If you are applying for this course from outside the UK/EU, click apply now
Course starts: 17 September 2018Apply now
If you are applying for this course from within the UK/EU, click apply now
The course is excellent preparation for jobs in cybersecurity and digital forensics, which is a rapidly growing area given the rise in computer-related crime. At the same time, the course also covers all the fundamentals of computing, leaving your career options open. Core topics include web applications, database systems, programming and software development.
Please note, this course is under review. The course title and modules are subject to change.
Teaching methods include lectures, tutorials, seminars and laboratory sessions. Group activities and discussions are facilitated through the University’s virtual learning environment.
You will be encouraged to develop independent study skills as well as work with other students on group projects. As well as assessments that count towards your degree, there are also ongoing assessments for feedback and consolidating your learning. Assessment methods include coursework and exams.
Software Development and Theory: Software Engineering, Human-Computer Interaction, Formal Methods
Programming: Microsoft C# .NET and programming for Robots
Database Systems: Database Design, Relational Databases and SQL, Database Integrity and Security, PHP and MySQL
Computer Systems and Networking: Operating Systems, Networks and Computer Architectures
Specialist Mini Project: Showcase your talents through a project in your chosen area of computing. Past projects have included a Facebook app, a hack challenge and the creation of a retro arcade game.
Discuss the basic principles of cybersecurity and digital forensics and describe the role computer forensics and cybersecurity play in deterring and detecting computer crime and in identifying weaknesses and vulnerabilities in computer systems.
Gain the knowledge and skills to deploy and support a client operating system. Explore in detail, the various tasks required to install, manage and maintain computers both in stand-alone and networked environments. This module also aims to increase your future employability by allowing you to utilise two of the most popular operating systems currently used in industry, namely Linux and Microsoft Windows.
You will be introduced to the twin topics of games design and development from both a theoretical and technical perspective. Working in the context of an industry standard game engine (for instance the Unreal Engine) you will be exposed to an industrial weight level designer as a means to learn the basic principles underpinning related game design such as 3D solid modeling, texture mapping, lighting, physics, terrains and scripting. You will employ existing game engine technologies (such as game related APIs) to write introductory 2D sprite based computer game programs (using a relevant language such as C/C++).
Discuss and analyse the evolution and revolution(s) in the computing disciplines related to other aspects of computing and computer science including computer system fundamentals, operating systems, computer hardware, programming and system design.
Some modules have prerequisites. Read more about what this means in our Help and Advice article.
Choose to develop a software project for a client or yourself. You will gain valuable experience of working within a team-based software development environment
This module will move beyond the basic object oriented concepts associated with simple classes and objects to cover a series of more sophisticated object-oriented ideas, including ‘inheritance’ and ‘polymorphism’.
This module introduces the architecture, structure, basic protocols and devices used in routed and switched networks, as well as in-depth discussion of the OSI and TCP/IP reference models and where these devices and protocols sit within it.
The aim of the module is to provide you with the knowledge to professionally, systematically and impartially approach the preservation and extraction of all relevant digital evidence from computers, computer systems and computer networks (including the Internet) using appropriate tools and techniques.
Gain knowledge of ethical issues and challenges facing computer forensic practitioners and ethical hackers and the skills to produce designs for secure computing systems and apply the principles of computational modelling to computer forensics and cybersecurity.
Undertake advanced study, including a literature review, in order to research and develop to completion a substantial piece of work that demonstrates the range of skills you have acquired. You will also submit a dissertation that describes and evaluates the problem and solution. Past examples include an Android audio application, a Trojan detector and a network monitoring tool.
In this module you will learn how to analyse the range of tradeoffs in balancing the security properties of confidentiality, integrity and availability. You will also learn how to select the appropriate tools and techniques to address and manage concepts of risk, threats, vulnerabilities and potential attacks.
Gain knowledge and understanding of current, specialist and sensitive areas in computer forensics. Critically examine the more contentious and ethically sensitive areas associated with computer forensics such as tracking paedophiles and addressing issues such as child pornography. The principles of maintaining the integrity of digital evidence in the securing, recovering and analysing of that evidence will be explored in depth from a range of different sources of potential digital evidence.
Examine the professional and ethical aspects of cybersecurity and digital forensics and develop an understanding of the particular legal and evidentiary challenges and the risk management requirements in these areas such as the application of legal procedures to evidence, role of the expert witness and protecting individual and human rights. Develop your critical analysis and research skills through an examination of the current issues in both subject areas.
The module begins with a detailed study of the current exterior gateway protocol that manages the routing of IP traffic over the Internet. You will learn how service providers and other multi-homed organisations use this protocol to support their routing policies.
Module moves from analogue principles to digital telephony, VOIP, packetized voice, GSM and converged networks. You will have an opportunity to build a fully converged modern telecommunications system.
You will develop knowledge and understanding of ethical hacking, which is about locating and strengthening security weaknesses in computer systems. The module will also cover a range of legal and social aspects in the ethical hacking domain.
This module focuses on providing the knowledge and skills that will enable you to explore and exploit business opportunities for software enterprises.
Undertake a work-based placement to support computing in a school or equivalent learning environment.
The David Goldman Informatics Centre,
Sir Tom Cowie Campus,
St Peter's Way,
Our typical offer is
If your qualification is not listed above, please contact the Student Administration team at firstname.lastname@example.org for further advice.
We also require three passes at GCSE grade C or above, which must include Mathematics and English Language, or an equivalent qualification, for example; a minimum of Level 2 Key Skills in Communication and Application of Number. If you have studied for a new GCSE for which you will be awarded a numerical grade then you will need to achieve a grade 4 or above.
If English is not your first language we will require an International English Language Testing System (IELTS) with an overall score of 6.0 and at least 5.5 or higher in each component: reading, writing, listening and speaking. An alternative approved Secure English Language Test (SELT) can also be considered if the applicants element scores are equivalent to those required for IELTS.
The annual fee is:
If you are not sure whether you qualify as a UK, EU or international student, find out more in our Help and Advice article.
Take a look at the Your Finances section to find out about the scholarships and bursaries that may be available to you.
This information was correct at the time of publication.
This course has a strong emphasis on real-world learning that boosts employability and equips you to make a bigger contribution in the workplace.
Sunderland has a good reputation with employers and, according to the Destination of Leavers from Higher Education Survey 2015/16, 94.2% of our graduates are in employment or further study within six months of graduating (based on UK undergraduate students). The top type of job gained by our graduates is ‘information and communication technology professional’.
In your final year of the course, you will undertake a major individual project, often working directly with a company. This adds to your hands-on experience and, in some cases, leads to a job offer that can be taken up as soon as the course ends.
Our graduates have gone on to become web programmers, IT managers, information analysts and software developers. Employers that have taken on our graduates include Sage, British Airways and the NHS. Other graduates have started their own businesses or become software contractors earning over £50,000 a year.
This course is accredited by the British Computer Society (BCS), the Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional. It is also accredited by BCS on behalf of the Engineering Council for the purposes of fully meeting the academic requirement for Incorporated Engineer and partially meeting the academic requirement for a Chartered Engineer.
Employers are increasingly looking not only for strong CVs but also real-life demonstrations of technical know-how and commitment to self-development. All computing students at the University of Sunderland develop e-portfolios that become showcases of personal progress. A typical e-portfolio would include audits of your skills, reflections on your areas of strength, evidence of how you have tackled weaker areas, and tools for joining up your learning in different modules.
Sign up to receive emails about your subject area.
Using Your Personal Information
The University of Sunderland is collecting this data in order for you to receive information on your chosen subject(s). Your information will be stored securely in our Customer Relationship Management system which is provided by a 3rd party and used only for the administration and provision of this information. Should you choose to opt in to further communications we will also use your information to facilitate other useful marketing information based on your preferences. Further information on how your data is stored and used can be found in our Privacy notice - marketing.