BSc (Hons) Cyber Security and Forensic Computing (Top-up)

The BSc (Hons) Cyber Security and Forensic Computing (Top-up) is a specialised undergraduate degree designed for learners who want to advance their knowledge in cyber security, digital forensics, and data protection. This course is ideal for students who already hold a relevant Level 5 qualification, such as a diploma or foundation degree, and wish to progress to a full honours degree in a high-demand IT field.
This programme focuses on developing practical and theoretical skills needed to protect computer systems, investigate cyber incidents, and analyse digital evidence. Students will gain a strong understanding of network security, ethical hacking, cybercrime investigation, and forensic tools used in real-world scenarios. The course also covers current industry practices, legal frameworks, and emerging cyber threats to prepare learners for modern challenges.
Graduates of this cyber security and forensic computing top-up degree are well-equipped for careers in cyber security analysis, digital forensics, information security management, and IT risk assessment. This qualification supports progression into both professional roles and further postgraduate study in cyber security and related disciplines.
Course Overview
Modules
07
Duration
1 year
Study Mood
Online
Assessment
Assessment Based
Course Study Units
- Network and Cloud Security
- Digital Investigation and E-Discovery
- Ethical Hacking
- Project
- Risk, Crisis and Security Management
- Project Analysis and Practice
- Career Development Learning

Entry Requirements
Who Can Enroll
The BSc (Hons) Cyber Security and Forensic Computing (Top-up) is designed for individuals who want to advance their expertise in cyber security, digital forensics, and information security. It is ideal for learners aiming to upgrade their existing Level 5 qualification to a full honours degree while building strong technical and analytical skills for the modern digital environment.
- Students who have completed a Level 5 qualification such as HND, foundation degree, or diploma in computing or IT
- Individuals looking to progress into a full BSc (Hons) degree in cyber security and forensic computing
- Aspiring cyber security analysts who want to develop practical and job-ready skills
- Learners interested in digital forensics, cybercrime investigation, and evidence analysis
- IT professionals seeking to upgrade their qualifications and improve career opportunities
- Network administrators and IT technicians aiming to specialise in cyber security
- Individuals passionate about ethical hacking and protecting digital systems
- Learners planning to pursue postgraduate studies in cyber security or related fields
- Professionals looking to move into information security management roles
- Anyone aiming to build a career in a high-demand and globally recognised IT sector
Course Learning Outcomes
Network and Cloud Security
On completing the module, students will be able to:
- understand the security risks associated with computer networks generally and within cloud computing environments specifically.
- explain and demonstrate the role of network security protocols and policies.
- demonstrate a critical understanding of commonly employed network security measures.
- describe and analyse authentication mechanisms and security modelling techniques.
- apply appropriate network security measures to particular scenarios.
- understand the fundamentals of network and cloud computing security with specific reference to Legal, Social, Professional, and Ethical Issues (LSPEI).
- critically evaluate and reflect on their learning, development, and achievements within the context of the subject.
Digital Investigation and E-Discovery
On successful completion of the module students will be able to:
- identify and apply major developments in the digital crime investigation and E-discovery field.
- demonstrate an understanding of how advances in digital technology are related to criminal behaviour.
- appreciate the relationships between the advances in digital technology such as encryption, data hiding techniques and obstruction and their retrieval.
- evaluate and select appropriate tools and techniques for the detection and prevention of digital crime and e-discovery.
- perform a digital forensic analysis using suitable the appropriate investigation tools and approaches on different types of crime, platforms and contexts.
- Understand the e-discovery landscape through the Electronic Discovery Reference Model (EDRM) and notably Identification, Preservation, Collection, Processing, Review & Analysis, Production and Presentation.
- be familiar with the different approaches that can be applied to real-time cybercrime investigation at law enforcement level and e-discovery at corporate level.
- be prepared for the CompTIA Security+ certification exam.
Ethical Hacking
On completing the module, the student will be able to:
- Demonstrate an understanding of the various types of hacking methods, techniques, tactics approaches and strategies that undermine the integrity, availability and confidentiality of computer systems and networks.
- Use appropriate tools, techniques and methods to identify, detect, analyse, evaluate, test and document the various types of hacking attacks on computer system and networks.
- Develop and implement practical solutions and countermeasures to thwart and reduce the various threats posed by hacking attacks on computer system and networks.
- Apply ethical hacking guiding principles in undertaking the various leaning activities and tasks.
- Critically reflect and evaluate the activities within the topic area in the context of Legal, Social, Ethical and Professional (LSEP) issues.
Project
On completion of the module the student should be able to:
- Carry out independent research and investigative work.
- Apply knowledge, skills and abilities to the solution of a previously unfamiliar real-life problem.
- Apply a structured design process to the development of the solution.
- Apply project management techniques to ensure that the project is completed in a timely manner, meeting the requirements of the appropriate professional body or industry standards.
- Select from a range of alternatives the optimal solution to a problem and to justify that selection, giving due consideration to risk management and security issues.
- Carry that solution through to final implementation, demonstrating an ability to work in a team, if appropriate.
- Formally and correctly report on the progress and outcomes of the process, and reflect upon their personal development, legal, social, ethical and professional issues.
Risk, Crisis and Security Management
By the end of this module students should be able to:
- understand the issues with information security and security risks;
- identify the security risks and risk control strategies in a particular context;
- appreciate the security controls for a particular security threat in a particular context;
- evaluate various security technologies;
- describe business continuity planning;
- understand security policy, standard, and practices;
- discuss issues related to legal, ethical, and professional issues in security management.
Project Analysis and Practice
On successful completion of this module students will be able to:
- Understand how the process of project analysis, development, and management in a business setting.
- Develop an understanding of how a project team is structured.
- Understand Security and Privacy by Design principles.
- Understand the role of UML and other tools in project management.
- Report on research into current directions in project management within the IT sector through case studies.
- Understand how risk affects a project and why it is important.
Career Development Learning
At the end of this module, students should be able to:
- Demonstrate that they can function effectively as independent learners in supervised and unsupervised learning environments, including selecting and applying appropriate methods and procedures to accomplish the required tasks.
- Communicate effectively with internal/external teams, clients, colleagues, decision-makers and budget holders.
- Apply analytical, creative and advanced problem-solving skills relevant to the subject.
- Critically evaluate skills and performance and plan for their systematic improvement.
- Evidence an enhanced understanding and awareness of important commercial, social and professional factors and their impact on society as a whole and business in particular.
