СʪÃÃÊÓƵ

Cyber Security BSc (Hons) - СʪÃÃÊÓƵ Dubai

cyber-security

Key details

Award: Undergraduate BSc (Hons)
Duration:
 Three years full-time
Location: Ð¡ÊªÃÃÊÓƵ Dubai campus

Course overview

Technology and computer systems are becoming increasingly integrated with our day-to-day lives, meaning protecting all the data and information they contain is paramount.

With many organisations and businesses now considering the protection of online information a critical business issue, there’s an increased focus on and demand for the role of cyber security.

The specialist techniques taught in this course will help prepare you for a career in a rapidly growing industry currently facing a shortage of skills.

Key features

  • СʪÃÃÊÓƵ Leicester has been named a gold standard ‘Academic Centre of Excellence in Cyber Security Education’ by the leading authority on cyber security in the UK, the National Cyber Security Centre (NCSC), part of GCHQ. СʪÃÃÊÓƵ is the first university in the East Midlands to achieve this prestigious status. 
  • Study modules on cryptography, penetration testing, and professionalism in forensics and security. Gain valuable industry experience through internships and industry networking with leading cybersecurity companies. Additionally, students can participate in cutting-edge research projects alongside renowned academics. This comprehensive curriculum and hands-on experience ensure graduates are well-equipped to tackle the ever-evolving cybersecurity challenges and significantly contribute to the industry.
  • The programme leaders are experienced professionals dedicated to ensuring students receive a high-quality education. They are readily available to answer any questions or concerns students may have regarding the accreditation process or the course content.
  • СʪÃÃÊÓƵ Dubai students can now benefit from the Industry Advisory Board, which comprises leading experts and professionals at the enterprise level. The board provides valuable insights and guidance to ensure the curriculum remains relevant and current with industry trends and demands. 
  • Benefit from laboratories fitted with customised PCs configured with multiple operating systems, virtualisation and removable hard drives.
  • Benefit from Block teaching, where a simplified ‘block learning’ timetable means you will study one subject at a time and have more time to engage with your learning, receive faster feedback and enjoy a better study-life balance.

 


Entry requirements

GCE A-Level

CCD

CBSE/ ICSE/ All Indian Boards

  • Successful completion of Standard XII with a 65% average from the best four subjects excluding Hindi or any other local language, e.g. Punjabi, Gujarati, Tamil, Marathi
  • Interview any candidate with 60% or above.

American High School Diploma + SAT

High School Diploma with a minimum GPA of 3.0 plus Advanced Placement, two subjects from group A with grade 3 or above ORSAT2 - 2 subject tests with a minimum score of 500 in each = 1000

UAE Tawjihiyya

Entry to IYZ only

International Baccalaureate Diploma

24 points

BTEC Level 3 Extended Diploma

DMM

African WAEC/ NECO/ WASSCE

5 "B" grades (only for Business Programme)

FBISE grade 12 (Pakistan)

85%

Curriculum Russian/Kazakhstan

Entry to IYZ only

English language tests and their entry requirements

IELTS Academic: 6.0 (minimum 5.5 in each band)

TOEFL Internet-based: 72 (17 in listening & writing, 20 in speaking and 18 in reading)

Pearson PTE Academic: 51

Additionally, students with the following qualifications may be considered as having met the English language requirements:

GCSE/IGCSE/O-Level English (as a first or second language): Grade C or higher

CBSE/ISC boards/NIOS/All state boards: A minimum grade of 55% in English

International Baccalaureate: Minimum grade 5 in English A1 (Standard or Higher Level) in IB OR a minimum of grade 5 in English B (Higher Level)

West African/Nigerian Curriculum WAEC/ WASSCE/ SSSCE: Minimum grade "C6"


Course modules

  1. First year

    Block 1: Foundation of Computing and Cyber Security
    Block 2: Endpoint Security
    Block 3: Secure Coding
    Block 4: Business Infrastructure and Security
    Additional: Expert Briefings in Cyber Security

  2. Second year

    Block 1: Secure Scripting and Business Applications
    Block 2: Incident Response and Cyber Threat Intelligence
    Block 3: Penetration Testing
    Block 4: Industrial Cryptography

  3. Third year

    Block 1: Malware and Attacker Techniques
    Block 2: Cyber Physical Systems Security
    Block 3/4: Final Project

    Optional modules

    Block 3/4: Cyber Security and Social Responsibility
    Block 3/4: Artificial Intelligence for Cyber Security
    Block 3/4: Digital Forensics and Cyber Crime Investigation

Teaching and assessments

You may be taught through a combination of lectures, tutorials, seminars, group work, laboratory sessions, practical sessions and self-directed study. Assessment and how assessments are weighted is varied across modules. Our assessment practices reflect the best practices in teaching methods deployed by academic members of staff each year. Indicative assessment weighting and assessment type per module are shown as part of the module information. Again, these are based on the current academic session and are subject to change.

Teaching contact hours

This is a full-time course. Each module is worth 30 credits. Outside of your normal timetabled hours you will be expected to conduct independent study each week to complete preparation tasks, assessments and research.

Self-directed study: In order to prepare for, and assimilate, the work in lectures and seminars you will be expected to use our on-line resources, participate in flipped or virtual classroom discussions on our virtual learning environment (VLE) and engage in personal study and revision for approximately 25 hours per week.

Graduate careers

This programme has been developed to help give students the skills needed for careers in the cyber security industry. Graduates can thrive in careers performing roles as security analyst, penetration tester, forensic investigator, or cyber security engineer.