
Cyber Security - BSc (Hons)
Currently viewing course to start in 2025/26 Entry. Switch to 2026/27 Entry
September 2025 — UCAS code 1010 - BSc / 1011 - MSci
In today’s digitally connected world, secure information technologies are the backbone of modern society. As cyber threats become increasingly sophisticated, the demand for skilled cybersecurity professionals has never been greater....
64 points required
Calculate UCAS pointsClearing places available
- Level Undergraduate
- Study mode Full Time
- Award BSc (Hons)
- Start date September 2025
- Fees View course fees
- Subject
- Location City Centre
This course is:
Available with Professional Placement year
Open to International Students
Overview
Clearing 2025
64 points (or equivalent) is the minimum you will need to be considered for this course in Clearing.
Use the UCAS Tariff Calculator to work out your points.
I'm a third year Music Technology student. When I was looking for Music Technology courses, Birmingham City University really stood out to me. I was keen on attending a Bachelor of Science and the course really focussed on the science aspects as well as maintaining the artistic elements of music and sound production. The support of the tutors has been fantastic. The professional standard and the facilities on campus are great due to their accessibility around the clock. The easy access to studios has been extremely helpful in completing my work and keeping on top of deadlines. At BCU, there's been a heavy focus on employability and what I could do with all aspects of my degree. The university has organised the industrial mentor forum, a space where students can communicate with alumni and people within the industry. The Acoustics Special Interest Group also consisted of more bespoke talks from people within the acoustics industry about different aspects of the work and how individual companies run. This is how I developed contact with an acoustic consultancy to complete my placement year. I act as an Acoustic Technician at Dragonfly Consulting. It went so well that I'm returning upon my graduation to continue working with them. The university has given me opportunities I don't think I would have received anywhere else.
I'm a second year computer science student studying at Birmingham City University. As a Computing student, there are plenty of computer labs available. There's entire rooms filled with Cisco networking equipment, as well as laptops that can be rented out to complete your work. Several of the facilities have now moved over to STEAMhouse, which is a £70 million build that is now the new home for Computing and Digital Technology students. One of the main things for me was getting employment at the end of my university degree. And Birmingham City University offers a wealth support for moving into the work environment. The course is a very important focus and a very industry focussed as well. I've been offered roles as a student demonstrator for Python programming. I found that the best way to show that you've understood something is to be able to teach somebody else.
I'm studying Computer Networks and Security. So far, I've really enjoyed my time at BCU. I felt really included within the student community. For the past two years, I've been involved in Innovation Fest. This is an annual event that showcases student work from the faculty. A lot of employers visit this festival, which allows us to widen our professional network. Throughout my time at BCU, I've had some time to
develop a relationship with the Careers+ team and go through tailoring my CV and my cover letters with them. Because of this, I have been presented with many opportunities which they have tailored to me and my needs. Through this, I was encouraged to apply for the women in tech competition.
So it was a one week program and I was working with the team from Cyferd. It's a software company,
and I successfully won and have taken up the placement year with them as a Junior Development Lead.
I look forward to coming back and applying the skills I've learnt throughout my placement and applied them within my studies.
In today’s digitally connected world, secure information technologies are the backbone of modern society. As cyber threats become increasingly sophisticated, the demand for skilled cybersecurity professionals has never been greater.
The BSc Cyber Security course is designed to equip you with cutting-edge technical expertise, analytical proficiency, management capabilities, and practical skills to effectively tackle the cybersecurity challenges faced by modern organisations. Our strong links with industry enable us to teach the most demanding and up-to-date topics.
Introducing STEAMhouse
STEAMhouse is a centre for technology, innovation, creative thinking, prototyping and business development. Our £70 million pound building is the home for all of our Computing courses.
What's covered in this course?
Taking a practice-led approach, the course emphasises hands-on experience with industry-standard tools and technologies, ensuring that graduates are well-prepared for successful careers in cybersecurity.
The industry-informed curriculum is structured to provide a strong foundation in security principles while fostering the critical thinking and problem-solving skills necessary to defend against cyber threats.
The course benefits from a dynamic research-inspired environment and is supported by strong industry partnerships with leading organisations including CISCO, EC-Council, Oracle, IBM, Microsoft and the Linux Professional Institute. These collaborations provide students with exposure to real-world cybersecurity challenges, access to professional networks, and opportunities to work with cutting-edge technologies, enhancing both learning and career prospects.
In your first year, you will develop a strong foundation in computing and cybersecurity, covering essential subjects such as cybersecurity fundamentals, computer programming, computer systems, networking fundamentals, and mathematics for computing.
During your second year, you will expand your knowledge through advanced cybersecurity subjects, including software security, applied cryptography, networking technologies, applied cyber forensics, and cybersecurity operations. Additionally, you will have the option to undertake a sandwich placement year between your second and final year, gaining valuable industry experience.
In your final year, you will study subjects such as ethical hacking, applied artificial intelligence (AI) for cybersecurity and cloud computing. You will also complete an individual project, demonstrating your technical expertise and preparing you for career opportunities in the cybersecurity field.
The final year students will take part in our annual Innovation Fest which is a unique opportunity for our students to showcase their creativity, problem-solving skills, and technical expertise. Our students have pushed the boundaries of what is possible and created solutions to real-world challenges.
Upon graduation you could progress into a career as a Cyber Security Analyst, Penetration Tester, Security Architect, Security Operations Centre (SOC) Analyst, Risk and Compliance Analyst and Cloud Security Engineer.
Professional Placement year
This course offers an optional professional placement year. This allows you to spend a whole year with an employer, following successful completion of your second year, and is a great way to find out more about your chosen career. Some students even return to the same employers after completing their studies.
If you choose to pursue a placement year, you will need to find a suitable placement to complement your chosen area of study. You will be able to draw on the University’s extensive network of local, regional, and national employers, and the support of our Careers teams. If you are able to secure a placement, you can request to be transferred to the placement version of the course.
Please note that fees are payable during your placement year, equivalent to 20% of the total full-time course fee for that year.
Accredited By
This course is accredited by:
Why Choose Us?
- Brand new facilities at STEAMhouse - This state-of-the-art building is the new home for our Computing courses. Based at our expanding City Centre Campus, this unique centre will give you access to outstanding facilities and teaching spaces, as well as opportunities to collaborate with people and businesses across multiple sectors and work on real industry-based projects.
- Student satisfaction - Top 20 in the UK for student satisfaction for Computer Science (Complete University Guide 2025).
- Home to Cisco Systems and Microsoft Academy Centre. We are one of Microsoft’s top UK university-based academies and we are a member of the Microsoft Developer Network Academic Alliance. This means we are able to use various Microsoft software products and online resources for research. We are also a Cisco ASC and one of only ten Cisco Instructor Training Centre’s in the UK.
- Optional placement year - You will have the option to carry out a placement year, in between your second and final year, giving you valuable work experience to enhance your employability.
- Showcase your work - Innovation Fest is designed to foster entrepreneurship and support the development of our students as future world-changers. The festival contributes to the knowledge economy, increasing students’ employability by providing genuine portfolio material.
Open Days
Join us for an Open Day where you'll be able to learn about this course in detail, chat to students, explore our campus and tour accommodation.
Next Open Day: 4 October 2025
Entry Requirements
These entry requirements apply for entry in 2025/26.
All required qualifications/grades must have been achieved and evidenced at the earliest opportunity after accepting an offer to help confirm admission and allow for on-time enrolment. This can also include other requirements, like a fee status form and relevant documents. Applicants can track their application and outstanding information requests through their BCU mySRS account.
64 points (or equivalent) is the minimum you will need to be considered for this course in Clearing.
Use the UCAS Tariff Calculator to work out your points.
Essential requirements
- Standard offer: 112 UCAS Tariff points. Learn more about UCAS Tariff points.
- Accelerate offer: 80 UCAS Tariff points. Find out more about BCU Accelerate.
If you have a qualification that is not listed, please contact us.
Don’t meet our entry requirements?
You could apply for a foundation course or a course at our International College. These routes have lower entry requirements and act as the bridge to a full degree. To find out more, please select your status:
Fees & How to Apply
UK students
Annual and modular tuition fees shown are applicable to the first year of study. The University reserves the right to increase fees for subsequent years of study in line with increases in inflation (capped at 5%) or to reflect changes in Government funding policies or changes agreed by Parliament. View fees for continuing students.
Award: BSc (Hons)
Starting: Sep 2025
- Mode
- Duration
- Fees
- Full Time
- 3 years
- £9,535 in 2025/26
- Apply via Clearing
International students
Annual and modular tuition fees shown are applicable to the first year of study. The University reserves the right to increase fees for subsequent years of study in line with increases in inflation (capped at 5%) or to reflect changes in Government funding policies or changes agreed by Parliament. View fees for continuing students.
Award: BSc (Hons)
Starting: Sep 2025
- Mode
- Duration
- Fees
- Full Time
- 3 years
- £17,690 in 2025/26
Places available to start in September
If you'd like to start this course full-time this September, you can apply through Clearing.
International and part-time students can apply online as normal using the links above.
Want to start in September 2026? You can apply via UCAS from September 2025.
Personal statement
UK / EU students are required to submit a personal statement as part of their application for this course.*
The personal statement gives you a crucial opportunity to say why you’re applying and why the institution should accept you.
Here are the key areas you’ll need to address:
- Course choice - Why does this course appeal? What areas are of particular interest?
- Career plans - If you have a specific career in mind, say how your chosen course will help you pursue this goal.
- Work experience - Mention any work that is relevant to your subject, highlighting the skills and experience gained.
- School or college experience - Highlight skills gained at school/college, eg summer schools or mentoring activities.
- Non-accredited skills or achievement - eg Duke of Edinburgh Award, Young Enterprise scheme.
You should also mention your future plans – if you’re planning to take a year out, don't forget to give your reasons. Talk about any subjects you’re studying that don’t have a formal assessment and any sponsorships or placements you’ve applied for. And don't be scared to add in details about your social, sports or leisure interests.
Worried about Personal Statements?
If you've got no idea where to start or just want to check you're on the right track, we’ve got expert advice and real examples from our students to help you nail your personal statement. You can even download our ultimate personal statement guide for free.
*Non-EU students are not required to submit a personal statement when applying for this course.

Financial Support
We offer further information on possible undergraduate financial support. This includes the type of loans, grants and scholarships available both from the government and from Birmingham City University.
Course in Depth
Year One
In order to complete this course, you must successfully complete all the following CORE modules (totalling 120 credits).
Within the Computer Systems Module, you will gain knowledge and experience of computers and computer hardware.
This module presents a holistic view of how computer systems work and it also provides the underpinning knowledge required:
- for the design of computer architecture
- to show how software interacts with hardware
- to apply electronics principles
- to use number systems for computer technology
The module introduces the fundamental elements of cybersecurity and its body of knowledge. It aims to develop a firm grounding in the underpinning knowledge and skills required to protect organisations from cyber-attack. You will be introduced to cybersecurity principles and implications of threats, vulnerability and risks facing these organisations.
In this module, you learn how modern operating systems are the glue that bind computer hardware and networks together and how they manage the user experience for individual computers and wider networks. We will focus on the function and purpose of operating systems, with a focus on hands-on practical skills.
We will build on learning from your networking, programming and computer systems modules, enhancing and extending skills in all these areas. You will make heavy use of Open Source Software, demonstrating what can be achieved with this huge publicly shareable resource on a very limited budget.
Within the module of Computer Programming you will learn the key skills of Programming and how this relates to technology and communications. Programming is an engineering tool that plays a vital role to drive most of the modern technologies surrounding us, including the technological devices for communication, transportation and entertainment.
In other words, it can be said that our modern lifestyles are heavily dependent on programming. Moreover, businesses increasingly rely on computers and the software run on them. Programming skills and a broader and deeper understanding of programming are therefore becoming increasingly important to the jobs market.
The module gives you the opportunity to learn mathematical concepts and methods and critically reflect on how they relate to computing and communication systems. You will develop core mathematical and statistical skills which are fundamental in computing and technical work in general. You will be expected to solve mathematical and statistical problems on paper and on a computer
The module provides the opportunity to learn and critically reflect the skills required in building and designing basic networks and their requirements within a network infrastructure. This module builds on the underpinning knowledge and theory of networking systems.
Year Two
In order to complete this course, you must successfully complete all the following CORE modules (totalling 120 credits).
Software is ubiquitous. Not only is it deployed on traditional computing platforms (such as workstations and servers), but it is also embedded in network equipment (such as routers and firewalls) and consumer devices (such as hearing aids and smartphones). In this module, we will explore the foundations of software security, important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking. The module explores defenses that prevent or mitigate these attacks, including advanced testing and analysis techniques. You will also learn how product vendors and services should manage exposed vulnerabilities and how vulnerabilities are being disclosed to stakeholders in an ethical way. It continues the software theme that you began at Level 4 when you studied the Computer Programming and Applied Operating Systems module.
The module has been designed to provide you with the necessary theoretical framework, foundations and practical support for understanding security solutions with reference to the application of cryptography, access control and a wider range of security attack categories and defensive approaches and systems.
This module begins with an introduction to the core principles and processes of a typical computer forensic investigation. It aims to develop a firm grounding in the underpinning knowledge and skills required to analyse and evaluate the authenticity of data from a computer and related data storage devices in a forensically sound manner. The module will teach you the fundamental data structures applicable to computer forensics and how various software tools can be employed to analyse these structures in a variety of case types.
The module provides you with an opportunity to build on the learning and to develop knowledge of cyber security and how it relates to information and network security. This module builds on Hardware and Security Fundamentals module and will allow you to protect a network system from issues of cyber-crime, based on security principles and the principles of how to defend networks from attack
In this module you will have the opportunity to learn and critically reflect on the skills required for Network Technologies. This module builds your knowledge and underpinning theory for the networking modules and you will review the requirements from a small to medium scale network deployment engineering context.
This module covers key areas of cryptography, including symmetric and asymmetric encryption algorithms, public key infrastructure (PKI), digital signature, digital certificates, key exchange and management.
In addition, the module will cover the application of cryptographic techniques to address security requirements such as confidentiality, integrity, authenticity, and non-repudiation. You will use various block cipher-based cryptographic algorithms such as Advance Encryption Algorithm (AES), RSA, Diffie-Hellman, and secure hash functions.
Professional Placement Year (Optional)
In order to qualify for the award of BSc (Hons) Cyber Security with Professional Placement Year a student must successfully complete the following module.
This module is designed to provide you with the opportunity to undertake a credit bearing, 40- week Professional Placement as an integral part of your Undergraduate Degree.
The purpose of the Professional Placement is to improve your employability skills which will, through the placement experience, allow you to evidence your professional skills, attitudes and behaviours at the point of entry to the postgraduate job market. Furthermore, by completing the Professional Placement, you will be able to develop and enhance your understanding of the professional work environment, relevant to your chosen field of study, and reflect critically on your own professional skills development within the workplace.
Final Year
In order to complete this course, you must successfully complete all the following CORE modules (totalling 120 credits).
The purpose of the module is to enable you to undertake a sustained, in-depth and research-informed project exploring an area that is of personal interest to you. In agreement with your supervisor, you will decide upon your topic which will take the form of a practical outcome (artefact) with accompanying contextual material. The main consideration when choosing your topic is that it must be aligned to the programme you are studying, and you should consider the relevance of this topic to your future academic or professional development.
The module provides you with an opportunity to learn and critically reflect on the skills of Ethical Hacking and information security within a global context. This module builds on the knowledge and underpinning theory from the networking modules and reviews the requirements for a secure network communication system.
As cyberattacks grow in volume and complexity, artificial intelligence (AI) is a vital tool assisting security operations analysts to stay ahead of threats. Looking after threat intelligence from millions of research papers, blogs and news stories, AI technologies like machine learning provide rapid insights to cut through the noise of daily alerts, drastically reducing response times. AI is a powerful tool for identifying vulnerabilities, threats, and attacks in cyberspace. AI-based cybersecurity can detect and analyse enormous amounts of data, seeking malicious patterns and providing necessary recommendations.
This module provides students with knowledge and practical skills essential for the acquisition, analysis and interpretation of evidence obtained from wired and wireless networked computers and storage systems. Emphasis is also placed on the evidence harboured by network hardware devices, such as routers and switches.
You will learn how to effectively retrieve valuable information from the Microsoft Windows Server operating systems and analyse the Active Directory for evidence pertaining to user policies, privileges and violations. You will also learn how to formulate and implement a strategy to acquire drive images as evidence files over networked computers.
One of the major objective of the computer science program is to introduce the theory, principles and technologies underlying the construction of modern computing systems. This module introduces, Cloud Computing which is the technology that enables on-demand computing resources (everything from applications to data centres) over the internet.
Download course specification
Download nowWe think it’s important that you are assessed in a number of different ways during your Cyber Security BSc (Hons) course. These will include including continuous assessment, in-class tests, examinations, laboratory exercises and project work.
Attendance requirements
For more information on attendance requirements, course contact time and suggested self-study hours, download the course specification.
International Opportunities
You are able to apply to undertake part of your studies abroad, allowing you to experience life and studying in another country at one of our exchange partner universities.
This offers a unique opportunity to enhance your CV and experience new cultures.

Athena Swan Bronze Award
We have successfully secured the Athena SWAN Departmental Bronze Award recognising a commitment to gender equality.
The Athena Swan Charter is a framework which is used across the globe to support and transform gender equality within higher education (HE) and research.
The BSc Cyber Security course provided me with a comprehensive and practical education, grounded in real-world application and industry relevance. Through a hands-on, practice-led approach, I gained experience with industry-standard tools and technologies, equipping me with the technical proficiency required in today’s cybersecurity landscape.
From the outset, the course built a strong foundation in key areas such as cybersecurity fundamentals, computer systems, networking, and programming. As I progressed, I developed deeper knowledge in advanced topics including software security, cryptography, cyber forensics, and cybersecurity operations. The opportunity to engage with ethical hacking, and cloud computing in my final year allowed me to explore emerging technologies and their application in protecting digital environments.
Working on an individual project and participating in Innovation Fest enabled me to demonstrate initiative, creativity, and problem-solving ability, while the course’s strong industry connections exposed me to real-world challenges and professional networks. These experiences collectively enhanced my confidence and employability.
The course has equipped me with a wide-ranging skill set including technical investigation, critical thinking, and the ability to respond effectively to cyber threats. These skills directly led to my current role in cybersecurity, where I apply the knowledge and practical experience gained throughout my degree on a daily basis.
Alumnus Zane Khan
We are an academic partner of the Chartered Institute of Information Security.
Employability
Enhancing your employability
Your studies here will equip you with the practical and academic skills that will help you to stand out when you look for your first professional role.
Because we have strong links with companies such as SAS, Microsoft, Cisco and Capgemini, you have the chance to work with and understand the workings of real-life industry from early on in your degree studies.
You will have access to world-class facilities throughout your time here and these will help you to be a highly employable graduate.
The University has a Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.
Placements
You have the option undertake an assessed sandwich year between your second and third year, which will provide you with valuable work experience and give you the real-life skills you need.
Graduate testimony
During my time in Cyber Security at Birmingham City University, I developed a strong foundation in vast areas of Cybersecurity, ISO management systems, AWS, Ethical hacking, Cisco Networking, Forensics. In my dissertation project, where I built a network vulnerability scanner using Python and machine learning, it allowed me to apply my technical skills in a real-world context and refine my problem-solving abilities.
Throughout the course, I had the opportunity to work and communicate with specialist subject area lecturers, who guided me on different career paths within cybersecurity. Their insights helped me understand the various directions I could take and what skills would be most valuable in the industry. Additionally, employment workshops provided by BCU gave me the chance to network with professionals in the cybersecurity field, which proved invaluable in shaping my career journey. These experiences not only expanded my professional connections but also helped me see how I could distinguish myself from other candidates.
George Marsh
Cyber Security Graduate Engineer at Vehicle Certification Agency
(Part of Department of Transportation)
Innovation Fest
Innovation Fest is designed to foster entrepreneurship and support the development of our first-year students as future world-changers. The festival contributes to the knowledge economy, increasing students’ employability by providing genuine portfolio material.
Facilities & Staff
Our Facilities
We are constantly investing in our estate and are currently in the process of spending £500 million on new learning facilities. This course will be taught at Millennium Point at the City Centre Campus.
The course is supported with a wide range of cutting-edge facilities in the City Centre Campus. We have a state-of-the-art computer games technology lab which contains high-performance PCs, Sony PlayStation development kits and a range of industry standard software including Unity, Unreal and a suite of professional Microsoft development tools.
We also have many open access areas where students can study together and even hire out laptops for use in these spaces and others within the university.
Within the University there are many internationally recognised research teams giving you the opportunity to collaborate with them on exciting interdisciplinary projects.
Computer networking
The laboratories are well-equipped for all our computer networking courses, as well as specialist areas for practical work such as voice-over internet protocol (VoIP), forensic and ethical hacking technologies, wireless and mobile technologies and radio frequency identification technologies to name but a few.
Software development and computer programming
There are a number of open access, software development and computer programming laboratories that can be used to develop systems and programmes, including database management systems such as MySQL, to name but a few.
Systems laboratories
Our embedded systems laboratories are used to develop real-time systems, such as specialist hardware training and development resources, and industrial-standard software development and simulation tools. These include microcontroller software and robotics design and development, to name but a few.
Electronic systems
To underpin the basic principles of electronic systems, we have a well-equipped laboratory of general and specialist test and measurement kits, including powered prototyping development boards, dual power supplies, frequency generators and counters and digital multi-meters to name but a few.
Forensic computing
Our successful development of forensic computing has led to a specialist forensics laboratory that is fully equipped with essential hardware and software for this sensitive area of study. The laboratory includes high-spec PCs with built-in multi interface Tableau write blockers, EnCase and FTK computer forensic software and steganography detection and analysis software, to name but a few.
Our staff
Dr Yussuf Ahmed
Senior Lecturer in Cyber Security
Dr Yussuf Ahmed is a Senior Lecturer in Cyber Security and Director of the BSc/MSci Cyber Security Programmes at Birmingham City University. He is a Senior Fellow of the Higher Education Academy (SFHEA) and specialises in Information Security, Cyber Assurance, Network Security, Cyber risks, and Security Governance. Yussuf is an experienced Cyber...
More about YussufDr Mohamed Ben Farah
Lecturer in Networks and Cyber Security
Mohamed (BEng, MSc, PhD, HDR) is a Lecturer in Cyber Security at Birmingham City University. Prior to this position, he was a research associate in Cyber Security at the Institute for Signals, Sensors and Communications with the Department of Electronic and Electrical Engineering at the University of Strathclyde. Mohamed has published over 30...
More about Mohamed