You'll learn all about the world of internet fraud on this intensive Digital Forensics and Cyber Security degree course. Discover techniques for stopping hackers, analysing risks and troubleshooting security issues on the latest gadgets.
With professional accreditation from the British Computer Society, this career-focused course will equip you with the key skills necessary to succeed in the cyber security industry.
This cutting-edge course is designed to put you at the forefront of computer security, with the curriculum regularly updated to keep up with the industry. You’ll study the prevention, detection, correction and conviction of digital crimes and enhance your essential knowledge of computing principles such as programming, communication networks and information systems.
As a digital crime-fighter, you’ll have the chance to boost your arsenal through exposure to specialist toolkits such as FTK and MPE+, as well as open-source toolkits such as Kali, Metasploit and Honeypot.
Throughout the course you’ll be supported by highly-qualified teaching staff who have strong links with the industry and potential employers. The tutors on your course will provide you with excellent academic guidance, pastoral care and careers advice throughout your studies.
You'll be assessed through essays, individual and group coursework, exams, research projects and a final dissertation. You'll receive regular supportive feedback throughout the course.
This course is accredited as fully meeting the educational requirement for Chartered IT Professional (CITP) registration.
On graduation, you'll be eligible to apply for Membership of the British Computer Society (MBCS).
In addition to the University's standard entry requirements, you should have:
Applicants with relevant professional qualifications or extensive professional experience will also be considered on a case by case basis.
If you don’t have traditional qualifications or can’t meet the entry requirements for this undergraduate degree, you may still be able to gain entry by completing the Cyber Security Extended Degree BSc.
All applicants must be able to demonstrate proficiency in the English language. Applicants who require a Tier 4 student visa may need to provide a Secure English Language Test (SELT) such as Academic IELTS. For more information about English qualifications please see our English language requirements.
If you have relevant qualifications or credit from a similar course it may be possible to enter this course at an advanced stage rather than beginning in the first year. Please note, advanced entry is only available for September start. See our information for students applying for advanced entry.
The modules listed below are for the academic year 2018/19 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.
Year 1 modules include:
The module introduces students to the basics of Information Technology; past, current and future trend in computer systems. The detailed design of a small scale Computer Systems is presented where students have the opportunity to build, configure and test a computer system for a given application. Students will identify the basic features of the Windows operating system and its elements. Health Safety issues and the safe disposal of equipment is also covered leading to an understanding and appreciation of social, ethical, environmental and economic issues related to computer’s hardware and software element. The module aims to
1. To introduce students to the fundamental concepts of Information Technology and basic networking,
2. To provide a working technical knowledge of modern computer systems and their respective components,
3. To introduce Operating systems by focusing on Windows products, identifying similarities and differences,
4. Identify the correct approach to preventive maintenance and upgrading, and troubleshooting
5. Introducing students to Assembly language and how it interacts with hardware
6. Awareness of social, environmental, commercial and economic aspects of PC technology
Students will receive an introduction to the principles of information processing and an overview of the information technologies for digital data processing using computational and communication devices, including an initial understanding of the requirements for usability, quality, complexity, security and privacy of the developed solution. The students will obtain initial practical skills in modelling, design, implementation and testing of software systems for real-world application using a suitable programming language.
Students will receive an introduction to the business environment and the role of information management and information systems within business.
The module develops an understanding of the Information Systems, the Software Development process and the basic technology underpinning these systems. This will include database management systems and the Internet. Students which will develop key skills and knowledge in the aspects of an information system, including databases, websites, and scripts with particular regard to usability.
• The module aims to provide an overview of the nature of organisations, their business models, and how key areas operate to meet business objectives. It introduces students to organisational culture, data, information and knowledge management, and the role of information in organisational decision making.
• Within the module the students will be given an appreciation of the effect of ICT on organisational performance, and a basic understanding of the processes of developing and maintaining information systems, software products and services.
• An introduction to underlying technologies (e.g., databases, Internet and Web) is embedded in the module, which also seeks to develop basic competence and confidence in the use of appropriate tools, techniques and academic and communication skills, with an underlining awareness of legal, social, ethical and professional issues.
The module aims are to give the students an understanding of how problems can be solved systematically, plan their solutions and write them in the form of algorithms. This module also develops a range of mathematical techniques including set theory, logic, relations, functions and operational research techniques. In addition it gives a grounding in standard software packages, to give students an understanding of their use in problem solving as well as to make students able to apply these packages appropriately in subsequent modules.
This is an introductory programming module, designed to develop interest, ability and confidence in using a programming language. Students will gain the basic knowledge and experience to solve simple programming problems using established techniques in program design, development and documentation.
The student is also expected to develop their confidence needed to program solutions to problems through a series of practical programming exercises.
Assessment: Coursework 1 (30%) + Coursework 2 (30%) + Multiple choice test (40%) [Pass on aggregate]
Year 2 modules include:
This module addresses the growing demand from law enforcement departments, security agencies and commercial organisations for skilled practitioners in Computer forensics. Computer forensic investigation requires an understanding of computer-related crimes, an appreciation of relevant laws, a high level of technical expertise, a methodical approach to investigation, and the ability to explain complex technical ideas simply. This module introduces the principles of computer forensics, develops the digital forensic analysis knowledge and skills required by the discipline, and prepares students for the career as a computer forensic investigator.
This module is aimed at providing students with fundamental concepts of modern operating systems and computer networks. It develops students’ knowledge and transferable skills for future employability. By taking this module the students will gain an understanding of key issues in relation to networking and operating system structures, fundamental issues, and services. This module also aims to provide students with an in-depth knowledge of the operation, function and inter-relation of the major software components of an operating system and the understanding of the hardware-software interface and its control by the operating system, and the insight knowledge of user-system interface.
This module focuses on computer laws, social, ethical and professional issues (LSEPI) underpinning the IT discipline. It also covers techniques for the world of work such as job search, CV and interviews as well as professional ethics and responsibilities. Topics on academic research and academic writing are also presented. (Exam and course work).
Assessment: Coursework (60%) + Unseen exam (40%) [Pass on aggregate]
The aims of this module are to:
• Provide students with knowledge and understanding of the regulations governing the digital environment (e.g. Internet) and social, ethical and professional issues (LSEPI) underpinning the IT discipline.
• Prepare students for the world of work and equip them with the knowledge and appreciation of professional bodies, code of conducts and professional certifications.
• Introduce students to academic research and research ethics, and to academic writing.
This module is in particular for those who wish to specialise in understanding, developing, and the application of IT security systems and measures in IT environments. It focuses on various aspects of security management and deals mainly with risk assessment, risk management, and standards and procedures. It provides students with an appreciation of the benefits security management provides within an information systems domain. This includes the choice and application of appropriate risk assessment and risk management techniques, coupled with an understanding of security standards and procedures.
This module is aimed at providing students with the understanding of security risks associated with information assets and the security programs designed to protect them from security threats. This module will focus on the identification of security risks, the application of risk control and risk management measures, the appreciation of security technology, and critical understanding of security policies, standards and practices. The legal, ethical, and professional issues in security management are also covered in this module.
This module is concerned with the fundamentals of security in key areas of computing in terms of understanding, controlling and managing the various risks and threats to computer-based systems. In addition, the issues in development of the security software will be dealt with via software engineering approaches.
Assessment: Coursework 1 (30%) + Coursework 2 (30%) + Unseen exam (40%) [Pass on aggregate]
The key skills and knoweldge to be gained are:
1. Provide students with an understanding of fundamental computer security concepts and issues.
2. Introduce students to the various types of security threats and risks to computer systems and networks.
3. Develop students’ ability to identify, analyse and evaluate a range of computer security threats.
4. Enable students to develop and/or use appropriate tools, techniques, methods, approaches and strategies to mitigate the various threats and provide practical, feasible and sustainable solutions.
5. Equip students with appropriate knowledge and skills necessary to protect the secrecy of confidential data and information.
6. Develop students’ knowledge, transferable skills and confidence in handling, managing and solving computer security issues leading to further academic progression and future employability in this area.
Year 3 modules include:
Nowadays, digital crimes are far more sophisticated and harder to fight against. It is imperative to explore advanced detective and preventive technology in combating the ever-changing computer crimes. This module provides knowledge of how to detect and prevent digital crimes. In this module, students are also prepared for their career as a professional working in Computer Forensics and IT Security industry. It provides students with practical knowledge and skills needed to succeed in the external exam from the certification of CompTIA Security+.
This module is designed to develop understanding, knowledge and skills associated with the various malicious hacking attacks targeting computer systems and the appropriate safeguards needed to minimise such attacks.
The aim of this module is to provide students with a critical understanding of security threats against network and cloud computing systems and the security measures designed to protect such systems. The module will explicitly develop students’ knowledge and experience in the design and application of network and cloud security solutions. The module will also equips students for further academic study and future employability in the area of computer security.
Assessment: Coursework (60%) and Examination (40%) - Pass on aggregate
The key skills and knoweldge to be gained are:
Students to develop a critical understanding of the principles and technologies employed in the protection of computers and their networked communications systems from security threats.
The module enables students to demonstrate their acquired knowledge and skills through a systematic and creative investigation of a project work in accordance with their course requirements. The topic of investigation will cover a broad spectrum of various analysis and techniques and will lead to a comprehensive and concise academic/industry-related report. Students will be assisted in exploring areas that may be unfamiliar to them and encouraged to develop innovative ideas and techniques. Students will be able to choose a project that may require the solution to a specific problem, creation of an artefact in a real-world environment or an investigation of innovative ideas and techniques related to an area within their field of study. Collaboration with outside agencies and projects with industrial, business or research partners/ sponsors will be encouraged.
Assessment: Project Report Interim Submission (25%) + Project process (25%) + Project Report Final Submission (40% - Pass on component) + Viva (10% - Pass on component).
The module aims to develop a wide range of subject specific cognitive abilities and skills relating to intellectual tasks, including practical skills and additional transferable skills of a more general nature and applicable in many other contexts.
Particularly, the module aims to:
• Provide an opportunity to learn, through supervised experience, how to plan and carry out a project through a systematic and creative approach;
• Encourage innovation and originality in approach to investigating a problem in an area that may be unfamiliar to the student;
• Provide opportunity for in depth study of some specialised area of suitable scale and complexity relevant to their course of study;
• Raise awareness in potential business development opportunities in connection to the project work undertaken and of any ethical, legal and professional issues;
• Develop reporting skills as well as the ability to communicate results, conclusions, and the knowledge and rationale underpinning these, to specialists and non-specialist’s audiences, clearly and unambiguously;
• Encourages reflection upon the relationship of design decisions to the appropriateness of the finished task;
• Enhance professional and personal development.
The University has a policy that all undergraduates must, at either Level 5 or 6, take a Work Related Learning (WRL) module i.e. a module which requires them to directly experience and operate in the real world of work and to reflect on that episode in order to identify skill and knowledge areas that they need to develop for their career. This module (and “partner” modules, namely, Creating a Winning Business 1 (Level 5) and Creating a Successful Social Enterprise 1 and 2), are module options available to ALL University students to fulfil the University’s WRL requirement.
This module challenges students to be creative in identifying a new business opportunity and in examining the viability of all aspects of the idea in the real world context e.g. testing potential customers’ views. As a result of the feedback received and enquiries carried out, the idea will change and develop over the duration of the module. Throughout the module, students are required to not only apply the business development theory taught but also to continuously reflect on how they have applied the theory and the skills and knowledge gained from their work. This reflective dimension promotes the development of practical attributes for employment and career progression.
The QAA Benchmark on Business and Management (2015) emphasises the attribute of “entrepreneurship” and of “the value of real world learning”. In terms of promoting work related skills, the module specifically focuses on practical techniques for generating and developing new business ideas and so develops creative thinking. In addition, it requires students to examine market potential and prepare a “pitch” as if seeking investment. The module requires a high level of self-reliance to pursue their business idea. Students develop an understanding of the role of new ideas in business start-ups, business growth and development.
These skills and techniques are of practical relevance to anyone considering starting a new business, working for a Small or Medium sized Enterprise (SME) or taking on an intrapreneurial role within a larger organisation where the business environment is constantly evolving and producing new challenges and opportunities.
For those students keen to go beyond this module and start their own business, they can apply to the Accelerator for access to “seed” money and advice and support.
The module enables students to undertake an appropriate short period of professional activity, related to their course at level 6, with a business or community organisation and to gain credit for their achievements. The activity can be a professional training, a volunteering activity, employment activity, an activity within the School of Computing and Digital Media Virtual Business Environment (VBE), placement or business start-up activity.
For the purpose of this module – the VBE will be also be recognised as ‘the employer’.
It is expected student should work for 150 hours which should be recorded clearly (in a learning log for instance) in the portfolio. The 150 hours can be completed in 25 working days in a FT mode, or spread over a semester in a PT mode.
Students should register with the module leader to be briefed on the module, undergo induction and Work Based Learning planning and to have the Work Based Learning approved, before they take up the opportunity. It is essential that students are made aware that both the “Work Based Learning agreement” and relevant “health and safety checklist” where applicable need to be approved before starting the learning activity.
The module aims to provide students with the opportunity to:
• gain a useful experience of the working environment and the career opportunities available on graduation.
• undertake a work-based project appropriate to their academic level.
• enhance and extend their learning experience by applying and building on their academic skills and abilities by tackling real life problems in the workplace.
• enhance professional and personal development.
"Throughout my whole degree, I've loved the subject and the material. The course is very intuitive, and lets you get hands-on in some subjects, so you get the feel of the real world. I definitely would recommend it if you like computers, hacking and forensics."
Diogo FIlipe Coito Gomes, second year student
"Studying Computer Forensics and IT Security has given me the foundation to go on and utilise my skills in a world where cyber security has become a major concern. The course itself covers a wide range of fun in-class activities as well as interesting and challenging assignments that cover real-life scenarios undertaken by detectives and hackers too!
And because the facilities are so great, I am able to simulate real attacks within a controlled environment. These activities help me understand how attacks occur and consequently help prevent them. The lab has many interesting tools available such as Kali Linux, BackTrack5, Encase, FTK and many more.
The whole subject area is always on stand-by to help pupils better their skills. Having viewed other universities and seen their facilities, I am happy that I chose to come here to London Met."
Majid Abdullahi, third year student
You’ll complete this course ready to pursue a career in computer forensics and/or IT security, or in the wider IT industry. Previous graduates have gone on to find employment as data analysts at companies such as MWR InfoSecurity.
Potential employers include digital crime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.
Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work placement module.
This course is also an excellent preparation for further research or studies such as MSc or PhD either at London Met or another university.
Please note, in addition to the tuition fee there may be additional costs for things like equipment, materials, printing, textbooks, trips or professional body fees.
Additionally, there may be other activities that are not formally part of your course and not required to complete your course, but which you may find helpful (for example, optional field trips). The costs of these are additional to your tuition fee and the fees set out above and will be notified when the activity is being arranged.
Unistats is the official site that allows you to search for and compare data and information on university and college courses from across the UK. The widget(s) below draw data from the corresponding course on the Unistats website. If a course is taught both full-time and part-time, one widget for each mode of study will be displayed here.
UK/EU applicants for September full-time entry must apply via UCAS unless specified otherwise.
UK/EU applicants for part-time study should apply direct to the University.
Non-EU applicants looking to study part-time should apply direct to the University. If you require a Tier 4 (General) student visa, please be aware that you will not be able to study as a part-time student at undergraduate level.
The University and Colleges Admissions Service (UCAS) accepts applications for full-time courses starting in September from one year before the start of the course. Our UCAS institution code is L68.
If you will be applying direct to the University you are advised to apply as early as possible as we will only be able to consider your application if there are places available on the course.
Please select when you would like to start:
London Metropolitan University will work with with Palo Alto Networks to deliver staff training on their behalf.
Professor Karim Ouazzane, Professor of Computing and Knowledge Exchange, offers his insight into the recent WhatsApp hacking.
The School of Computing and Digital Media's Summer Show will be held on 6 - 7 June in the world famous Graduate Centre. Events to celebrate the School will take place from 6 - 14 June.
A team of London Met students won third place in a national cyber hacking competition.
London Metropolitan University attended Lloyds Banking Group's inaugural Innovation Community event, a day-long session to bring together stories, collaboration and knowledge.
An exciting new Cyber Security Research Centre will launch at London Met with the aim to foster and nurture the University’s strong entrepreneurial culture.
London Met’s Widening Participation team work with young people across London and host a range of taster days to give tomorrow’s leaders a taste of university life.
The annual Computing and Digital Media Show will be held on Thursday 14 – Saturday 16 June. You are invited to attend this free event.