Course specification and structure
Undergraduate Course Structures Postgraduate Course Structures

UDCSFCOM - BSc (Hons) Cyber Security and Forensic Computing (Top-up)

Course Specification


Validation status Validated
Highest award Bachelor of Science Level Honours
Possible interim awards Bachelor of Science
Total credits for course 120
Awarding institution London Metropolitan University
Teaching institutions London Metropolitan University
School School of Computing and Digital Media
Subject Area Computer Science and Applied Computing
Attendance options
Option Minimum duration Maximum duration
Full-time 1 YEARS 2 YEARS
Part-time 2 YEARS 4 YEARS
Course leader  

About the course and its strategy towards teaching and learning and towards blended learning/e-learning

The modules are delivered by employing face-to-face teaching in lectures that are supported by seminars, workshops and tutorials based on each module’s needs. All materials, teaching and learning, are provided online via the university’s VLE (Virtual Learning Environment). Furthermore, students are encouraged to engage in workshops and presentations presented by external guest speakers, as well as visit external institutions and organisations. In this effort students are supported by module leader blogs, use of video and role playing. Moreover, apart from timetabled use of PC workshops, students are encouraged to make use of PC provision in their personal study time, but also use the library and learning centre study facilities. Appropriate blended learning technologies, such as the University’s VLE WebLearn, Library’s e-books and Online Databases, are used to facilitate and support student learning, in particular to:
• deliver content;
• encourage active learning;
• provide formative and summative assessments with prompt feedback;
• enhance student engagement and learning.

Course aims

Cyber Security and Forensic Computing are the two main themes that characterise the course. Specifically, the main aim of the course is to provide a general education in the theory and practice of computer, network and information security, with special emphasis in the field of cyber security and forensic computing. Furthermore, the course aims to develop specialist analytical, operational and developmental skills in both technical and socio-technical areas of cyber security.

The general aims of the course are:
• to prepare students for cyber security and forensic computing careers
• to help students develop independent-thinking, effective communication, and problem-solving skills that are applicable to variety of IT-related careers
• to prepare students for higher degrees studies in related subjects
• to continuously develop study skills that will enable students to become independent and lifelong learners
The specific aims of the course are:
• to develop students’ knowledge and industry-oriented skills of cyber security and forensic computing technologies
• to provide students with a solid background in the theoretical underpinnings and practical aspects of IT, Cyber Security and Digital Forensics
• to help students’ comprehend the key issues in preservation of information confidentiality, integrity, and availability
• to develop students’ understanding about professional, legal and ethics issues in cyber security and forensic computing

Course learning outcomes

On successful completion of this course students will be able:

LO 1. demonstrate a requisite understanding of the main body of knowledge in
Computing;
LO 2. understand and apply essential concepts, principles and practice in the context of well
defined scenarios, showing judgment in the selection and application of tools and techniques to solve the issues with cyber security and forensic computing;
LO 3. produce work involving identification, the analysis, design and development of a cyber security and forensic computing system with accompanying documentation, recognising the important relationships between these stages and showing problem solving and evaluation skills drawing on supporting evidence;
LO 4. demonstrate transferable skills and an ability to work under guidance and as a cyber security and/or forensic computing team member;
LO 5. identify appropriate practices within professional and ethical framework of cyber security and forensic computing and understand the need for continuing professional development in this profession;
LO 6. Discuss cyber security and forensic computing practices/measures based upon the body of knowledge learned from this course.
ULO. Demonstrate confidence, resilience, ambition and creativity and will act as inclusive, collaborative and socially responsible practitioners/professionals in their discipline.

Principle QAA benchmark statements

Assessment strategy

A range of assessment methods is employed throughout the course. The method of assessment for each module in each level is clearly described in the individual ‘Module Guide’ which is made available to the students at the start of the semester. Modules employ a combination of the following forms of assessments:
• Case study focussed reports and presentations
• Research reports
• Meeting logs
• Online journal entries
• Unseen examinations
• Part seen examinations
• Individual vivas

Organised work experience, work based learning, sandwich year or year abroad

A work-related learning module is available as designate in Autumn semester. The module enables students to undertake an appropriate short period of professional activity, related to their course at level 6, with a business or community organization and to gain credit for their achievements. The activity can be a professional training, a volunteering activity, employment activity, placement or business start-up activity.

Modules required for interim awards

All modules are core-compulsory, except the choice of optional modules.

Arrangements for promoting reflective learning and personal development

There is strong encouragement to the students to produce blogs/logs in order to demonstrate what they have learned every week, as well as to maintain a personal development portfolio.
In addition, formative feedback is provided during the course of the academic year. Specifically, by conducting regular checkpoint meetings students are given the opportunity to present and discuss their coursework progress with their lectures in seminars and workshops. Through this process constructive feedback is provided to students to help them refine and improve their work before final submission.
Students are also asked to provide evidence reflecting on how formative feedback on checkpoint meetings has been implemented in the final submission.

Career, employability and opportunities for continuing professional development

Successful completion of this course offers improved career opportunities in law enforcement, government or other related agencies, and commercial IT departments or security consultancies. This course is also an excellent preparation for further research or studies such as MSc or PhD.

Career opportunities

You’ll complete this course ready to pursue a career in computer forensics and/or cyber security arena, or in the wider IT industry. Previous graduates have gone on to find employment as security/cyber analysts at companies such as MWR InfoSecurity, CACI, Cisco Systems and LGC Group.

Potential employers include digital crime investigation companies, government agencies and the police force, as well as national and international organisations that need protection against digital crime.

Throughout the course, you’ll have the opportunity to attend regular student enterprise workshops, where you’ll have the chance to network with potential employers. You’ll also be able to gain valuable work experience through our optional work-related module.

This course is also an excellent preparation for further research or studies such as MSc or PhD either at London Met or another university.

Entry requirements

In addition to the University's standard entry requirements, you should have one of the following:

  • 240 credits with at least a Merit from a Higher National Diploma (HND), at least 2:2 (or equivalent) from a Foundation Degree (FdA/ FdSc) or equivalent international qualification in a relevant subject
  • 240 credits at least 2:2 (or equivalent) from years 1 and 2 of an undergraduate degree (BA/BSc) in a relevant subject at a different institution

Applicants who do not meet the necessary classifications will be required to attend an interview.

Official use and codes

Approved to run from 2019/20 Specification version 1 Specification status Validated
Original validation date 23 May 2019 Last validation date 23 May 2019  
Sources of funding FUNDED ENTIRELY BY STUDENT TUITION FEES
JACS codes
Route code CSFCOM

Course Structure

Stage 1 Level 06 September start Offered

Code Module title Info Type Credits Location Period Day Time
CC6004 Network and Cloud Security Core 30 NORTH AUT+SPR WED AM
CC6010 Digital Investigation and E-Discovery Core 30 NORTH AUT+SPR MON PM
CC6051 Ethical Hacking Core 15 NORTH SPR THU AM
CS6P05 Project Core 30 NORTH AUT+SPR WED PM
CC5052 Risk, Crisis and Security Management Option 15 NORTH AUT THU PM
CC6052 Management Support Systems Option 15        
FC6W51 Work Related Learning II Option 15