Cyber Security with a Foundation Year - BSc (Hons)
Currently viewing course to start in 2026/27 Entry.
Want to study a Cyber Security degree? Cyber Security with a Foundation Year ensures you will develop a range of academic and technical skills relevant to cyber security. The Foundation Year course option enables you to study for our BSc (Hons) degree over an extended full-time duration of four years by including a Foundation Certificate (year one of four)....
- Level Foundation
- Study mode Full Time
- Award BSc (Hons)
- Start date September 2026
- Fees View course fees
- Subject
- Location City Centre
This course is:
Open to International Students
Overview
Want to study a Cyber Security degree? Cyber Security with a Foundation Year ensures you will develop a range of academic and technical skills relevant to cyber security.
The Foundation Year course option enables you to study for our BSc (Hons) degree over an extended full-time duration of four years by including a Foundation Certificate (year one of four). The Foundation Certificate provides a broad study programme that underpins the follow-on degree. In order to progress to the next year of your degree, it is necessary to achieve a pass in all of the modules of the Foundation Certificate.
The BSc Cyber Security course is designed to equip you with state-of-the-art technical knowledge, intellectual know-how, management capabilities and practical skills that will enable you to succeed in meeting the cyber security challenges facing modern organisations. In the 21st century, data has become a necessary commodity, which has value in isolation and more so when viewed as a larger data set for trends and habits. Data is key to the functioning of modern business and the protection of this data is key to the ongoing success of the digital economy.
As systems, such as IoT, both generate and consume data grow in capability and complexity, the need to protect the data created, stored and transited across public and private networks intensifies. Due to this, the need for suitably qualified cyber security practitioners has never been greater. This course will provide you with the knowledge and skills needed by the employers. Our strong links with industry enable us to teach the most demanding and up-to-date topics. You will learn state of the art technical knowledge, intellectual know-how, management capabilities and hands-on practical skills to succeed in meeting the cyber security challenges faced by modern organisations.
This course is supported by a vibrant research environment within the department of Networks and Cyber Security and by traditionally strong industrial links with CISCO, Oracle, IBM, Microsoft, UK Fast, Linux Professional Institute and BT.

Introducing STEAMhouse
STEAMhouse is a centre for technology, innovation, creative thinking, prototyping and business development. Our £70 million pound building is the home for all of our Computing courses.
What's covered in this course?
Secure information technologies form the bedrock of our modern connected mobile society. Our BSc Cyber Security course will equip you to enter this growing and important industry. The course takes a practice-led approach, making use of equipment and tools found in the industry to give you the best preparation for a successful career.
Our approach prioritises the practical skills sought by industry, backing this up with a thorough understanding of theory. The course delivers the latest in computing, network and security technologies, with the opportunity to gain additional accreditation from Cisco, Juniper, Huawei and the Linux Professional Institute. The course delivers a well-rounded curriculum in the security of the communication networks; the security of computer processing and storage equipment and the software that runs on it, both private and public, and both local and cloud based; the security and accuracy of information and information systems; and the forensic analysis of threats and attacks, as well as management-level skills such as project and change management, maximising your career potential.
Studying computing with us puts you at the heart of an exciting, innovative community. Upon graduation you could progress into a career as a cyber-security engineer, network administrator, and cyber security analyst or network security architect.
Accredited By
This course is accredited by:
I always recommend Birmingham City University to students wishing to go to the UK for studies and six of them so far have listened to my advice!
Muhammad Sagir Usman
Why Choose Us?
- Brand new facilities at STEAMhouse - This state-of-the-art building is the new home for our Computing courses. Based at our expanding City Centre Campus, this unique centre will give you access to outstanding facilities and teaching spaces, as well as opportunities to collaborate with people and businesses across multiple sectors and work on real industry-based projects.
- Home to Cisco Systems and Microsoft Academy Centre - We are one of Microsoft’s top UK university-based academics and we are a member of the Microsoft Developer Network Academic Alliance. This means we are able to use various Microsoft software products and online resources for research
- Industry connections - We are also a Cisco ASC and one of only ten Cisco Instructor Training Centre’s in the UK
- State-of-the-art facilities - You will be based at Millennium Point, within our City Centre Campus that has recently received £6.5 million investment in IT facilities and software, allowing you to work with industry-standard software development and simulation tools
- Gain professional qualifications - From vendors such as Cisco, Microsoft and Linux Professional Institute. You will also have an opportunity to undertake an industry placement
Open Days
Join us for an Open Day where you'll be able to learn about this course in detail, chat to students, explore our campus and tour accommodation. Booking isn't open for the next event yet. Register your interest, and we'll let you know as soon as booking goes live.
Next Open Day: Friday 26 June
Entry Requirements
Essential requirements
80 UCAS Tariff points. Learn more about UCAS Tariff points.
If you have a qualification that is not listed, please contact us.
Fees & How to Apply
UK students
Annual and modular tuition fees shown are applicable to the first year of study. The University reserves the right to increase fees for subsequent years of study in line with increases in inflation (capped at 5%) or to reflect changes in Government funding policies or changes agreed by Parliament. View fees for continuing students.
Award: BSc (Hons)
Starting: Sep 2026
- Mode
- Duration
- Fees
- Full Time
- 4 years
- £9,790 in 2026/27
- Apply via UCAS
International students
Annual and modular tuition fees shown are applicable to the first year of study. The University reserves the right to increase fees for subsequent years of study in line with increases in inflation (capped at 5%) or to reflect changes in Government funding policies or changes agreed by Parliament. View fees for continuing students.
Award: BSc (Hons)
Starting: Sep 2026
- Mode
- Duration
- Fees
- Full Time
- 4 years
- £18,570 in 2026/27
Guidance for UK students
UK students applying for most undergraduate degree courses in the UK will need to apply through UCAS.
The Universities and Colleges Admissions Service (UCAS) is a UK organisation responsible for managing applications to university and college.
Applying through UCAS
- Register with UCAS
- Login to UCAS and complete your details
- Select your course and write a personal statement
- Get a reference
- Pay your application fee and submit your application
Course in Depth
Foundation
In order to complete this course a student must successfully complete all the following CORE modules (totalling 120 credits):
The Foundation Mathematics module provides the basic knowledge and mathematical skills which will equip the students to continue their studies to an undergraduate programme. The module will be focused on mathematics related to the field of computing.
The interactive taught sessions will use fundamental mathematical in discussions to broaden understanding of the theory and practice introduced in the module. Additional support materials will be made available on the module Moodle website.
This module will provide you with an understanding of the role of digital technologies in transforming industries and sectors. It will provide you with a comprehensive introduction to core concepts of science for digital technology, and an understanding of the fundamental aspects of science essential for studying and working with digital technologies.
You will learn systems thinking methodologies to model systems supported by digital technologies, enabling you to understand different aspects of technology, and to design your own solutions. Moreover, this module will help you to develop essential academic and personal study skills necessary for success in higher education. It will provide you with basic research, academic writing, and reflection skills. These skills are vital for your transition to higher education and will enhance your learning and academic growth.
The purpose of this module is to introduce students to the role of cyber security within modern society and everyday life. Students will explore how digital technologies influence individuals, organisations, and communities, and how cyber risks emerge within this connected environment.
The module focuses on foundational online safety practices, privacy awareness, and responsible digital behaviour. Students will examine real-world cyber incidents and consider how cyber security impacts social, ethical, and economic contexts.
This module, focused on emerging technologies, will provide you with an understanding of the latest advancements and trends in Computing and their applications. Through discussions, practical examples, and hands-on activities, you will gain knowledge and insights into how emerging technologies are shaping the digital landscape and the world.
During the journey within higher education, developing your independent study is an essential skill to support shaping the knowledge to become more useful and applied within practice. This module aims to provide you with necessary skills and tips that should support you to work independently within your discipline and to successfully apply project management tools and techniques to a mini project related to your subject discipline. Within the module, various tutorials will encourage the elements or creativity, innovation and thinking. The skills developed from this module acts as a foundation both towards subjects within your discipline, and more importantly, your final year’s project in Level 6. This module will be supported with 2hrs of extra module support session.
Foundations of programming aims to provide you with the fundamental principles and practice-based activities needed to begin developing software programs. The module details the anatomy of a structured software program that includes the creation of a program algorithm, a logical, simple and organised program flow and the generation of pseudo and programming code.
The module uses a combination of theory and practice-based sessions designed to engage students in group and individual activities to identify the components of a software program and to apply their knowledge into hands-on software programming activities. During the module sessions you will acquire the basic skills to design and create software programs.
Year One
In order to complete this course a student must successfully complete all the following CORE modules (totalling 120 credits):
Within the Computer Systems Module, you will gain knowledge and experience of computers and computer hardware.
This module presents a holistic view of how computer systems work and it also provides the underpinning knowledge required:
- for the design of computer architecture
- to show how software interacts with hardware
- to apply electronics principles
- to use number systems for computer technology
The module introduces the fundamental elements of cybersecurity and its body of knowledge. It aims to develop a firm grounding in the underpinning knowledge and skills required to protect organisations from cyber-attack. You will be introduced to cybersecurity principles and implications of threats, vulnerability and risks facing these organisations.
In this module, you learn how modern operating systems are the glue that bind computer hardware and networks together and how they manage the user experience for individual computers and wider networks. We will focus on the function and purpose of operating systems, with a focus on hands-on practical skills.
We will build on learning from your networking, programming and computer systems modules, enhancing and extending skills in all these areas. You will make heavy use of Open Source Software, demonstrating what can be achieved with this huge publicly shareable resource on a very limited budget.
Within the module of Computer Programming you will learn the key skills of Programming and how this relates to technology and communications. Programming is an engineering tool that plays a vital role to drive most of the modern technologies surrounding us, including the technological devices for communication, transportation and entertainment.
In other words, it can be said that our modern lifestyles are heavily dependent on programming. Moreover, businesses increasingly rely on computers and the software run on them. Programming skills and a broader and deeper understanding of programming are therefore becoming increasingly important to the jobs market.
The module gives you the opportunity to learn mathematical concepts and methods and critically reflect on how they relate to computing and communication systems. You will develop core mathematical and statistical skills which are fundamental in computing and technical work in general. You will be expected to solve mathematical and statistical problems on paper and on a computer
The module provides the opportunity to learn and critically reflect the skills required in building and designing basic networks and their requirements within a network infrastructure. This module builds on the underpinning knowledge and theory of networking systems.
Year Two
In order to complete this course, you must successfully complete all the following CORE modules (totalling 120 credits).
Software is ubiquitous. Not only is it deployed on traditional computing platforms (such as workstations and servers), but it is also embedded in network equipment (such as routers and firewalls) and consumer devices (such as hearing aids and smartphones). In this module, we will explore the foundations of software security, important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking. The module explores defenses that prevent or mitigate these attacks, including advanced testing and analysis techniques. You will also learn how product vendors and services should manage exposed vulnerabilities and how vulnerabilities are being disclosed to stakeholders in an ethical way. It continues the software theme that you began at Level 4 when you studied the Computer Programming and Applied Operating Systems module.
The module has been designed to provide you with the necessary theoretical framework, foundations and practical support for understanding security solutions with reference to the application of cryptography, access control and a wider range of security attack categories and defensive approaches and systems.
This module begins with an introduction to the core principles and processes of a typical computer forensic investigation. It aims to develop a firm grounding in the underpinning knowledge and skills required to analyse and evaluate the authenticity of data from a computer and related data storage devices in a forensically sound manner. The module will teach you the fundamental data structures applicable to computer forensics and how various software tools can be employed to analyse these structures in a variety of case types.
The module provides you with an opportunity to build on the learning and to develop knowledge of cyber security and how it relates to information and network security. This module builds on Hardware and Security Fundamentals module and will allow you to protect a network system from issues of cyber-crime, based on security principles and the principles of how to defend networks from attack
In this module you will have the opportunity to learn and critically reflect on the skills required for Network Technologies. This module builds your knowledge and underpinning theory for the networking modules and you will review the requirements from a small to medium scale network deployment engineering context.
This module covers key areas of cryptography, including symmetric and asymmetric encryption algorithms, public key infrastructure (PKI), digital signature, digital certificates, key exchange and management.
In addition, the module will cover the application of cryptographic techniques to address security requirements such as confidentiality, integrity, authenticity, and non-repudiation. You will use various block cipher-based cryptographic algorithms such as Advance Encryption Algorithm (AES), RSA, Diffie-Hellman, and secure hash functions.
Professional Placement Year (Optional)
In order to qualify for the award of Bachelor of Science with Honours Cyber Security with Foundation Year and Professional Placement Year, a student must successfully complete all of the modules listed as well as the following Level 5 module:
This module is designed to provide you with the opportunity to undertake a credit bearing, 40- week Professional Placement as an integral part of your Undergraduate Degree.
The purpose of the Professional Placement is to improve your employability skills which will, through the placement experience, allow you to evidence your professional skills, attitudes and behaviours at the point of entry to the postgraduate job market. Furthermore, by completing the Professional Placement, you will be able to develop and enhance your understanding of the professional work environment, relevant to your chosen field of study, and reflect critically on your own professional skills development within the workplace.
Final Year
In order to complete this course, you must successfully complete all the following CORE modules (totalling 120 credits).
The purpose of the module is to enable you to undertake a sustained, in-depth and research-informed project exploring an area that is of personal interest to you. In agreement with your supervisor, you will decide upon your topic which will take the form of a practical outcome (artefact) with accompanying contextual material. The main consideration when choosing your topic is that it must be aligned to the programme you are studying, and you should consider the relevance of this topic to your future academic or professional development.
The module provides you with an opportunity to learn and critically reflect on the skills of Ethical Hacking and information security within a global context. This module builds on the knowledge and underpinning theory from the networking modules and reviews the requirements for a secure network communication system.
As cyberattacks grow in volume and complexity, artificial intelligence (AI) is a vital tool assisting security operations analysts to stay ahead of threats. Looking after threat intelligence from millions of research papers, blogs and news stories, AI technologies like machine learning provide rapid insights to cut through the noise of daily alerts, drastically reducing response times. AI is a powerful tool for identifying vulnerabilities, threats, and attacks in cyberspace. AI-based cybersecurity can detect and analyse enormous amounts of data, seeking malicious patterns and providing necessary recommendations.
This module provides students with knowledge and practical skills essential for the acquisition, analysis and interpretation of evidence obtained from wired and wireless networked computers and storage systems. Emphasis is also placed on the evidence harboured by network hardware devices, such as routers and switches.
You will learn how to effectively retrieve valuable information from the Microsoft Windows Server operating systems and analyse the Active Directory for evidence pertaining to user policies, privileges and violations. You will also learn how to formulate and implement a strategy to acquire drive images as evidence files over networked computers.
One of the major objective of the computer science program is to introduce the theory, principles and technologies underlying the construction of modern computing systems. This module introduces, Cloud Computing which is the technology that enables on-demand computing resources (everything from applications to data centres) over the internet.
Download course specification
Download nowWe think it’s important that you are assessed in a number of different ways during your Computer Networks and Security BSc (Hons) course. These will include including continuous assessment, in-class tests, examinations, laboratory exercises and project work.
Attendance requirements
For more information on attendance requirements, course contact time and suggested self-study hours, download the course specification.
International Opportunities
You are able to apply to undertake part of your studies abroad, allowing you to experience life and studying in another country at one of our exchange partner universities.
This offers a unique opportunity to enhance your CV and experience new cultures.
Athena Swan Bronze Award
We have successfully secured the Athena SWAN Departmental Bronze Award recognising a commitment to gender equality.
The Athena Swan Charter is a framework which is used across the globe to support and transform gender equality within higher education (HE) and research.

We are an academic partner of the Institute of Information Security Professionals.
Employability
Enhancing your employability
Your studies here will equip you with the practical and academic skills that will help you to stand out when you look for your first professional role.
Because we have strong links with companies such as SAS, Microsoft, Cisco and Capgemini, you have the chance to work with and understand the workings of real-life industry from early on in your degree studies.
You will have access to world-class facilities throughout your time here and these will help you to be a highly employable graduate.
The University has a Graduate+ programme, an extracurricular awards framework that is designed to augment the subject-based skills that you’ve developed throughout the programme with broader employability attributes, which will enhance your employability options upon graduating.
Placements
You have the option undertake an assessed sandwich year between your second and third year, which will provide you with valuable work experience and give you the real-life skills you need.
Innovation Fest
Innovation Fest is designed to foster entrepreneurship and support the development of our first-year students as future world-changers. The festival contributes to the knowledge economy, increasing students’ employability by providing genuine portfolio material.
Facilities & Staff

Computing facilities
Take a look around the facilities available to you as a Computing student at BCU.
Our staff
Dr Hadeel Saadany
Lecturer in Data Science and Natural Language Processing (NLP)
Dr Hadeel Saadany is a lecturer in Data Science and Natural Language Processing (NLP). She conducts research in multidisciplinary fields focusing on the intersecting areas of NLP, Deep Learning and Artificial Intelligence (AI) in different domains. Her research projects are primarily focused on utilizing AI to solve real-life problems through...
More about HadeelProfessor Atif Azad
Professor of Artificial Intelligence
The work of Professor Azad furthers the National Artificial Intelligence Strategy, UK Digital Strategy, and BCU's 2025 strategy for creating an inclusive digital economy, closing the digital skills gap, partnership building and decreasing underrepresentation of various demographics in the tech industry via some flagship institutional...
More about AtifSandeep Singh Chahil
Lecturer
Sandeep has a background in corporate video production, having spent several years producing content for commercial video projects. He’s experienced in all stages of this process, with a strong technical knowledge of hardware and software systems.
More about Sandeep


