Course specification and structure
Undergraduate Course Structures Postgraduate Course Structures

UDCSFCOM - BSc (Hons) Cyber Security and Forensic Computing (Top-up)

Course Specification


Validation status Validated
Highest award Bachelor of Science Level Honours
Possible interim awards Bachelor of Science
Total credits for course 120
Awarding institution London Metropolitan University
Teaching institutions London Metropolitan University
School School of Computing and Digital Media
Subject Area Computer Science and Applied Computing
Attendance options
Option Minimum duration Maximum duration
Full-time 1 YEARS 2 YEARS
Part-time 2 YEARS 4 YEARS
Course leader Alexandros Chrysikos

About the course and its strategy towards teaching and learning and towards blended learning/e-learning

The modules are delivered by employing face-to-face teaching in lectures that are supported by seminars, workshops and tutorials based on each module’s needs. All materials, teaching and learning, are provided online via the university’s VLE (Virtual Learning Environment). Furthermore, students are encouraged to engage in workshops and presentations presented by external guest speakers, as well as visit external institutions and organisations. In this effort students are supported by module leader blogs, use of video and role playing. Moreover, apart from timetabled use of PC workshops, students are encouraged to make use of PC provision in their personal study time, but also use the library and learning centre study facilities. Appropriate blended learning technologies, such as the University’s VLE WebLearn, Library’s e-books and Online Databases, are used to facilitate and support student learning, in particular to:
• deliver content;
• encourage active learning;
• provide formative and summative assessments with prompt feedback;
• enhance student engagement and learning.

Course aims

Cyber Security and Forensic Computing are the two main themes that characterise the course. Specifically, the main aim of the course is to provide a general education in the theory and practice of computer, network and information security, with special emphasis in the field of cyber security and forensic computing. Furthermore, the course aims to develop specialist analytical, operational and developmental skills in both technical and socio-technical areas of cyber security.

The general aims of the course are:
• to prepare students for cyber security and forensic computing careers
• to help students develop independent-thinking, effective communication, and problem-solving skills that are applicable to variety of IT-related careers
• to prepare students for higher degrees studies in related subjects
• to continuously develop study skills that will enable students to become independent and lifelong learners
The specific aims of the course are:
• to develop students’ knowledge and industry-oriented skills of cyber security and forensic computing technologies
• to provide students with a solid background in the theoretical underpinnings and practical aspects of IT, Cyber Security and Digital Forensics
• to help students’ comprehend the key issues in preservation of information confidentiality, integrity, and availability
• to develop students’ understanding about professional, legal and ethics issues in cyber security and forensic computing

Course learning outcomes

On successful completion of this course students will be able:

LO 1. demonstrate a requisite understanding of the main body of knowledge in
Computing;
LO 2. understand and apply essential concepts, principles and practice in the context of well
defined scenarios, showing judgment in the selection and application of tools and techniques to solve the issues with cyber security and forensic computing;
LO 3. produce work involving identification, the analysis, design and development of a cyber security and forensic computing system with accompanying documentation, recognising the important relationships between these stages and showing problem solving and evaluation skills drawing on supporting evidence;
LO 4. demonstrate transferable skills and an ability to work under guidance and as a cyber security and/or forensic computing team member;
LO 5. identify appropriate practices within professional and ethical framework of cyber security and forensic computing and understand the need for continuing professional development in this profession;
LO 6. Discuss cyber security and forensic computing practices/measures based upon the body of knowledge learned from this course.

Course learning outcomes / Module cross reference

LO 01 LO 02 LO 03 LO 04 LO 05 LO 06


Module Title Module Code
CS6PO5 Project LO1,2,5 LO4,6 LO6 LO7 LO3,5
CC6003 Digital Crime Investigation LO4-6 LO3-6 LO1,2,7 LO1,2,7
CC6004 Network and Cloud Security LO6 LO1-4 LO4-5 LO7 LO5
CC6051 Ethical Hacking LO1,2 LO2,3 LO4,5 LO3
FC6W51 Work Related Learning LO4 LO3,4 LO2 LO5,6 LO1,4
CC5052 Risk, Crisis and Security Management LO1,2 LO2-4 LO5,7 LO2,3,6
CC6052 Management Support Systems LO1,2 LO3,4 LO4

Principle QAA benchmark statements

QAA Subject Benchmark for Computing, February 2016 (https://www.qaa.ac.uk/docs/qaa/subject-benchmark-statements/sbs-computing-16.pdf?sfvrsn=26e1f781_12)

Benchmark standards (page 16) are defined at threshold and typical levels.

Threshold level

1. The threshold level is interpreted to mean that all students (taken over all years), graduating with an honours degree in the discipline of computing will have achieved this level of performance.

2. On graduating with an honours degree in computing, students should be able to:

• demonstrate a requisite understanding of the main body of knowledge for their programme of study
• understand and apply essential concepts, principles and practice of the subject in the context of well-defined scenarios, showing judgement in the selection and application of tools and techniques
• produce work involving problem identification, the analysis, design and development of a system with accompanying documentation, recognising the important relationships between these stages and showing problem solving and evaluation skills drawing on supporting evidence
• produce small well-constructed programmes to solve well-specified problems
• demonstrate generic skills, an ability to work under guidance and as a team member
• identify appropriate practices within a professional, legal and ethical framework and understand the need for continuing professional development


Typical level

3. This is the average standard attained (taken over all years) of all the students graduating with an honours degree in the discipline of computing.

4. On graduating with an honours degree in computing, students should be able to:

• demonstrate a sound understanding of the main areas of the body of knowledge within their programme of study, with an ability to exercise critical judgement across a range of issues
• critically analyse and apply a range of concepts, principles and practice of the subject in an appropriate manner in the context of loosely defined scenarios, showing effective judgement in the selection and use of tools and techniques
• produce work involving problem identification, the analysis, the design or the development of a system, with accompanying documentation, recognising the important relationships between these. The work will show problem-solving and evaluation skills, draw upon supporting evidence and demonstrate a good understanding of the need for quality
• demonstrate transferable skills with an ability to show organised work as an individual and as a team member and with minimum guidance
• apply appropriate practices within a professional, legal and ethical framework and identify mechanisms for continuing professional development and lifelong learning
• explain a wide range of applications based upon the body of knowledge.

Assessment strategy

A range of assessment methods is employed throughout the course. The method of assessment for each module in each level is clearly described in the individual ‘Module Guide’ which is made available to the students at the start of the semester. Modules employ a combination of the following forms of assessments:
• Case study focussed reports and presentations
• Research reports
• Meeting logs
• Online journal entries
• Unseen examinations
• Part seen examinations
• Individual vivas

Organised work experience, work based learning, sandwich year or year abroad

A work-related learning module is available as designate in Autumn semester. The module enables students to undertake an appropriate short period of professional activity, related to their course at level 6, with a business or community organization and to gain credit for their achievements. The activity can be a professional training, a volunteering activity, employment activity, placement or business start-up activity.

Modules required for interim awards

All modules are core-compulsory, except the choice of optional modules.

Arrangements for promoting reflective learning and personal development

There is strong encouragement to the students to produce blogs/logs in order to demonstrate what they have learned every week, as well as to maintain a personal development portfolio.
In addition, formative feedback is provided during the course of the academic year. Specifically, by conducting regular checkpoint meetings students are given the opportunity to present and discuss their coursework progress with their lectures in seminars and workshops. Through this process constructive feedback is provided to students to help them refine and improve their work before final submission.
Students are also asked to provide evidence reflecting on how formative feedback on checkpoint meetings has been implemented in the final submission.

Other external links providing expertise and experience

FHEQ October 2014 (https://www.qaa.ac.uk/docs/qaa/quality-code/qualifications-frameworks.pdf)

Career, employability and opportunities for continuing professional development

Successful completion of this course offers improved career opportunities in law enforcement, government or other related agencies, and commercial IT departments or security consultancies. This course is also an excellent preparation for further research or studies such as MSc or PhD.

Career opportunities

You’ll complete this course ready to pursue a career in computer forensics and/or cyber security arena, or in the wider IT industry. Previous graduates have gone on to find employment as security/cyber analysts at companies such as MWR InfoSecurity, CACI, Cisco Systems and LGC Group.

Potential employers include digital crime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.

Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work-related module.

This course is also an excellent preparation for further research or studies such as MSc or PhD either at London Met or another university.

Entry requirements

In addition to the University's standard entry requirements, you should have one of the following:

  • 240 credits from a Higher National Diploma (HND), Foundation Degree (FdA/ FdSc) or equivalent international qualification in a relevant subject
  • 240 credits from years 1 and 2 of an undergraduate degree (BA/BSc) in a relevant subject at a different institution

To study a degree at London Met, you must be able to demonstrate proficiency in the English language. If you require a Tier 4 student visa you may need to provide the results of a Secure English Language Test (SELT) such as Academic IELTS. For more information about English qualifications please see our English language requirements.

If you need (or wish) to improve your English before starting your degree, the University offers a Pre-sessional Academic English course to help you build your confidence and reach the level of English you require.

Official use and codes

Approved to run from 2019/20 Specification version 1 Specification status Validated
Original validation date 23 May 2019 Last validation date 23 May 2019  
Sources of funding FUNDED ENTIRELY BY STUDENT TUITION FEES
JACS codes
Route code CSFCOM

Course Structure

Stage 1 Level 06 September start Offered

Code Module title Info Type Credits Location Period Day Time
CC6003 Digital Crime Investigation Core 30        
CC6004 Network and Cloud Security Core 30 NORTH AUT+SPR WED AM
CC6051 Ethical Hacking Core 15 NORTH SPR THU AM
CS6P05 Project Core 30 NORTH AUT+SPR WED PM
CC5052 Risk, Crisis and Security Management Option 15 NORTH AUT THU PM
CC6052 Management Support Systems Option 15 NORTH AUT THU AM
FC6W51 Work Related Learning II Option 15 NORTH AUT WED PM
          NORTH SPR WED PM