Coventry University

Degree level: Undergraduate

Ethical Hacking and Cybersecurity

There are other course options available which may have a different vacancy status or entry requirements – view the full list of options

Make sure you check on the university, college or conservatoire website for any updates about course changes as a result of COVID-19.

Course summary

Cybersecurity is fast becoming the most pressing and least understood problem for many individuals, businesses and nations. The landscape itself is difficult to visualise, built on layer upon layer of evolving computing equipment, networks, protocols and software. The ways in which it can be exploited are innumerable, with new vulnerabilities discovered daily. Coventry University is committed to educating successive generations of cybersecurity researchers and experts – from developers that can write secure code, to digital forensics specialists and penetration testers. We have garnered a reputation for teaching excellence and our current staff benefit from a mix of practical experience from industry and law-enforcement, combined with active research in cutting-edge cybersecurity. Current projects include the incorporation of cryptography into network services for centralised management, machine learning for intrusion detection, low-power security systems and the security of embedded devices and the Internet of Things. Our extensive links with industry have helped previous graduates to secure rewarding jobs with security companies, large corporations and government. These relationships also provide various opportunities for industry placements* during your studies, with previous students spending a year working for high profile security consultancy organisations such as BAE Detica, Nettitude and NCC Group. This course is designed to give you the opportunity to equip yourself with the knowledge and skills to lead the fight against cyber criminals and keep hard-earned assets secure. It covers the essentials of computer systems architecture, programming, operating systems and databases, together with specialist topics in digital forensics, legal issues, networking, ethical hacking and computer security. Our Activity-Led Learning (ALL) approach means your education should be hands-on; we aim to help you become familiar with penetration testing tools, encryption algorithms and forensic analysis software. You could also gain an additional industry recognised network certification through the CISCO Academy Programme (competitive application and additional costs may apply). *Industrial placement opportunities may be subject to availability, competitive application, additional costs and meeting applicable visa requirements. Key Course Benefits

  • Opportunity to gain Forensic Toolkit (FTK) certification (additional costs may apply). Please visit the following website for further information.
  • Option to join the CISCO Academy Programme leading to an industry-recognised CISCO Certified Networked Associate (CCNA) qualification (additional costs may apply).
  • Active Computer Club that organises a range of extracurricular activities, such as LAN gaming, robot programming challenges and hackathons.
  • Accredited by the British Computer Society (BCS), fully meeting the academic requirements for registration as a Chartered IT Professional and provides partial fulfilment for Chartered Scientist and Chartered Engineer.
  • Support applying for short and long-term placements with technology companies to gain the experience employers desire. Past students have worked for Microsoft UK Ltd, Intel and Accenture, as well as a range of medium sized companies in web, media and the creative industries. Placements may be subject to availability, competitive application, additional costs and meeting applicable visa requirements.
  • £50m Engineering and Computing building features a large range of specialised computing laboratories in computer security, communications and signal processing, electrical, electronics and microprocessors, ethical hacking and forensic computing, together with a games and multimedia studio and open access computer facilities, featuring industry-standard software from Kali Linux to wireshark and FTK.

Course details


Your main study themes are:

  • Digital forensics: You will be introduced to digital forensics and digital crime scene investigation, including concepts of digital evidence, digital forensic investigation methodology, legacy and current file systems essentials, registry files, password recovery, data acquisition and forensic examination of computer systems using current commercial forensic tools. We will also consider UK and European Commission rules of evidence, legislative frameworks and how the Association of Chief Police Officers (ACPO) Digital Evidence Principles (2012) govern investigations in a law enforcement and corporate environment.
  • Computer security: Businesses, the public sector and private individuals increasingly rely on digital systems, which has increased their size, scope and complexity making security and assurance significantly more difficult. There is a correlation between the advances made in computer and network technology, the increased complexity created in its usage and the rise in the level of security required. Digital security may have a strong technological component, but it also has an equally strong physical, social and ethical dimension through the people who both use it and try to subvert it. We will explore the digital security landscape, its technologies and strategies for protection to provide you with a good theoretical underpinning for assessing security requirements and preparing strategies.
  • Ethical hacking: We will study different types of network and computer attack vectors and penetration tests. You should become familiar with some of the standard tools, techniques and frameworks which are used to identify weaknesses within computer systems, from scanning and finding vulnerabilities to exploitation and maintaining access..
  • Programming: You will be taught the concepts and algorithms behind programming to enable you to use whatever programming language that best suits the problem being faced. You will have the opportunity to develop core skills in programming by learning and applying syntax, problem-solving strategies, and theory common to most programming languages. We also examine professional practices associated with the industry, including key software development concepts such as testing code, version control, functional decomposition and event driven programming, as well as how to interact with non-technical colleagues and clients.
  • Software Development: We offer a practical guide to the software development process with associated tools and techniques, such as project management. We focus on modern iterative process models using object-oriented (OO) modelling methods and tools, including techniques for requirements engineering and analysis, architectural design and detailed software design with patterns, through to software implementation and testing.
  • Computer Architecture and Operating Systems: We investigate and analyse the origin, structure and use of the fundamental components of computers, how they represent data, the operating systems (OS) used and networking approaches. We will explore basic OS concepts, such as processes, memory management, drivers and file systems. We cover the main features of Linux, Windows, Unix and Mac OSI, among others.
For more information about what you will study, please visit our website.

Professional bodies

Professionally accredited courses provide industry-wide recognition of the quality of your qualification.

  • BCS - The Chartered Institute for IT

How to apply

Application codes

Course code:
Institution code:
Campus name:
Main Site
Campus code:

Points of entry

The following entry points are available for this course:

  • Year 1

This course may be available at alternative locations, please check if other course options are available

Entry requirements

Qualification requirements

All applications are considered on an individual basis and the whole application is reviewed which includes previous and predicted qualifications, experience, reference and your motivation to study the course. The University also accepts the BTEC Level 3 National Extended Certificate / BTEC Level 3 Subsidiary Diploma and BTEC Level 3 National Diploma / BTEC Level 3 Diploma for entry onto degree programmes, provided that they are studied in combination with other qualifications that are equivalent to three A2 Levels. This may include subject specific requirements where necessary. If you are successful in receiving an offer, you will be invited to an Applicant Visit Day to discover more about the course and studying at Coventry University.

Unistats information

Operated by the Office for Students

There is no data available for this course. For further information visit the Discover Uni website.

Fees and funding

Tuition fees

England £9250 Year 1
Northern Ireland £9250 Year 1
Scotland £9250 Year 1
Wales £9250 Year 1
Republic of Ireland £9250 Year 1

Additional fee information

No additional fees or cost information has been supplied for this course, please contact the provider directly.

Provider information

Visit our website

Coventry University
Priory Street

Clearing contact details

Recruitment and Admissions Office

02476 888888

Course Clearing information

Additional information

Thursday 18 August 08:00-20:00, Friday 19 August 08:00-18:00, Saturday 20 August 10:00-16:00, Sunday 21 August 10:00-16:00, Monday 22 August onwards (weekdays only) 08:00-18:30

Course contact details

Visit our course page
UK Admissions Office

024 7765 2222

European and International Admissions Office

+44 024 7765 2152

Ethical Hacking and Cybersecurity at Coventry University - UCAS