Skip to main content
Undergraduate study
Computing & Cyber Security

Cyber Security Management (with Foundation Year)* BSc (Hons)

Cyber security management is a growing sector responsible for the protection of computer systems and sensitive information from cyber criminals or unwanted access, as well as ensuring appropriate laws and regulations are followed. The course has been developed with input from leading international providers and local businesses.



Course routes:


Course overview

Work placement

As a cyber security graduate you are well placed to support and enhance the world economy, through social developments, medical systems, education, financial institutions or heavy industry. You study how to safeguard digital information, monitor for security vulnerabilities, anticipate new security threats and business continuity management planning.

The cyber security element of this course starts with an investigation into data collection and the inherent security, ethical, legal, social and professional issues. You also study information security management principles and ethical hacking before studying strategic security management in your final year.

This course includes a foundation year - ideal if you need additional preparation or if you don't have sufficient grades to join Year 1 of a degree.

Top reasons to study this course at Teesside:

  • British Computer Society (BCS) academic membership: get free BCS membership to accelerate your career path with CV builder tools, e-learning courses, mentorship programmes, jobs boards and volunteering opportunities.
  • Industry links: work on live industry briefs, competitions and hackathons with companies including Cisco, Cubic Transportation Systems, Sage, TUI, Atombank, HMRC and Waterstons.
  • State-of-the-art facilities: learn in industry-standard computing labs with specialist equipment used to undertake development projects and build innovative prototypes.
  • Career-ready: our ExpoSeries of events allow you to showcase your skills to industry professionals who are seeking to recruit new and rising talent.

Download pdf Order prospectus

* Subject to University approval


Course details

Course structure

Foundation year core modules

Agile Development Project

This module gives you the opportunity to undertake a programming project. Working in small teams, you design, develop and demonstrate a software solution that relates to an agreed requirements specification.

Computational Thinking

Algorithms are considered to be at the heart of computing and are critical to developing computer-driven applications. Designing algorithms requires you to think like a machine, using computational thinking to construct procedures to implement as computer programmes.

This module introduces you to the fundamental building blocks of algorithms through classic puzzles and recreational games. You develop your knowledge of design principles and your proficiency in creating algorithmic procedures by cultivating your ability to think computationally in solving puzzles and creating routines for playing simple, computer-enabled games.

Information Systems Development

This module introduces you to the analysis, design and development of simple information systems. You learn the tools, techniques and methods associated with information systems development, such as gathering requirements, modelling requirements, designing data models and implementing a solution.

Introduction to Mathematics

This module introduces the relevant mathematical notations and techniques if you are preparing to study a technical computing degree at undergraduate level. The emphasis is on developing the skills that enable you to understand technical specifications of computing devices.

Topics include the number systems prevalent in computing, algebraic manipulation and equation solving, and the concept of functions – both algebraic and graphical formulations.

The module is delivered through lecture and tutorial sessions. Worked examples illustrate how each mathematical technique is applied. Problem-solving tutorial exercises give you the opportunity to practise each skill or technique.

Introduction to Programming

This module is ideal if you have little or no experience of programming – it uses tools that are easily available, easy to use and familiar to anyone who has used a computer.

You learn how programming language constructs are applied to different problems of increasing complexity. All programming solutions are executed in a web browser although the module is not specifically targeting web development.


Year 1 core modules

Information Security and Cybercrime

You cover a range of issues relating to information and computer security, including systematic approaches to managing security risks, elementary cryptography, how computers are used in the execution of crime, and how such crimes are investigated.

Network Architecture

Network Architecture provides a thorough understanding of the role of Computer Networks in modern society. Network design principles are introduced; current trends in network usage are explored, including the increased demand for bandwidth, the demand for mobile and wireless solutions and the bandwidth divide.

You cover all the essential skills necessary to design and implement networks in a LAN environment and gain hands-on experience using key network devices including cabling, switches and routers on a wired and wireless network. Network and computer security issues are explored, along with ethical and professional issues relevant to network design.

Network Scripting

Network Scripting provides you with the must-have skills of computing professionals: knowledge of multiple open source computing environments, open source implementation basics for both the Linux operating systems and its applications.

You develop and expand your knowledge of Unix-like operating systems, through remote administration of a Linux virtual server, and develop skills in Linux file system manipulation, networking and shell scripting as well as competence with the Linux environment.

Python Programming

You are introduced to the fundamental concepts of software development through the Python programming language.  

You look at key aspects of the software development process including designing solutions, writing application code, developing documentation and formal approaches to testing.

Secure Data Acquisition

The module will explore issues of data representation and data quality, information architectures and scale. The principles and techniques of information security and governance will be introduced.

Systems Design and Databases

Successful, robust and user-friendly systems or applications begin with a requirements analysis and detailed design. You are introduced to the concepts and techniques of systems analysis and design, enabling you to break down and simplify complex systems and represent them visually using industry-standard approaches such as Unified Modelling Language (UML). In industry, the resulting models are used to communicate designs to developers and stakeholders prior to implementation.

You learn to design and implement fully normalised relational databases as part of an information system. Using data modelling techniques you define how the system stores data and interacts with it. You implement your design using Structured Query Language (SQL): Data Definition Language for creating tables, and Data Manipulation Language for accessing the data.

You develop professional practice and transferrable skills essential for industry, including project management."


Year 2 core modules

CIS Cyber

You will work within a small team to plan, design and build a secure network within a small team. Each team will be required to design, implement and document a secure network, including installation of physical servers running a variety of operating systems.

You will be guided on how to incorporate security from the design stage onward and introduced to techniques on how to assess the security of existing networks. The module requires a professional approach, informed by current industry practice, to plan a successful development project.

Ethical Hacking

Ethical hackers are skilled in finding and exploiting technical vulnerabilities in networked devices whilst behaving in a professional and responsible manner. They act lawfully to assist organisations in identifying and resolving security weaknesses and vulnerabilities within their networks. In this module, you learn how to perform and document ethical hacks, and explore the key concepts of ethical hacking, including penetration testing, attack vectors and models and vulnerability analysis. You also explore industry standard hacking tools and learn how to use them in an ethical manner.

Human Factors in Cyber Security

You study the different practical techniques used to exploit human vulnerabilities in cyber security, such as social engineering and manipulation techniques. You also explore how to design security that is usable and acceptable to a range of human actors, for instance, end-users, administrators and developers.

You are introduced to a broader organisational and societal perspective on security: the importance of trust and collaboration for effective cyber security, which can only be achieved by engaging stakeholders and negotiating security solutions that meet their needs.

Information Security Management

This module develops a detailed understanding of information and network security concepts and principles as well as the tools and configurations available to defend your network technologies. You will identify and discuss secure infrastructure needs for business requirements, including cloud-based systems. Cryptographic techniques and systems are analysed and compared. The module will emphasise the professional, ethical and legal compliance considerations required of a computer security professional.

Server Administration

You will be exposed to a range of network server administration concepts, principles and practices, which will enable you to understand the key principles of monitoring and managing server storage. This will include identifying the types of cloud solutions and the adoption measures needed for each, together with the technical challenges and the mitigation measures involved in cloud computing.

You will learn how to monitor and troubleshoot servers as well as developing your understanding of essential services such as file and print services; and network services and applications.

Further study will develop your ability to identify secure server configuration to meet business requirements, to critically analyse and compare different server solutions and identify the best solution for the business. You will also be able to identify how to operate ethically in order to implement and test a secure infrastructure to meet an appropriate business requirement.


Optional work placement year

Work placement

You have the option to spend one year in industry learning and developing your skills. We encourage and support you with applying for a placement, job hunting and networking.

You gain experience favoured by graduate recruiters and develop your technical skillset. You also obtain the transferable skills required in any professional environment, including communication, negotiation, teamwork, leadership, organisation, confidence, self-reliance, problem-solving, being able to work under pressure, and commercial awareness.

Many employers view a placement as a year-long interview, therefore placements are increasingly becoming an essential part of an organisation's pre-selection strategy in their graduate recruitment process. Benefits include:

· improved job prospects
· enhanced employment skills and improved career progression opportunities
· a higher starting salary than your full-time counterparts
· a better degree classification
· a richer CV
· a year's salary before completing your degree
· experience of workplace culture
· the opportunity to design and base your final-year project within a working environment.

If you are unable to secure a work placement with an employer, then you simply continue on a course without the work placement.


Final-year core modules

Business Continuity Management

Despite all best efforts, it is likely that at some point cyber security defences will be breached. An essential part of the risk assessment, management and governance process includes consideration and planning of the process of managing incidents and rapidly responding to cyber-attacks. The aim is to understand the impact on the system and minimise it, develop and implement a remediation plan, and use this understanding to improve defences to better protect against successful exploitation of vulnerabilities in future.

You learn the key concepts of business continuity and industry standards and apply different tools and methodologies for planning and implementing business continuity within organisations. You also consider different resilience techniques to implement redundancy and dealing with disasters.

Computing Project

You complete a large scale piece of work, under the supervision of an academic staff member. You produce a substantial artefact relating to the computing field, and complete your report and viva consisting of a presentation, demonstration and discussion of the artefact.

You are guided to develop an appropriate sense of work-discipline coupled with a professional outlook. You take responsibility for the planning and execution of an extended piece of work including the consideration of associated legal, social, ethical and professional issues. You are able to explore in depth a chosen subject area, and thereby demonstrate your ability to analyse, synthesise, and creatively apply what has already been studied on the programme while demonstrating critical and evaluative skills and professional awareness.

Information Governance

You identify the goals of information governance, from protecting the needs of the stakeholder to ensuring the transparency of processes and how these link together to support data governance principles such as integrity, transparency, auditability, accountability, standardization and change management.
You study a range of governance topics including law, regulations, and compliance; security governance and risk management; security for cloud architectures and issues around 3rd party data storage.

Internet of Things

The Internet of Things (IoT) incorporates a number of technologies, including wireless sensor networks, embedded systems, pervasive computing, machine learning, context awareness and distributed systems. IoT has been successfully applied to environmental monitoring, smart homes, industrial controls and digital cities.
You cover a mixture of theoretical and practical topics such as coverage of the range of IoT-enabled devices, low power communications, and processing data gained from the IoT. You also gain experience of practical skills required for the programming of IoT devices.

Strategic Cyber Security Management

Strategic deployment and implementation of cybersecurity within an organisation is challenging. It requires understanding threats, managing resources, and implement solutions. Moreover, it is necessary to engage with decision makers in order to get the resources to implement such solutions.

You explore the key concepts of strategic cybersecurity management, and are introduced to different tools and methodologies for risk assessment. You consider different IT security controls, plans and procedures, including security auditing.


Modules offered may vary.


How you learn

You learn through lectures and practical lab sessions. Lectures teach the principles while practical sessions allow you to put these principles into practice. You undertake a piece of work for several weeks building a deeper understanding of the subject. In your final year you also undertake a personal project which integrates the work you have studied in previous years.

How you are assessed

A variety of assessment methods are used to build on the work you undertake in class. An in-course assessment often consists of a practical exercise and an associated report helping you to develop both technical and business skills.

Our Disability Services team provide an inclusive and empowering learning environment and have specialist staff to support disabled students access any additional tailored resources needed. If you have a specific learning difficulty, mental health condition, autism, sensory impairment, chronic health condition or any other disability please contact a Disability Services as early as possible.
Find out more about our disability services

Find out more about financial support
Find out more about our course related costs


Entry requirements

Entry requirements

Any combination of level 3 qualifications. Each application is considered on a case-by-case basis.

We may also be able to help you meet the entry requirements through our Summer University short courses.

For general information please see our overview of entry requirements

International applicants can find out what qualifications they need by visiting Your Country

You can gain considerable knowledge from work, volunteering and life. Under recognition of prior learning (RPL) you may be awarded credit for this which can be credited towards the course you want to study.
Find out more about RPL



Career opportunities

Our computing students go into a range of careers, both nationally and globally, in industries including power, avionics and pharmaceuticals, and for companies including Cisco, HMRC, Accenture and Durham Police.


Information for international applicants


International applicants - find out what qualifications you need by selecting your country below.

Select your country:


Useful information

Visit our international pages for useful information for non-UK students and applicants.

Talk to us

Talk to an international student enrolment adviser


Other course routes

Work placement

Study this course with an optional work placement year, at no extra cost. Alongside this, you can gain valuable experience and engagement with the sector through our shorter work placements, internships and work experience opportunities.

Work placements


Entry to 2022/23 academic year

Fee for UK applicants
£9,250 a year

More details about our fees

Fee for international applicants
£14,000 a year

More details about our fees for international applicants

What is included in your tuition fee?

  • Length: 4 years (or 5 with a work placement)
  • UCAS code: I126 BSc/CSMFY
  • Start date: September
  • Semester dates
  • Typical offer: Offers tailored to individual circumstances

Apply online (full-time) through UCAS



  • Not available part-time

Choose Teesside


ExpoTalent 2020

See highlights from Teesside University’s ExpoTalent 2020 – showcasing the next generation of talent from our School of Computing, Engineering & Digital Technologies.


Get in touch

UK students


Telephone: 01642 738801

Online chat

International students


Telephone: +44 (0) 1642 738900

More international contacts


Open days and events