Cyber and Computer Security

Bachelor of Science (Hons)

StudienberatungOnline Bewerben Infomaterial

Werde Cyber-Sicherheitsexperte/-in

Die fortschreitende Digitalisierung bringt neben ihren unzähligen Vorteilen und Chancen im Alltag auch eine Großzahl an Risiken und Gefährdungen mit sich. Cyberangriffe werden immer komplexer und stellen eine ernstzunehmende Bedrohung für die soziale Infrastruktur dar, welche hohe wirtschaftliche Schäden zur Folge haben kann. Längst ist klar, dass es zum Schutz von Privatpersonen, Unternehmen und Institutionen der Expertise und Forschung von qualifiziertem Fachpersonal im Bereich der Cybersicherheit bedarf.

Das Bachelorstudium Cyber & Computer Security bereitet Dich optimal auf eine Karriere in diesem Bereich vor. Mit der Fachhochschule des Mittelstands und der University of Gloucestershire haben sich gleich zwei renommierte Institutionen zusammengetan und bieten Dir internationales Know-how auf höchstem Niveau. Du profitierst durch die Expertise der führenden Cyber Security-Universität und bekommst spannende und praxisnahe Inhalte vermittelt – auch in Kollaboration mit britischen Regierungsorganisationen!

Studiere jetzt den B.Sc. Cyber & Computer Security am Campus der Fachhochschule des Mittelstands und der University of Gloucestershire in Düren – das Studium in Vollzeit für deine berufliche Zukunft.

Erfahre mehr über die University of Gloucestershire.

Click here for the English version

Become a cyber security expert!

In addition to its countless advantages and opportunities in everyday life, advancing digitalisation also comes with it a large number of risks and dangers. Cyber attacks are becoming increasingly complex and pose a serious threat to social infrastructure, which can result in high economic damage. It has long been clear that the protection of private individuals, companies and institutions requires the expertise and research of qualified professionals in the field of cyber security.

The Bachelor's degree programme Cyber & Computer Security optimally prepares you for a career in this field. With the University of Applied Sciences and the University of Gloucestershire, two renowned institutions have joined forces to offer you international know-how at the highest level. You benefit from the expertise of the leading cyber security university and are taught exciting and practical content - also in collaboration with British government organisations!

Study Cyber & Computer Security now at the campus of the University of Applied Sciences and the University of Gloucestershire in Düren - the full-time study programme for your professional future

Find out more about the University of Gloucestershire.

Alle Details zu Deinem Studium!

Vollzeit-Studium

Standort

Dauer

3 Jahre*

Studienstart

April, Oktober

Studiengebühren

Düren

7,500 €/ Jahr

Non-EU Applicants: refer to agent for fees

Credits

360 UK-credits (180 ECTS)

Einmalige Gebühren

500,00 € (Abschlussprüfung)

Sonstiges

Alle Module finden in Englisch statt.
Der Kursinhalt wird in Unterrichtsblöcken vermittelt.
Pro Trimester finden 3 Wochen Blockunterricht statt.

Information on the B.Sc. (Hons) Cyber and Computer Security programme

Possible careers

Graduates from this course can go on to work in:

  • penetration testing
  • systems security
  • information security management
  • digital forensic examination
  • law enforcement
  • civil forensic examination

Course modules

Here's an example of the types of modules you'll study (it's unlikely but the contents and structure of the course could change).

The course content is taught in teaching blocks. There are 3 weeks of block teaching per trimester. 

Level 4 (Undergraduate year 1)

All students must complete these modules:

Computers and Security

This module introduces the core concepts of computers and security by considering the design and operation of computers and computer networks, the implications of security and how computers may be programmed.

Scheduled Contact Hours: 72
Independent Learning Hours: 228
Assessment
001: 50% Assignment: Individual: 2000 words or equivalent
002: 50% Assignment: Individual: 2000 words or equivalent

Principles of Cyber Forensics

This module introduces the foundation of computer and cyber forensics. The students will learn about different tools and techniques for conducting a forensic investigation on a range of digital information and sources.

Scheduled Contact Hours: 72
Independent Learning Hours: 228
Assessment
001: 50% Assignment: Individual: 2000 words or equivalent
002: 50% Assignment: Individual: 2000 words or equivalent

Principles of Programming

This module introduces the principles of programming and develops an understanding of problem solving techniques for software development using a programming language.

Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment
001: 100% Assignment: Individual: 2000 words or equivalent

Maths for Data Science

The module aims to introduce basic topics in data analysis, probability, statistics and hypothesis testing. This module will provide students with a range of processes and techniques to address data science and its theoretical foundation.

Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment
001: 100% Assignment: Individual: 2000 words or equivalent

Systems Design

This module introduces software engineering principles and practices necessary to developing quality software-intensive systems for business use. Students will be introduced to working in teams to identify business requirements and turn these into practical, workable solutions.

Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment
001: 100% Assignment: Individual: 2000 words or equivalent

Web Development

This module covers the business rationale for using the web as a solution to a business problem, together with the core technologies required to create such solutions. Students will create structured websites using both scripts (e.g., html, CSS; JavaScript, php, MySql) and industry-standard software (e.g., Adobe DreamWeaver). The module would be suited to a student in any computing field who wishes to obtain an understanding of the Internet, its facilities and technologies and gain experience in production techniques.

Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment
001: 100% Assignment: Individual: 2000 words or equivalent

Level 5 (Undergraduate year 2)

All students must complete these modules:

Operating Systems

This module investigates underlying architecture and operation of operating systems including Windows, Unix and Linux and Mac OS. The students will learn the core concepts of installation, administration and security.

Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment
001: 100% Assignment: Individual: 2500 words or equivalent

Cryptography & Security

This module will aim to provide an introduction to the fundamental concepts, theory and application of cryptography. A number of cryptographic techniques and encryption algorithms will be studied and examined. The primary objective for students is to understand and synthesize the practical application of modern cryptography.

Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment
001: 100% Assignment: Individual: 2500 words or equivalent

Network Design & Configuration

This module aims to provide an understanding of the principles of networking, network design and network architecture and infrastructures. A number of core networking topics will be delivered. They include, networking principles, network architecture and design, network standards, configuration of network devices, routers and switches. Network trouble-shooting, maintenance, support and the provision of network redundancy, fault-tolerance and load balancing will also be included.

Scheduled Contact Hours: 72
Independent Learning Hours: 228
Assessment
001: 50% Assignment: Individual: 2500 words or equivalent
002: 50% Assignment: Individual: 2500 words or equivalent

Ethical Hacking & Security

This module aims to provide both the theoretical and practical skills in the area of ethical hacking and how this is conducted within the available frameworks in an ethical way within UK, EU, and international laws.

Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment
001: 100% Assignment: Individual: 2500 words or equivalent

You can choose from the following modules:

Data Analytics

This module provides an understanding of analytic techniques to process data and find useful patterns. Data can be in various forms such as textual, image or audio and can be collected from various sources such as sensors, devices, networks, log files, web, social media etc.
Students are assumed to have some background in programming. Learning and Teaching Activities
Scheduled Contact Hours: 36
Independent Learning Hours: 114


Assessment
001: 100% Assignment: Individual: 2500 words or equivalent

Professional Issues

Professional issues introduces students to the professional and ethical issues of computing disciplines and facilitates the consideration of these professional and ethical issues within the business arena, allowing students to reflect on maximising their own employability within organisations of the 21st century. Learning and Teaching Activities
Scheduled Contact Hours: 24
Independent Learning Hours: 126


Assessment
001: 100% Assignment: Individual: 2500 words or equivalent

Managing the Security of Information

This module is concerned with the security of information and how it may be managed to ensure confidentiality, integrity and availability. It encompasses the role of the Information Security Officer, security policies, standards and managing user activities.

Learning and Teaching Activities
Scheduled Contact Hours: 36
Independent Learning Hours: 114


Assessment
001: 100% Assignment: Individual: 2500 words or equivalent

Cyber Human Factors

This module is concerned with critically evaluating challenges associated with the human factors element of cyber security. As such, it focuses on managing and mitigating the complex, ever-evolving elements of cyber risk in socio-technical organisational systems.

Learning and Teaching Activities
Scheduled Contact Hours: 36
Independent Learning Hours: 114


Assessment
001: 100% Assignment: Individual: 2500 words or equivalent

Level 6 (Undergraduate final year)

All students must complete these modules:

Computing Technology Placement

Twelve months work based learning

Scheduled Contact Hours: 8
Independent Learning Hours: 72
Scheduled Hours on Placement: 920
Assessment
001: 100% Assignment: Individual: 2500 words or equivalent

Advanced Networking & Security

The aim of this module is to build on the network design and implementation principles from module CT5047. The objective is to defend and protect the network infrastructure, architecture, protocols and applications in order to deliver secured protocols, applications, services and data. The cyber security framework of identifying, protecting, detecting, responding and recovery in relation to network security will be evaluated and critically analysed during the module.

Students will be capable of analysing, designing and managing the requirements of a secure network architecture based on risk analysis and operational requirements in accordance with regulations and standards.

Scheduled Contact Hours: 72
Independent Learning Hours: 228
Assessment
001: 50% Assignment: Individual: 2000 words or equivalent
002: 50% Assignment: Individual: 2000 words or equivalent

Dissertation Research Methods

This module aims to give students an in-depth study in the practical and theoretical skills required to read, understand, and undertake academic research in the computing-related disciplines.

Scheduled Contact Hours: 36
Independent Learning Hours: 114
Assessment
001: 100% Assignment: Individual: 3000 words or equivalent

Dissertation

This module provides the opportunity for students to study in depth a topic of their own choice within the subject area of their course. Students self-manage an academic investigation of an appropriate topic with support from an adviser.

Learning and Teaching Activities
001: 100% Dissertation / Major Project: 8000 words or equivalent and poster presentation

You can choose from the following modules:

Advanced Topics in Technology and Innovation

This module provides the student with the opportunity to research current innovative issues in technology. The topics will be introduced in a series of lectures and then discussed in seminars with the student contributing written and verbal content.

Learning and Teaching Activities
Scheduled Contact Hours: 24
Independent Learning Hours: 126


Assessment
001: 100% Assignment: Individual: 3000 words or equivalent

Penetration Testing Certification

This module aims to provide an understanding and practical application of penetration testing. It will help prepare students for the CESG CHECK certification. Students will learn different methodologies, tools and techniques used for penetration testing to comply with the required scope and requirements. Industry tools and frameworks will be applied in a controlled computer lab environment, simulating a live configuration.

Students will be expected to develop a strong understanding of the technical components of penetration testing. The planning, scoping, reconnaissance, scanning, exploitation and post exploitation of a penetration test. The legal frameworks, risk analysis and management, penetration testing methodologies and frameworks. The importance of report writing and presentation.

Furthermore, students will develop and improve their skills to apply theory, analytical and problem based approaches to penetration testing and system auditing. Students will evaluate Targets of Evaluation (ToE) through hands-on practical sessions.

Learning and Teaching Activities
Scheduled Contact Hours: 36
Independent Learning Hours: 114


Assessment
001: 100% Exam: Unseen, Closed Book: 2.00 hours

Cyber Security Management

This module aims to critically evaluate and synthesise cyber security management. This is a multi-faceted subject addressing the socio-technical elements of cyber security. Students will learn the strategic components of cyber security; governance, aligning cyber security strategy with business requirements, goals and objectives. Protecting organisations, threat identification, risk assessment and management, security context, breach management, cyber security roadmaps and frameworks. The module will allow student to understand how to design a cyber intelligence framework for organisations.

Learning and Teaching Activities
Scheduled Contact Hours: 24
Independent Learning Hours: 126


Assessment
001: 100% Assignment: Individual: 3000 words or equivalent

Secure Coding

The module explores a range of recognised software security problems using motivational examples. This module looks at the fundamental sources of vulnerabilities arising at the programming level including inadequate handling of exception situations, poor understanding of the details of the programming language in use, incomplete descriptions of the interface between components, and insufficient care in the treatment of concurrency and threading issues, and how these relate to evolving threat models.

Learning and Teaching Activities
Scheduled Contact Hours: 36
Independent Learning Hours: 114


Assessment
001: 100% Assignment: Individual: 3000 words or equivalent

Malware Analysis

Learning and Teaching Activities
Scheduled Contact Hours: 24
Independent Learning Hours: 126


Assessment
001: 100% Assignment: Individual: 3000 words or equivalent

Entry requirements

Germany

Zeugnis der Allgemeinen Hochschulreife (Abitur) with a grade of 2 out of 6 or a Gut. English

Language requirement:

IELTS 6.0 overall with no less than 5.5 in any band

Abitur English taken as Hauptfach/Leistungskurs with a minimum grade of 10 can be accepted.

India

Successful completion of Higher Secondary Certificate/Indian School Certificate/Standard XII with a minimum of 65% from CISCE and CBSE boards. Completion of a recognised foundation course. Please note that some courses may require higher entry requirements. Applicants are advised to check the course page, and/or conditions stated in the offer letter. More information: https://www.glos.ac.uk/international/in-your-country/india/

Contact: india@@doctoral-school.de

China

  • For high school graduates:

1. Senior Secondary School Graduation Certificate + Three years of high school transcripts (80% overall).

高中毕业证书 + 高中三年成绩单(每科均达到满分的80% 以上)

2. Senior Secondary School Graduation Certificate + Seni- or Secondary Academic Proficiency Test with a minimum grade of 80% A.

高中毕业证书 + 普通高中学业水平考试/会考(A等级占比达80%以上)

3. Senior Secondary School Graduation Certificate + National College Entrance Examination with a minimum score in a relevant stream of:

高中毕业证书 + 普通高等学校招生全国统一考试/高考(最低分数需达到):

Full score满分

Minimum score

最低分数

750

425

660

375

480

275

900

525

 

Interested candidates who do not meet the above requirements are also advised to contact us.

  • For current university students:

One year (or more) of university study in China with a minimum grade of 70% overall.

Undergraduate (Advanced Entry to Bachelor Degree):
Level 5: 

  • Two-three year Diploma (Dazhuan / Zhuanke) in a related subject area.
  • Successful completion of a minimum 2 years’ university study in a related subject area.
  • NB: Detailed module information (in English) with learning outcomes and lecture schedules is required for consideration.

Level 6:

  • Three year Diploma (Dazhuan/ Zhuanke) in a related subject area.
  • Successful completion of three years’ university study in a related subject area.
  • HND / SQA Advanced Diploma in a related subject area.
  • NB: Detailed module information (in English) with learning outcomes and lecture schedules is required for consideration for advanced standing into Level 6.
    More information: https://www.glos.ac.uk/international/in-your-country/china/   

Apply

To apply for the Cyber Security M.Sc. programme, please fill in the following form and send it to us by dueren@@fh-mittelstand.de.

Downloads

Stories from our students

Harry is studying Cyber and Computer Security.

“I’ve had so many opportunities on my course – travelling to Las Vegas for DEFCON26, exhibiting at cyber security conventions, and … on placement at BAE Systems.”

Harry has just completed his exciting placement year in the Insider Threat Team at BAE. He’s now completing his final year back on campus in our incredible computing facilities.