You'll learn all about the world of internet fraud on our intensive Digital Forensics and Cyber Security BSc (Hons) degree. On this course you'll discover techniques for stopping hackers, analyse risks and troubleshoot security issues on the latest gadgets.
Our Cyber Security Research Centre provides a secure environment for you to study alongside our industry partners. You'll also get to work on live projects, giving you experience of the real working world.
You'll graduate fully prepared to thrive in the cyber security industry.
Our Digital Forensics and Cyber Security BSc degree has been accredited with full CITP status by BCS, The Chartered Institute for IT. This accreditation is a mark of assurance that the degree meets the standards set by BCS. As a graduate of this course, accreditation will also entitle you to professional membership of BCS, which is an important part of the criteria for achieving Chartered IT Professional (CITP) status through the Institute. Some employers recruit preferentially from accredited degrees, and an accredited degree is likely to be recognised by other countries that are signatories to international accords.
We ranked first in the country with 100% overall satisfaction, a 100% rating for the teaching on the course and 100% for assessement and feedback on our Digital Forensics and Cyber Security course, with software engineering at London Met coming joint first in the country with 100% student satisfaction.
With professional accreditation from the British Computer Society, this career-focused course will equip you with the key skills needed to become a successful cyber security professional.
This cutting-edge course is designed to put you at the forefront of computer security, with the curriculum regularly updated to keep up with the industry. You’ll study the prevention, detection, correction and conviction of digital crimes and enhance your essential knowledge of computing principles such as programming, communication networks and information systems. In addition, the course also allows you to understand computer-related crimes, relevant laws and methodical approaches to crime investigation.
As a digital crime-fighter, you’ll have the chance to boost your arsenal through exposure to specialist computer toolkits such as Forensic Toolkit (FTK), EnCase, and mobile forensic toolkits such as Mobile Phone Examiner Plus (MPE+) and Cellebrite, as well as open-source toolkits such as Kali Linux and Metasploit.
Throughout the course you’ll be supported by highly-qualified teaching staff who have strong links with the industry and potential employers. The tutors on your course will provide you with excellent academic guidance, pastoral care and careers advice throughout your studies.
You can get a taste for life at our School of Computing and Digital Media by taking a look at our showcase of recent student work.
You'll be assessed through essays, individual and group coursework, exams, research projects and a final dissertation. You'll receive regular supportive feedback throughout the course.
This course is accredited as fully meeting the educational requirement for Chartered IT Professional (CITP) registration.
On graduating, you'll be eligible to apply for Membership of the British Computer Society (MBCS).
We are planning to return to our usual ways of teaching this autumn including on-campus activities for your course. However, it's still unclear what the government requirements on social distancing and other restrictions might be, so please keep an eye on our Covid-19 pages for further updates as we get closer to the start of the autumn term.
In addition to the University's standard entry requirements, you should have:
Applicants with relevant professional qualifications or extensive professional experience will also be considered on a case by case basis.
If you don't have traditional qualifications or can't meet the entry requirements for this undergraduate degree, you may still be able to gain entry by completing our Digital Forensics and Cyber Security (including foundation year) BSc (Hons) degree.
If you have relevant qualifications or credit from a similar course it may be possible to enter this course at an advanced stage rather than beginning in the first year. Please note, advanced entry is only available for September start. See our information for students applying for advanced entry.
Any university-level qualifications or relevant experience you gain prior to starting university could count towards your course at London Met. Find out more about applying for Accreditation of Prior Learning (APL).
To study a degree at London Met, you must be able to demonstrate proficiency in the English language. If you require a Student visa you may need to provide the results of a Secure English Language Test (SELT) such as Academic IELTS. For more information about English qualifications please see our English language requirements.
If you need (or wish) to improve your English before starting your degree, the University offers a Pre-sessional Academic English course to help you build your confidence and reach the level of English you require.
The modules listed below are for the academic year 2021/22 and represent the course modules at this time. Modules and module details (including, but not limited to, location and time) are subject to change over time.
Year 1 modules include:
The module introduces students to the basics of Information Technology; past, current and future trend in computer systems. The detailed design of a small scale Computer Systems is presented where students have the opportunity to build, configure and test a computer system for a given application. Students will identify the basic features of the Windows operating system and its elements. Health Safety issues and the safe disposal of equipment is also covered leading to an understanding and appreciation of social, ethical, environmental and economic issues related to computer’s hardware and software element. The module aims to
1. To introduce students to the fundamental concepts of Information Technology and basic networking,
2. To provide a working technical knowledge of modern computer systems and their respective components,
3. To introduce Operating systems by focusing on Windows products, identifying similarities and differences,
4. Identify the correct approach to preventive maintenance and upgrading, and troubleshooting
5. Introducing students to Assembly language and how it interacts with hardware
6. Awareness of social, environmental, commercial and economic aspects of PC technology
Students will receive an introduction to the principles of information processing and an overview of the information technologies for digital data processing using computational and communication devices, including an initial understanding of the requirements for usability, quality, complexity, security and privacy of the developed solution. The students will obtain initial practical skills in modelling, design, implementation and testing of software systems for real-world application using a suitable programming language.
Students will receive an introduction to the business environment and the role of information management and information systems within business.
The module develops an understanding of the Information Systems, the Software Development process and the basic technology underpinning these systems. This will include database management systems and the Internet. Students which will develop key skills and knowledge in the aspects of an information system, including databases, websites, and scripts with particular regard to usability.
• The module aims to provide an overview of the nature of organisations, their business models, and how key areas operate to meet business objectives. It introduces students to organisational culture, data, information and knowledge management, and the role of information in organisational decision making.
• Within the module the students will be given an appreciation of the effect of ICT on organisational performance, and a basic understanding of the processes of developing and maintaining information systems, software products and services.
• An introduction to underlying technologies (e.g., databases, Internet and Web) is embedded in the module, which also seeks to develop basic competence and confidence in the use of appropriate tools, techniques and academic and communication skills, with an underlining awareness of legal, social, ethical and professional issues.
The module aims are to give the students an understanding of how problems can be solved systematically, plan their solutions and write them in the form of algorithms. This module also develops a range of mathematical techniques including set theory, logic, relations, functions and operational research techniques. In addition it gives a grounding in standard software packages, to give students an understanding of their use in problem solving as well as to make students able to apply these packages appropriately in subsequent modules.
This is an introductory programming module, designed to develop interest, ability and confidence in using a programming language. Students will gain the basic knowledge and experience to solve simple programming problems using established techniques in program design, development and documentation.
The student is also expected to develop their confidence needed to program solutions to problems through a series of practical programming exercises.
Assessment: Coursework 1 (30%) + Coursework 2 (30%) + Multiple choice test (40%) [Pass on aggregate]
Year 2 modules include:
This module addresses the growing demand from law enforcement departments, security agencies and commercial organisations for skilled practitioners in Computer forensics. Computer forensic investigation requires an understanding of computer-related crimes, an appreciation of relevant laws, a high level of technical expertise, a methodical approach to investigation, and the ability to explain complex technical ideas simply. This module introduces the principles of computer forensics, develops the digital forensic analysis knowledge and skills required by the discipline, and prepares students for the career as a computer forensic investigator.
This module addresses the growing demand from Corporate, SME and law enforcement for skilled practitioners in Network Forensics and Incident Response. Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes to act professionally within cybersecurity incident such as data breach, hacking and malware-related threat. This module will cover the entire forensics process from information gathering, legal evidence, and intrusion detection. The aim of the module is to provide students with both theoretical and practical hands on experience in capturing, recording and analysis of network events in order to discover evidential information about the source of security attacks.
This module is aimed at providing students with fundamental concepts of modern operating systems and computer networks. It develops students’ knowledge and transferable skills for future employability. By taking this module the students will gain an understanding of key issues in relation to networking and operating system structures, fundamental issues, and services. This module also aims to provide students with an in-depth knowledge of the operation, function and inter-relation of the major software components of an operating system and the understanding of the hardware-software interface and its control by the operating system, and the insight knowledge of user-system interface.
This module focuses on computer laws, social, ethical and professional issues (LSEPI) underpinning the IT discipline. It also covers techniques for the world of work such as job search, CV and interviews as well as professional ethics and responsibilities. Topics on academic research and academic writing are also presented. (Exam and course work).
Assessment: Coursework (60%) + Unseen exam (40%) [Pass on aggregate]
The aims of this module are to:
• Provide students with knowledge and understanding of the regulations governing the digital environment (e.g. Internet) and social, ethical and professional issues (LSEPI) underpinning the IT discipline.
• Prepare students for the world of work and equip them with the knowledge and appreciation of professional bodies, code of conducts and professional certifications.
• Introduce students to academic research and research ethics, and to academic writing.
This module is in particular for those who wish to specialise in understanding, developing, and the application of IT security systems and measures in IT environments. It focuses on various aspects of security management and deals mainly with risk assessment, risk management, and standards and procedures. It provides students with an appreciation of the benefits security management provides within an information systems domain. This includes the choice and application of appropriate risk assessment and risk management techniques, coupled with an understanding of security standards and procedures.
This module is aimed at providing students with the understanding of security risks associated with information assets and the security programs designed to protect them from security threats. This module will focus on the identification of security risks, the application of risk control and risk management measures, the appreciation of security technology, and critical understanding of security policies, standards and practices. The legal, ethical, and professional issues in security management are also covered in this module.
This module is concerned with the fundamentals of security in key areas of computing in terms of understanding, controlling and managing the various risks and threats to computer-based systems. In addition, the issues in development of the security software will be dealt with via software engineering approaches.
Assessment: Coursework 1 (30%) + Coursework 2 (30%) + Unseen exam (40%) [Pass on aggregate]
The key skills and knowledge to be gained are:
1. Provide students with an understanding of fundamental computer security concepts and issues.
2. Introduce students to the various types of security threats and risks to computer systems and networks.
3. Develop students’ ability to identify, analyse and evaluate a range of computer security threats.
4. Enable students to develop and/or use appropriate tools, techniques, methods, approaches and strategies to mitigate the various threats and provide practical, feasible and sustainable solutions.
5. Equip students with appropriate knowledge and skills necessary to protect the secrecy of confidential data and information.
6. Develop students’ knowledge, transferable skills and confidence in handling, managing and solving computer security issues leading to further academic progression and future employability in this area.
Year 3 modules include:
Digital crimes are becoming far more sophisticated and harder to fight against. Therefore the need for educating cybersecurity, investigation, and e-Discovery professionals is more critical than ever - there is a large talent gap for people with these skills.
It is imperative to explore advanced detective and preventive technology in combating the ever-changing digital and cybercrimes. This module provides knowledge of how to detect and prevent digital crimes and cyber incident at both law enforcement and corporate level. In this module, students are also prepared for their career as a professional working in Cyber security and notably the digital investigation and e-discovery domains. It provides students with practical knowledge and skills needed to succeed in the external exam from the certification of CompTIA Security+.
This module is designed to develop understanding, knowledge and skills associated with the various malicious hacking attacks targeting computer systems and the appropriate safeguards needed to minimise such attacks.
The module aims are to:
1. Provide students with knowledge and understanding of the various hacking methods used in attacking computer systems and networks.
2. Enable students to use appropriate tools and techniques to identify, analyse, evaluate and test computer security vulnerabilities prone to hacking attacks, and develop appropriate procedures, solutions and countermeasures to defend and minimise such attacks.
3. To develop students’ awareness of ethical, professional and legal issues connected with hacking.
4. Develop students’ knowledge, transferable skills and confidence in the subject leading to further academic and professional progression in this area.
The aim of this module is to provide students with a critical understanding of security threats against network and cloud computing systems and the security measures designed to protect such systems. The module will explicitly develop students’ knowledge and experience in the design and application of network and cloud security solutions. The module will also equips students for further academic study and future employability in the area of computer security.
Assessment: Coursework (60%) and Examination (40%) - Pass on aggregate
The key skills and knowledge to be gained are:
Students to develop a critical understanding of the principles and technologies employed in the protection of computers and their networked communications systems from security threats.
The module enables students to demonstrate their acquired knowledge and skills through a systematic and creative investigation of a project work in accordance with their course requirements. The topic of investigation will cover a broad spectrum of various analysis and techniques and will lead to a comprehensive and concise academic/industry-related report. Students will be assisted in exploring areas that may be unfamiliar to them and encouraged to develop innovative ideas and techniques. Students will be able to choose a project that may require the solution to a specific problem, creation of an artefact in a real-world environment or an investigation of innovative ideas and techniques related to an area within their field of study. Collaboration with outside agencies and projects with industrial, business or research partners/ sponsors will be encouraged.
Assessment: Project Report Interim Submission (25%) + Project process (25%) + Project Report Final Submission (40% - Pass on component) + Viva (10% - Pass on component).
The module aims to develop a wide range of subject specific cognitive abilities and skills relating to intellectual tasks, including practical skills and additional transferable skills of a more general nature and applicable in many other contexts.
Particularly, the module aims to:
• Provide an opportunity to learn, through supervised experience, how to plan and carry out a project through a systematic and creative approach;
• Encourage innovation and originality in approach to investigating a problem in an area that may be unfamiliar to the student;
• Provide opportunity for in depth study of some specialised area of suitable scale and complexity relevant to their course of study;
• Raise awareness in potential business development opportunities in connection to the project work undertaken and of any ethical, legal and professional issues;
• Develop reporting skills as well as the ability to communicate results, conclusions, and the knowledge and rationale underpinning these, to specialists and non-specialist’s audiences, clearly and unambiguously;
• Encourages reflection upon the relationship of design decisions to the appropriateness of the finished task;
• Enhance professional and personal development.
The University has a policy that all undergraduates must, at either Level 5 or 6, take a Work Related Learning (WRL) module i.e. a module which requires them to directly experience and operate in the real world of work and to reflect on that episode in order to identify skill and knowledge areas that they need to develop for their career. This module (and “partner” modules, namely, Creating a Winning Business 1 (Level 5) and Creating a Successful Social Enterprise 1 and 2), are module options available to ALL University students to fulfil the University’s WRL requirement.
This module challenges students to be creative in identifying a new business opportunity and in examining the viability of all aspects of the idea in the real world context e.g. testing potential customers’ views. As a result of the feedback received and enquiries carried out, the idea will change and develop over the duration of the module. Throughout the module, students are required to not only apply the business development theory taught but also to continuously reflect on how they have applied the theory and the skills and knowledge gained from their work. This reflective dimension promotes the development of practical attributes for employment and career progression.
The QAA Benchmark on Business and Management (2015) emphasises the attribute of “entrepreneurship” and of “the value of real world learning”. In terms of promoting work related skills, the module specifically focuses on practical techniques for generating and developing new business ideas and so develops creative thinking. In addition, it requires students to examine market potential and prepare a “pitch” as if seeking investment. The module requires a high level of self-reliance to pursue their business idea. Students develop an understanding of the role of new ideas in business start-ups, business growth and development.
These skills and techniques are of practical relevance to anyone considering starting a new business, working for a Small or Medium sized Enterprise (SME) or taking on an intrapreneurial role within a larger organisation where the business environment is constantly evolving and producing new challenges and opportunities.
For those students keen to go beyond this module and start their own business, they can apply to the Accelerator for access to “seed” money and advice and support.
The module enables students to undertake an appropriate short period of professional activity, related to their course at level 6, with a business or community organisation and to gain credit for their achievements. The activity can be a professional training, a volunteering activity, employment activity, an activity within the School of Computing and Digital Media Virtual Business Environment (VBE), placement or business start-up activity.
For the purpose of this module – the VBE will be also be recognised as ‘the employer’.
It is expected student should work for 150 hours which should be recorded clearly (in a learning log for instance) in the portfolio. The 150 hours can be completed in 25 working days in a FT mode, or spread over a semester in a PT mode.
Students should register with the module leader to be briefed on the module, undergo induction and Work Based Learning planning and to have the Work Based Learning approved, before they take up the opportunity. It is essential that students are made aware that both the “Work Based Learning agreement” and relevant “health and safety checklist” where applicable need to be approved before starting the learning activity.
The module aims to provide students with the opportunity to:
• Gain a useful experience of the working environment and the career opportunities available on graduation.
• Undertake a work-based project appropriate to their academic level.
• Enhance and extend their learning experience by applying and building on their academic skills and abilities by tackling real life problems in the workplace.
• Enhance professional and personal development.
"Throughout my whole degree, I've loved the subject and the material. The course is very intuitive, and lets you get hands-on in some subjects, so you get the feel of the real world. I definitely would recommend it if you like computers, hacking and forensics." Diogo FIlipe Coito Gomes
"Studying Computer Forensics and IT Security has given me the foundation to go on and utilise my skills in a world where cyber security has become a major concern. The course itself covers a wide range of fun in-class activities as well as interesting and challenging assignments that cover real-life scenarios undertaken by detectives and hackers too!
"And because the facilities are so great, I am able to simulate real attacks within a controlled environment. These activities help me understand how attacks occur and consequently help prevent them. The lab has many interesting tools available such as Kali Linux, BackTrack5, Encase, FTK and many more.
The whole subject area is always on stand-by to help pupils better their skills. Having viewed other universities and seen their facilities, I am happy that I chose to come here to London Met." Majid Abdullahi
You’ll complete this course ready to pursue a career in computer forensics and/or IT security, or in the wider IT industry. Previous graduates have gone on to find employment as data analysts at companies such as MWR InfoSecurity.
Potential employers include digital crime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.
Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work placement module.
This course is also an excellent preparation for further research or studies such as MSc or PhD either at London Met or another university.
Please note, in addition to the tuition fee there may be additional costs for things like equipment, materials, printing, textbooks, trips or professional body fees.
Additionally, there may be other activities that are not formally part of your course and not required to complete your course, but which you may find helpful (for example, optional field trips). The costs of these are additional to your tuition fee and the fees set out above and will be notified when the activity is being arranged.
Discover Uni is an official source of information about university and college courses across the UK. The widget below draws data from the corresponding course on the Discover Uni website, which is compiled from national surveys and data collected from universities and colleges. If a course is taught both full-time and part-time, information for each mode of study will be displayed here.
If you're a UK applicant wanting to study full-time starting in September, you must apply via UCAS unless otherwise specified. If you're an international applicant wanting to study full-time, you can choose to apply via UCAS or directly to the University.
If you're applying for part-time study, you should apply directly to the University. If you require a Student visa, please be aware that you will not be able to study as a part-time student at undergraduate level.
The University and Colleges Admissions Service (UCAS) accepts applications for full-time courses starting in September from one year before the start of the course. Our UCAS institution code is L68.
If you will be applying direct to the University you are advised to apply as early as possible as we will only be able to consider your application if there are places available on the course.To find out when teaching for this degree will begin, as well as welcome week and any induction activities, view our academic term dates.
Please select when you would like to start:
Data Analytics MSc students Stephanie Healy Fabrega and Indrajitrakuraj Ravi have been employed on a research project.
Two students have been hired to work alongside London Met lecturer Sandra Fernando on a major data analysis project, giving them real-life work experience alongside their degrees.
A new research project will see a London Met student work with academics on data analysis across the Computing departments of higher education institutions.
Cyber Security student Dipo Dunsin has been hired to advance the project as part of London Met's commitment to providing students with valuable work experience for their future careers.
The prestigious accreditation scheme means the qualifications gained by London Met graduates are recognised by the computing industry for their high quality and rigorous standards.
Students, staff and external guests attended three of the School’s biggest annual events - SEND 2019, the School Summer Show 2019, and Final Cuts.
London Metropolitan University’s cyber-security team recently won funding from Innovate UK to develop products which will enhance UK security.
London Metropolitan University will work with with Palo Alto Networks to deliver staff training on their behalf.
Professor Karim Ouazzane, Professor of Computing and Knowledge Exchange, offers his insight into the recent WhatsApp hacking.
The School of Computing and Digital Media's Summer Show will be held on 6 - 7 June in the world famous Graduate Centre. Events to celebrate the School will take place from 6 - 14 June.
A team of London Met students won third place in a national cyber hacking competition.
London Metropolitan University attended Lloyds Banking Group's inaugural Innovation Community event, a day-long session to bring together stories, collaboration and knowledge.
An exciting new Cyber Security Research Centre will launch at London Met with the aim to foster and nurture the University’s strong entrepreneurial culture.
London Met’s Widening Participation team work with young people across London and host a range of taster days to give tomorrow’s leaders a taste of university life.
Professor of Computing and Knowledge Exchange, Director of Research and Enterprise for the School of Computing and Digital Media