BSc (Hons) Cyber Security and Forensic Computing (Top-up)

Overview

Course category

Degree Program

Course Duration

1 Year

Evaluation

Assignment Based

Study Units

7

Learning Mode

Online | E-Learning

Qualification Structure

To achieve the,BSc (Hons) Cyber Security and Forensic Computing (Top-up); Candidates must complete the following Modules,

  • Network and Cloud Security
  • Digital Investigation and E-Discovery
  • Ethical Hacking
  • Project
  • Risk, Crisis and Security Management
  • Project Analysis and Practice
  • Career Development Learning
  • Network and Cloud Security
  • understand the security risks associated with computer networks generally and within cloud computing environments specifically.
  • explain and demonstrate the role of network security protocols and policies.
  • demonstrate a critical understanding of commonly employed network security measures.
  • describe and analyse authentication mechanisms and security modelling techniques.
  • apply appropriate network security measures to particular scenarios.
  • understand the fundamentals of network and cloud computing security with specific reference to Legal, Social, Professional, and Ethical Issues (LSPEI).
  • critically evaluate and reflect on their learning, development, and achievements within the context of the subject.
  • Digital Investigation and E-Discovery
  • identify and apply major developments in the digital crime investigation and E-discovery field.
  • demonstrate an understanding of how advances in digital technology are related to criminal behaviour.
  • appreciate the relationships between the advances in digital technology such as encryption, data hiding techniques and obstruction and their retrieval.
  • evaluate and select appropriate tools and techniques for the detection and prevention of digital crime and e-discovery.
  • perform a digital forensic analysis using suitable the appropriate investigation tools and approaches on different types of crime, platforms and contexts.
  • Understand the e-discovery landscape through the Electronic Discovery Reference Model (EDRM) and notably Identification, Preservation, Collection, Processing, Review & Analysis, Production and Presentation.
  • be familiar with the different approaches that can be applied to real-time cybercrime investigation at law enforcement level and e-discovery at corporate level.
  • be prepared for the CompTIA Security+ certification exam.
  • Ethical Hacking
  • Demonstrate an understanding of the various types of hacking methods, techniques, tactics approaches and strategies that undermine the integrity, availability and confidentiality of computer systems and networks.
  • Use appropriate tools, techniques and methods to identify, detect, analyse, evaluate, test and document the various types of hacking attacks on computer system and networks.
  • Develop and implement practical solutions and countermeasures to thwart and reduce the various threats posed by hacking attacks on computer system and networks.
  • Apply ethical hacking guiding principles in undertaking the various leaning activities and tasks.
  • Critically reflect and evaluate the activities within the topic area in the context of Legal, Social, Ethical and Professional (LSEP) issues.
  • Project
  • Carry out independent research and investigative work.
  • Apply knowledge, skills and abilities to the solution of a previously unfamiliar real-life problem.
  • Apply a structured design process to the development of the solution.
  • Apply project management techniques to ensure that the project is completed in a timely manner, meeting the requirements of the appropriate professional body or industry standards.
  • Select from a range of alternatives the optimal solution to a problem and to justify that selection, giving due consideration to risk management and security issues.
  • Carry that solution through to final implementation, demonstrating an ability to work in a team, if appropriate.
  • Formally and correctly report on the progress and outcomes of the process, and reflect upon their personal development, legal, social, ethical and professional issues.
  • Risk, Crisis and Security Management
  • understand the issues with information security and security risks;
  • identify the security risks and risk control strategies in a particular context;
  • appreciate the security controls for a particular security threat in a particular context;
  • evaluate various security technologies;
  • describe business continuity planning;
  • understand security policy, standard, and practices;
  • discuss issues related to legal, ethical, and professional issues in security management.
  • Project Analysis and Practice
  • Understand how the process of project analysis, development, and management in a business setting.
  • Develop an understanding of how a project team is structured.
  • Understand Security and Privacy by Design principles.
  • Understand the role of UML and other tools in project management.
  • Report on research into current directions in project management within the IT sector through case studies.
  • Understand how risk affects a project and why it is important.
  • Career Development Learning
  • Demonstrate that they can function effectively as independent learners in supervised and unsupervised learning environments, including selecting and applying appropriate methods and procedures to accomplish the required tasks.
  • Communicate effectively with internal/external teams, clients, colleagues, decision-makers and budget holders.
  • Apply analytical, creative and advanced problem-solving skills relevant to the subject.
  • Critically evaluate skills and performance and plan for their systematic improvement.
  • Evidence an enhanced understanding and awareness of important commercial, social and professional factors and their impact on society as a whole and business in particular.
Entry Requirements

Entry Requirements

  • Applicants must be at least 21 years old at the time of enrollment.
  • A Level 5 qualification such as a Higher National Diploma (HND), Foundation Degree, or equivalent in computing, IT, or a related discipline is required to enter directly into the final year.
  • Relevant work experience in IT, networking, systems administration, or cyber security is not mandatory but is considered an advantage.
  • Applicants whose first language is not English must demonstrate competence in English language skills suitable for academic study

Inspire Institute of Technologies is  an approved partner to deliver this program.

What You Need to Know

This course is ideal for students who have completed a Level 5 qualification such as an HND in computing, IT, or cyber security and wish to progress to a full honours degree. It also suits IT professionals looking to specialise in cyber security and digital forensics.

You should take this course to gain advanced knowledge and practical skills in cyber security and forensic computing. It prepares you to protect systems, investigate cybercrime, and respond to growing global cyber threats.

Yes, cyber security is one of the fastest-growing and highest-demand fields globally due to increasing cyber threats and digital transformation.

Graduates can pursue roles such as cyber security analyst, digital forensic investigator, ethical hacker, penetration tester, information security analyst, or IT security consultant across various industries.

You will develop skills in cyber defence, threat analysis, incident response, forensic investigation, and IT security management.

Yes, a BSc (Hons) Cyber Security and Forensic Computing is widely recognised globally and provides strong career opportunities in international organisations, government agencies, and private sector industries.

Apply for This Course

Similar Posts