As a result of the continuing digital revolution, computer systems are involved in just about every aspect of modern life. As the number of mobile users, digital applications, and data networks increase, so has the number of potential risks and threats, resulting in the need for talented professionals to secure and protect systems and data.
Our BSc (Hons) Cyber Security course is designed to produce high quality graduates who can contribute effectively in one of the fastest growing sectors globally.
The course offers real-life tools and challenges, giving you the opportunity to become an independent learner through practical projects and advanced teaching methods.
Why Coventry University Wrocław?
At Coventry University Wrocław, we aim to offer a career-focused experience to our students, one that is traditionally academic but is also designed to help you progress in your future career. Our offering is flexible and designed to fit around your life, allowing you to benefit from a modern, forward-thinking higher education institution, reinforced by the quality and reputation of Coventry University. We are dedicated to making higher education accessible and enjoyable for as many people as possible, so we only to cover one module at a time, allowing you to become a specialist in each topic before moving onto the next.
Top Quality CoursesAll of our degree courses are awarded by Coventry University
One ModuleWe only teach one module at a time, allowing more time for assignments
No Year-End ExamsOur modern teaching techniques mean no last-minute cramming
Career-FocusedVocational degrees designed to maximise employability
This course examines the principles and threats which underpin computer systems, networks and the software development process. You will become competent and confident in a range of prevalent topics, such as operating systems, network security, programming language, penetration testing, ethical hacking and more.
Download PDF (334kb)
The first year of the course introduces you to the core fundamentals that underpin computing science. You will explore the importance of IT security, and the risks posed to computer systems globally. In addition, you will develop your professional problem-solving skills, as you understand the basic principles of programming. Most of the modules in this year contain a practical element, so that you receive the best combination of theoretical and hands-on learning.
This introductory module aims to provide knowledge of key networking and computer architectures. Focusing on the origins, structure and fundamental components of a computer network, you will gain foundational knowledge of relevant technologies including wireless, wired and optical computer networking. This includes access controllers, hubs, transceivers and more.
In this module you will learn basic operating system concepts including processes, memory management, drivers and file systems, while examining security risks and security management strategies. You will also examine favoured operating systems such as Microsoft Windows and Mac OSX, with focus placed on the Linux operating system.
Here you will cover the prevalent issue of IT security and risk. You will critically analyse risks a computer may face, from viruses to computer hacking. Exploring the pros and cons of ethical hackers, website hacking and internet security, you’ll gain specialist knowledge of legal, social, ethical and professional issues associated with cyber security.
Basic problem solving and algorithm design techniques will be studied in this module, alongside programming and programming language concepts. You will learn the syntax and semantics of a high-level programming language (e.g. Python) and the basic principles of developing well engineered software and the supporting tools and techniques.
Building on knowledge gained in year one, this year is aimed at building your skillset to an advanced standard. You’ll develop object-orientated analysis, design and implementation skills as you explore complex subjects such as cryptography, digital forensic science and algorithms. Towards the end of the year our lecturers work with you to refine transferable employability skills, as you prepare for a career in computing as a global citizen.
In this module you’ll study the methods and use of cryptography at two levels. Firstly, you will be introduced to cryptographic primitives and their use in developing secure systems. Secondly, you will be given the opportunity to use current implementations of crypto-based security systems for applications such as signing websites and encrypting emails.
You will develop the skills necessary to gather, analyse and evaluate digital evidence by deploying digital forensic science techniques. The processes of forensic investigation and incident response will be studied, along with the application of digital investigation and evidence recovery techniques within a legal framework.
In this module, you will extend your programming and algorithm design skills and gain the ability to structure and manipulate intricate data sets through extensive work with complex programs. In addition, you will refine object-oriented analysis, design and implementation skills and learn to effectively utilise libraries, components and supporting tools.
In preparation for the final year project, this collaborative module aims to enhance your skillset by developing key skills such as communication, team working, co-operation and collaboration, project planning, commercial awareness, cultural awareness and distributed working. In addition, you will develop the critical thinking, research, academic and professional writing skills required as a reflective practitioner.
Sandwich years and placement years give you the opportunity to gain further insight into the industry or career you are seeking to follow. This enables you to contextualise the theoretical models and concepts discussed in the classroom in the work place. Furthermore, if you choose to take advantage of a placement or sandwich year, this version of the degree will help to increase your employment prospects by acquiring skills and gaining an understanding of what employers expect of graduates.
In the final year of study, you look at complex subjects such as the Internet of Things and the underlying principles. You will analyse and evaluate potential risk and exploitation in secure programming, and assess a range of issues such as buffer overflows and how to mitigate a number of security risks. Finally, you’ll get the chance to demonstrate your skills in a number of independent projects, taking charge of processes from inception to delivery.
In this module, you will study advanced programming techniques specifically aligned to developing secure software. A detailed understanding of potential security risks and flaws in software will be developed, along with knowledge on how these flaws and areas of exploitation can be mitigated via defensive means.
The underlying principles, technologies and architecture of wireless sensor networks will be examined in this module along with current practical applications and future trends. You will critically evaluate the security, privacy and trust implications of IoT technology and explore the approaches and mechanisms that mitigate security risks.
This unit focuses on a range of contemporary and emerging technologies, applications and professional issues in computing. Throughout the module, you will engage with research and advanced practice literature with the aim of extending and broadening your subject knowledge. There’s a focus on professional, ethical, business and societal issues, through an international lens.
You have the opportunity to focus on an area of interest within the field of Computing Science, which may be aligned to your future career interests. Throughout the project, you will need to demonstrate research, problem solving, design and development skills, through a practical implementation, investigation (possibly including the gathering and analysis of secondary evidence) and evaluation.
We have been ranked joint first amongst Modern Universities in England for career prospects - Guardian University Guide 2021
In more detail...
This course has been developed by practising professionals and industry experts. Our academics bring a wealth of expertise to the classroom, meaning our students gain a well-rounded and relevant teaching experience.
Throughout your studies, you will find that the course is underpinned with practical elements. This course puts a strong emphasis on pragmatic learning, meaning our graduates are already accustomed to industry standard software and equipment by the time they enter workplace.
At Coventry University Wrocław, we put a strong focus on getting our graduates ready to enter the job market. This can be done in a variety of ways—one key element is work placements. With this degree, you are given the opportunity to undertake short and long-term placements in between the second and third year.
- Upon completion of this course, you will receive a qualification awarded by Coventry University, which is ranked 15th best university in the UK in the Guardian University Guide 2020. Coventry University were also awarded a Gold rating in the Teaching Excellence Framework (TEF) in 2017.
- In order to make higher education accessible to as many people as possible, we keep our tuition fees competitively priced.
- We deliver one module at a time during each block. This means you can dedicate your time to specialise in each subject without the distraction of numerous modules and multiple deadlines.
- Small tutorial group sessions ensure that you receive the mentoring help and support you need.
Your main study themes are:
- Independent and autonomous working: You will gain the ability to critically appraise a cyber security scenario, with a view to apply modern methods efficiently neutralise a threat.
- Industry Adaptation: Factors that influence the technological industry, policies and processes which includes technology development, legislation and environmental factors.
- Project Management: You will be effective and efficient in project management, time management and organisation. You will be introduced to a number of applications and processes to facilitate the successful development of management skills.
- Research Methods: Critical analysis, reflection, information searching and experimental design in security, data collection, analysis and design.
This course is available as a three year or optional four-year sandwich course, the latter incorporating a work placement or study year in a related field. Our teaching methods are varied, offering a number of teaching styles to suit the needs of all our students, so in addition to lectures, we also utilise a blended learning approach, including online aspects, workshops and group work.
We also operate an open-door policy, with additional availability via email and our online learning platform, Moodle.
Progression through the modules develops knowledge and skills, including communication (written and oral), study skills, research methods, project management, presentation and career development. We will also encourage you to consider your employability and/or entrepreneurial development.
Unlike traditional institutions, there are no end of year exams. Instead, learning is assessed through coursework and phase tests, which is more reflective of our learning model.
The learning outcomes of modules, assignments and projects will be clearly stated. Your work will be marked according to how well you achieve these learning outcomes and your final feedback will refer to each outcome, as well as providing an overall percentage grade.
Assessment methods vary and include, practical class and project performance, written practical reports, project thesis, oral presentations, tutorial tasks and assessments which take place at the end of each six-week block.
Course Breakdown (approximate):
- 90% Coursework
- 10% Phase Tests
|Polish Matura Exam||Polish Matura Extended Level||International Baccalaureate (IB)||English Language Requirements|
|Satisfactory Grade||Two subjects at Grade 4 or 55% if higher. If one Extended Level subject is English at 75% or higher you do not require additional English Language qualifications.||28 points||A telephone interview to assess English language skills will be arranged for non-native English speakers.
If you hold IELTS Level 6.0 (with no component less than 5.5) or equivalent, you will not have to complete the telephone interview.
|Entry Requirements Europe||International Baccalaureate (IB)||English Language Requirements|
|We're here to help you understand which qualifications, diplomas and certificates you can use form your own country to meet our entry requirements.
You can contact us at firstname.lastname@example.org.
|28 points||A telephone interview to assess English language skills will be arranged for non-native English speakers.
If you hold IELTS Level 6.0 (with no component less than 5.5) or equivalent, you will not have to complete the telephone interview.
We pride ourselves on offering competitive tuition fees which we review on an annual basis. Course fees are calculated on the basis of what it costs to teach each course and we aim for total financial transparency.
24,995 zł (per year)
39,995 zl (per year)
An important vocation in the modern digital age, cyber security professionals work with creativity and analytical thinking to understand how systems can be broken, protected and used.
A career in cyber security is challenging, dynamic and highly transferable, meaning graduates may have the opportunity to work internationally throughout their careers as there is a recognised global demand for trained specialists.
Cyber security is a rapidly growing market, with plenty of scope to develop a very lucrative career. Graduates from this course can enter a number of possible career pathways, such as Cyber Security Consultant, Cyber Crime Investigator, Digital Forensics Analyst or Software Developer Programmer.
The University will charge the tuition fees that are stated on the course webpage and in the prospectus for the first year of study. The University will review tuition fees each year and will be entitled to increase the fees in line with inflation based on the average annual index of consumer goods and services announced in the form of a communication by the President of Statistics Poland in the Official Journal of Poland “Monitor Polski”. If the tuition fees are increased the student may withdraw from their student contract before that increase takes effect without incurring any financial penalty.