Skip to main content
Undergraduate study
Computing

G402 BSc/COMP (G405 BSc/COMPFY for Year 0 entry)

 
 

Course overview

Computer technology touches many parts of our lives from the way we shop and the cars we drive to our interaction with governments. It drives innovation in the sciences, engineering, business, entertainment and education. This course includes an optional work placement year, at no extra cost.

A degree in computing can offer you excellent job prospects. Whether you like solving problems, are keen to develop and build new systems or want to work in digital media, we help you gain the skills to do it. Here we provide flexibility for you to build a degree based on three main themes: Information Technology, Computer Science and Web Production. You have a range of option modules to select from within each theme, so that you can tailor your learning to match your own specific requirements.

Free online maths course
Prepare for your studies with our free online Mathematics for University course. Develop your knowledge and understanding in maths so that you can start your studies in September confidently and better prepared. Places offered on a first-come, first-served basis. Find out more

CyberFirst Bursary
CyberFirst is a student scheme inspired and led by the National Cyber Security Centre (NCSC) which aims to support and prepare undergraduates for a career in cyber security. NCSC partners with other government departments and selected industry to offer students £4,000 per year and paid cyber skills training to help you kick start a career in cyber security.

You will need to have (or expect to have)
• 3 ‘A’ levels in any subject at Grade B or above (or equivalent)
• and have an offer (or be applying) to study an Undergraduate Degree or Integrated Masters in any subject at a UK University from September 2021.

Applications now open - find out more.

Alongside the optional work placement year, you can gain valuable experience and engagement with the sector through our shorter work placements, internships and work experience opportunities. Find out more

 

Course details

Some option choices are dependent on other module selections

Course structure

Year 0 (foundation year) core modules

Agile Development Project

This module gives you the opportunity to undertake a programming project. Working in small teams, you design, develop and demonstrate a software solution that relates to an agreed requirements specification.

Computational Thinking

Algorithms are considered to be at the heart of computing and are critical to developing computer-driven applications. Designing algorithms requires you to think like a machine, using computational thinking to construct procedures to implement as computer programmes.

This module introduces you to the fundamental building blocks of algorithms through classic puzzles and recreational games. You develop your knowledge of design principles and your proficiency in creating algorithmic procedures by cultivating your ability to think computationally in solving puzzles and creating routines for playing simple, computer-enabled games.

Information Systems Development

This module introduces you to the analysis, design and development of simple information systems. You learn the tools, techniques and methods associated with information systems development, such as gathering requirements, modelling requirements, designing data models and implementing a solution.

Introduction to Mathematics

This module introduces the relevant mathematical notations and techniques if you are preparing to study a technical computing degree at undergraduate level. The emphasis is on developing the skills that enable you to understand technical specifications of computing devices.

Topics include the number systems prevalent in computing, algebraic manipulation and equation solving, and the concept of functions – both algebraic and graphical formulations.

The module is delivered through lecture and tutorial sessions. Worked examples illustrate how each mathematical technique is applied. Problem-solving tutorial exercises give you the opportunity to practise each skill or technique.

Introduction to Programming

This module is ideal if you have little or no experience of programming – it uses tools that are easily available, easy to use and familiar to anyone who has used a computer.

You learn how programming language constructs are applied to different problems of increasing complexity. All programming solutions are executed in a web browser although the module is not specifically targeting web development.

 

Year 1 core modules (Information Technology)

Business Systems Development

Business intelligence combines the business world and the technical world using technologies, applications and practices for the study of business information, influencing business decision making.

You will combine the analysis of given data sets from business case studies and the subsequent visualisation of narratives identified within the data. You must present business information on a variety of platforms and devices so you will learn how to develop responsive websites using HTML5 and CSS for presentation.

Python Programming

You are introduced to the fundamental concepts of software development through the Python programming language.  

You look at key aspects of the software development process including designing solutions, writing application code, developing documentation and formal approaches to testing.

Rapid Application Development

You study the concept of rapid development applications. You gain experience of analysing, designing and building web-database applications using a tools-driven approach. A range of rapid development tools will be explored, such as Mendix, Microsoft LightSwitch, Zoho Creator, and one of these is taught in depth.

As part of your studies, you develop an application using the taught rapid development tool.

Systems Design and Databases

Successful, robust and user-friendly systems or applications begin with a requirements analysis and detailed design. You are introduced to the concepts and techniques of systems analysis and design, enabling you to break down and simplify complex systems and represent them visually using industry-standard approaches such as Unified Modelling Language (UML). In industry, the resulting models are used to communicate designs to developers and stakeholders prior to implementation.

You learn to design and implement fully normalised relational databases as part of an information system. Using data modelling techniques you define how the system stores data and interacts with it. You implement your design using Structured Query Language (SQL): Data Definition Language for creating tables, and Data Manipulation Language for accessing the data.

You develop professional practice and transferrable skills essential for industry, including project management."

 

and two optional modules (Information Technology)

Computational Problem Solving

You are introduced to the fundamental concepts that support computer science, including number bases, statistical methods, matrix algebra, and discrete mathematics.

You study topics in discrete mathematics which form the basis of the notation used in software specification. Statistical methods, including probability, are covered at an introductory level, preparing you for growing areas of computer science applications such as big data.

You are introduced to problem-solving using recreational problems, including games and puzzles, to convey algorithmic concepts.

Information Security and Cybercrime

You cover a range of issues relating to information and computer security, including systematic approaches to managing security risks, elementary cryptography, how computers are used in the execution of crime, and how such crimes are investigated.

Java Programming

You are introduced to the fundamental concepts of software development through Java programming language. You study key aspects of the software development process, including designing solutions, writing application code, developing documentation, and formal approaches to testing.

 

and two optional modules (Information Technology)

Algorithms and Data Structures

You develop intricate programmes to solve complex problems, using data structures and appropriate algorithms. You study a variety of algorithmic techniques and the use and importance of data structures. You are introduced to classifying data according to its abstract behaviour, as distinct from its representation.

A range of well-established data structures are examined and their properties are described. You gain an understanding of the basic skills needed in algorithmic design and the interaction between algorithm and data structure in creating efficient code.

Java Applications Development

You study the syntax of Java programming language and the Java API, as well as object-oriented concepts including inheritance, abstraction and polymorphism. The emphasis is on problem solving, design and documentation adopted in Java Programming.

You gain an understanding of professional practice, codes of conduct and copyright/licencing.

Network Architecture

Network Architecture provides a thorough understanding of the role of Computer Networks in modern society. Network design principles are introduced; current trends in network usage are explored, including the increased demand for bandwidth, the demand for mobile and wireless solutions and the bandwidth divide.

You cover all the essential skills necessary to design and implement networks in a LAN environment and gain hands-on experience using key network devices including cabling, switches and routers on a wired and wireless network. Network and computer security issues are explored, along with ethical and professional issues relevant to network design.

Network Scripting

Network Scripting provides you with the must-have skills of computing professionals: knowledge of multiple open source computing environments, open source implementation basics for both the Linux operating systems and its applications.

You develop and expand your knowledge of Unix-like operating systems, through remote administration of a Linux virtual server, and develop skills in Linux file system manipulation, networking and shell scripting as well as competence with the Linux environment.

Networks and Security

This module provides you with an understanding of the role of computer networks to fully appreciate and utilise within modern web-applications. Specific network design solutions are introduced and explored. You get hands on experience using key network devices for wired and wireless network.

Security threads, hazards and issues are explored along with security risk assessment and management. Relevant protocols and hardware technologies are introduced along with the role of legal requirements, social and ethical issues.

Secure Data Acquisition

The module will explore issues of data representation and data quality, information architectures and scale. The principles and techniques of information security and governance will be introduced.

 

Year 1 core modules (Computer Science)

Java Applications Development

You study the syntax of Java programming language and the Java API, as well as object-oriented concepts including inheritance, abstraction and polymorphism. The emphasis is on problem solving, design and documentation adopted in Java Programming.

You gain an understanding of professional practice, codes of conduct and copyright/licencing.

Java Programming

You are introduced to the fundamental concepts of software development through Java programming language. You study key aspects of the software development process, including designing solutions, writing application code, developing documentation, and formal approaches to testing.

Networks and Security

This module provides you with an understanding of the role of computer networks to fully appreciate and utilise within modern web-applications. Specific network design solutions are introduced and explored. You get hands on experience using key network devices for wired and wireless network.

Security threads, hazards and issues are explored along with security risk assessment and management. Relevant protocols and hardware technologies are introduced along with the role of legal requirements, social and ethical issues.

Systems Design and Databases

Successful, robust and user-friendly systems or applications begin with a requirements analysis and detailed design. You are introduced to the concepts and techniques of systems analysis and design, enabling you to break down and simplify complex systems and represent them visually using industry-standard approaches such as Unified Modelling Language (UML). In industry, the resulting models are used to communicate designs to developers and stakeholders prior to implementation.

You learn to design and implement fully normalised relational databases as part of an information system. Using data modelling techniques you define how the system stores data and interacts with it. You implement your design using Structured Query Language (SQL): Data Definition Language for creating tables, and Data Manipulation Language for accessing the data.

You develop professional practice and transferrable skills essential for industry, including project management."

 

and two optional modules (Computer Science)

Computational Problem Solving

You are introduced to the fundamental concepts that support computer science, including number bases, statistical methods, matrix algebra, and discrete mathematics.

You study topics in discrete mathematics which form the basis of the notation used in software specification. Statistical methods, including probability, are covered at an introductory level, preparing you for growing areas of computer science applications such as big data.

You are introduced to problem-solving using recreational problems, including games and puzzles, to convey algorithmic concepts.

Information Security and Cybercrime

You cover a range of issues relating to information and computer security, including systematic approaches to managing security risks, elementary cryptography, how computers are used in the execution of crime, and how such crimes are investigated.

Python Programming

You are introduced to the fundamental concepts of software development through the Python programming language.  

You look at key aspects of the software development process including designing solutions, writing application code, developing documentation and formal approaches to testing.

 

and two optional modules (Computer Science)

Algorithms and Data Structures

You develop intricate programmes to solve complex problems, using data structures and appropriate algorithms. You study a variety of algorithmic techniques and the use and importance of data structures. You are introduced to classifying data according to its abstract behaviour, as distinct from its representation.

A range of well-established data structures are examined and their properties are described. You gain an understanding of the basic skills needed in algorithmic design and the interaction between algorithm and data structure in creating efficient code.

Business Systems Development

Business intelligence combines the business world and the technical world using technologies, applications and practices for the study of business information, influencing business decision making.

You will combine the analysis of given data sets from business case studies and the subsequent visualisation of narratives identified within the data. You must present business information on a variety of platforms and devices so you will learn how to develop responsive websites using HTML5 and CSS for presentation.

Network Architecture

Network Architecture provides a thorough understanding of the role of Computer Networks in modern society. Network design principles are introduced; current trends in network usage are explored, including the increased demand for bandwidth, the demand for mobile and wireless solutions and the bandwidth divide.

You cover all the essential skills necessary to design and implement networks in a LAN environment and gain hands-on experience using key network devices including cabling, switches and routers on a wired and wireless network. Network and computer security issues are explored, along with ethical and professional issues relevant to network design.

Network Scripting

Network Scripting provides you with the must-have skills of computing professionals: knowledge of multiple open source computing environments, open source implementation basics for both the Linux operating systems and its applications.

You develop and expand your knowledge of Unix-like operating systems, through remote administration of a Linux virtual server, and develop skills in Linux file system manipulation, networking and shell scripting as well as competence with the Linux environment.

Rapid Application Development

You will learn rapid development applications. It will give you experience of analysing, designing and building web-database applications using a tools-driven approach.

Secure Data Acquisition

The module will explore issues of data representation and data quality, information architectures and scale. The principles and techniques of information security and governance will be introduced.

 

Year 2 core modules (Information Technology)

IS Developer

A practical module where you undertake the development of an IT based project usually in the form of an approved Web/Database System, taking into consideration appropriate legal issues and professional ethics. You will be placed in an active learning environment to enable development of group working, project process skills, and an identified product by a given deadline.

Working in small teams, you will take responsibility for determining project aims, objectives, roles, tasks, deliverables, schedules and documentation. The work will culminate with the teams providing a group report and a group presentation of the product or application to a panel of academics and/or industry experts. You will also be required to submit an individual report to reflect on the project process as a whole, review the ethical and legal issues considered, evaluate group members’ performance, your own strengths and weaknesses and relate those to their future career aspirations.

Rapid Development Systems

This module takes a tools-driven approach to advanced application development; creating rich user interfaces for secure information systems.

Application development tools to generate the code will be used, and you will be taught how to manipulate, enhance and customise the output from these tools to create a unique, bespoke and user-friendly interface with minimal coding. You will build one application throughout this module which will take the form of a fully scaffolded database with a web front-end. The utilisation of web services and plug-in application components to further enhance functionality and usability will be considered.

Relational and NoSQL Databases

You develop your ability to design and implement database applications to meet business needs. A case study is used to follow the system development life cycle, and you develop a server database application from inception to implementation for a real world scenario.

The module investigates the issues and technologies associated with implementing and supporting databases and the services that are needed to maintain and access a repository of data. Investigations are undertaken in a number of areas including data modelling, data management and approaches that support the modelling and visualisation of data for a range of use views.

 

and two optional modules (Information Technology)

Ethical Hacking

Ethical hackers are skilled in finding and exploiting technical vulnerabilities in networked devices whilst behaving in a professional and responsible manner. They act lawfully to assist organisations in identifying and resolving security weaknesses and vulnerabilities within their networks. In this module, you learn how to perform and document ethical hacks, and explore the key concepts of ethical hacking, including penetration testing, attack vectors and models and vulnerability analysis. You also explore industry standard hacking tools and learn how to use them in an ethical manner.

Network Infrastructures

Your knowledge of advanced networks will be further developed in this module. You will also develop an understanding of how switches are interconnected and configured to provide network access to LAN and WAN users, including the integration of wireless devices.

The module begins with design and configuration of a Virtual Local Area Network (VLAN) before consideration of various WAN technologies used to connect small- to medium-sized business networks. The final topic investigates how a virtual private network allows a computer to pass data across shared networks while still benefiting from the functionality of the private network.

Networks and Systems Administration

Key aspects of network and systems administration as applied to the IT scenario are introduced in this module, which includes a study of current network filing systems, user account issues including account setting up (bulk and individual), generating IDs and passwords, password policies account administration, suspending accounts, changing quotas and passwords and issues associated with wireless networks etc.

The importance of secure storage and backup of user data will be addressed, along with other maintenance issues, network management issues and network performance monitoring.
The significance of licences and legality (or otherwise) of user software will be investigated, as will policies on network and account security, viruses, and attack by hackers (DOS) and spammers. Finally, some of the ethical and moral concerns surrounding account privacy will be investigated.

Server Administration

You will be exposed to a range of network server administration concepts, principles and practices, which will enable you to understand the key principles of monitoring and managing server storage. This will include identifying the types of cloud solutions and the adoption measures needed for each, together with the technical challenges and the mitigation measures involved in cloud computing.

You will learn how to monitor and troubleshoot servers as well as developing your understanding of essential services such as file and print services; and network services and applications.

Further study will develop your ability to identify secure server configuration to meet business requirements, to critically analyse and compare different server solutions and identify the best solution for the business. You will also be able to identify how to operate ethically in order to implement and test a secure infrastructure to meet an appropriate business requirement.

Software Design Patterns

You study object oriented design and examine a number of design principles that lead to better quality code, and a set of design patterns that solve commonly occurring software problems. In the second half of the module, you are be introduced to concurrency, middleware and software architecture. This is a very practical module that encourages you to adopt agile software development methods.

Web Apps and Services

You design and construct web applications and web services, and understand the role that they play in the architecture of enterprise-style software systems. Web applications serve dynamic content or fully asynchronous single-page applications, bringing the web alive in comparison to traditional static sites. Web services use industry-standardised interfaces to make their capabilities reusable by third-parties, especially apps running on mobile devices. Together, these technologies are the cornerstone of the modern web.

This module explores the underlying technologies of how the web works, and investigates how to use professional tools to construct web apps and web services. You study the principles, patterns, libraries, frameworks and techniques used to engineer good-quality software components ready to participate in enterprise-style software system architectures. The module builds upon and extends previous programming experience and knowledge, and understanding of data modelling and persistence.

 

and two optional modules (Information Technology)

Information Security Management

This module develops a detailed understanding of information and network security concepts and principles as well as the tools and configurations available to defend your network technologies. You will identify and discuss secure infrastructure needs for business requirements, including cloud-based systems. Cryptographic techniques and systems are analysed and compared. The module will emphasise the professional, ethical and legal compliance considerations required of a computer security professional.

Open Source Business Solutions

you gain a theoretical and practical perspective of developing online business solutions using an open source system/platform such as Wordpress, OSCommerce, SuiteCRM and OsTicket. You are also introduced to using cloud-based solutions and self-hosting and manipulation of the back-end structure.

You gain an understanding of the wide range of uses of open source systems, benefit from engaging with the open source community and learn how to develop custom applications based on open source systems.

 

Year 2 core modules (Computer Science)

Agile Developer

Plan, design and build a mobile app for a smartphone or tablet device within a small software development team. The module explores the frameworks, libraries, patterns and industry-standard development tools used to build today’s mobile apps. It requires a professional approach, informed by current industry practice, to plan a successful software development project.

Assessment is via an in-course assignment requiring the team-based planning, design, development and presentation of a mobile app, followed by individual reflection upon personal actions, contribution and growth.

Software Design Patterns

You study object oriented design and examine a number of design principles that lead to better quality code, and a set of design patterns that solve commonly occurring software problems. In the second half of the module, you are be introduced to concurrency, middleware and software architecture. This is a very practical module that encourages you to adopt agile software development methods.

Web Apps and Services

You design and construct web applications and web services, and understand the role that they play in the architecture of enterprise-style software systems. Web applications serve dynamic content or fully asynchronous single-page applications, bringing the web alive in comparison to traditional static sites. Web services use industry-standardised interfaces to make their capabilities reusable by third-parties, especially apps running on mobile devices. Together, these technologies are the cornerstone of the modern web.

This module explores the underlying technologies of how the web works, and investigates how to use professional tools to construct web apps and web services. You study the principles, patterns, libraries, frameworks and techniques used to engineer good-quality software components ready to participate in enterprise-style software system architectures. The module builds upon and extends previous programming experience and knowledge, and understanding of data modelling and persistence.

 

and two optional modules (Computer Science)

Ethical Hacking

Ethical hackers are skilled in finding and exploiting technical vulnerabilities in networked devices whilst behaving in a professional and responsible manner. They act lawfully to assist organisations in identifying and resolving security weaknesses and vulnerabilities within their networks. In this module, you learn how to perform and document ethical hacks, and explore the key concepts of ethical hacking, including penetration testing, attack vectors and models and vulnerability analysis. You also explore industry standard hacking tools and learn how to use them in an ethical manner.

Network Infrastructures

Your knowledge of advanced networks will be further developed in this module. You will also develop an understanding of how switches are interconnected and configured to provide network access to LAN and WAN users, including the integration of wireless devices.

The module begins with design and configuration of a Virtual Local Area Network (VLAN) before consideration of various WAN technologies used to connect small- to medium-sized business networks. The final topic investigates how a virtual private network allows a computer to pass data across shared networks while still benefiting from the functionality of the private network.

Networks and Systems Administration

Key aspects of network and systems administration as applied to the IT scenario are introduced in this module, which includes a study of current network filing systems, user account issues including account setting up (bulk and individual), generating IDs and passwords, password policies account administration, suspending accounts, changing quotas and passwords and issues associated with wireless networks etc.

The importance of secure storage and backup of user data will be addressed, along with other maintenance issues, network management issues and network performance monitoring.
The significance of licences and legality (or otherwise) of user software will be investigated, as will policies on network and account security, viruses, and attack by hackers (DOS) and spammers. Finally, some of the ethical and moral concerns surrounding account privacy will be investigated.

Rapid Development Systems

This module takes a tools-driven approach to advanced application development; creating rich user interfaces for secure information systems.

Application development tools to generate the code will be used, and you will be taught how to manipulate, enhance and customise the output from these tools to create a unique, bespoke and user-friendly interface with minimal coding. You will build one application throughout this module which will take the form of a fully scaffolded database with a web front-end. The utilisation of web services and plug-in application components to further enhance functionality and usability will be considered.

Relational and NoSQL Databases

You develop your ability to design and implement database applications to meet business needs. A case study is used to follow the system development life cycle, and you develop a server database application from inception to implementation for a real world scenario.

The module investigates the issues and technologies associated with implementing and supporting databases and the services that are needed to maintain and access a repository of data. Investigations are undertaken in a number of areas including data modelling, data management and approaches that support the modelling and visualisation of data for a range of use views.

Server Administration

You will be exposed to a range of network server administration concepts, principles and practices, which will enable you to understand the key principles of monitoring and managing server storage. This will include identifying the types of cloud solutions and the adoption measures needed for each, together with the technical challenges and the mitigation measures involved in cloud computing.

You will learn how to monitor and troubleshoot servers as well as developing your understanding of essential services such as file and print services; and network services and applications.

Further study will develop your ability to identify secure server configuration to meet business requirements, to critically analyse and compare different server solutions and identify the best solution for the business. You will also be able to identify how to operate ethically in order to implement and test a secure infrastructure to meet an appropriate business requirement.

 

and two optional modules (Computer Science)

Functional Programming

We introduce you to functional programming and its underlying fundamental concepts. You use a functional programming language, such as Haskell, to solve real-world problems. The mathematical nature of functional programs allows you to apply mathematical reasoning to your programs, so as to prove that they are correct.

This module:

  • introduce you to functional programming and its underlying fundamental concepts
  • enables you to solve real-world problems using a functional programming language
  • enables you to apply mathematical reasoning to programs, so as to prove that a program is correct.

Lectures are supported by laboratory-based practicals. Lectures include on-line, interactive demonstrations. The IT laboratory sessions are used to implement and test solutions to given exercises. An electronic discussion forum is provided for you to discuss questions you may not have asked in class, and an electronic notice board is used to keep you informed about the module. You have weekly exercises to complete and group work is encouraged; you are expected to demonstrate your completed exercises during the laboratory classes. You are required to use your freelance time to complete your work or reinforce your understanding of a particular topic.

Information Security Management

This module develops a detailed understanding of information and network security concepts and principles as well as the tools and configurations available to defend your network technologies. You will identify and discuss secure infrastructure needs for business requirements, including cloud-based systems. Cryptographic techniques and systems are analysed and compared. The module will emphasise the professional, ethical and legal compliance considerations required of a computer security professional.

Open Source Business Solutions

you gain a theoretical and practical perspective of developing online business solutions using an open source system/platform such as Wordpress, OSCommerce, SuiteCRM and OsTicket. You are also introduced to using cloud-based solutions and self-hosting and manipulation of the back-end structure.

You gain an understanding of the wide range of uses of open source systems, benefit from engaging with the open source community and learn how to develop custom applications based on open source systems.

 

Final year core modules (Information Technology)

Client-focused Business Solutions

Technical consultancy is widely used within industry. Close collaboration between the client and the consultants allows the design and implementation of information technology projects to be made based on informed decisions.

You work in close collaboration with your client(s) by taking on the role of the IT consultant as part of a team. You have the opportunity to go through the full consultancy cycle and manage your client’s project from the start to completion using industry standard methodologies such as PRINCE2®.

Utilising and developing previously acquired technical skills and knowledge, you research industry-standard tools such as open source content management systems (CMS) that allow you to advise and influence your clients appropriately on the most suitable platform to use in their organisation. Client relationships are key as you are heavily involved in client-facing activities in order to collect data and present findings.

You widen your experience of working as part of a team and grow your understanding of the theories underpinning effective teamwork.

Computing Project

You complete a large scale piece of work, under the supervision of an academic staff member. You produce a substantial artefact relating to the computing field, and complete your report and viva consisting of a presentation, demonstration and discussion of the artefact.

You are guided to develop an appropriate sense of work-discipline coupled with a professional outlook. You take responsibility for the planning and execution of an extended piece of work including the consideration of associated legal, social, ethical and professional issues. You are able to explore in depth a chosen subject area, and thereby demonstrate your ability to analyse, synthesise, and creatively apply what has already been studied on the programme while demonstrating critical and evaluative skills and professional awareness.


Databases and Business Intelligence

You develop your ability to design and implement big data solutions to meet business needs by using a case study to follow the system development life cycle. You then develop a plausible big data solution from inception to implementation for a real world scenario.

You investigate the issues and technologies associated with implementing and supporting large scale databases and the services that are needed to maintain and access a repository of data. You undertake investigations in a number of areas including big data, data warehouses, integrating legacy data, data management and approaches that support the modelling and visualisation of data for a range of use views.

 

and two optional modules (Information Technology)

Applied Machine Learning

Machine learning is an important topic in the area of artificial intelligence. The methodology involves building a model of a given task based on observations to make predictions about unseen data. Such techniques are useful when the desired output is known - but an algorithm is unknown, or when a system needs to adapt to unforeseen circumstances. Machine learning draws significantly from statistics and probability theory as (though the applications are many and various) the fundamental task is to make inferences from data samples. The contribution from other areas of computer science is also essential for efficient task representation, learning algorithms, and inferences procedures. You also gain an exposure to a breadth of tasks and techniques in machine learning.

Cloud System DevOps

You explore how cloud computing enables companies to avoid the infrastructure and maintenance costs associated with buying and running their own dedicated hardware and software platforms. Software’s move to the cloud, and the need to utilise third-party infrastructure and platforms, creates new challenges and new opportunities for software developers. You explore the extent of cloud computing, cloud-capable software architectures, and study the professional DevOps practices used to develop and deploy complete software systems.

Data Analytics for Enterprise

Business intelligence tools are used to show the state of the business to facilitate better and faster business decision making. The next evolution is business analytics which is a technology-aided process which analyses the data to predict future performance.

You will develop skills in combining the analysis of a given data set from a business case study and the creation of dynamic, interactive visualisations that enable decision makers to explore the data through a variety of perspectives.

Using an interactive graphic gives the option to zoom in on sections of the data which are of interest, explore more than one dimension at a time, and sort and filter to discover new patterns and themes within the data.

Databases and Business Intelligence

You develop your ability to design and implement big data solutions to meet business needs by using a case study to follow the system development life cycle. You then develop a plausible big data solution from inception to implementation for a real world scenario.

You investigate the issues and technologies associated with implementing and supporting large scale databases and the services that are needed to maintain and access a repository of data. You undertake investigations in a number of areas including big data, data warehouses, integrating legacy data, data management and approaches that support the modelling and visualisation of data for a range of use views.

Enterprise Server Management

You explore the administration of network operating systems, the configuration of core network services and securing of network resources. You look at the management of local and remote users, groups and system resources; the installation, configuration and management of core network services; the investigation of current network management security issues and measures to mitigate against risk. You gain awareness of legal, ethical and professional issues around server management.

Security Analyst

Gain a detailed knowledge of the security techniques required for internet-connected systems and understand the mind-set of attackers and how they apply tools and techniques to compromise online systems. You review the latest tools and techniques for both attacking and defending computer systems and consider cybercrime, electronic social engineering and penetration testing to reflect what is happening in real world cybercrime and other online events.

 

and two optional modules (Information Technology)

Information Governance

You identify the goals of information governance, from protecting the needs of the stakeholder to ensuring the transparency of processes and how these link together to support data governance principles such as integrity, transparency, auditability, accountability, standardization and change management.
You study a range of governance topics including law, regulations, and compliance; security governance and risk management; security for cloud architectures and issues around 3rd party data storage.

Internet of Things

The Internet of Things (IoT) incorporates a number of technologies, including wireless sensor networks, embedded systems, pervasive computing, machine learning, context awareness and distributed systems. IoT has been successfully applied to environmental monitoring, smart homes, industrial controls and digital cities.
You cover a mixture of theoretical and practical topics such as coverage of the range of IoT-enabled devices, low power communications, and processing data gained from the IoT. You also gain experience of practical skills required for the programming of IoT devices.

Software Reliability

Society is increasingly dependent on complex software systems that pose difficult challenges in terms of reliability and security. Building software systems that are safe and reliable is a difficult and expensive task. You examine the methods and tools used to build reliable software systems and an in-depth study of key research in the area of formal methods for software engineering.

Specialist Networks

You investigate developing or emerging network technologies in areas such as automotive, sensor, industrial and robot – in light of this, module content will change and adapt in line with the latest advancements and developments in the computer networking field.

You follow a research based approach and undertake a significant amount of self-directed investigation and use a variety of appropriate network and internet resources to explore cutting edge research developments in specialist computer networks.

 

Final year core modules (Computer Science)

Cloud System DevOps

You explore how cloud computing enables companies to avoid the infrastructure and maintenance costs associated with buying and running their own dedicated hardware and software platforms. Software’s move to the cloud, and the need to utilise third-party infrastructure and platforms, creates new challenges and new opportunities for software developers. You explore the extent of cloud computing, cloud-capable software architectures, and study the professional DevOps practices used to develop and deploy complete software systems.

Computing Project

You complete a large scale piece of work, under the supervision of an academic staff member. You produce a substantial artefact relating to the computing field, and complete your report and viva consisting of a presentation, demonstration and discussion of the artefact.

You are guided to develop an appropriate sense of work-discipline coupled with a professional outlook. You take responsibility for the planning and execution of an extended piece of work including the consideration of associated legal, social, ethical and professional issues. You are able to explore in depth a chosen subject area, and thereby demonstrate your ability to analyse, synthesise, and creatively apply what has already been studied on the programme while demonstrating critical and evaluative skills and professional awareness.


Internet of Things

The Internet of Things (IoT) incorporates a number of technologies, including wireless sensor networks, embedded systems, pervasive computing, machine learning, context awareness and distributed systems. IoT has been successfully applied to environmental monitoring, smart homes, industrial controls and digital cities.
You cover a mixture of theoretical and practical topics such as coverage of the range of IoT-enabled devices, low power communications, and processing data gained from the IoT. You also gain experience of practical skills required for the programming of IoT devices.

 

and two optional modules (Computer Science)

Applied Machine Learning

Machine learning is an important topic in the area of artificial intelligence. The methodology involves building a model of a given task based on observations to make predictions about unseen data. Such techniques are useful when the desired output is known - but an algorithm is unknown, or when a system needs to adapt to unforeseen circumstances. Machine learning draws significantly from statistics and probability theory as (though the applications are many and various) the fundamental task is to make inferences from data samples. The contribution from other areas of computer science is also essential for efficient task representation, learning algorithms, and inferences procedures. You also gain an exposure to a breadth of tasks and techniques in machine learning.

Data Analytics for Enterprise

Business intelligence tools are used to show the state of the business to facilitate better and faster business decision making. The next evolution is business analytics which is a technology-aided process which analyses the data to predict future performance.

You will develop skills in combining the analysis of a given data set from a business case study and the creation of dynamic, interactive visualisations that enable decision makers to explore the data through a variety of perspectives.

Using an interactive graphic gives the option to zoom in on sections of the data which are of interest, explore more than one dimension at a time, and sort and filter to discover new patterns and themes within the data.

Databases and Business Intelligence

You develop your ability to design and implement big data solutions to meet business needs by using a case study to follow the system development life cycle. You then develop a plausible big data solution from inception to implementation for a real world scenario.

You investigate the issues and technologies associated with implementing and supporting large scale databases and the services that are needed to maintain and access a repository of data. You undertake investigations in a number of areas including big data, data warehouses, integrating legacy data, data management and approaches that support the modelling and visualisation of data for a range of use views.

Enterprise Server Management

You explore the administration of network operating systems, the configuration of core network services and securing of network resources. You look at the management of local and remote users, groups and system resources; the installation, configuration and management of core network services; the investigation of current network management security issues and measures to mitigate against risk. You gain awareness of legal, ethical and professional issues around server management.

Security Analyst

Gain a detailed knowledge of the security techniques required for internet-connected systems and understand the mind-set of attackers and how they apply tools and techniques to compromise online systems. You review the latest tools and techniques for both attacking and defending computer systems and consider cybercrime, electronic social engineering and penetration testing to reflect what is happening in real world cybercrime and other online events.

 

and two optional modules (Computer Science)

Client-focused Business Solutions

Technical consultancy is widely used within industry. Close collaboration between the client and the consultants allows the design and implementation of information technology projects to be made based on informed decisions.

You work in close collaboration with your client(s) by taking on the role of the IT consultant as part of a team. You have the opportunity to go through the full consultancy cycle and manage your client’s project from the start to completion using industry standard methodologies such as PRINCE2®.

Utilising and developing previously acquired technical skills and knowledge, you research industry-standard tools such as open source content management systems (CMS) that allow you to advise and influence your clients appropriately on the most suitable platform to use in their organisation. Client relationships are key as you are heavily involved in client-facing activities in order to collect data and present findings.

You widen your experience of working as part of a team and grow your understanding of the theories underpinning effective teamwork.

Information Governance

You identify the goals of information governance, from protecting the needs of the stakeholder to ensuring the transparency of processes and how these link together to support data governance principles such as integrity, transparency, auditability, accountability, standardization and change management.
You study a range of governance topics including law, regulations, and compliance; security governance and risk management; security for cloud architectures and issues around 3rd party data storage.

Software Reliability

Society is increasingly dependent on complex software systems that pose difficult challenges in terms of reliability and security. Building software systems that are safe and reliable is a difficult and expensive task. You examine the methods and tools used to build reliable software systems and an in-depth study of key research in the area of formal methods for software engineering.

Specialist Networks

You investigate developing or emerging network technologies in areas such as automotive, sensor, industrial and robot – in light of this, module content will change and adapt in line with the latest advancements and developments in the computer networking field.

You follow a research based approach and undertake a significant amount of self-directed investigation and use a variety of appropriate network and internet resources to explore cutting edge research developments in specialist computer networks.

 

Modules offered may vary.

 

How you learn

You attend a combination of lectures and practical sessions for each module. Lectures concentrate on teaching the principles while practical sessions allow you to put these principles into practice in purpose built labs. Throughout your practical sessions you receive feedback on your work and progress. You often work on a piece of work for several weeks building a deeper under-standing of the subject as you work. The feedback you receive will help you to get the most out of your learning.

In your final year you also undertake a personal project which integrates much of the work you have studied in previous years.

There are lots of opportunities for you to engage with the computing and IT industry through our connections at Cubic Transpor-tation Systems, Sage, Atombank, NHS, TUI, Traceroc and Waterstons.

How you are assessed

A variety of assessment methods are used. Your assessments are designed to build on the work you undertake in class, because your learning continues through the assessment period. An in-course assessment often consists of a practical exercise and an associated report helping you to develop both technical and business skills.


Our Disability Services team provide an inclusive and empowering learning environment and have specialist staff to support disabled students access any additional tailored resources needed. If you have a specific learning difficulty, mental health condition, autism, sensory impairment, chronic health condition or any other disability please contact a Disability Services as early as possible.
Find out more about our disability services

Find out more about financial support
Find out more about our course related costs

 
 

Entry requirements

Entry requirements

Typical offer
• Year 0 entry (UCAS code G405 BSc/COMPFY): flexible, each application is considered on a case-by-case basis
• Year 1 entry (UCAS code G402 BSc/COMP): 96-112 points

Find out how many points your qualifications are worth using the UCAS tariff calculator. If your qualifications are not listed, contact our admissions team as we may accept alternatives.

We may also be able to help you meet the entry requirements through our Summer University modules.

Maths and English
Acceptable qualifications in maths and English include:
• GCSE grade 4 (or higher)
• Level 2 Key Skills (Communication and Application of Number)
• Level 2 Functional Skills.

We also accept alternative equivalent or higher level qualifications.

For additional information please see our entry requirements

International applicants can find out what qualifications they need by visiting Your Country


You can gain considerable knowledge from work, volunteering and life. Under recognition of prior learning (RPL) you may be awarded credit for this which can be credited towards the course you want to study.
Find out more about RPL

 

Employability

Work placement

During your degree we advertise a variety of paid placement opportunities (subject to availability). You can apply for a year-long supervised work placement between your second and final year. A placement gives you a valuable opportunity to improve your employment prospects by developing new skills and deepening your understanding of your subject.

Student selection is carried out by the employers through competitive interviews and often skills tests. Placements are not compulsory but are assessed and contribute to your final degree award.

Our placements team gives you help and support throughout the placement process, including guidance on applications and interviews, to help you get a placement that suits you.

Our students have been placed in organisations such as Dupont, Accenture, General Electric, Nissan, HMRC, Nicander, Red Embedded, Microsoft, IBM, Intel, Thomson Reuters, Glaxo Smith Kline, GCHQ.

Career opportunities

The flexibility of the course in allowing you to build your own pathway means that a wide range of careers is potentially available. The career path you take will be influenced by the choices made during your studies.

By choosing appropriate modules and selecting your final-year project carefully, you could open career paths as disparate as web designer, programmer, systems analyst, games programmer, multimedia developer and network support.

 

Information for international applicants

Qualifications

International applicants - find out what qualifications you need by selecting your country below.

Select your country:

  
 

Useful information

Visit our international pages for useful information for non-UK students and applicants.

Talk to us

Talk to an international student enrolment adviser

 
 

Full-time

Entry to 2020/21 academic year

Fee for UK/EU applicants
£9,250 a year

More details about our fees

Fee for international applicants
£13,000 a year

More details about our fees for international applicants


What is included in your tuition fee?

  • Length: 3 years (or 4 with a work placement) or 4 years including foundation year (or 5 with a work placement)
  • UCAS code: G402 BSc/COMP
    G405 BSc/COMPFY for Year 0 entry
  • Enrolment date: September
  • Semester dates
  • Typical offer: 96-112 points

Apply online (full-time) through UCAS

 

Part-time

2020/21 entry

Fee for UK/EU applicants
£4,500 (120 credits)

More details about our fees

  • Length: Up to 6 years
  • Attendance: Daytime
  • Enrolment date: September
  • Semester dates

Apply online (part-time)

 
 
 
 

Facilities

ExpoTalent is a unique opportunity to meet businesses to secure placements, internships and future employment opportunities.

 

Choose Teesside

iPad

Are you eligible for an iPad, keyboard and up to £300 credit for learning resources?

 

Accommodation

Live in affordable accommodation right on-campus

 

Campus

Study in our town-centre campus with over £270m of recent investment

 

Industry ready

Benefit from work placements, live projects, accredited courses

 

Get in touch

 
 

Foundation year

Part-time

Part-time DiscoverUni data