Undergraduate study
Cybersecurity and Networks

BSc (Hons) Cybersecurity and Networks

UCAS code: I121 BSc/CSN

UCAS code: I122 BSc/CSNFY for Year 0 entry
Network technologies are constantly evolving and underpin almost everything we do. This degree provides a hands-on approach and strong emphasis on network infrastructure, particularly how you can create and manage secure networks.

Course information

Full-time

  • Length: 3 years (or 4 years including a work placement) or 4 years including foundation year (or 5 years including a work placement)

More full-time details

Part-time

  • Not available part-time

Contact details

Further information

 

Note: this course is for Year 0 and Year 1 entry only in 2017. For direct entry to Year 2 or final year, contact SCM-Enquiries@tees.ac.uk.

You study a curriculum that meets the growing needs of industry and this course has been developed with input from leading international providers and local businesses. You can be part of the next generation of network and security graduates to support and enhance the world economy – whether that be through social developments, medical systems, education, financial institutions or heavy industry.

You explore a range of different network platforms and learn about their applications: how different network architectures are used in industry; network convergence; how to deliver excellent server administration and enterprise server management; investigation of mobile services; implementing network virtualisation and virtual network security and understanding the needs of specialist networks such as automotive, robotic and sensor networks.

There may also be the opportunity to achieve Cisco certification during the first two years of your course.

The computer security element of this course starts with an investigation into data collection and the inherent security, ethical, legal, social and professional issues. You also study information security management principles including security for cloud-based systems, before studying advanced security techniques in your final year.

Course structure

Year 0 (foundation year) core modules

Agile Development Project

This module gives you the opportunity to undertake a programming project. Working in small teams, you design, develop and demonstrate a software solution that relates to an agreed requirements specification.

Computational Thinking

Algorithms are considered to be at the heart of computing and are critical to developing computer-driven applications. Designing algorithms requires you to think like a machine, using computational thinking to construct procedures to implement as computer programmes.

This module introduces you to the fundamental building blocks of algorithms through classic puzzles and recreational games. You develop your knowledge of design principles and your proficiency in creating algorithmic procedures by cultivating your ability to think computationally in solving puzzles and creating routines for playing simple, computer-enabled games.

Information Systems Development

This module introduces you to the analysis, design and development of simple information systems. You learn the tools, techniques and methods associated with information systems development, such as gathering requirements, modelling requirements, designing data models and implementing a solution.

Introduction to Mathematics

This module introduces the relevant mathematical notations and techniques if you are preparing to study a technical computing degree at undergraduate level. The emphasis is on developing the skills that enable you to understand technical specifications of computing devices.

Topics include the number systems prevalent in computing, algebraic manipulation and equation solving, and the concept of functions – both algebraic and graphical formulations.

The module is delivered through lecture and tutorial sessions. Worked examples illustrate how each mathematical technique is applied. Problem-solving tutorial exercises give you the opportunity to practise each skill or technique.

Introduction to Programming

This module is ideal if you have little or no experience of programming – it uses tools that are easily available, easy to use and familiar to anyone who has used a computer.

You learn how programming language constructs are applied to different problems of increasing complexity. All programming solutions are executed in a web browser although the module is not specifically targeting web development.

 

Year 1 core modules

Data Acquisition and Security

You are introduced to the diverse world of data available to organisations, and to the tools and techniques used to acquire, filter and process that data legally and ethically.
You explore issues of data representation and data quality, information architectures and scale. The principles and techniques of information security and governance are introduced.

Information Security and Cybercrime

You cover a range of issues relating to information and computer security, including systematic approaches to managing security risks, elementary cryptography, how computers are used in the execution of crime, and how such crimes are investigated.

Network Architecture

Network Architecture provides a thorough understanding of the role of Computer Networks in modern society. Network design principles are introduced; current trends in network usage are explored, including the increased demand for bandwidth, the demand for mobile and wireless solutions and the bandwidth divide.

You cover all the essential skills necessary to design and implement networks in a LAN environment and gain hands-on experience using key network devices including cabling, switches and routers on a wired and wireless network. Network and computer security issues are explored, along with ethical and professional issues relevant to network design.

Network Scripting

Network Scripting provides you with the must-have skills of computing professionals: knowledge of multiple open source computing environments, open source implementation basics for both the Linux operating systems and its applications.

You develop and expand your knowledge of Unix-like operating systems, through remote administration of a Linux virtual server, and develop skills in Linux file system manipulation, networking and shell scripting as well as competence with the Linux environment.

Systems Design and Databases

Successful, robust and user-friendly systems or applications begin with a requirements analysis and detailed design. You are introduced to the concepts and techniques of systems analysis and design, enabling you to break down and simplify complex systems and represent them visually using industry-standard approaches such as Unified Modelling Language (UML). In industry, the resulting models are used to communicate designs to developers and stakeholders prior to implementation.

You learn to design and implement fully normalised relational databases as part of an information system. Using data modelling techniques you define how the system stores data and interacts with it. You implement your design using Structured Query Language (SQL): Data Definition Language for creating tables, and Data Manipulation Language for accessing the data.

You develop professional practice and transferrable skills essential for industry, including project management."

 

Year 2 core modules

CIS Cyber

You will work within a small team to plan, design and build a secure network within a small team. Each team will be required to design, implement and document a secure network, including installation of physical servers running a variety of operating systems.

You will be guided on how to incorporate security from the design stage onward and introduced to techniques on how to assess the security of existing networks. The module requires a professional approach, informed by current industry practice, to plan a successful development project.

Information Security Management

This module develops a detailed understanding of information and network security concepts and principles as well as the tools and configurations available to defend your network technologies. You will identify and discuss secure infrastructure needs for business requirements, including cloud-based systems. Cryptographic techniques and systems are analysed and compared. The module will emphasise the professional, ethical and legal compliance considerations required of a computer security professional.

Mobile Services

This module introduces you to designing networks that can effectively support mobile services. This is one of the fastest growing areas in technology, whether it is Bring Your Own Device, smartphones, tablets, or public cloud data stores.

It examines the technical and design requirements for mobile services, including how to specify the connectivity needs and how to design for best practise to support redundancy, security, and scalability.

You will be introduced to network convergence – identifying the pros and cons of how the use of multiple communication modes in a single network can offer convenience and flexibility that is not possible with separate infrastructures, and what the negative impact of this may be. You will also become familiar with the next generation of mobile services (currently 5G) that is being developed, which will be able to deliver data up to 50Gbit/s, and the impact this has on network infrastructure.

Network Infrastructures

Your knowledge of advanced networks will be further developed in this module. You will also develop an understanding of how switches are interconnected and configured to provide network access to LAN and WAN users, including the integration of wireless devices.

The module begins with design and configuration of a Virtual Local Area Network (VLAN) before consideration of various WAN technologies used to connect small- to medium-sized business networks. The final topic investigates how a virtual private network allows a computer to pass data across shared networks while still benefiting from the functionality of the private network.

Server Administration

You will be exposed to a range of network server administration concepts, principles and practices, which will enable you to understand the key principles of monitoring and managing server storage. This will include identifying the types of cloud solutions and the adoption measures needed for each, together with the technical challenges and the mitigation measures involved in cloud computing.

You will learn how to monitor and troubleshoot servers as well as developing your understanding of essential services such as file and print services; and network services and applications.

Further study will develop your ability to identify secure server configuration to meet business requirements, to critically analyse and compare different server solutions and identify the best solution for the business. You will also be able to identify how to operate ethically in order to implement and test a secure infrastructure to meet an appropriate business requirement.

 

Final-year core modules

Advanced Security Techniques

You gain a detailed underpinning knowledge of security techniques required for internet connected systems, this means you must understand the mind-set of attackers and how they apply the tools and techniques to compromise online systems.

You review the latest tools and techniques for both attacking and defending computer systems, and gain knowledge of cybercrime, electronic social engineering and penetration testing to understand what is happening in real world cybercrime and other online events.

Computing Project

You complete a large scale piece of work, under the supervision of an academic staff member. You produce a substantial artefact relating to the computing field, and complete your report and viva consisting of a presentation, demonstration and discussion of the artefact.

You are guided to develop an appropriate sense of work-discipline coupled with a professional outlook. You take responsibility for the planning and execution of an extended piece of work including the consideration of associated legal, social, ethical and professional issues. You are able to explore in depth a chosen subject area, and thereby demonstrate your ability to analyse, synthesise, and creatively apply what has already been studied on the programme while demonstrating critical and evaluative skills and professional awareness.


Enterprise Server Management

You explore the administration of network operating systems, the configuration of core network services and securing of network resources. You look at the management of local and remote users, groups and system resources; the installation, configuration and management of core network services; the investigation of current network management security issues and measures to mitigate against risk. You gain awareness of legal, ethical and professional issues around server management.

Information Governance

You identify the goals of information governance, from protecting the needs of the stakeholder to ensuring the transparency of processes and how these link together to support data governance principles such as integrity, transparency, auditability, accountability, standardization and change management.
You study a range of governance topics including law, regulations, and compliance; security governance and risk management; security for cloud architectures and issues around 3rd party data storage.

Specialist Networks

You investigate developing or emerging network technologies in areas such as automotive, sensor, industrial and robot – in light of this, module content will change and adapt in line with the latest advancements and developments in the computer networking field.

You follow a research based approach and undertake a significant amount of self-directed investigation and use a variety of appropriate network and internet resources to explore cutting edge research developments in specialist computer networks.

 

Modules offered may vary.

How you learn

You attend a combination of lectures and practical sessions for each module. Lectures concentrate on teaching the principles while practical sessions allow you to put these principles into practice in purpose built labs. Throughout your practical sessions you receive feedback on your work and progress. You often work on a piece of work for several weeks building a deeper understanding of the subject as you work. The feedback you receive will help you to get the most out of your learning.

In your final year you also undertake a personal project which integrates much of the work you have studied in previous years.

How you are assessed

A variety of assessment methods are used. Your assessments are designed to build on the work you undertake in class, because your learning continues through the assessment period. An in-course assessment often consists of a practical exercise and an associated report helping you to develop both technical and business skills.


Our Disability Services team helps students with additional needs resulting from disabilities such as sensory impairment or learning difficulties such as dyslexia
Find out more about our disability services

Find out more about financial support
Find out more about our course related costs

Career opportunities

Our computing students go into a wide range of careers, both nationally and globally. Graduates have gone on to work in a range of industries including the power industry, avionics and the pharmaceutical industry.

Professional placement
During your degree we advertise a variety of paid placement opportunities (subject to availability). You can apply for a year-long supervised work placement between your second and final year. A placement gives you a valuable opportunity to improve your employment prospects by developing new skills and deepening your understanding of your subject.

Student selection is carried out by the employers through competitive interviews and often skills tests. Placements are not compulsory but are assessed and contribute to your final degree award.

Our placements team gives you help and support throughout the placement process, including guidance on applications and interviews, to help you get a placement that suits you.

Our students have been placed in organisations such as IBM, Microsoft, SABIC Petrochemicals and Thomson Reuters.

Entry requirements

A typical offer is 96-112 tariff points from at least two A levels (or equivalent), or 64-80 for entry to Year 0 (Foundation Year). You're required to attend an interview.

If you’re applying for entry to Year 0 (Foundation Year) please use UCAS code I122 BSc/CSNFY.

For additional information please see the entry requirements in our admissions section

International applicants can find out what qualifications they need by visiting Your Country


You can gain considerable knowledge from work, volunteering and life. Under recognition of prior learning (RPL) you may be awarded credit for this which can be credited towards the course you want to study.
Find out more about RPL

Foundation year

What is KIS?

How to understand the Key Information Set

Course information

Full-time

  • Length: 3 years (or 4 years including a work placement) or 4 years including foundation year (or 5 years including a work placement)

More full-time details

Part-time

  • Not available part-time

Contact details

Further information