If you are applying for this course from within the UK/EU, click apply now
Course starts: 14 September 2020Apply now
If you are applying for this course from outside the UK/EU, click apply now
Course starts: 14 September 2020Apply now
The course is excellent preparation for jobs in cybersecurity and digital forensics, which is a rapidly growing area given the rise in computer-related crime. At the same time, the course also covers all the fundamentals of computing, leaving your career options open.
Topics include computer security, development of secure systems and networks, cybersecurity and practical aspects of digital forensics.
Teaching methods include lectures, tutorials, seminars and laboratory sessions. You will be encouraged to develop independent study skills as well as work with other students on group projects.
As well as assessments that count towards your degree, there are also ongoing opportunities for feedback and consolidating your learning. Assessment methods include coursework and Professional Practice Weeks (PPWs). PPWs present you with real-world problems that must be solved in a working week. They aim to provide you with an experience reflective of the industry you want to enter, and give you meaningful feedback that you can use to improve your knowledge and skills. Each year has a different theme- previous themes include the City of Culture Bid in 2017 and e-sports in 2018.
Software Development and Theory: Software Engineering, Human-Computer Interaction, Formal Methods
Programming: Microsoft C# .NET and programming for Robots
Database Systems: Database Design, Relational Databases and SQL, Database Integrity and Security, PHP and MySQL
Computer Systems and Networking: Operating Systems, Networks and Computer Architectures
Specialist Mini Project: Showcase your talents through a project in your chosen area of computing. Past projects have included a Facebook app, a hack challenge and the creation of a retro arcade game.
Discuss the basic principles of cybersecurity and digital forensics and describe the role computer forensics and cybersecurity play in deterring and detecting computer crime and in identifying weaknesses and vulnerabilities in computer systems.
Some modules have prerequisites. Read more about what this means in our Help and Advice article.
Learn key skills such as self-determination, planning and actioning of goals, time management, independent learning and team working. Prepare for placement or gain workplace skills through shadowing, volunteering or mentoring.
Work in integrated groups to undertake a large scale development either for a real client or to realise an enterprising idea that your group has conceived and developed. Learn the principles of software engineering and development in the context of real world and real client needs and demands. Focus on ethics, professionalism and security related issues within the software development and technology management industries.
This module will move beyond the basic object oriented concepts associated with simple classes and objects to cover a series of more sophisticated object-oriented ideas, including ‘inheritance’ and ‘polymorphism’.
This module introduces the architecture, structure, basic protocols and devices used in routed and switched networks, as well as in-depth discussion of the OSI and TCP/IP reference models and where these devices and protocols sit within it.
The aim of the module is to provide you with the knowledge to professionally, systematically and impartially approach the preservation and extraction of all relevant digital evidence from computers, computer systems and computer networks (including the Internet) using appropriate tools and techniques.
Gain knowledge of ethical issues and challenges facing computer forensic practitioners and ethical hackers and the skills to produce designs for secure computing systems and apply the principles of computational modelling to computer forensics and cybersecurity.
Undertake advanced study, including a literature review, in order to research and develop to completion a substantial piece of work that demonstrates the range of skills you have acquired. You will also submit a dissertation that describes and evaluates the problem and solution. Past examples include an Android audio application, a Trojan detector and a network monitoring tool.
In this module you will learn how to analyse the range of tradeoffs in balancing the security properties of confidentiality, integrity and availability. You will also learn how to select the appropriate tools and techniques to address and manage concepts of risk, threats, vulnerabilities and potential attacks.
Gain knowledge and understanding of current, specialist and sensitive areas in computer forensics. Critically examine the more contentious and ethically sensitive areas associated with computer forensics such as tracking paedophiles and addressing issues such as child pornography. The principles of maintaining the integrity of digital evidence in the securing, recovering and analysing of that evidence will be explored in depth from a range of different sources of potential digital evidence.
Examine the professional and ethical aspects of cybersecurity and digital forensics and develop an understanding of the particular legal and evidentiary challenges and the risk management requirements in these areas such as the application of legal procedures to evidence, role of the expert witness and protecting individual and human rights. Develop your critical analysis and research skills through an examination of the current issues in both subject areas.
The module begins with a detailed study of the current exterior gateway protocol that manages the routing of IP traffic over the Internet. You will learn how service providers and other multi-homed organisations use this protocol to support their routing policies.
Module moves from analogue principles to digital telephony, VOIP, packetized voice, GSM and converged networks. You will have an opportunity to build a fully converged modern telecommunications system.
You will develop knowledge and understanding of ethical hacking, which is about locating and strengthening security weaknesses in computer systems. The module will also cover a range of legal and social aspects in the ethical hacking domain.
This module focuses on providing the knowledge and skills that will enable you to explore and exploit business opportunities for software enterprises.
Undertake a work-based placement to support computing in a school or equivalent learning environment.
Our typical offer is
If your qualification is not listed above, please contact the Student Administration team at email@example.com for further advice.
We also require three passes at GCSE grade C or above, which must include Mathematics and English Language, or an equivalent qualification, for example; a minimum of Level 2 Key Skills in Communication and Application of Number. If you have studied for a new GCSE for which you will be awarded a numerical grade then you will need to achieve a grade 4 or above.
If English is not your first language we will require an International English Language Testing System (IELTS) with an overall score of 6.0 and at least 5.5 or higher in each component: reading, writing, listening and speaking. An alternative approved Secure English Language Test (SELT) can also be considered if the applicants element scores are equivalent to those required for IELTS.
The annual fee is:
If you are not sure whether you qualify as a UK, EU or international student, find out more in our Help and Advice article.
Take a look at the Your Finances section to find out about the scholarships and bursaries that may be available to you.
This information was correct at the time of publication.
This course has a strong emphasis on real-world learning that boosts employability and equips you to make a bigger contribution in the workplace.
Sunderland has a good reputation with employers - 93.4% of our graduates are in employment, further study or training within six months of graduating, according to DLHE 2016/17 (based on full-time, first degree, home leavers). The top type of job gained by our graduates is ‘information and communication technology professional’.
In your final year of the course, you will undertake a major individual project with research-active staff. This adds to your hands-on experience and, in some cases, leads to a job offer that can be taken up as soon as the course ends.
Our graduates have gone on to become web programmers, IT managers, information analysts and software developers. Employers that have taken on our graduates include Sage, British Airways and the NHS. Other graduates have started their own businesses or become software contractors earning over £50,000 a year.
This course is accredited by the Chartered Society of Forensic Sciences and by the British Computer Society (BCS), the Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional. It is also accredited by BCS on behalf of the Engineering Council for the purposes of fully meeting the academic requirement for Incorporated Engineer and partially meeting the academic requirement for a Chartered Engineer.
Employers are increasingly looking not only for strong CVs but also real-life demonstrations of technical know-how and commitment to self-development. All computing students at the University of Sunderland develop e-portfolios that become showcases of personal progress. A typical e-portfolio would include audits of your skills, reflections on your areas of strength, evidence of how you have tackled weaker areas, and tools for joining up your learning in different modules.
PPWs present you with real-world problems that must be solved in a working week. The assessments aim to provide you with an experience reflective of the industry you want to enter, and give you meaningful feedback that you can use to improve your knowledge and skills. There are five PPWs in each academic year and each year has a different theme. Previous themes include the City of Culture Bid in 2017 and e-sports in 2018. Feedback from students about the PPWs is very positive, with comments including:
Sign up to receive emails about your subject area.
Using Your Personal Information
The University of Sunderland is collecting this data in order for you to receive information on your chosen subject(s). Your information will be stored securely in our Customer Relationship Management system which is provided by a 3rd party and used only for the administration and provision of this information. Should you choose to opt in to further communications we will also use your information to facilitate other useful marketing information based on your preferences. Further information on how your data is stored and used can be found in our Privacy notice - marketing.