practical knowledge and skills needed to succeed in the external exam from the certification of CompTIA Security+.

    Read full details
  • This module currently runs:
    • spring semester - Thursday morning

    This module is designed to develop understanding, knowledge and skills associated with the various malicious hacking attacks targeting computer systems and the appropriate safeguards needed to minimise such attacks.

    Read full details
  • This module currently runs:
    • all year (September start) - Wednesday morning

    The aim of this module is to provide students with a critical understanding of security threats against network and cloud computing systems and the security measures designed to protect such systems. The module will explicitly develop students’ knowledge and experience in the design and application of network and cloud security solutions. The module will also equips students for further academic study and future employability in the area of computer security.

    Assessment: Coursework (60%) and Examination (40%) - Pass on aggregate

    The key skills and knoweldge to be gained are:

    Students to develop a critical understanding of the principles and technologies employed in the protection of computers and their networked communications systems from security threats.

    Read full details
  • This module currently runs:
    • all year (September start) - Wednesday afternoon

    The module enables students to demonstrate their acquired knowledge and skills through a systematic and creative investigation of a project work in accordance with their course requirements. The topic of investigation will cover a broad spectrum of various analysis and techniques and will lead to a comprehensive and concise academic/industry-related report. Students will be assisted in exploring areas that may be unfamiliar to them and encouraged to develop innovative ideas and techniques. Students will be able to choose a project that may require the solution to a specific problem, creation of an artefact in a real-world environment or an investigation of innovative ideas and techniques related to an area within their field of study. Collaboration with outside agencies and projects with industrial, business or research partners/ sponsors will be encouraged.

    Assessment: Project Report Interim Submission (25%) + Project process (25%) + Project Report Final Submission (40% - Pass on component) + Viva (10% - Pass on component).

    The module aims to develop a wide range of subject specific cognitive abilities and skills relating to intellectual tasks, including practical skills and additional transferable skills of a more general nature and applicable in many other contexts.

    Particularly, the module aims to:

    • Provide an opportunity to learn, through supervised experience, how to plan and carry out a project through a systematic and creative approach;
    • Encourage innovation and originality in approach to investigating a problem in an area that may be unfamiliar to the student;
    • Provide opportunity for in depth study of some specialised area of suitable scale and complexity relevant to their course of study;
    • Raise awareness in potential business development opportunities in connection to the project work undertaken and of any ethical, legal and professional issues;
    • Develop reporting skills as well as the ability to communicate results, conclusions, and the knowledge and rationale underpinning these, to specialists and non-specialist’s audiences, clearly and unambiguously;
    • Encourages reflection upon the relationship of design decisions to the appropriateness of the finished task;
    • Enhance professional and personal development.

    Read full details
  • This module currently runs:
    • autumn semester - Thursday morning

    CC6052 Management Support Systems 15 weeks: This module enables students to build on their existing knowledge of databases to understand the application of computer-based information systems used in business for the support of management decision-making, e.g. Management Information Systems, Decision Support Systems, Expert Systems, Executive Information Systems, etc

    Read full details
  • This module currently runs:
    • autumn semester - Thursday afternoon

    This module is in particular for those who wish to specialise in understanding, developing, and the application of IT security systems and measures in IT environments. It focuses on various aspects of security management and deals mainly with risk assessment, risk management, and standards and procedures. It provides students with an appreciation of the benefits security management provides within an information systems domain. This includes the choice and application of appropriate risk assessment and risk management techniques, coupled with an understanding of security standards and procedures.
    This module is aimed at providing students with the understanding of security risks associated with information assets and the security programs designed to protect them from security threats. This module will focus on the identification of security risks, the application of risk control and risk management measures, the appreciation of security technology, and critical understanding of security policies, standards and practices. The legal, ethical, and professional issues in security management are also covered in this module.

    Read full details
  • This module currently runs:
    • spring semester - Wednesday afternoon
    • autumn semester - Wednesday afternoon

    The module enables students to undertake an appropriate short period of professional activity, related to their course at level 6, with a business or community organisation and to gain credit for their achievements. The activity can be a professional training, a volunteering activity, employment activity, an activity within the School of Computing and Digital Media Virtual Business Environment (VBE), placement or business start-up activity.
    For the purpose of this module – the VBE will be also be recognised as ‘the employer’.
    It is expected student should work for 150 hours which should be recorded clearly (in a learning log for instance) in the portfolio. The 150 hours can be completed in 25 working days in a FT mode, or spread over a semester in a PT mode.
    Students should register with the module leader to be briefed on the module, undergo induction and Work Based Learning planning and to have the Work Based Learning approved, before they take up the opportunity. It is essential that students are made aware that both the “Work Based Learning agreement” and relevant “health and safety checklist” where applicable need to be approved before starting the learning activity.

    The module aims to provide students with the opportunity to:
    • gain a useful experience of the working environment and the career opportunities available on graduation.
    • undertake a work-based project appropriate to their academic level.
    • enhance and extend their learning experience by applying and building on their academic skills and abilities by tackling real life problems in the workplace.
    • enhance professional and personal development.

    Read full details

After the course

You’ll complete this course ready to pursue a career in computer forensics and/or cyber security arena, or in the wider IT industry. Previous graduates have gone on to find employment as security/cyber analysts at companies such as MWR InfoSecurity, CACI, Cisco Systems and LGC Group.

Potential employers include digital crime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.

Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work-related module.

This course is also an excellent preparation for further research or studies such as MSc or PhD either at London Met or another university.

Additional costs

Please note, in addition to the tuition fee there may be additional costs for things like equipment, materials, printing, textbooks, trips or professional body fees.

Additionally, there may be other activities that are not formally part of your course and not required to complete your course, but which you may find helpful (for example, optional field trips). The costs of these are additional to your tuition fee and the fees set out above and will be notified when the activity is being arranged.

Unistats - key information set

Unistats is the official site that allows you to search for and compare data and information on university and college courses from across the UK. The widget(s) below draw data from the corresponding course on the Unistats website. If a course is taught both full-time and part-time, one widget for each mode of study will be displayed here.

How to apply

Apply to us for September 2019

Applying for a full-time undergraduate degree starting this September is quick and easy – simply call our Clearing hotline on or complete our online Clearing application form.

If you're a UK/EU applicant applying for full-time study you must apply via UCAS unless otherwise specified.

UK/EU applicants for part-time study should apply direct to the University.

Non-EU applicants looking to study part-time should apply direct to the University. If you require a Tier 4 (General) student visa, please be aware that you will not be able to study as a part-time student at undergraduate level.

All applicants applying to begin a course starting in January must apply direct to the University.

When to apply

The University and Colleges Admissions Service (UCAS) accepts applications for full-time courses starting in September from one year before the start of the course. Our UCAS institution code is L68.

If you will be applying direct to the University you are advised to apply as early as possible as we will only be able to consider your application if there are places available on the course.

News and success stories

Visit us

You may also like...