• Undergraduate

Cyber Security BSc (Hons)

Overview

Overview

Why study at UWL? 
  • In the top 30% of universities nationwide - The Guardian University Guide 2024
  • University of the Year for Social Inclusion - Daily Mail University Guide 2024
  • Best university for Student Experience and Teaching Quality in the UK - The Times and Sunday Times Good University Guide 2024
  • Number 1 London university (non-specialist) - National Student Survey 2023**
Why study this course?

As more people spend more time online, the amount of data they generate grows. If organisations and companies do not have secure information systems then data could get into the wrong hands, with potentially dangerous results. 

This cyber security course is designed to train tomorrow’s security professionals, combining fundamental concepts and principles with exposure to new technologies and solutions. You will gain a practical understanding of key issues relating to the design, analysis and implementation of modern IT security systems.

As a member of the Amazon Web Services (AWS) Academy programme, we have integrated part of their respected, industry-focused curriculum into our course. 

Saturday intensive option

The classes for this course take place on Saturdays throughout the academic year meaning you can balance your studies with other commitments. As well as the added convenience, the yearly costs are reduced, making this a great option for you.

Please note that the Saturday intensive option is classed as full-time study. This means that you are able to apply for a full-time student loan - find out further information at Student Finance. It may also affect your eligibility for state benefits.

Cyber Security at UWL video - thumbnail

Select your desired study option, then pick a start date to see relevant course information:

Study options:
We support flexible study by offering some of our courses part-time or via distance learning. To give you real world experience before you graduate, we also offer some courses with a placement or internship. All available options are listed here. Your choices may affect some details of your course, such as the duration and cost per year. Please re-check the details on this page if you change your selection.

Start date:

If your desired start date is not available, try selecting a different study option.

Why study Cyber Security with us?

Why study Cyber Security with us?

What our students say…

I was most impressed by UWL over others because of the lecturers, they really know everything about cyber security, they've done their research and they just want to teach you and keep you up to date with all the latest technologies.I believe that the University of West London is the best place to study Cyber Security, especially in London.

Alessandro Cara
Next
Tile: Mac and PC Labs
Specialist careers advice
It is possible to study this course on Saturdays
Tile: NSS 3rd in London for software engineering
Course detail & modules

Course detail & modules

Cyber security is essentially about the protection of information and information systems. On this course, you will learn how to perform this protective role, exploring different security technologies and studying management processes and control systems.  

Our partnership with Amazon Web Services Academy means you will be exposed to new security technologies and solutions. This will help you to gain valuable skills that you can use both during the course and after graduation.  

As you study for your cyber security degree, you will:

  • build the skills you need to tackle modern secure systems 
  • develop your appreciation of commercial and open-source cyber security equipment, software and services
  • learn management and applications central to cyber security issues
  • develop interpersonal skills and business acumen.

Your course will begin with an introduction to cyber security. You will also learn about computing principles, including the essentials of programming and algorithms, software engineering, and mathematics and computer architecture. 

You will go on to hone your knowledge in specialist modules that examine key topics in security. Your computing modules will focus on skills in analysis, design and development, while a team project will help you to develop team-working skills.

Finally, you will focus on advanced cyber security topics. This will help you to direct your studies so they reflect your interests and career ambitions. At the end of your course, you will design and develop a security-related project.

After completing the course, you will have the necessary knowledge and skills to embark on a career in cyber security. 

Compulsory modules

  • Computer Architecture

    This module will help you to learn the basic concepts behind current computer hardware, software and supporting technologies. As you learn these principles, you will understand how computers work beyond the statements of their high-level language, and this will allow you to write more efficient code.

  • Maths for Computing

    This module will teach you the basic mathematical concepts and techniques of discrete structures. You will study mathematical logic, sets, relations and functions. The module will develop your skills in expressing problems in mathematical language, using mathematical techniques to find solutions to problems and communicating mathematical ideas clearly and succinctly.

  • Programming

    This module covers basic programming concepts and fundamentals using Java programming language. Content includes:

    • an overview of programming paradigms and techniques
    • analysis of problems and design using pseudo-code and flowcharts
    • basic program elements and structure
    • development supported by version-controlled code repositories.
  • Cyber Security in Society

    This module introduces the basic components and concepts of cyber security in modern society, emphasising not only the technical aspects of cyber security, but also its multi-disciplinary natures including legal and crime, business and management, social and human factors, etc.

    The topics of the module will include:

    • Cyber security threat landscape
    • Malware and attacks
    • Actors in cyber security and their roles in cyber security affairs
    • Authentication and password security
    • Networking and network security
    • Cryptography and securing digital information
    • Web security and cyber ethics
    • Cyber crime and warfare
    • Cyber law and legislation
    • Analysis and management of cyber risks
    • Cyber security in business and social media.
  • Algorithms and Data Types

    This module will help you to gain the knowledge and competence to deal with basic data structures and algorithms. You will learn how to specify collections using abstract data types (ADTs) and to implement them using a variety of techniques such as linked lists and trees. You'll also use a range of algorithms, including searching and sorting.

  • Information Systems and Databases

    You will gain the knowledge and skills to design and implement a relational database. It will cover information security and database management issues and an awareness of the central role of relational and other types of databases.

Compulsory modules

  • Applied Cryptography

    This module is an introduction to modern ideas in cryptology and its applications. Increase of storage, manipulation, and transfer of data on computer networks requires effective encryption techniques. This module will provide insight into some of these techniques, algorithms and their development through history. Part of the course is dedicated to the Number Theory relevant to Cryptography.

  • Theory of Computation

    You will gain the knowledge and understanding of fundamental concepts of computational theory and computational complexity. You will learn how to examine whether a given problem can be solved computationally.

  • Artificial Intelligence

    In this module you will gain insights into key techniques within the field of artificial intelligence (AI). Aspects of AI you'll cover include agents, environments and learning as well as techniques such as regression, classification, clustering, reinforcement learning, learning recommendation and decision support systems.

  • Network and Security

    On this module you will identify fundamental issues in computer networks and their security, and study approaches for addressing these issues. By learning these principles, you will be able to understand emerging network technology more quickly.

  • Cyber Threat Analysis

    This module is focused at analysing potential cyber security vulnerabilities/threats within diverse platforms such as; web and mobile applications. It will emphasize specific security issues for such application domains with special consideration given to experimentation to identify and assess potential security vulnerabilities within different application domains followed by understanding of strategies to mitigate against them.

  • Group Research Project

    This module will introduce you to collaboration and research skills, and develop your basic understanding of research approaches. You will gain experience of working collaboratively as part of a project team and have opportunities to adopt different team roles to deliver a solution and project.

Compulsory modules

  • Enterprise Security Management

    The module aims to introduce managerial approaches to information security in modern enterprises. It considers how to manage the use of information assets securely and support the goals and objectives of enterprises through effective information security governance, risk management, and contingency planning.

  • Advanced Topics in Cyber Security

  • Cyber Crime

    This module aims to introduce you to the twenty-first-century offence of cybercrime and the theoretical suppositions underpinning it. It explores the definition, regulation, typologies, methods, categories and patterns of victimisation. It also critically examines law enforcement, regulation and legal issues in digital forensic acquisition.

  • Machine Learning

    Machine learning is an application of artificial intelligence that provides systems with the ability to automatically learn and improve from experience without being explicitly programmed.

    This module familiarises you with some basic machine learning algorithms and techniques and their applications, as well as general questions related to analysing and handling large data sets. Several software libraries and data sets publicly available will be used to illustrate the application of these algorithms. The emphasis will be thus on machine learning algorithms and applications, with some broad explanation of the underlying principles.

  • Project

    You will investigate a topic of interest and prepare a project proposal. You will then present your ideas to the school for approval and once this has been approved, you will begin a detailed literature review of your chosen field. You will choose and follow a suitable development methodology leading to an implementation which you will evaluate.

Entry requirements

Entry requirements

112 UCAS points required from level 3 qualifications

These can include:

  • A Levels at grade B, B and C, or above
  • BTEC Extended Diploma with Distinction, Merit, Merit
  • Access to HE Diploma
  • T Levels

You also need GCSE English and Maths (grade 9 – 4 / A* - C) or Level 2 equivalents.

 

Looking for BSc (Hons) Cyber Security with Foundation Year?

View Foundation Year course
Whether you are changing career or don't have the exact subjects and grades required for this course, you might want to choose this course with a foundation year. This will give you an extra year's study to prepare you for the standard degree programme, where you can go on to graduate with a full Honours degree. Follow the link to see full details of the course with foundation year.

Mature applicants (aged 21+): If you do not hold the qualifications listed but have relevant work experience, you are welcome to apply. Your application will be considered on an individual basis.

Level 5 (year 2) entry
To directly enter the second year of this course you will need to show appropriate knowledge and experience. For example, you are an ideal candidate if you have 120 undergraduate credits at Level 4 or a CertHE in a related subject area.

Level 6 (year 3) entry
To directly enter the third year of this course you need to show appropriate knowledge and experience. For example, you are an ideal candidate if you have 240 undergraduate credits (at Levels 4 and 5), a DipHE, Foundation Degree or HND in a related subject area.

Looking for BSc (Hons) Cyber Security with Foundation Year?

View Foundation Year course
Whether you are changing career or don't have the exact subjects and grades required for this course, you might want to choose this course with a foundation year. This will give you an extra year's study to prepare you for the standard degree programme, where you can go on to graduate with a full Honours degree. Follow the link to see full details of the course with foundation year.
6.0 IELTS or above

You need to meet our English language requirement - a minimum of IELTS 5.5 for each of the 4 individual components (Reading, Writing, Speaking and Listening). Visit our English language requirements page for information on other English language tests we accept. 

You also need academic qualifications at the same level as UK applicants. In some countries where teaching is in English, we may accept local qualifications. Check for local equivalents

We offer pre-sessional English language courses if you do not meet these requirements.

Find out more about our English Language courses.

Looking for BSc (Hons) Cyber Security with Foundation Year?

View Foundation Year course
Whether you are changing career or don't have the exact subjects and grades required for this course, you might want to choose this course with a foundation year. This will give you an extra year's study to prepare you for the standard degree programme, where you can go on to graduate with a full Honours degree. Follow the link to see full details of the course with foundation year.

Mature applicants (aged 21+): If you do not hold the qualifications listed but have relevant work experience, you are welcome to apply. Your application will be considered on an individual basis.

Level 5 (year 2) entry
To directly enter the second year of this course you will need to show appropriate knowledge and experience. For example, you are an ideal candidate if you have 120 undergraduate credits at Level 4 or a CertHE in a related subject area.

Level 6 (year 3) entry
To directly enter the third year of this course you need to show appropriate knowledge and experience. For example, you are an ideal candidate if you have 240 undergraduate credits (at Levels 4 and 5), a DipHE, Foundation Degree or HND in a related subject area.

Looking for BSc (Hons) Cyber Security with Foundation Year?

View Foundation Year course
Whether you are changing career or don't have the exact subjects and grades required for this course, you might want to choose this course with a foundation year. This will give you an extra year's study to prepare you for the standard degree programme, where you can go on to graduate with a full Honours degree. Follow the link to see full details of the course with foundation year.
Fees & funding

Fees & funding

{{ formatCurrencyValue(currentVariantData.field_p_cv_uk_eu_main_fee.name) }} per year

The fee above is the cost per year of your course.

If your course runs for two years or more, you will need to pay the fee for each academic year at the start of that year. If your course runs for less than two years, the cost above is for your full course and you will need to pay the full fee upfront.

Government regulation does affect tuition fees and the fees listed for courses starting in the 2025/26 academic year are subject to change.

If no fee is shown above then the fees for this course are not available yet. Please check again later for updates.

Funding your studies

You may be eligible for a student loan to cover the cost of tuition fees or a maintenance loan. Loans vary depending on your study options. Additional funding is available to some types of students, such as those with dependants and disabled students.

We offer generous bursaries and scholarships to make sure your aspirations are your only limit. In recent years, hundreds of students have received our Full-time Undergraduate Student Bursary.

Additional scholarships specifically for computing and engineering students are also on offer.

Saturday Intensive option

Please note that the Saturday Intensive course is classed as full-time study. This means that you are able to apply for a full-time student loan - find out further information at Student Finance. It may also affect your eligibility for state benefits.

{{ formatCurrencyValue(currentVariantData.field_p_cv_int_main_fee.name) }} per year

The fee above is the cost per year of your course.

If your course runs for two years or more, you will need to pay the fee for each academic year at the start of that year. If your course runs for less than two years, the cost above is for your full course and you will need to pay the full fee upfront.

Government regulation does affect tuition fees and the fees listed for courses starting in the 2025/26 academic year are subject to change.

If no fee is shown above then the fees for this course are not available yet. Please check again later for updates.

International students - funding your studies

We offer scholarships for international students including International Ambassador Scholarships. 

Further information about funding and financial support for international students is available from the UK Council for International Student Affairs.

 

Teaching staff

Teaching staff

Waqar Asif staff profile

Dr Waqar Asif

Dr Waqar Asif is a  Senior Lecturer in Cyber Security at University of West London, before this, he has worked as a Postdoctoral Research fellow at City University of London for three years after completing his PhD from the same institute. Dr Asif has been involved in multiple EU projects, where he has contributed as both a researcher and a developer, thus giving him a complete insight into how a research outcome could be integrated into a real-world solution.

Dr Asif likes to explore new technologies day in and day out and thus his area of interest is a constantly growing list. He has worked in communication protocols such as space time block codes and turbo codes. He also has interest in wireless sensor networks, Internet of Things, information privacy, information security, risk analysis, cryptography, blockchain, GDPR, data anonymization, social network analysis, authentical and access control approaches.

Dr Waqar Asif is a  Senior Lecturer in Cyber Security at University of West London, before this, he has worked as a Postdoctoral Research fellow at City University of London for three years after completing his PhD from the same institute. Dr Asif has been involved in multiple EU projects, where he has contributed as both a researcher and a developer, thus giving him a complete insight into how a research outcome could be integrated into a real-world solution.

Dr Asif likes to explore new technologies day in and day out and thus his area of interest is a constantly growing list. He has worked in communication protocols such as space time block codes and turbo codes. He also has interest in wireless sensor networks, Internet of Things, information privacy, information security, risk analysis, cryptography, blockchain, GDPR, data anonymization, social network analysis, authentical and access control approaches.

Study & career progression

Study & career progression

A female talking to colleagues in front of large data monitors

Cyber Security graduates generally have a good record of finding employment and progressing in their profession. Popular roles for BSc Cyber Security graduates include: 

  • network or computer security technician
  • computer or network security officer
  • identity and access management officer
  • threat and incident response analyst
  • data privacy officer
  • data protection adviser
  • security operations analyst
  • cloud security architect
  • security consultant
  • business continuity manager
  • information risk manager
  • information governance manager
  • cryptographer/cryptologist
  • security software developer
  • source code auditor
  • virus technician.

Once you graduate, you will be able to look for roles with law enforcement, government agencies, security consultancies and commercial IT departments. 

You may also want to progress your studies to explore a related field or specialise on a postgraduate course.

How to apply

How to apply

Important notes for applicants

Disclaimer

*Modern universities - defined as higher education institutions that were granted university status in, and subsequent to, 1992.

**The National Student Survey 2022 and 2023 - Based on an average of all 27 questions. Excludes specialist institutions.

Testimonials - our students or former students provided all of our testimonials - often a student from the course but sometimes another student. For example, the testimonial often comes from another UWL student when the course is new.

Optional modules - where optional modules are offered they will run subject to staff availability and viable student numbers opting to take the module.

Videos - all videos on our course pages were accurate at the time of filming. In some cases a new Course Leader has joined the University since the video was filmed.

Availability of placements - if you choose a course with placement/internship route we would like to advise you that if a placement/internship opportunity does not arise when you are expected to undertake the placement then the University will automatically transfer you to the non-internship route, this is to ensure you are still successful in being awarded a degree.