Course overview
You develop the skillset to assess threats and manage cyber security technologies, and explore the legal, social and political impact of cyber threats.
Designed with Future Facing Learning in mind, you learn the fundamentals of software for digital innovation, big data and business intelligence, and agile development. You also explore professional, ethical, security and social implications of cyber security and acquire a range of practical, professional and transferable skills.
Your opportunities don’t end there. As a student part of TU Online, you can gain Microsoft and Adobe certifications alongside your studies.
Combining the PGDip qualification alongside our optional free certifications, provides a solid foundation for success. When combining this with the flexibility of online learning across multiple study routes, this course covers all bases for those looking to take the next step in their academic and professional careers.
Course details
Course structure
Core modules
Cyber Risk and Vulnerability Management
You explore cyber security risk assessment and guidance models, practices, tools and techniques to address threats or vulnerabilities. You also look at how to identify common threats and vulnerabilities using appropriate tools and techniques.
Cyber Security and Network Foundations
Study the foundations of computer networks and cyber security. You explore network design principles, trends in network usage, the demand for mobile solutions, the bandwidth divide and ethical issues in network design.
You explore what is increasingly recognised as one of the most important areas and greatest threats of cybersecurity - the human being. Criminals are increasingly targeting people as an easy way to access a computer system, this is summed up in a famous quote by a well-known writer on cybersecurity, Bruce Schneier ‘Only amateurs attack machines; professionals target people’.
You explore what these types of cybersecurity threats are and what steps individuals and organisations can take to mitigate against them.
You explore the key legal issues to consider if you are anticipating a career in the IT industry. Key topics include introduction to the English legal system, intellectual property rights, computer crime, computer contracts and liability, privacy and data protection. You apply the legal principles studied to realistic scenarios and case studies from the real-world.
Mobile Systems and Cyber Security
You gain a thorough understanding of the concepts and technologies used in modern mobile devices such as phones, tablets and laptops. You learn about the hardware used by mobile devices and the networking technologies that allow them to communicate with each other and the outside world. You also explore data compression techniques and security. You attend a series of lectures, tutorials and seminars.
You cover theoretical concepts including cryptography and cyber security models alongside the practical issues of cyber attacks and countermeasures. You study topics in access control, symmetric and public key cryptography protocols, digital signatures, authentication protocols, wireless network and security, firewall, network security attacks, penetration testing, intrusion detection and access control lists.
Modules offered may vary.
How you learn
Using our online learning environment, you are supported by tutors who have worked in the field, and work collaboratively with other students to develop your technical skills and knowledge.
How you are assessed
Your subject specific knowledge, cognitive and intellectual skills, and transferable skills are assessed through assignments, tests and case studies.
Entry requirements
A UK bachelor’s degree (2.2 minimum) or equivalent overseas qualification.
International students require IELTS 6.0 or equivalent.
For general information please see our overview of entry requirements
Employability
Career opportunities
When you complete the course, you have the option of completing a Computing Master's Project to top-up to a full 180 credit MSc qualification. You have the option of completing your project on a real-world scenario within your current professional role.
Early career roles include Cyber Security Analyst/Consultant, Information Securities Officer, Incident Response Analyst and Vulnerability Analyst.
Career roles for those with previous experience include Security Architect, Cloud Security Engineer, Governance, Risk & Compliance (GRC) Specialist and Identity and Access Management (IAM) Analyst.
Learning platform
Our virtual learning environment (VLE) is the platform you use to access your online course
Teesside University online learning courses are delivered through the Brightspace Learning Environment.
Here are some of the benefits.
- You can use it on your smartphone, tablet and computer.
- And you can use it anytime, so that you can plan your learning to fit your own schedule.
- It's easy to use and navigate.
- Modules are set out by topics and themes. You can use the progress bar to understand where you are in your modules, and appreciate your achievements.
- We support you to become familiar with your VLE, helping you to start learning quickly.
- You get feedback, help and guidance from tutors throughout your course through the VLE, and you can ask questions at any time.
- Our tutors use a live activity feed to keep you updated about your course.
- You can create a student profile, collaborate with other students and take part in online discussion forums.
