hacker coding at night cybersecurity concept

Available with:

  • Foundation Year

Accreditations


Course Summary

Unlock the future of cybersecurity with our BSc Cybersecurity degree, designed to equip you with in-demand skills for tackling today’s evolving digital threats. In a world where computer and information security are crucial, this course provides comprehensive training to help you understand, assess, and counteract security risks effectively.

The security of computers, systems and information is of paramount importance to all nations. In response to security dangers, this course will give you knowledge of the threats, and provide you with the chance to gain the skills and expertise to investigate, police, and react accordingly, and to protect systems and organisations. 

Stay ahead in the fast-paced field of cybersecurity with our up-to-date teaching materials and innovative teaching methods, ensuring you're prepared to meet the demands of this critical industry.

Why You'll Love It

What Our Students Think

What You'll Study

During the Computing Foundation Year, you are taught to understand key concepts relating to the role of processors, key algorithms, data analysis, HTML website creation, and programming. You will also learn how IT systems and infrastructures are protected from threats.

  • Term 1: Introduction to Computing Principles and Skills
  • Term 2: Threats and Opportunities
  • Term 3: Applied Programming and Data Science

The information listed in this section is an overview of the academic content of the course that will take the form of either core or option modules and should be used as a guide. We review the content of our courses regularly, making changes where necessary to improve your experience and graduate prospects. If during a review process, course content is significantly changed, we will contact you to notify you of these changes if you receive an offer from us.

In Year 1 (Level 4), you will be introduced to the fundamentals of professional skills for computing: key skills include professionalism, cybersecurity and introduction to computers. You will also learn how complex databases can be managed and how software systems are developed using programming in Python/C++.

Modules

This module explores the design and development of computer software (applications) from two perspectives:

  1. The implementation of software using programming code, in a high level statically typed, object-oriented programming language, such as Java.
  2. The user-centred design approach to software design, considering human factors, user experience, usability, and prototyping.

The programming aspect covers a range of topics including

  • The syntax and semantics of a programming language
  • Different types of data, including collections
  • Control flow - conditional, iterative and recursive
  • Data input and output (CLI and file based)
  • Object-orientation, including class design and inheritance
  • Unit testing
  • Basic refactoring

The human aspect considers topics that include

  • User-centred design
  • Human factors
  • Usability
  • Accessibility
  • User experience
  • Low and high-fidelity prototyping
  • Evaluation

This module provides a strong foundation in the key areas of computing, i.e., mathematics, modern computing systems, cybersecurity, and professional skills. It equips students with the essential knowledge needed to tackle real-world computing problems and prepare them for advanced computing studies.

The mathematical aspect covers a range of topics that include:

  • Set theory
  • Geometric and trigonometric problem solving
  • Vectors
  • Linear, quadratic, fractional, and simultaneous equations
  • Matrices
  • Logarithmic functions
  • Simple differential equations
  • Introduction to complex numbers

The computing systems considers topics that include:

  • Computer architecture - Hardware, software, and peripherals
  • Basic computing mathematics - Number systems, binary operations, probability
  • Logic gates and Boolean Algebra
  • Machine Code and Assembly Language
  • Compilers and Linkers
  • Data Formats
  • Operating Systems and File Management

The cybersecurity component addresses areas including:

  • Cybersecurity Concepts
  • The Human Weakness in Cybersecurity
  • Cybersecurity Vulnerabilities
  • Cybersecurity Exploitation
  • Cryptography and Information Security
  • Cybersecurity Auditing Methods
  • Cybersecurity Defensive Strategies
  • Programming for Cybersecurity with Python
  • Ethical Hacking and Penetration Testing Lifecycle

The professional skills aspect encompasses subjects including:

  • Employment & Employability
  • Curriculum Vitae
  • Role of Professional Bodies
  • Security Obligations, Ethics and Law
  • Copyright and IPR Concepts
  • Report Writing and Referencing
  • Proposal and Business Plans
  • Social Networks and Collaboration
  • Data Collection Methods
  • Reflection

This module introduces fundamental concepts in database systems, emphasising their importance in modern computing. Students will gain theoretical and practical skills in designing, implementing, and querying relational databases, while also exploring alternative database management systems (DBMS), such as NoSQL and distributed databases. Through hands-on experience with tools like SQL and exposure to NoSQL systems, students will learn to choose the right database solution for different use cases.

The aims of this module are:

  • Understand the role and importance of databases in computer systems and applications.
  • Explain core database concepts, including schemas, tables, keys, and relationships.
  • Design normalised database schemas using Entity-Relationship (ER) modelling.
  • Implement relational databases in a DBMS.
  • Write SQL queries for data definition, manipulation, and retrieval.
  • Compare and contrast relational databases with alternative database models such as NoSQL and distributed systems.
  • Explore use cases for NoSQL databases, including document stores, key-value stores, and graph databases.
  • Understand the challenges and benefits of distributed databases, including replication and scalability.
  • Awareness of basic techniques for database optimisation and indexing.
  • Discuss data security, privacy, and ethical considerations in database design and use.

The module focuses on the application of computer programming, and related technologies, in solving everyday problems. In this process, problems and challenges will be analysed, leading to the selection and deployment of tools and techniques in response.

As a problem-based learning strategy is employed, the syllabus of the module is fluid from occurrence-to-occurrence. However, central themes and foundational concepts that will be covered are:

  • Computational thinking (decomposition, abstraction, algorithm design, pattern recognition)
  • Collaborative software development
  • Solution evaluation
  • Project portfolios

You now have the opportunity to pick an optional module to learn a new language or build on your existing language skills as part of your degree. You can choose:

  • Subsidiary Language for Beginners (choice of German, Italian or Spanish)
  • French: Intermediate Language Development
  • Spanish: Intermediate Language Development
  • Chinese: Intermediate Language Development
  • German: Communication in Practice
  • French: Communication in Practice
  • Spanish: Communication in Practice

The information listed in this section is an overview of the academic content of the course that will take the form of either core or option modules and should be used as a guide. We review the content of our courses regularly, making changes where necessary to improve your experience and graduate prospects. If during a review process, course content is significantly changed, we will contact you to notify you of these changes if you receive an offer from us.

In Year 2 (Level 5), you will extend your theoretical knowledge and develop your ability to apply it to real-world problems, continuing the core themes started in Year 1, this is in addition to learning cyber intelligence tools and techniques. 

Modules

This module introduces intermediate topics in algorithm design, analysis and implementation using industry standard libraries, tools and techniques. Topics include asymptotic analysis, memory management and common data structures and algorithms such as:

  • Arrrays
  • Linked lists
  • Stacks
  • Queues
  • Heaps
  • Binary search trees
  • Hash tables
  • Sorting
  • Searching
  • Pseudorandom number generation

Additionally we cover topics such as multithreaded software development, as well as issues regarding maintainability for larger software projects.

This module provides a critical understanding of the fundamental building blocks of computer systems with an emphasis on performance efficiency. Topics include gate-level minimization, the design of combinational and sequential circuits, and an exploration of performance metrics and techniques for enhancing microprocessor architecture.

The module also covers the below topics of computer networks. 

  • Network representation and topologies
  • Protocols and models
  • SDLC
  • Switching concepts
  • Spanning Tree Protocol
  • VLANs
  • Wireless LAN
  • Subnetting
  • Routing fundamentals
  • Network Virtualisation
  • Cloud Fundamentals
  • Quality-of-Service
  • Network Security

The module introduces students to the basics of static websites - their structure (HTML), aethetics (CSS) and interactivity (JavaScript). It also introduces the kep protocol of the web (HTTP) and use of it's key verbs to make requests.

Students will be taught how websites compliant with HTML and CSS document standards, as well as being accessible, as defined by the Web Content Accessibility Guidelines (WCAG).

Students will also be introduced to various associated technolohies, such as IDEs, FTP clients and introduced to DevOps processes.

Students will then be introduced to mechanisms for developing dynamic websites through the development of server-side applications which utilise a database (i.e. full-stack development).

The module is about software attack techniques, approaches, and methodologies.  It provides students exposure to exploitation techniques, including, for example, buffer overflow, stack overflow, heap attacks, and UAF (Use After Free), amongst others.  The content also covers attack methods including system, host, network, and web-based attacks.  Other aspects of the topic areas addressed are social engineering awareness and mitigation, network security and attacks, use of penetration testing tools, network tapping/sniffing and detection, wireless and mobile hacking, ethical issues in software exploitation and penetration testing.

Students will develop understanding of attack surfaces and entry points, as well as the use of various static and dynamic analysis tools for detection of vulnerabilities that exist in pre-existing software.  Tools such as GDB(including GEF), Wireshark, and the Metasploit framework are used in solving tasks in the module.

This is an experiential learning opportunity that incorporates, 20 teaching contact hours/lectures to prepare for the150 contract hours where L5 students can use all their skills learned to date on an actual real-world (external business) client driven project, working in teams and produce an artefact. 

Students are also expected to undertake around 30 hours of self study.

This module not only gives them enhanced skills but the opportunity to work for a real client thus giving them a valuable CV and LInkedIn entry as work experience that can contribute to their employability portfolio. 

Students will collaborate in teams and produce full client documentation alongside a reflection of their expereince and this all give some much needed contemplation of their skills to date and how to use them. 

This module provides a structured, university-level work placement for 4, 5 or 7 weeks as one continuous block / period with a placement provider (i.e. industry apprioprate sector). It is designed to enhance your professional skills in a real-world job setting.

The placement can either be organised by you or with support from university staff.

All work placements within this module must be university-level; this means:

  • Undertaking high-skilled work commensurate with level 5 study (e.g. report writing, attending meetings, delivering presentations, producing spreadsheets, writing content on webpages, social media, marketing services/products etc)
  • Physically placed (albeit part of it can be hybrid) within an employer setting in one continuous block / period for 4, 5 or 7 weeks for a minimum of 140-147 hours over the course of the entire work placement

Where applicable, your existing part-time employer can be approached/used as the placement provider, if the high-skilled work.

  • criterion above is fulfilled for the full duration of the placement.
  • All quality assurances/agreements provided by the University are adhered to, by you and the employer.

The work placement context may not necessarily, reflect your degree discipline per se, but rather, it will give you an enriched experience to enhance your professional skills in a real-world job setting.

The Level 5, 40-credit modules require a basic foundation of knowledge of your chosen language e.g. GCSE or equivalent,  a Level 4 module in the same language or equivalent previous learning. This module includes an optional placement abroad, such as an intensive course at a partner university. You can choose:

  • Advanced Language Development and Global Sustainability (choice of German, French or Spanish)
  • Upper Intermediate Language Development and Global Employability (choice of Chinese, French or Spanish)
  • Post Beginner Language Development and Global Cultures (choice of German, Italian or Spanish)

The information listed in this section is an overview of the academic content of the course that will take the form of either core or option modules and should be used as a guide. We review the content of our courses regularly, making changes where necessary to improve your experience and graduate prospects. If during a review process, course content is significantly changed, we will contact you to notify you of these changes if you receive an offer from us.

In Year 3 (Level 6), you will be ready to choose which themes are most relevant to your future needs. You will tackle large-scale projects and develop your knowledge, skills and speciality in your chosen area from the wide range of optional modules.

The module covers a range of topics that include:

  • Malware analysis and investigation
  • Low-level concepts of Operating Systems
  • Understanding endpoints (smartphones, servers, PC/Mac/smartphones) and how they are configured
  • Data collection and mitigation of surveillance

The module involves developing understanding of Logging and Auditing, it also includes extraction and examination of the storage mediums, RAM, and networks using tools such as FTK Imager, Autopsy, and Volatility.  The module also involves malware analysis using various static and dynamic analysis tools.

This module introduces the foundational concepts of cryptography, focusing on securing data and communications. It also explores key exchange mechanisms and the role of digital certificates in ensuring trust in digital interactions. The module begins with a brief overview of security concepts before diving into cryptographic principles. The key focus areas are:

  • Security concepts
  • Cryptographic concepts
  • Key exchange principles
  • Digital certificates and signatures

The security concepts covers :

  • Confidentiality, Integrity, and Authentication: Foundations of secure communication.
  • Basic Threats: Overview of common security threats like eavesdropping, tampering, and impersonation.
  • Security Mechanisms: Brief introduction to encryption, firewalls, and access control.
  • Importance of Security: Ensuring trust, data protection, and system reliability.

The cryptographic concepts covers:

  • Encryption and Decryption: Transforming data into unreadable formats and restoring it.
  • Types of Cryptography: Symmetric (e.g., AES) and Asymmetric (e.g., RSA) methods.
  • Hash Functions: Verifying data integrity using algorithms like SHA-256.
  • Applications: Securing communication, file encryption, and data storage

The key exchange principles covers:

  • Secure Key Sharing: Exchanging cryptographic keys over insecure channels.
  • Diffie-Hellman: Method for establishing a shared secret using modular arithmetic.
  • Elliptic Curve Diffie-Hellman (ECDH): Efficient key exchange leveraging elliptic curves.
  • Challenges and Solutions: Overcoming risks like interception during key exchange.

The digital certificates and signatures covers :

  • Digital Certificates: Verifying the ownership of public keys via Certificate Authorities (CAs).
  • Public Key Infrastructure (PKI): Framework managing certificates and trust.
  • Digital Signatures: Ensuring message authenticity and integrity using private keys.
  • Applications: Securing web traffic (HTTPS), email authentication, and document verification.

The module covers a range of topics that include:

  • Basic cloud computing concepts, advantages, and service delivery models.
  • Identity and Access Management (IAM) for centrally managing access to cloud resources.
  • Secure networking practices within the cloud environments.
  • Design and implementation of highly available, and secure cloud architecture.
  • Design and implementation of cloud resources such as Virtual servers, Databases, and storage solutions.
  • Introduction to serverless architecture within the cloud environments.
  • Application Data protection, both in transit and at rest, with in the cloud environments.
  • Logging and Monitoring within the cloud.
  • Incident Response Management within the cloud environments.

Students will undertake a large self-directed software project in a specialist topic of their choice with guidance and support from a dedicated academic supervisor.

The project will begin with an appraisal of said topic, usually through a literature review and/or a commercial assessment of viability. This will be followed by planning and creation of a practical software artefact covering an implementation lifecycle, making use of project management techniques.

Ethical issues will be explored, leading to required approval for quantitative and/or qualitative testing, with results then analysed and used to inform futher development and to draw conclusions against a hypothesis.

This module is introduces the theory and practice of network protocol design, maintenance and evalutation. We will build from first principles towards a professional, research and development approach to the subject. This will include topics such as:

  • Routing
  • Traffic engineering
  • Distributed protocol design
  • Use of discrete event simulation tools
  • Evaluation and analysis of protocols
  • Mobile and wireless networking
  • Graph theory
  • Network optimisation
  • Computational complexity
  • Software defined networking
  • Information centric networking

The module combines relevant theoretical abstractions with essential practical networking approaches to build a strong profile of skills, abilities and knowledge for the successful student.

The module covers a range of topics that include: 

  • Open Source Intelligence (OSINT)
  • Social Media Intelligence (SOCMINT)
  • Human Intelligence (HUMINT)
  • Cyber crime
  • Cyber activism
  • Cyber espionage
  • Information Operations (INFO-OPS)
  • Incident Response

Students will learn how to use indicators of compromise to detect initial incidents.  YARA rules will be created to perform threat hunting.  Cyber Kill Chain and SANS incident response models will be used to map out the entire attack methodology used by threat actors. The module involves understanding critical infrastructure hacking.  Previous breach reports will be used to identify attackers' capabilities in order to identify potential threat actors.

The information listed in this section is an overview of the academic content of the course that will take the form of either core or option modules and should be used as a guide. We review the content of our courses regularly, making changes where necessary to improve your experience and graduate prospects. If during a review process, course content is significantly changed, we will contact you to notify you of these changes if you receive an offer from us.

How You'll Learn

This course is delivered in three terms of ten weeks each. In each term, students study 40 credits comprised of either one or two modules. Scheduled contact hours range between approximately 6 and 12 hours per week depending upon the level of study and the complexity of the material being taught.

If studied, the Foundation Year, as with the following years of study, will be taught in three 10-week blocks across an academic year. Each block will comprise of a large 40-credit subject-specific module that includes a breadth of topics and subject skills. You will have on average 12-14 hours of contact time per week during the Foundation Year. There may be variations to this where subject practical or specialist space teaching is included.

This course is delivered primarily through in-person learning supported by online learning materials. Students can expect to take part in labs, workshops, lectures and tutorials. Teaching will be delivered by experienced academics and practitioners in the subject. This will be supplemented by occasional guest lecturers and speakers. 

On this course, you should expect to spend an average of 30 – 34 hours per week on independent study which might include following asynchronous learning material on the University’s VLE, using the University’s library, working with peers, and preparing work for assessment. 

There will be a broad range of assessment methods so that students are exposed to the different types of tasks they might encounter in the workplace. These will include coursework in the form of programming projects, software artefacts, portfolios of work, written work (e.g. essays) and presentations. In some modules, students will encounter class tests and practical assessments. We continuously review the assessment methods used in order that they adequately prepare students for graduate-level employment. 

All teaching is delivered by experienced academics and practitioners, with the fundamental principles of the Chester Future Skills Curriculum at its core - building your subject competence, confidence, and key transferable skills to shape you into a world-ready Chester graduate.

Study a Common First Year

This course shares a common first year with students on the Cybersecurity with Artificial Intelligence BSc Hons course.

This means that you’ll learn alongside students studying a similar discipline, helping to broaden your knowledge and exposure to other concepts, perspectives and professions in the first year of your degree.

As you learn and collaborate with students from other courses, you'll not only widen your social and professional network but also learn new skills that will set you up for success in your industry.

In your second and third years, you will progress to studying more specialist modules within cybersecurity, developing your skills to become a World Ready graduate.

Entry Requirements

112UCAS Points

UCAS Tariff

112 points

GCE A Level

Typical offer – BCC-BBC

GCSE Maths grade C/grade 4 or above is also required

BTEC

BTEC Extended Diploma: DMM

International Baccalaureate

28 points

Irish / Scottish Highers

Irish Highers - H3 H3 H3 H3 H4

Scottish Highers - BBBB

Access requirements

Access to HE Diploma, to include 45 credits at level 3, of which 30 must be at Merit or above

T Level

Merit

OCR Cambridge Technicals

OCR Extended Diploma: DMM

Extra Information

Welsh Baccalaureate Advanced and A level General Studies will be recognised in our offer. We will also consider a combination of A Levels and BTECs/OCRs.

Students from countries outside the UK are expected to have entry qualifications roughly equivalent to UK A Level for undergraduate study and British Bachelor's degree (or equivalent) for postgraduate study. To help you to interpret these equivalents, please click on your country of residence to see the corresponding entry qualifications, along with information about your local representatives, events, information and contacts.

We accept a wide range of qualifications and consider all applications individually on merit. We may also consider appropriate work experience.

English Language Requirements

  • IELTS Academic: Undergraduate: 6.0 (minimum 5.5 in each band)
  • Postgraduate: 6.5 (minimum 5.5 in each band)

For more information on our entry requirements, please visit International Entry Requirements.

72UCAS Points

UCAS Tariff

72 points

GCE A level

72 points overall, including grade D in A level

GCSE Maths grade C/grade 4 or above is also required

BTEC

BTEC Extended Diploma: MMP

International Baccalaureate

24 points

Irish / Scottish Highers

Irish Highers: H4 H4 H4 H4 H4

Scottish Highers: CCDD

Access requirements

Access to HE Diploma – Pass overall

T Level

T Level: Pass (D or E on the core)

OCR Cambridge Technicals

OCR Extended Diploma: MMP

Extra Information

Welsh Baccalaureate Advanced and A level General Studies will be recognised in our offer.  We will also consider a combination of A Levels and BTECs/OCRs.

If you are a mature student (21 or over) and have been out of education for a while or do not have experience or qualifications at Level 3 (equivalent to A Levels), then our Foundation Year courses will help you to develop the skills and knowledge you will need to succeed in your chosen degree. 

Fees and Funding

£9,535per year for a full-time course (2025/26)

Our full-time undergraduate tuition fees for Home students entering University in 2025/26 are £9,535 a year, or £1,590 per 20-credit module for part-time study.

You can find more information about undergraduate fees on our Fees and Finance pages.

Students from the UK, Isle of Man, Guernsey, Jersey and the Republic of Ireland are treated as Home students for tuition fee purposes.

Students from countries in the European Economic Area and the EU will pay International Tuition Fees.

Students who have been granted Settled Status may be eligible for Home Fee Status and if eligible will be able to apply for Tuition Fee Loans and Maintenance Loans.

Students who have been granted Pre-settled Status may be eligible for Home Fee Status and if eligible will be able to apply for Tuition Fee Loans.

£14,450*per year for a full-time course (2025/26)

The tuition fees for international students studying Undergraduate programmes in 2025/26 are £14,450 per year for a full-time course. This fee is set for each year of study.

The University of Chester offers generous international and merit-based scholarships, providing a significant reduction to the published headline tuition fee. You will automatically be considered for these scholarships when your application is reviewed, and any award given will be stated on your offer letter.

For courses with a Foundation Year, the tuition fees for Year 1 are £10,750 and £14,200 for Years 2-4 in 2025/26.

For more information, go to our International Fees, Scholarship and Finance section.

Irish Nationals living in the UK or ROI are treated as Home students for Tuition Fee Purposes. 

Your course will involve additional costs not covered by your tuition fees. This may include books, printing, photocopying, educational stationery and related materials.

Students often elect to purchase a laptop, where students choose to do so, the cost is likely to be around £800-£1000.

Most software specific to your course is available free to students through agreements we have with the software vendors. 

Occasional, optional, field trips may be offered, depending on student demand, these are typically within the UK and where chargeable the cost is likely to be under £100. Students are not required to participate in order to successfully complete the course. 

If you are living away from home during your time at university, you will need to cover costs such as accommodation, food, travel and bills. 

Who You'll Learn From

Where You'll Study Exton Park, Chester

Your Future Career

Job Prospects

Cybersecurity graduates are in great demand across a variety of jobs, including in policing, in the government and government-run bodies, in industry from small companies to the very largest, in banking, and in the military and intelligence agencies. 

Careers service

The University has an award-winning Careers and Employability service which provides a variety of employability-enhancing experiences; through the curriculum, through employer contact, tailored group sessions, individual information, advice and guidance.

Careers and Employability aims to deliver a service which is inclusive, impartial, welcoming, informed and tailored to your personal goals and aspirations, to enable you to develop as an individual and contribute to the business and community in which you will live and work.

We are here to help you plan your future, make the most of your time at University and to enhance your employability. We provide access to part-time jobs, extra-curricular employability-enhancing workshops and offer practical one-to-one help with career planning, including help with CVs, applications and mock interviews. We also deliver group sessions on career planning within each course and we have a wide range of extensive information covering graduate jobs and postgraduate study.

Enquire about a course