Name of Programme
BSc (Hons) Computing [Cyber Security]
Final Award
BSc (Hons)
Location
Buckingham
Awarding Institution/Body
University Of Buckingham
Teaching Institution
University Of Buckingham
School of Study
School of Computing
Programme Code(s)
UBSF9SCCS / Full Time / 2 Years and 1 Term
UBSF2SCCS / Full Time / 2 Years
Professional Body Accreditation
British Computer Society
Relevant Subject Benchmark Statement (SBS)
QAA SBS: Computing (2022)
Admission Criteria
A-Level: ABB - BBB, IB 32 or equivalent (Computing and/or Mathematics are desired, but not essential); GCSE: maths B/5, English C/4; IELTS 6.5
Applicable Cohort(s)
September 2023
FHEQ Level
6
UCAS Code
G404
Summary of Programme
Advanced knowledge of fundamentals and innovations in digital and technology solutions, and their application to solve real-life problems are at the heart of Buckingham’s computing programmes.

Accredited by the British Computer Society, our undergraduate programmes blend theory with practice to ensure students gain confidence, skills, and the expertise required to becoming an IT professional in this increasingly interdisciplinary field. Student-centred small group teaching and learning utilising state-of-art technologies and equipment, informed by cutting-edge research, prepares graduates of this programme for a rewarding career in industries of the future.

Students on this two-year undergraduate degree programme will be trained on fundamental theories and concepts, key techniques, approaches, methodologies and tools of software engineering and application development as practiced within the IT industry. This pathway in Cyber Security is designed to give students access to a wealth of potential career routes in cyber security by training them on key techniques, approaches and methodologies of cyber security. The programme will provide students with the practical skills required to implement secure digital and technology solutions for a wide variety of complex problems.
Educational Aims of the Programme
Digital and technology solutions lie at the heart of modern societies and industries of the future. They include hardware, software, data networks, tools, frameworks, and standards that provide the technological ecosystem on which the delivery of information services is based. Multinational corporations, small to large businesses, charities and public sector organisations are using data and digital technologies to transform the products and services they offer, and to optimise their internal business processes.
Innovations in technological solutions are essential to solve some of the most complex challenges humanity faces today. This two-year undergraduate computing degree aims to equip students with key competencies to analyse complex problems, and design, implement and evaluate innovative, ethical and sustainable digital solutions to a wide range of problems in modern society.

Software are considered to be complex engineering products that require a professional, systematic, collaborative and an interdisciplinary approach to design and develop. Thus, knowledge and understanding of software development processes, tools and techniques, as well as practical skills to implement such products are much sought-after within many sectors of the economy. The core computing programme is designed for students who are curious to learn the underlying theories, concepts and techniques in computing and software development, and apply them to solve previously unseen problems.

With digital and technology solutions being an essential part in nearly all aspects of our lives, ensuring the security, authenticity and reliability of IT infrastructure, software and data has never been more crucial. This pathway in Cyber Security is designed to give access to a wealth of career routes in cyber security by training students on key techniques, approaches and methodologies of cyber security as practiced within the IT industry. The programme has a strong technical focus to give students a deep level of understanding and hands-on experience on how computing devices operate and communicate in the cyber space and how to secure them properly. Students will also learn how to actively assess and improve the security posture of organisations’ cyber systems.

The first year of this two-year programme introduces students to essential theories and concepts of computing, programming and software development that underpin modern computer science. These theories and concepts build the fundamentals necessary to undertake highly specialised modules that follow in the second year.

The second year focusses on equipping students with specialised skills and sound knowledge that would enable them to pursue a rewarding career in the rapidly growing field of Cyber Security. Students will learn concepts and techniques in cryptograph, network security, ethical hacking and cyber incident management, alongside web application development, software project management and cloud computing, which are some of the most sought-after skills in the IT sector today.

All students undertake a substantial 'Individual Project’ where they get the opportunity to apply their knowledge and skills to develop an innovative solution to a real-life complex problem. There are several opportunities to work in teams, thus developing leadership and collaboration skills.

This fast-tracked programme prepares students to work in much south-after roles in cyber security, or to pursue postgraduate education. Our small-group teaching and learning environment supported by personal tutors offer students a personalised learning experience to achieve their full potential. Learning is enriched through collaborative projects, co-curricular activities and seminars by guest speakers from industry. Opportunities for professional skills development are offered throughout the degree programme.
Programme Outcomes

Knowledge and Understanding

At the end of the programme students should be able to gain knowledge and understanding in:

1. Roles of computer-based systems and digital solutions in the wider historical, social, economic, political and environmental context
2. Essential fundamental facts, concepts, theories, principles and methodologies of computing
3. Problem solving and computer programming together with relevant techniques, algorithms, mathematical structures and concepts
4. Data, software and system architectures, communication networks and protocols, and related technologies
5. Use of the theoretical knowledge, software development processes, methods and tools in analysing, modelling, designing, implementing, testing, and deploying usable, secure, inclusive and sustainable digital and technology solutions to meet specific requirements
6. Use of appropriate management techniques and tools for the successful development of software products within agreed time, budget and quality requirements
7. Ethical, professional, social, legal, commercial, security, safety and sustainability issues in developing and exploiting computing technology in practice
8. Fundamentals of cyber security and hands-on experience on how to implement advanced algorithms and protocols in cryptography.
9. State-of-art developments of technologies in ethical hacking and penetration testing.
10. Digital forensics investigations, cyber security incidents/responses, and how to manage them effectively.

Teaching/Learning Strategy

Classroom-based teaching/learning following the principle of progressive disclosure is the main strategy for achieving all aspects of the knowledge and understanding. A variety of sessions of teacher-student interaction such as lectures, tutorials, practical classes, workshops, seminars, and project supervision sessions are deployed to enhance the understanding. Reading, practicing and interactions with teachers and peers are useful strategies of learning. Virtual learning environments, online or stand-alone software tools are used to enhance the effects of teaching and learning. The Individual project is used as an opportunity for self-directed learning.

Teaching/learning strategies corresponding to the specific aspects of knowledge and understanding are as follows:

1. Examples systems, case studies, individual project, site visits;
2. Lectures, tutorials, seminars, project meetings;
3. Practical classes, coursework and individual project;
4. Module projects, individual project, group work (including role play), workshops;
5. Lectures, tutorials, individual project, literature review style coursework;
6. Strategies of specific modules;
7. Skill module on PESLI, individual project, coursework for certain modules.
8 to 10. Strategies of the following modules: Fundamentals of Cyber Security and Cryptography, Ethical Hacking & Pen Testing, and Digital Forensics and Cyber Incident Management

Assessment Strategy

Student knowledge and understanding are evaluated by
a combination of the following means:

- Written exams and tests (1, 2, 3, 4, 5, 6, 7)
- Coursework (1, 2, 3, 4, 5, 6, 7)
- Practical exams & practical tests (3)
- Project reports and presentations (1, 2, 4, 5, 6, 7)
- Individual Project work (1, 2, 3, 4, 5, 6, 7)

According to the marks awarded, students are then
considered as:

- failed to achieve the knowledge and understanding
- partially achieving the knowledge and understanding
- fully achieving the knowledge and understanding
Programme Outcomes

Cognitive Skills

At the end of the programme, students should be able to gain skills and abilities in:

1. Gathering, evaluating, filtering and selecting useful information on new technologies from primary sources
2. Identifying problems and specifying requirements for new solutions
3. Evaluating solutions (technical and nontechnical).
4. Deploy appropriate methods and tools
5. Modelling & designing computer-based software systems
6. Communicating knowledge to technical and non-technical audience
7. Analysing and identifying which cyber security techniques/approaches are best suited to solve a real-life scenario/problem.
8. Analysing and identifying possible security vulnerabilities complex IT systems.
9. Understanding and implementing various computer forensics investigation processes

Teaching/Learning Strategy

The skills are achieved through various forms of practical exercises. In particular:

- After-lecture revisions (1, 3, 5)
- Exercises in tutorials, practical classes and coursework (all)
- Research type module projects, Journals and articles (1, 3, 5)
- Individual Project (all)

The skills are obtained through successes and failures in the practical exercises. Feedback from tutors assists obtaining and improving the skills.

Assessment Strategy

All skills are assessed by the following means:

- Coursework
- Practical examinations
- Project reports
- Individual Project

According to the assessment results, students are considered as:

- failed to possess the skills
- partially possess the skills
- competently skilled
Programme Outcomes

Practical/Transferable Skills

Practical computing skills: At the end of the programme students should be able to:

1. Use appropriate theoretical and practical processes to specify, design, construct or implement, evaluate and maintain computer systems
2. Apply principles, methods and tools of system design in developing information systems that meet user needs
3. Evaluate alternatives, understand trade-off issues and deploy effective tools and methods in solving problems, working with technical uncertainty
4. Operate computer systems effectively and be familiar with well-established languages, software systems and tools.
5. Design and implement solutions to address specific needs in cyber security.
6. Evaluate and identify possible evidence of digital forensics that can be left behind by cybercriminals.

Transferable skills: At the end of the programme students should be able to:

7. Produce individual work and undertake self-directed learning of new knowledge for education and professional development
8. Work as an effective part of a development team and recognise the roles to play within the team
9. Analyse data and present the analysis results to a variety of audiences of different backgrounds
10. Problem solving and time management
11. Communicate various aspects of cyber security to the general public in an easy-to-understand format.

Teaching/Learning Strategy

The skills are obtained through practical exercises. In particular:

- Module projects (all)
- Individual project (all)
- Individual coursework (1,2,3,5,7,8)
- Group coursework (all)
- Extensive practical exercises in workshops and practical classes (4, 8)
- Presentations/Demonstrations (7)

Assessment Strategy

All skills are assessed by means of the following:

- Coursework (written essays and reports)
- Practical/written examinations
- Presentation/Demonstration performance
- Group work reports
- Individual Project

The Individual Project plays a critical role in obtaining the key skills. The importance of the individual project is reflected by a special examination convention for the programme, which states that the overall degree classification cannot be significantly higher (i.e. one grade higher) than that awarded to the project.
External Reference Points
· QAA Framework for Higher Education Qualifications:
(Link)
· Relevant Subject Benchmark Statement(s): QAA Subject Benchmark Statement Computing:
(Link)
· BCS Guidelines on Course Accreditation:
(Link)
Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical student might reasonably be expected to achieve and demonstrate if he/she takes full advantage of the learning opportunities that are provided. More detailed information on the learning outcomes, content and teaching, learning and assessment methods of each course unit/module can be found in the departmental or programme handbook. The accuracy of the information contained in this document is reviewed annually by the University of Buckingham and may be checked by the Quality Assurance Agency.
Date of Production
September 2022
Date approved by School Learning and Teaching Committee
Latest Revision Date: November 2023
Date approved by School Board of Study
Latest Revision Date: November 2023
Date approved by University Learning and Teaching Committee
Latest Revision Date: November 2023
Date of Annual Review
In line with the University annual monitoring review process.

 

PROGRAMME STRUCTURES

BSc (Hons) Computing [Cyber Security]

UBSF2SCCS / Full Time / January Entry
Term 1
Winter
Introduction to Computer Systems [L4/15U] (SUFITCS)
Problem Solving and Programming 1 [L4/15U] (SUFPSP1)
Mathematics for Computing [L4/15U] (SUFMATC)
Skills and Professional Development [L6/15U] (SUFSPD2) **
Term 2
Spring
Introduction to Operating Systems [L4/15U] (SUFITOS)
Problem Solving and Programming 2 [L4/15U] (SUFPSP4)
Introduction to Statistics [L4/15U] (SUFITSS)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Preliminary Examination
Term 3
Summer
Principles of Database Systems [L5/15U] (SUFPRDS)
Object Oriented Programming [L5/15U] (SUFOOPG)
User Experience (UX) Design [L5/15U] (SUFUSED)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Term 4
Autumn
Software Engineering [L5/15U] (SUFSEN5)
Principles of Computer Networks [L5/15U] (SUFPRCN)
Design, Implementation and Analysis of Algorithms [L5/15U] (SUFDIAA)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Part 1 Examination
Term 5
Winter
One of:
Fundamentals of Artificial Intelligence [L5/15U]
Fundamentals of Mobile Applications Development [L5/15U] (FCLP10)
Project [L6/45U] (SUFPRJT) *
Fundamentals of Cyber Security and Cryptography [L5/15U] (SUFFCYB)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Term 6
Spring
Web Applications Development [L6/15U] (SUFWAD6)
Project [L6/45U] (SUFPRJT) *
(Continued)
Ethical Hacking [L6/15U] (SUFHACK)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Part 2 Stage 1 Examination
Term 7
Summer
Software Project Management [L6/15U] (SUFSWPM)
Project [L6/45U] (SUFPRJT) *
(Continued)
Advanced Web Applications Development [L6/15U] (SUFAWAD)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Term 8
Autumn
Cloud Computing [L6/15U] (SUFCLDC)
Digital Forensics and Cyber Incident Management [L6/15U] (SUFFCIM)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Part 2 Stage 2 Examination

** Skills and Professional Development module runs across the entire programme and is assessed as a module within the last term of the programme.
* Please note there are Special Regulations governing this programme, which can be reviewed in the University of Buckingham’s regulations Handbook: https://www.buckingham.ac.uk/about/handbooks/regulations-handbook

 

BSc (Hons) Computing [Cyber Security]

UBSF9SCCS / Full Time / September Entry
Term 1
Autumn
Introduction to Computer Systems [L4/15U] (SUFITCS)
Introduction to Statistics [L4/15U] (SUFITSS)
Preliminary 1 Examination
Term 2
Winter
Mathematics for Computing [L4/15U] (SUFMATC)
Problem Solving and Programming 1 [L4/15U] (SUFPSP1)
Skills and Professional Development [L6/15U] (SUFSPD2) **
Term 3
Spring
Introduction to Operating Systems [L4/15U] (SUFITOS)
Problem Solving and Programming 2 [L4/15U] (SUFPSP4)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Preliminary 2 Examination
Term 4
Summer
Principles of Database Systems [L5/15U] (SUFPRDS)
Object Oriented Programming [L5/15U] (SUFOOPG)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
User Experience (UX) Design [L5/15U] (SUFUSED)
Term 5
Autumn
Software Engineering [L5/15U] (SUFSEN5)
Principles of Computer Networks [L5/15U] (SUFPRCN)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Design, Implementation and Analysis of Algorithms [L5/15U] (SUFDIAA)
Part 1 Examination
Term 6
Winter
One of:
Fundamentals of Artificial Intelligence [L5/15U]
Fundamentals of Mobile Applications Development [L5/15U] (FCLP10)
Project [L6/45U] (SUFPRJT) *
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Fundamentals of Cyber Security and Cryptography [L5/15U] (SUFFCYB)
Term 7
Spring
Web Applications Development [L6/15U] (SUFWAD6)
Project [L6/45U] (SUFPRJT) *
(Continued)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Ethical Hacking [L6/15U] (SUFHACK)
Part 2 Stage 1 Examination
Term 8
Summer
Software Project Management [L6/15U] (SUFSWPM)
Project [L6/45U] (SUFPRJT) *
(Continued)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Advanced Web Applications Development [L6/15U] (SUFAWAD)
Term 9
Autumn
Cloud Computing [L6/15U] (SUFCLDC)
Digital Forensics and Cyber Incident Management [L6/15U] (SUFFCIM)
Skills and Professional Development [L6/15U] (SUFSPD2) **
(Continued)
Part 2 Stage 2 Examination

** Skills and Professional Development module runs across the entire programme and is assessed as a module within the last term of the programme.
* Please note there are Special Regulations governing this programme, which can be reviewed in the University of Buckingham’s regulations Handbook: https://www.buckingham.ac.uk/about/handbooks/regulations-handbook