STUDY
Institution code: | S82 |
---|---|
UCAS code: | I103 |
Start date: | September 2025 |
Duration: | Three years full-time, four and a half to nine years part-time |
Location: | Ipswich |
Typical Offer: | 112 UCAS tariff points (or above) BBC (A-Level) DMM (BTEC), Merit (T Level) |
Institution code: | S82 |
---|---|
UCAS code: | I103 |
Start date: | September 2025 |
Duration: | Three years full-time, four and a half to nine years part-time |
---|---|
Location: | Ipswich |
Typical Offer: | 112 UCAS tariff points (or above) BBC (A-Level) DMM (BTEC), Merit (T Level) |
Overview
This course is provided as a pathway on our BSc (Hons) Computing degree. All students begin their studies on the BSc (Hons) Computing degree before choosing the cyber security pathway towards the end of their first year of study. Students who complete this pathway will receive the specialist BSc (Hons) Computing (Cyber Security) award at graduation.
Introduction
As more time is spent online, the amount of data we create increases. Often this data contains personal or sensitive information that is vulnerable to cyber-attacks. The networks and systems themselves can also be disrupted causing millions in damages and lost revenue. The cyber security pathway on our BSc (Hons) Computing degree provides you with the skills and knowledge to prevent and defend from these attacks.
There has never been a better time to begin your career as a cyber security professional. Global spending on cyber security alone is expected to exceed £68 billion by 2025. Here in the UK, the National Cyber Security Centre (NCSC) reports around 60 ‘high-level’ cyber-attacks a month, many of which threaten national security.
Course Highlights
- Access to our state-of-the-art cyber security range allowing students to simulate attack and defence scenarios.
- Learn how to secure enterprise computer networks in our new Juniper Networking Lab.
- Access to resources from some of the largest tech companies including Amazon Web Services, Juniper, Oracle and our new Google Student Club.
- An opportunity to start your own cyber security business with the University of Suffolk’s Innovation Labs (ILABS) and gain guidance from business leaders and academics.
Our cyber security pathway combines a solid grounding in computer systems with the expertise required for a successful career in the field of cyber security.
How will you be taught?
You will be taught by experienced lecturers who use their years of industry and research knowledge to demonstrate best practice, industry standards and innovative technologies. You will experience a variety of teaching methods including lectures and seminar sessions, totalling at least 12 hours of contact time per week. You will also have access to our virtual learning environment, Brightspace, allowing you 24/7 access to lecture material and activities, both on and off campus.
Students also have access to our computing Slack channel allowing them to collaborate and chat with each other. New computing students joining the University will receive access to our ‘New Student’ Slack channel in the weeks before the course commences. This allows new students to get to know each other and make friends before they arrive on campus.
How will you be assessed?
Throughout the course, the emphasis is placed on students completing hands-on projects that they can later present in their professional portfolio to employers. A variety of assessment methods are used, including individual and group-based practical projects, quizzes, technical reports and presentations. There are opportunities for feedback on your work throughout and you will receive the support you need through your lecturers and our academic support and library services teams.
Computing at the University of Suffolk
Course Modules
Our undergraduate programmes are delivered as 'block and blend', more information can be found on Why Suffolk? You can also watch our Block and Blend video.
Downloadable information regarding all University of Suffolk courses, including Key Facts, Course Aims, Course Structure and Assessment, is available in the Definitive Course Record.
This module covers the principles of computer systems, hardware components, the essence of operating systems, and relevant computing-related mathematics. This module will provide the foundational underpinning to enable students to progress deeper into different computing specialisms, and a grasp of the history of computing, recent developments and its possible future.
This module introduces the concepts of communications and networking. It explores the Open Systems Interconnectivity (OSI) 7-layer reference model and TCP/IP Routing Suite (the 5-layer Internet reference model). TCP/IP is the model which is most commonly deployed in the majority of modern-day networks.
The module introduces the concepts of web design, with a focus on designing responsive websites that are targeted at mobile platforms. Students are introduced to HTML, CSS and JavaScript to provide them with an understanding of what goes into the front-end of modern websites. Using a series of case studies, students will analyse the design and layout of a range of existing sites using a number of common analysis techniques.
This module introduces students to the concepts and practice of computer programming. It is aimed at providing students with an understanding of the fundamentals of computer programming by having them work through a range of tasks focused on layout, structure and functionality.
This module provides an understanding of why cyber security matters to businesses, to society and to individuals, coupled with knowledge of basic concepts, attack techniques, attacker types, and the core elements of cyber assurance.
This module provides an introduction to the artificial intelligence and data science fields, covering the history of the discipline, and exploring a variety of “classical AI” topics.
This module focuses on all phases of the modern software engineering lifecycle and advanced software engineering topics, including critical software, secure software, formal methods and project management from the practitioner’s perspective. This will be put into practice through the requirements gathering, design, implementation and testing of an extensive project that meets the needs of a particular enterprise.
This module provides essential knowledge and appreciation of the role of relational database systems, including basic principles and practice of design, implementation and development for both system designers and software engineers. It will include practical exercises in Structured Query Language.
Research skills are an essential set of capabilities in the toolkit of a professional software engineer. In this module, students will develop knowledge and understanding of the purpose, processes, methods (surveys, experiments, interviews, case studies, etc.), analysis (qualitative and quantitative), and outputs of research and will be able to apply them. This module also delves into the professional, legal and ethical standards and guidelines that inform and guide best practice in business and computing.
This module focuses on data structures (e.g. linked lists, trees, heaps, hash tables, etc), algorithms (sorting, searching, dynamic programming, greedy, graph, geometric, cryptographic, string matching and compression algorithms, etc), and advanced programming techniques and other language paradigms.
Software, networks and databases do not exist in isolation, but form part of systems. Few systems are purely technical, but are socio-technical and info-socio-technical in nature, where human beings may be central or peripheral to the system, yet be the weakest link in their security. This module introduces, in the context of cyber security, system thinking and human behaviour, and how social engineering and open-source intelligence may be used in both attack and defence of systems and individuals.
This module covers basic and advanced security concepts related to wired and wireless networks, and builds upon the network knowledge previously covered in Level 4 study. Students will learn about the main challenges faced by a variety of wired and wireless environments. Further, the module presents common defence techniques and tools used to counter different security threats, and also explores some of the latest network security challenges posed by recent technology developments.
The module provides the opportunity for students to apply and develop some of the knowledge and skills acquired in their degree by engaging in a significant project in a specialist area of computing, typically software or networks. It will enable and require students to utilise practical, intellectual and decision-making skills in novel situations and develop their autonomy and self-direction.
There has been a triple convergence of computing, communications and the physical world, leading to the creation of complex cyber-physical systems, a reliance on strong cryptography, and the need to instil security into software and cyber-physical systems in the face of an ever-evolving threat landscape.
Cyber security is now an executive-level concern in most organisations. Cyber security specialists will be required to deliver strategic value to their organisations by ensuring security is intrinsic to system architectures by design and by default, by applying appropriate standards in risk analysis, systems modelling and policy design, and scanning the horizon of emergent threat landscapes to discern new issues.
Cyber attacks are increasing in frequency and diversity with hostile actors probing for vulnerabilities, cooperating to develop exploits, and deploying these on an industrial scale. Many organisations are essentially under continuous attack from multiple actors. Eternal vigilance through monitoring and logging is essential for reactive and proactive responses. Inevitably some attacks will be successful and effective actions are required to handle these incidents, limit breaches, and collect evidence for investigation.
This covers the full range of skills and knowledge required for “Big Data” including parallel and NoSQL databases, statistical modelling and programming, machine learning, data analytics and visualisation. These skills are essential for making sense of security-related Big Data.
This module provides a systematic understanding of distributed operating systems, software services and applications in terms of their architectures, functionality and behaviour. It includes case studies on the “Internet of Things” and cloud computing as well as topics on parallel programming.
The module is intended to provide students with an understanding of development for mobile devices with a focus on the constraints of mobile hardware, including interface and networking. Students will learn to integrate input from hardware sensors and work with networked data and services.
WHY SUFFOLK
2nd in the UK for Career Prospects
WUSCA 20243rd in the UK for spend on academic services
Complete University Guide 20254th in the UK for Teaching Satisfaction
Guardian University Guide 2024Entry Requirements
Career Opportunities
Our pathway in cyber security will provide you with the knowledge and skills required to become a career-ready graduate. The University of Suffolk’s Innovation Labs (ILABS) provides students will the opportunity to start a business with business and academic guidance, facilities and support. Students who graduate on this pathway could also pursue a career in one of the following roles:
-
Cyber Security Expert
-
Cyber Security Analyst
-
Cyber Security Consultant
-
IT Security Administrator
-
IT Security Engineer
-
Information Security Analyst
-
IT Security Manager
-
Penetration Tester
-
SOC Analyst
Facilities and Resources
The majority of teaching on this degree will take place on our main Ipswich Waterfront campus and on the top floor of the Atrium building, which houses four high-end computer laboratories complete with industry-standard software and tools.
Specialist modules in data science, artificial intelligence and cyber security may also take place in our state-of-the-art DigiTech Centre at Adastral Park, which was unveiled by Her Royal Highness the Princess Royal in November 2019 and launched in the summer of 2021. The Cyber Security and Digital Forensics Laboratory at Digitech is an advanced facility equipped with high-specification machines. It provides a controlled environment where students can simulate cyberattacks, conduct forensic investigations, and delve into activities such as malware analysis, penetration testing, and cryptographic analysis without affecting other campus networks. In addition, the lab features top-tier Digital Forensics Equipment, which includes high-spec computers and acquisition kits complete with hardware write blockers for forensic image capture from various digital devices.
Unibuddy: Chat to our Students and Staff
Related News
- 13 June 2024
- 21 February 2024