If you are applying for this course from outside the UK/EU, click apply now.
Course starts: 16 September 2019Apply now
If you are applying for this course from within the UK/EU, click apply now.
Course starts: 16 September 2019Apply now
Networks and Cybersecurity blends academic rigour with practical skills and incorporates the Cisco Certified Network Associate curriculum for small and medium-sized networks.
You will develop both practical skills in designing and building networks, as well as expertise in five key areas of network management: fault, configuration, accounting, performance and security. For each of these, you will learn about available protocols and how to analyse different models and standards.
At the same time, the course covers all the fundamentals of computing. Topics include web applications, database systems, programming and software development.
Teaching methods include lectures, tutorials, seminars and laboratory sessions. We also use the University’s virtual learning environment for group activities, discussions, assignments and links to resources. We encourage you to develop independent study skills as well as to work with other students on the course.
As well as assessments that count towards your degree, there are also ongoing assessments for feedback and consolidating your learning. Assessment methods include coursework, exams and Professional Practice Weeks.
Software Development and Theory: Software Engineering, Human-Computer Interaction, Formal Methods
Programming: Microsoft C# .NET and programming for Robots
Database Systems: Database Design, Relational Databases and SQL, Database Integrity and Security, PHP and MySQL
Computer Systems and Networking: Operating Systems, Networks and Computer Architectures
Specialist Mini Project: Showcase your talents through a project in your chosen area of computing. Past projects have included a Facebook app, a hack challenge and the creation of a retro arcade game.
Discuss the basic principles of cybersecurity and digital forensics and describe the role computer forensics and cybersecurity play in deterring and detecting computer crime and in identifying weaknesses and vulnerabilities in computer systems.
Some modules have prerequisites. Read more about what this means in our Help and Advice article.
Learn key skills such as self-determination, planning and actioning of goals, time management, independent learning and team working.
Work in a team to undertake a large scale development for a real client or realise an enterprising idea that the group has personally conceived and developed. Learn the principles of software engineering and development in the context of real world and real client needs and demands. Focus on ethics, professionalism and security related issues within the software development and technology management industries.
This module introduces the architecture, structure, basic protocols and devices used in routed and switched networks, as well as in-depth discussion of the OSI and TCP/IP reference models and where these devices and protocols sit within it.
This module will provide you with the second half of the CISCO accreditation for CCNA.
Cover areas of Network Security including: dial-up security, TCP/IP based networks, securing network services, AAA (Authentication, Authorisation & Accounting), Encryption techniques, firewalling, intrusion detection methods, intrusion prevention methods, proxies, virtual private networks and network security policies. You will also set up live secure networks (hardware and simulated), and system recovery after attacks.
Concentrate on the increasingly important subject of virtualisation and programming in Python.
Industrial placement (optional)
You will research a topic and develop software that’s connected to that topic. Past examples include an Android audio application, a Trojan detector and a network monitoring tool.
The module begins with a detailed study of the current exterior gateway protocol that manages the routing of IP traffic over the Internet. You will learn how service providers and other multi-homed organisations use this protocol to support their routing policies.
In this module you will learn how to analyse the range of tradeoffs in balancing the security properties of confidentiality, integrity and availability. You will also learn how to select the appropriate tools and techniques to address and manage concepts of risk, threats, vulnerabilities and potential attacks.
You will develop knowledge and understanding of ethical hacking, which is about locating and strengthening security weaknesses in computer systems. The module will also cover a range of legal and social aspects in the ethical hacking domain.
Module moves from analogue principles to digital telephony, VOIP, packetized voice, GSM and converged networks. You will have an opportunity to build a fully converged modern telecommunications system.
This module focuses on providing the knowledge and skills that will enable you to explore and exploit business opportunities for software enterprises.
Undertake a work-based placement to support computing in a school or equivalent learning environment.
Our typical offer is 112 UCAS points from a minimum of two A Levels or equivalent (e.g. 1 x AVCE double award).
Find out how many points your qualifications are worth using the UCAS Tariff calculator.
We accept a maximum of 6 points from Level 3 Key Skills qualifications. Please note we do not accept AS/A Level General Studies.
We also require three passes at GCSE grade C or above, which must include Mathematics and English Language, or a minimum of Level 2 Key Skills in Communication and Application of Number. If you have studied for a GCSE which has a numerical grade then you will need to achieve a grade 4 or above.
If English is not your first language, please see our English language requirements.
The annual fee for this course is:
If you are not sure whether you qualify as a UK, EU or international student, find out more in our Help and Advice article.
Take a look at the Your Finances section to find out about the scholarships and bursaries that may be available to you.
This information was correct at the time of publication.
This course has a strong emphasis on real-world learning that boosts employability and equips you to make a bigger contribution in the workplace.
Sunderland has a good reputation with employers - 93.4% of our graduates are in employment, further study or training within six months of graduating, according to DLHE 2016/17 (based on full-time, first degree, home leavers). The top type of job gained by our graduates is ‘information and communication technology professional’.
Our graduates have gone on to become web programmers, IT managers, information analysts and software developers. Employers that have taken on our graduates include Sage, British Airways and the NHS. Other graduates have started their own businesses or become software contractors earning over £50,000 a year.
PPWs present you with real-world problems that must be solved in a working week. The assessments aim to provide you with an experience reflective of the industry you want to enter, and give you meaningful feedback that you can use to improve your knowledge and skills. There are five PPWs in each academic year and each year has a different theme. Previous themes include the City of Culture Bid in 2017 and e-sports in 2018. Feedback from students about the PPWs is very positive, with comments including:
Sign up to receive emails about your subject area.
Using Your Personal Information
The University of Sunderland is collecting this data in order for you to receive information on your chosen subject(s). Your information will be stored securely in our Customer Relationship Management system which is provided by a 3rd party and used only for the administration and provision of this information. Should you choose to opt in to further communications we will also use your information to facilitate other useful marketing information based on your preferences. Further information on how your data is stored and used can be found in our Privacy notice - marketing.