If you are applying for this course from within the UK click Apply Now
Course starts: 19 September 2022Apply now
The course is excellent preparation for jobs in cybersecurity and digital forensics, which is a rapidly growing area given the rise in computer-related crime. At the same time, the course also covers all the fundamentals of computing, leaving your career options open.
Topics include computer security, development of secure systems and networks, cybersecurity and practical aspects of digital forensics.
Teaching methods include lectures, tutorials, seminars and laboratory sessions. You will be encouraged to develop independent study skills as well as work with other students on group projects. As well as assessments (i.e. coursework) that count towards your degree, there are also ongoing opportunities for feedback and consolidating your learning.
The Computing Integrated Foundation Year includes five modules:
Some modules have prerequisites. Read more about what this means in our Help and Advice article.
Gain an overview of basic design principles of systems and software, including modelling principles and the use of tools, and design patterns. Investigates different software processes, data integration, project management and be introduced to software testing methods. Discover key concepts that will allow you to begin to break down programmatical application areas and begin to devise, document, test, develop and improve working solutions for a given problem.
Learn the basic principles of computer architectures. Gain an understanding of the underlying mathematics, operations and components used by computer architectures. Be introduced to the concept of operating systems and the types of hardware that can be attached to a computer to facilitate input and output. Explore in detail the considerations and tasks required to install, manage, and maintain computers both in stand-alone and virtual environments.
Learn the basic principles of programming. Develop your skills in logical analysis into formal representation within structured program code. Cover the core principles of computer programming that underpin all computer science disciplines. Focus on simple data storage and manipulation using the primary programming structures of sequence, selection, and repetition. Develop programs using industry standard techniques.
Be introduced to the fundamentals of client-server web-based development from a programming perspective. Learn key concepts that will allow you to start building dynamic web applications in response to business requirements. Develop web applications using industry standard tools and techniques and use of a range of programming, markup, and query languages.
Develop a sound knowledge of networking protocols and technologies, together with the techniques to install, configure and troubleshoot a network operating system. Acquire the skills to maximise network availability to all users. Learn about client server architectures and cloud computing paradigms.
Discuss the basic principles of cybersecurity and digital forensics and describe the role computer forensics and cybersecurity play in deterring and detecting computer crime and in identifying weaknesses and vulnerabilities in computer systems.
Learn key skills such as self-determination, planning and actioning of goals, time management, independent learning and team working. Prepare for placement or gain workplace skills through shadowing, volunteering or mentoring.
This module has been developed with the support of the Institute of Coding, a network of employers, universities, training providers and professional bodies working together to create the skills needed for the digital economy. The module has been modified as a result of collaboration with a number of industry partners including SAGE and Adlink, to enhance industry relevant employability skills.
This module will move beyond the basic object oriented concepts associated with simple classes and objects to cover a series of more sophisticated object-oriented ideas, including ‘inheritance’ and ‘polymorphism’.
This module introduces the architecture, structure, basic protocols and devices used in routed and switched networks, as well as in-depth discussion of the OSI and TCP/IP reference models and where these devices and protocols sit within it.
The aim of the module is to provide you with the knowledge to professionally, systematically and impartially approach the preservation and extraction of all relevant digital evidence from computers, computer systems and computer networks (including the Internet) using appropriate tools and techniques.
Gain knowledge of ethical issues and challenges facing computer forensic practitioners and ethical hackers and the skills to produce designs for secure computing systems and apply the principles of computational modelling to computer forensics and cybersecurity.
Undertake advanced study, including a literature review, in order to research and develop to completion a substantial piece of work that demonstrates the range of skills you have acquired. You will also submit a dissertation that describes and evaluates the problem and solution. Past examples include an Android audio application, a Trojan detector and a network monitoring tool.
In this module you will learn how to analyse the range of tradeoffs in balancing the security properties of confidentiality, integrity and availability. You will also learn how to select the appropriate tools and techniques to address and manage concepts of risk, threats, vulnerabilities and potential attacks.
Gain knowledge and understanding of current, specialist and sensitive areas in computer forensics. Critically examine the more contentious and ethically sensitive areas associated with computer forensics such as tracking paedophiles and addressing issues such as child pornography. The principles of maintaining the integrity of digital evidence in the securing, recovering and analysing of that evidence will be explored in depth from a range of different sources of potential digital evidence.
This module has been developed with the support of the Institute of Coding, a network of employers, universities, training providers and professional bodies working together to create the skills needed for the digital economy. The module has been modified as a result of collaboration with Cellebrite, a leading provider of end to end digital forensics solutions, to enhance learning to the latest thoughts on security techniques.
The module begins with a detailed study of the current exterior gateway protocol that manages the routing of IP traffic over the Internet. You will learn how service providers and other multi-homed organisations use this protocol to support their routing policies.
Module moves from analogue principles to digital telephony, VOIP, packetized voice, GSM and converged networks. You will have an opportunity to build a fully converged modern telecommunications system.
You will develop knowledge and understanding of ethical hacking, which is about locating and strengthening security weaknesses in computer systems. The module will also cover a range of legal and social aspects in the ethical hacking domain.
This module focuses on providing the knowledge and skills that will enable you to explore and exploit business opportunities for software enterprises.
Undertake a work-based placement to support computing in a school or equivalent learning environment.
Develop knowledge and understanding of delivering maximum value to a business in its use of IT and IT processes.
We don’t currently display entry requirements for United States. Please contact the Student Admin team on firstname.lastname@example.org or 0191 515 3154.
Entry requirements are provided for guidance only and we may offer you an entrance interview which will help us determine your eligibility for your chosen degree. This enables us to consider making you an offer if you are perhaps a mature student who has been out of education for a period of time, or you have gained significant knowledge and skills through employment rather than traditional education.
Eligible entry qualifications:
1. Normally a minimum of three Level 2 qualifications (NVQ, GCSE or equivalent), including Maths and English at grade C or above** and a minimum of 40 UCAS tariff points from Level 3 qualifications (e.g. A or AS Levels, BTEC certificates/diplomas, access courses or equivalent)
2. Demonstrable evidence of appropriate knowledge and skills acquired from at least three years of post-school work experience.
If you are unsure of whether you think you might be suitable for the course, please contact us!
** If you have studied for a GCSE which has a numerical grade then you will need to achieve a grade 4 or above. Equivalent alternative qualifications are also accepted, such as Level 2 Key Skills in Communication and Application of Number. If you have not achieved a grade C in Maths and English we may be able to work with you to ensure that you are able to gain these in the first year of the course, depending on your experience.
If English is not your first language, please see our English language requirements.
The annual fee for this course is £9,250 if you are from the UK/Ireland/EU settled/pre-settled.
If you are a full-time UK/Irish/EU settled/EU pre-settled student you may be eligible to receive financial support to cover your fees for the full four years. UK and EU settled students may also be eligible to receive a maintenance loan.
Please note, this course is not available to international students.
Learn more about settled status, pre-settled status, special discounts, visa requirements and Common Travel Area (CTA) agreements for the Republic of Ireland applicants in our Help and Advice article.
Take a look at the Your Finances section to find out about the scholarships and bursaries that may be available to you.
This information was correct at the time of publication.
This course has a strong emphasis on real-world learning that boosts employability and equips you to make a bigger contribution in the workplace.
In your final year of the course, you will undertake a major individual project with research-active staff. This adds to your hands-on experience and, in some cases, leads to a job offer that can be taken up as soon as the course ends.
Our graduates have gone on to become web programmers, IT managers, information analysts and software developers. Employers that have taken on our graduates include Sage, British Airways and the NHS. Other graduates have started their own businesses or become software contractors earning over £50,000 a year.
This course is accredited by the Chartered Society of Forensic Sciences and by the British Computer Society (BCS), the Chartered Institute for IT for the purposes of fully meeting the further learning academic requirement for registration as a Chartered IT Professional. It is also accredited by BCS on behalf of the Engineering Council for the purposes of fully meeting the academic requirement for Incorporated Engineer and partially meeting the academic requirement for a Chartered Engineer.
Employers are increasingly looking not only for strong CVs but also real-life demonstrations of technical know-how and commitment to self-development. All computing students at the University of Sunderland develop e-portfolios that become showcases of personal progress. A typical e-portfolio would include audits of your skills, reflections on your areas of strength, evidence of how you have tackled weaker areas, and tools for joining up your learning in different modules.
Sign up to receive emails about your subject area.
Using Your Personal Information
The University of Sunderland is collecting this data in order for you to receive information on your chosen subject(s). Your information will be stored securely in our Customer Relationship Management system which is provided by a 3rd party and used only for the administration and provision of this information. Should you choose to opt in to further communications we will also use your information to facilitate other useful marketing information based on your preferences. Further information on how your data is stored and used can be found in our Privacy notice - marketing.