If you are applying for this course from outside of the UK click Apply Now
Course starts: 19 September 2022Apply now
If you are applying for this course from inside the UK click Apply Now
Course starts: 19 September 2022Apply now
The course is excellent preparation for jobs in cybersecurity and digital forensics, which is a rapidly growing area given the rise in computer-related crime. At the same time, the course also covers all the fundamentals of computing, leaving your career options open.
Topics include computer security, development of secure systems and networks, cybersecurity and practical aspects of digital forensics.
Teaching methods include lectures, tutorials, seminars and laboratory sessions. You will be encouraged to develop independent study skills as well as work with other students on group projects.
As well as assessments that count towards your degree, there are also ongoing opportunities for feedback and consolidating your learning. Assessment methods include coursework and Professional Practice Weeks (PPWs). PPWs present you with real-world problems that must be solved in a working week. They aim to provide you with an experience reflective of the industry you want to enter, and give you meaningful feedback that you can use to improve your knowledge and skills. Each year has a different theme- previous themes include the City of Culture Bid in 2017 and e-sports in 2018.
Gain an overview of basic design principles of systems and software, including modelling principles and the use of tools, and design patterns. Investigates different software processes, data integration, project management and be introduced to software testing methods. Discover key concepts that will allow you to begin to break down programmatical application areas and begin to devise, document, test, develop and improve working solutions for a given problem.
Learn the basic principles of computer architectures. Gain an understanding of the underlying mathematics, operations and components used by computer architectures. Be introduced to the concept of operating systems and the types of hardware that can be attached to a computer to facilitate input and output. Explore in detail the considerations and tasks required to install, manage, and maintain computers both in stand-alone and virtual environments.
Learn the basic principles of programming. Develop your skills in logical analysis into formal representation within structured program code. Cover the core principles of computer programming that underpin all computer science disciplines. Focus on simple data storage and manipulation using the primary programming structures of sequence, selection, and repetition. Develop programs using industry standard techniques.
Be introduced to the fundamentals of client-server web-based development from a programming perspective. Learn key concepts that will allow you to start building dynamic web applications in response to business requirements. Develop web applications using industry standard tools and techniques and use of a range of programming, markup, and query languages.
Develop a sound knowledge of networking protocols and technologies, together with the techniques to install, configure and troubleshoot a network operating system. Acquire the skills to maximise network availability to all users. Learn about client server architectures and cloud computing paradigms.
Discuss the basic principles of cybersecurity and digital forensics and describe the role computer forensics and cybersecurity play in deterring and detecting computer crime and in identifying weaknesses and vulnerabilities in computer systems.
Some modules have prerequisites. Read more about what this means in our Help and Advice article.
Learn key skills such as self-determination, planning and actioning of goals, time management, independent learning and team working. Prepare for placement or gain workplace skills through shadowing, volunteering or mentoring.
This module has been developed with the support of the Institute of Coding, a network of employers, universities, training providers and professional bodies working together to create the skills needed for the digital economy. The module on this programme has been modified as a result of collaboration with a number of industry partners including SAGE and Adlink, to enhance industry relevant employability skills.
This module will move beyond the basic object oriented concepts associated with simple classes and objects to cover a series of more sophisticated object-oriented ideas, including ‘inheritance’ and ‘polymorphism’.
This module introduces the architecture, structure, basic protocols and devices used in routed and switched networks, as well as in-depth discussion of the OSI and TCP/IP reference models and where these devices and protocols sit within it.
The aim of the module is to provide you with the knowledge to professionally, systematically and impartially approach the preservation and extraction of all relevant digital evidence from computers, computer systems and computer networks (including the Internet) using appropriate tools and techniques.
Gain knowledge of ethical issues and challenges facing computer forensic practitioners and ethical hackers and the skills to produce designs for secure computing systems and apply the principles of computational modelling to computer forensics and cybersecurity.
Undertake advanced study, including a literature review, in order to research and develop to completion a substantial piece of work that demonstrates the range of skills you have acquired. You will also submit a dissertation that describes and evaluates the problem and solution. Past examples include an Android audio application, a Trojan detector and a network monitoring tool.
In this module you will learn how to analyse the range of tradeoffs in balancing the security properties of confidentiality, integrity and availability. You will also learn how to select the appropriate tools and techniques to address and manage concepts of risk, threats, vulnerabilities and potential attacks.
Gain knowledge and understanding of current, specialist and sensitive areas in computer forensics. Critically examine the more contentious and ethically sensitive areas associated with computer forensics such as tracking paedophiles and addressing issues such as child pornography. The principles of maintaining the integrity of digital evidence in the securing, recovering and analysing of that evidence will be explored in depth from a range of different sources of potential digital evidence.
This module has been developed with the support of the Institute of Coding, a network of employers, universities, training providers and professional bodies working together to create the skills needed for the digital economy. The module has been modified as a result of collaboration with Cellebrite, a leading provider of end to end digital forensics solutions, to enhance learning to the latest thoughts on security techniques.
The module begins with a detailed study of the current exterior gateway protocol that manages the routing of IP traffic over the Internet. You will learn how service providers and other multi-homed organisations use this protocol to support their routing policies.
Module moves from analogue principles to digital telephony, VOIP, packetized voice, GSM and converged networks. You will have an opportunity to build a fully converged modern telecommunications system.
You will develop knowledge and understanding of ethical hacking, which is about locating and strengthening security weaknesses in computer systems. The module will also cover a range of legal and social aspects in the ethical hacking domain.
This module focuses on providing the knowledge and skills that will enable you to explore and exploit business opportunities for software enterprises.
Undertake a work-based placement to support computing in a school or equivalent learning environment.
Develop knowledge and understanding of delivering maximum value to a business in its use of IT and IT processes.
Our typical offer is:
|High School Diploma along with one of the following at the required grade - SAT I and SAT II, ACT or Advanced Placement||GPA 3.0 or above and: Sat score of 1250/1600 from SATs AP (Grades 3+ in at least 3 subjects) ACT (score of 30+)|
If you don't meet our standard entry requirements, you can take one of the foundation pathways at our partners ONCAMPUS Sunderland. Find out more information and whether your course is eligible on our ONCAMPUS page.
If your qualification is not listed above, please contact the Student Administration team at email@example.com for further advice.
If English is not your first language, please see our English language requirements.
The annual fee is:
*European Union (EU), EEA (European Economic Area) and Swiss nationals who do not qualify for the EU Settlement Scheme are classed as international, however, for 22/23 admission you will receive a European student fee scholarship and will pay the home tuition fee rate for the duration of your studies. The discounted fee will be reflected in your offer letter. Learn more in our Help and Advice article.
Take a look at the Your Finances section to find out about the scholarships and bursaries that may be available to you.
This information was correct at the time of publication.
This course has a strong emphasis on real-world learning that boosts employability and equips you to make a bigger contribution in the workplace.
In your final year of the course, you will undertake a major individual project with research-active staff. This adds to your hands-on experience and, in some cases, leads to a job offer that can be taken up as soon as the course ends.
Our graduates have gone on to become web programmers, IT managers, information analysts and software developers. Employers that have taken on our graduates include Sage, British Airways and the NHS. Other graduates have started their own businesses or become software contractors earning over £50,000 a year.
PPWs present you with real-world problems that must be solved in a working week. The assessments aim to provide you with an experience reflective of the industry you want to enter, and give you meaningful feedback that you can use to improve your knowledge and skills. There are five PPWs in each academic year and each year has a different theme. Previous themes include the City of Culture Bid in 2017 and e-sports in 2018. Feedback from students about the PPWs is very positive, with comments including:
Employers are increasingly looking not only for strong CVs but also real-life demonstrations of technical know-how and commitment to self-development. All computing students at the University of Sunderland develop e-portfolios that become showcases of personal progress. A typical e-portfolio would include audits of your skills, reflections on your areas of strength, evidence of how you have tackled weaker areas, and tools for joining up your learning in different modules.
Sign up to receive emails about your subject area.
Using Your Personal Information
The University of Sunderland is collecting this data in order for you to receive information on your chosen subject(s). Your information will be stored securely in our Customer Relationship Management system which is provided by a 3rd party and used only for the administration and provision of this information. Should you choose to opt in to further communications we will also use your information to facilitate other useful marketing information based on your preferences. Further information on how your data is stored and used can be found in our Privacy notice - marketing.