BSc (Hons) Cyber Security and Forensic Computing (Top-up)

BSc (Hons) Cyber Security and Forensic Computing (Top-up)
BSc (Hons) Cyber Security and Forensic Computing (Top-up)

The BSc (Hons) Cyber Security and Forensic Computing (Top-up) is a specialised undergraduate degree designed for learners who want to advance their knowledge in cyber security, digital forensics, and data protection. This course is ideal for students who already hold a relevant Level 5 qualification, such as a diploma or foundation degree, and wish to progress to a full honours degree in a high-demand IT field.

This programme focuses on developing practical and theoretical skills needed to protect computer systems, investigate cyber incidents, and analyse digital evidence. Students will gain a strong understanding of network security, ethical hacking, cybercrime investigation, and forensic tools used in real-world scenarios. The course also covers current industry practices, legal frameworks, and emerging cyber threats to prepare learners for modern challenges.

Graduates of this cyber security and forensic computing top-up degree are well-equipped for careers in cyber security analysis, digital forensics, information security management, and IT risk assessment. This qualification supports progression into both professional roles and further postgraduate study in cyber security and related disciplines.

Modules

07

Duration

1 year

Study Mood

Online

Assessment

Assessment Based

Course Study Units

  • Network and Cloud Security
  • Digital Investigation and E-Discovery
  • Ethical Hacking
  • Project
  • Risk, Crisis and Security Management
  • Project Analysis and Practice
  • Career Development Learning

Entry Requirements

  • Minimum age: Applicants must be at least 18 years old at the time of enrolment.
  • Educational background: A relevant Level 5 qualification such as a Foundation Degree, HND, or equivalent in computing, cyber security, or IT is required.
  • Work experience: Prior academic or practical experience in IT, networking, or cyber security is recommended but not always mandatory.
  • Language proficiency: Learners must have English proficiency equivalent to IELTS 5.5 or above, or an approved equivalent qualification.

Who Can Enroll

The BSc (Hons) Cyber Security and Forensic Computing (Top-up) is designed for individuals who want to advance their expertise in cyber security, digital forensics, and information security. It is ideal for learners aiming to upgrade their existing Level 5 qualification to a full honours degree while building strong technical and analytical skills for the modern digital environment.

  • Students who have completed a Level 5 qualification such as HND, foundation degree, or diploma in computing or IT
  • Individuals looking to progress into a full BSc (Hons) degree in cyber security and forensic computing
  • Aspiring cyber security analysts who want to develop practical and job-ready skills
  • Learners interested in digital forensics, cybercrime investigation, and evidence analysis
  • IT professionals seeking to upgrade their qualifications and improve career opportunities
  • Network administrators and IT technicians aiming to specialise in cyber security
  • Individuals passionate about ethical hacking and protecting digital systems
  • Learners planning to pursue postgraduate studies in cyber security or related fields
  • Professionals looking to move into information security management roles
  • Anyone aiming to build a career in a high-demand and globally recognised IT sector

Course Learning Outcomes

Network and Cloud Security

On completing the module, students will be able to:

  • understand the security risks associated with computer networks generally and within cloud computing environments specifically.
  • explain and demonstrate the role of network security protocols and policies.
  • demonstrate a critical understanding of commonly employed network security measures.
  • describe and analyse authentication mechanisms and security modelling techniques.
  • apply appropriate network security measures to particular scenarios.
  • understand the fundamentals of network and cloud computing security with specific reference to Legal, Social, Professional, and Ethical Issues (LSPEI).
  • critically evaluate and reflect on their learning, development, and achievements within the context of the subject.

Digital Investigation and E-Discovery

On successful completion of the module students will be able to:

  • identify and apply major developments in the digital crime investigation and E-discovery field.
  • demonstrate an understanding of how advances in digital technology are related to criminal behaviour.
  • appreciate the relationships between the advances in digital technology such as encryption, data hiding techniques and obstruction and their retrieval.
  • evaluate and select appropriate tools and techniques for the detection and prevention of digital crime and e-discovery.
  • perform a digital forensic analysis using suitable the appropriate investigation tools and approaches on different types of crime, platforms and contexts.
  • Understand the e-discovery landscape through the Electronic Discovery Reference Model (EDRM) and notably Identification, Preservation, Collection, Processing, Review & Analysis, Production and Presentation.
  • be familiar with the different approaches that can be applied to real-time cybercrime investigation at law enforcement level and e-discovery at corporate level.
  • be prepared for the CompTIA Security+ certification exam.

Ethical Hacking

On completing the module, the student will be able to:

  • Demonstrate an understanding of the various types of hacking methods, techniques, tactics approaches and strategies that undermine the integrity, availability and confidentiality of computer systems and networks.
  • Use appropriate tools, techniques and methods to identify, detect, analyse, evaluate, test and document the various types of hacking attacks on computer system and networks.
  • Develop and implement practical solutions and countermeasures to thwart and reduce the various threats posed by hacking attacks on computer system and networks.
  • Apply ethical hacking guiding principles in undertaking the various leaning activities and tasks.
  • Critically reflect and evaluate the activities within the topic area in the context of Legal, Social, Ethical and Professional (LSEP) issues.

Project

On completion of the module the student should be able to:

  • Carry out independent research and investigative work.
  • Apply knowledge, skills and abilities to the solution of a previously unfamiliar real-life problem.
  • Apply a structured design process to the development of the solution.
  • Apply project management techniques to ensure that the project is completed in a timely manner, meeting the requirements of the appropriate professional body or industry standards.
  • Select from a range of alternatives the optimal solution to a problem and to justify that selection, giving due consideration to risk management and security issues.
  • Carry that solution through to final implementation, demonstrating an ability to work in a team, if appropriate.
  • Formally and correctly report on the progress and outcomes of the process, and reflect upon their personal development, legal, social, ethical and professional issues.

Risk, Crisis and Security Management

By the end of this module students should be able to:

  • understand the issues with information security and security risks;
  • identify the security risks and risk control strategies in a particular context;
  • appreciate the security controls for a particular security threat in a particular context;
  • evaluate various security technologies;
  • describe business continuity planning;
  • understand security policy, standard, and practices;
  • discuss issues related to legal, ethical, and professional issues in security management.

Project Analysis and Practice

On successful completion of this module students will be able to:

  • Understand how the process of project analysis, development, and management in a business setting.
  • Develop an understanding of how a project team is structured.
  • Understand Security and Privacy by Design principles.
  • Understand the role of UML and other tools in project management.
  • Report on research into current directions in project management within the IT sector through case studies.
  • Understand how risk affects a project and why it is important.

Career Development Learning

At the end of this module, students should be able to:

  • Demonstrate that they can function effectively as independent learners in supervised and unsupervised learning environments, including selecting and applying appropriate methods and procedures to accomplish the required tasks.
  • Communicate effectively with internal/external teams, clients, colleagues, decision-makers and budget holders.
  • Apply analytical, creative and advanced problem-solving skills relevant to the subject.
  • Critically evaluate skills and performance and plan for their systematic improvement.
  • Evidence an enhanced understanding and awareness of important commercial, social and professional factors and their impact on society as a whole and business in particular.

Inspire Institue of Technologies is an approved partner to deliver this program.

Frequently Asked Questions (FAQs)

This course is designed to upgrade a Level 5 qualification into a full honours degree while developing advanced knowledge in cyber security and digital forensics. It prepares learners to handle real-world cyber threats and digital investigations. The programme also aligns with current industry standards and employer expectations.

The course usually includes topics such as network security, cybercrime investigation, ethical hacking, and digital evidence analysis. It also focuses on legal and ethical aspects of cyber security. These subjects help learners build both technical and analytical skills.

Yes, the course is developed to meet current cyber security industry demands and global standards. It integrates practical learning with theoretical knowledge to ensure job readiness. Graduates gain skills that are relevant to modern cyber threats and technologies.

Yes, if you already have a Level 5 qualification in computing or IT, this course can support a career transition into cyber security. It provides specialised knowledge and practical skills needed in the field. This makes it suitable for career changers within the IT sector.

Yes, international students with equivalent Level 5 qualifications can apply. The course is designed with global standards, making it relevant worldwide. English language proficiency is usually required for admission.

Similar Posts