Cyber security is a fast growing industry. Cyber security professionals are highly sought after and in hot demand globally and this demand will keep growing due to the continual rise of cyber incidents, high profile cyber attacks and security breaches and the billions of pounds lost as consequences of these security breaches. By coming for our top-up degree in cyber security, you are investing in your future. Recent research shows that there are more than a million cyber security jobs and the number keeps growing. One report stated that 37% of cyber security jobs in the UK remain unfilled. Cyber security professionals are one of the most highly paid professionals worldwide. By choosing our course, you will be preparing yourself for a fulfilling and satisfying career in cyber security. There is a broad range of careers in cyber security including: Cyber Security Operations Manager Cyber Security Engineer Cyber Security Architect Cyber Security Analyst Information Security Analysts Network Security Engineer IT Security Specialist Security Auditor Penetration Tester Our top-up degree focuses on providing you with the core and specialist skills in cyber security and developing you for the job market. We focus on employability skills in both technical and soft skills to make you ready for the ever growing Cyber Security job market. The world needs elite cyber security professionals to engage in cyber warfare against cyber criminals. Could it be you? Join the fast growing digital market of cyber security and gain your BSc honours through our top-up course. You will combine your theoretical knowledge and technical skills whilst furthering your learning through research and development in the field of cyber security. With the range of expertise that you will develop, your specialist skills will be in high demand throughout the digital world. Become a cyber superhero and fly closer to your future career. This course will enable you to become one of the most sought after professionals in the IT industry. You will be able to recommend and implement protection measures against cyber security threats and respond to cyber incidents confidently and effectively. Do you have what it takes to confront and find solutions to the ever expanding cyber threat landscape? The course is opened for students with any of the following qualifications at level 5:
- Foundation Degree
- Diploma of Higher Education in relevant subjects
- International qualifications will also be considered
- Mature students with relevant industry experience will also be considered
Modules may include: Level 6 Penetration Testing (20 credits). Before you can confront cyber criminals successfully, you have to think like them even though you are not like them. This module will enable you to be the cyber defender you will be trained to be. The module will further your understanding of penetration testing whilst simulating attacks against networks, devices and applications to identify the vulnerability of specific technologies and learn how you would prevent such attacks. Module topics may include: Advanced Penetration Testing concepts, techniques and tools Identifying vulnerabilities Privilege escalation/elevation in a Windows environment Advanced exploitation using tools such as Metasploit and post-exploitation techniques Modelling and analysing Advanced Persistent Threat (APT) The Cyber Kill-Chain framework – reconnaissance, weaponization, delivery, exploitation, etc. Ethics and ethical considerations in Penetration Testing Cyber Security Incident Management (20 credits). Within this module, your knowledge and skills of cyber security incident management will be developed. You will learn how to plan and respond to incidents, investigating, analysing, interpreting and preserving evidence. Module topics may include: Cyber Security and Incident Management Concepts Incident response and management requirements – regulatory and legal requirement Incident response frameworks and processes Risk assessment and implementation of risk control strategies Planning for cyber incidents Investigating security incidents – types and methods of investigations Intrusion monitoring, detection, analysis, logging, response, and management Tools for incident response Ethics and ethical considerations in cyber security incident management Research Methods (20 Credits) You will acquire the skills required to complete an independent study project, including critical reading, critical thinking, analysis of data using statistical methods and reflective practice. Module topics may include: Research projects – research approaches, research tools, academic writing styles and formats, report writing skills Nature of data – qualitative, quantitative, objective, subjective, accuracy, precision, errors, significance, reliability Data collection – probability sampling: random, systematic, stratified, and clustered Data analysis and types of statistics Principles of Ethical Practice Digital Entrepreneurship (20 Credits) Explore entrepreneurial ventures and develop your digital skills, tools, practises and processes looking at marketing strategies and how to generate income. Module topics may include: Business Ideas – Blog, Vlog, podcast, e-book, technologies etc. The similarities and differences, including positives and negatives, of all the major digital and social media platforms Business feasibility Strategies for monetising digital ideas Digital Skills for business Digital etiquette Major Project (40 credits). In this practical module You will identify a cyber problem and deliver a solution to rectify the problem using a range of development methodologies. Module topics may include: Key concepts, tools, techniques and approaches to project management – time management, resource management, stakeholders, frameworks, and methodologies Project management essentials: planning; scheduling; estimating; risk management; resource allocation; monitoring and control, etc. Methods of research, instruments of research, analysing the data Evaluating the solution, evaluating the project. critical discussion of results, conclusions and recommendations Ethics in research, authorisation/approval process, informed consent, securing data, specific ethical issues in computing disciplines
Assessment methods may include:
- Practical demonstrations
- Case studies
How to apply
This course is not accepting applications from students requiring a Student visa. For more information, please contact the course provider.
This is the deadline for applications to be completed and sent for this course. If the university or college still has places available you can apply after this date, but your application is not guaranteed to be considered.
Please select a course option – you will then see the application code you need to use to apply for the course.
Points of entry
The following entry points are available for this course:
- Year 1
Typical offer Foundation Degree/HND: A typical offer is likely to be a Pass at foundation degree or a Pass grade on a relevant HND. IELTS: IELTS 6.0 with no less than 5.5 in any component. International qualifications: International qualifications will be assessed against these criteria. Mature applicants: University Centre Leeds welcomes applications from mature* applicants who may not meet the academic criteria, but who can demonstrate a wealth of experience in their chosen field. Candidates in this category and otherwise are likely to be interviewed to assess their suitability for the course and may be asked to provide a portfolio of evidence to support their application. *21 years and over at the start of the course RPL claims: The course structure actively supports claims for Recognition of Prior Certified Learning (RPL).
There is no data available for this course. For further information visit the Discover Uni website.
Fees and funding