Aston University, Birmingham

Cyber Security Aston University, Birmingham Degree level: Undergraduate


Course options

Course summary

TEF Gold

Aston University, Birmingham has opted into the TEF and received a Gold award.

Find out more about the TEF.

Our BSc Cybersecurity course is offered as either a three or four year course with integrated placement year. We aim to produce computing graduates who specialise in cybersecurity. The practical orientation of our programmes, and industry input, will enable you to gain the range of professional and technical skills you will need to start a career in cybersecurity.

Throughout the course, you will develop expertise in cybersecurity and the key applications of computing science in each year of the programme. Particular emphasis is placed on applications in industry and commerce. You will focus on a range of topics including security management, designing secure systems and human factors in security.

Career prospects continue to be strong for our students with their sound understanding of the principles and practical applications of computing. The majority of our Computer Science graduates find stimulating and rewarding positions in computing related activities with suppliers and users or within a wide range of careers for which a university degree is a prerequisite.

Key course benefits:

  • Our optional placement year offers you the opportunity to gain valuable experience and set your studies in the context of a working environment, designed to boost your future employment prospects.

Course details


Security Fundamentals: Scene-setting module introducing the fundamental concepts of cyber security.

Networks, distributed Systems and Network Security: A 30-credit wide-ranging module that goes from basic networking principles to networking protocols to network topologies to the OSI stack and TCP/IP, then introduces distributed systems, distributed system architectures and (e.g.) contemporary issues such as the cloud and Internet of Things. The final 10 credits will revisit many of these with a focus on network security; vulnerabilities, threats and mitigations (secure protocols, key exchange, PKI, network analytics, firewalls, and so on.

Secure Programming: Now students have the basics of programming, helping them learn about developing secure code; defensive programming, memory usage and vulnerabilities (e.g. buffer overflows, code injections), introducing V&V strategies.

Security Threats, Vulnerabilities and Mitigations: Building on these concepts introduced in outline in Security Fundamentals. Case-study based. Large element on cryptography and cryptanalysis.

Information Assurance Methodologies and Testing: Draws on existing module on testing and reliability. Places security in the context of other dependability attributes (reliability, availability, safety, …) and outlines a range of V&V techniques for these in general, and for security in particular. Large element on penetration testing. Likely to be heavily lab-based.

Security Management: Security policy, access control, culture and governance, operational security hygiene.

Ethical, Legal and Business Issues: Ethical issues around use and misuse of data (lots of case studies). Business obligations, governance and risk (financial, reputational, etc.). The law as it applies to the management and collection of data (e.g. GDPR).

Designing Secure Systems: Module that specializes the existing Software Engineering module with a focus on developing the knowledge and skills needed to analyse problems from a security perspective (e.g. misuse cases) and develop a solution design with the appropriate architecture and design-level mitigations to deal with the identified threats. Introduces notion of risk. Likely to be groupwork-based.

Human Factors in Security: Draws on material form existing HCI modules with additional material on (e.g.) how poor HCI compromises security (e.g. requiring people to remember long passwords). Large element on human factors and social engineering.

Security Risk Management: How to identify assets, and assess their value and the vulnerabilities and threats that apply to them. More on corporate governance.

Security Forensics: Part introduction to digital forensics (data storage media, operating systems, networks and mobile devices, …), and part introduction to forensic linguistics to (e.g.) profile chatroom grooming.

How to apply

You can no longer submit a new application for courses starting in 2019.

If you already have a 2019 application and are in Clearing, you can add this course as a Clearing choice in Track – contact the university or college first to check they have places.

Application deadlines

If your application is completed by the following date, it’s guaranteed to be considered:

15 January

*If you apply after this deadline, universities or colleges don’t have to consider your application if they’ve filled their spaces, so the sooner you apply, the better!

Application codes

You will need these codes when you add a choice to your application.

Course code I190
Institution code A80
Campus name Main Site
Campus code -

This course may be available at alternative locations, please check if other course options are available

Points of entry

The following entry points are available for this course:

  • Year 1

Entry requirements

Qualification requirements

Qualification Offer Further information
A level ABB - BBB
Pearson BTEC Level 3 National Extended Diploma (first teaching from September 2016) DDM BTEC in relevant subject area
Access to HE Diploma D: 30 credits
M: 15 credits
in relevant subject area
GCSE/National 4/National 5 Maths Grade C/4 and English Language Grade C/4

Fees and funding

Tuition fees

EU £9,250 Year 1
International £16,350 Year 1
England £9,250 Year 1
Northern Ireland £9,250 Year 1
Scotland £9,250 Year 1
Wales £9,250 Year 1

Additional fee information

For Sandwich courses the placement fee is £1250 for Home/EU students and £2,500 for International students.

Provider information

Visit our website

Aston University, Birmingham
Aston Triangle
B4 7ET

Clearing contact details

Clearing Phoneline

Course contact details

Visit our course page