Skip to main content
Undergraduate study
Computing & Cyber Security

Digital and Technology Solutions Professional (Cyber Security Analyst) Degree Apprenticeship

Develop your knowledge, skills and behaviours in cyber security, learning to implement, maintain and support security controls that protect an organisation’s systems and data assets from threats and hazards.

 

Linked Level 6 University award: BSc (Hons) Digital and Technology Solutions (Cyber Security Analyst)

 

Course overview

You learn how to use security technologies and practices, operating in accordance with an organisation’s policies and standards to provide continued protection. You develop a broad understanding of network infrastructures, software and data to identify where threat and hazard can occur, and learn how to perform vulnerability assessments to evaluate an organisation’s ongoing security posture, providing regular management summaries of the main risks and control status.

This apprenticeship is based on standards defined by employers including Accenture, Bright Future, BT, Capgemini, CGI, Ford, Fujitsu, GlaxoSmithKline, HMRC, Hewlett Packard, IBM, John Lewis, Lloyds Banking Group, Network Rail and Tata Consulting Services.

This is a degree apprenticeship, ideal if you are in employment and your job role can be enhanced by developing knowledge and skills in software engineering. Your employer must be willing to support your professional development as a software engineer before you can apply for this course.

Please refer to the The Institute for Apprentices & Technical Education apprenticeship standard for more information.

Top reasons to study this course at Teesside:

  • Real-world experience: undertake bespoke project modules relevant to your workplace, enabling you to apply specialist skills and knowledge to respond to your own business challenges.
  • British Computer Society (BCS) academic membership: get free BCS membership to accelerate your career path with e-learning courses and mentorship opportunities.
  • Industry input: this course has been developed with industry professionals, giving you skills and knowledge relevant to the modern workplace.

Download pdf Order prospectus

 

Course details

Course structure

Year 1 core modules

Cyber Security Work-Based Project

You identify a cyber security project in consultation with your employer and a member of the course team, and prepare a proposal outlining the objectives and deliverables considering both business strategy and requirements. You then undertake the project with advice and guidance from a supervisor and report your findings and recommendations.

Information Security and Cybercrime

You cover a range of issues relating to information and computer security, including systematic approaches to managing security risks, elementary cryptography, how computers are used in the execution of crime, and how such crimes are investigated.

Network Architecture

Network Architecture provides a thorough understanding of the role of Computer Networks in modern society. Network design principles are introduced; current trends in network usage are explored, including the increased demand for bandwidth, the demand for mobile and wireless solutions and the bandwidth divide.

You cover all the essential skills necessary to design and implement networks in a LAN environment and gain hands-on experience using key network devices including cabling, switches and routers on a wired and wireless network. Network and computer security issues are explored, along with ethical and professional issues relevant to network design.

Network Scripting

Network Scripting provides you with the must-have skills of computing professionals: knowledge of multiple open source computing environments, open source implementation basics for both the Linux operating systems and its applications.

You develop and expand your knowledge of Unix-like operating systems, through remote administration of a Linux virtual server, and develop skills in Linux file system manipulation, networking and shell scripting as well as competence with the Linux environment.

Python Programming

You are introduced to the fundamental concepts of software development through the Python programming language.  

You look at key aspects of the software development process including designing solutions, writing application code, developing documentation and formal approaches to testing.

 

Year 2 core modules

Cyber Security Application

You draw on your previous subject specific learning to plan, design and build a secure network, in consultation with your employer and a University supervisor/mentor.

You are guided on how to incorporate security from the design stage onward as well as being introduced to techniques on how to assess the security of existing systems and networks. You learn how to take a professional approach, informed by current industry practice, to plan a successful development project. You also learn how evaluate design and technical decisions, and work with stakeholder and team members.

Ethical Hacking

Ethical hackers are skilled in finding and exploiting technical vulnerabilities in networked devices whilst behaving in a professional and responsible manner. They act lawfully to assist organisations in identifying and resolving security weaknesses and vulnerabilities within their networks. In this module, you learn how to perform and document ethical hacks, and explore the key concepts of ethical hacking, including penetration testing, attack vectors and models and vulnerability analysis. You also explore industry standard hacking tools and learn how to use them in an ethical manner.

Information Security Management

This module develops a detailed understanding of information and network security concepts and principles as well as the tools and configurations available to defend your network technologies. You will identify and discuss secure infrastructure needs for business requirements, including cloud-based systems. Cryptographic techniques and systems are analysed and compared. The module will emphasise the professional, ethical and legal compliance considerations required of a computer security professional.

Open Source Business Solutions

you gain a theoretical and practical perspective of developing online business solutions using an open source system/platform such as Wordpress, OSCommerce, SuiteCRM and OsTicket. You are also introduced to using cloud-based solutions and self-hosting and manipulation of the back-end structure.

You gain an understanding of the wide range of uses of open source systems, benefit from engaging with the open source community and learn how to develop custom applications based on open source systems.

Server Administration

You will be exposed to a range of network server administration concepts, principles and practices, which will enable you to understand the key principles of monitoring and managing server storage. This will include identifying the types of cloud solutions and the adoption measures needed for each, together with the technical challenges and the mitigation measures involved in cloud computing.

You will learn how to monitor and troubleshoot servers as well as developing your understanding of essential services such as file and print services; and network services and applications.

Further study will develop your ability to identify secure server configuration to meet business requirements, to critically analyse and compare different server solutions and identify the best solution for the business. You will also be able to identify how to operate ethically in order to implement and test a secure infrastructure to meet an appropriate business requirement.

 

Final-year core modules

Enterprise Server Management

You explore the administration of network operating systems, the configuration of core network services and securing of network resources. You look at the management of local and remote users, groups and system resources; the installation, configuration and management of core network services; the investigation of current network management security issues and measures to mitigate against risk. You gain awareness of legal, ethical and professional issues around server management.

Information Governance

You identify the goals of information governance, from protecting the needs of the stakeholder to ensuring the transparency of processes and how these link together to support data governance principles such as integrity, transparency, auditability, accountability, standardization and change management.
You study a range of governance topics including law, regulations, and compliance; security governance and risk management; security for cloud architectures and issues around 3rd party data storage.

Internet of Things

The Internet of Things (IoT) incorporates a number of technologies, including wireless sensor networks, embedded systems, pervasive computing, machine learning, context awareness and distributed systems. IoT has been successfully applied to environmental monitoring, smart homes, industrial controls and digital cities.
You cover a mixture of theoretical and practical topics such as coverage of the range of IoT-enabled devices, low power communications, and processing data gained from the IoT. You also gain experience of practical skills required for the programming of IoT devices.

Security Analyst

Gain a detailed knowledge of the security techniques required for internet-connected systems and understand the mind-set of attackers and how they apply tools and techniques to compromise online systems. You review the latest tools and techniques for both attacking and defending computer systems and consider cybercrime, electronic social engineering and penetration testing to reflect what is happening in real world cybercrime and other online events.

Synoptic Project

You complete a large-scale piece of work, under the supervision of an academic staff member and in consultation with your employer. You produce a substantial artefact relating to your apprenticeship and complete your report and viva consisting of a presentation, demonstration and discussion of the artefact.

You are guided to develop an appropriate sense of work-discipline coupled with a professional outlook. You take responsibility for the planning and execution of an extended piece of work including the consideration of associated legal, social, ethical and professional issues. You explore a chosen subject area in depth, demonstrating your ability to analyse, synthesise, and creatively apply your previous learnings while demonstrating critical and evaluative skills, and professional awareness.

 

Modules offered may vary.

 

How you learn

You learn through interactive workshops, lectures, individual and group activities, case studies and presentations. Modules are delivered one day a week, supported by guided learning materials on the University’s virtual learning environment.

How you are assessed

Assessments are mainly based on work-related assignments with some exams, case studies and technical exercises. You are also assessed through an individual portfolio of work that demonstrates knowledge, skills and behaviours associated with the apprenticeship along with a presentation/discussion.


Our Disability Services team provide an inclusive and empowering learning environment and have specialist staff to support disabled students access any additional tailored resources needed. If you have a specific learning difficulty, mental health condition, autism, sensory impairment, chronic health condition or any other disability please contact a Disability Services as early as possible.
Find out more about our disability services

 
 

Entry requirements

Entry requirements

You must be working and have your employer’s support, including the employer commitment to 20% off the job training.

You need GCSE grade 4 English and maths (or equivalent), or will need to achieve this before taking your final assessment.


You can gain considerable knowledge from work, volunteering and life. Under recognition of prior learning (RPL) you may be awarded credit for this which can be credited towards the course you want to study.
Find out more about RPL

 

Employability

Career opportunities

We provide an environment and support that allows you to develop the extra practical employability characteristics to accelerate your career path.

 
 

Full-time

  • Not available full-time
 

Part-time

2022/23 entry

Fee for UK applicants

  • Length: 3 years
  • Attendance: Day release
  • Start date: September

Enquire now

 
 
 

Get in touch

UK students

Email: SCEDTApprenticeships@tees.ac.uk

Telephone: 01642 342631


Online chat

 

Open days and events