Course Details
Course Name
Computer Science with Security and Forensics BSc
Level of study
Undergraduate
Study Mode
Fulltime
Duration
3 Years
Start Term
Sept
Country
United Kingdom
City
Cardiff
Course Subject
- Computer Science & IT
Course Fees
Inside EU: 9000
Outside EU: 18980
Universities
Cardiff University
Description
The BSc Computer Science with Security and Forensics degree aims to provide you with a firm understanding of the principles, tools and technologies needed to ensure that an organisation's investment in information and communications technology meets its needs in a secure manner.
Students on this course will develop transferable technical, analytical and professional skills, supported by a broad awareness of current technology trends, particularly in the field of computer security. The course covers a mixture of core techniques and concepts and evolving, technology-based subject matter.
Business use of web applications and rising cases of cybercrime has fundamentally changed the nature of information security. As a concern for big business economies and consumers alike, graduates with an understanding of computer security and forensics are exceptionally valuable to many employers.
Graduates are able to objectively analyse problems and develop appropriate computational solutions. Your detailed understanding of computer security and digital forensics will make you suitable for a range of professional careers and sought-after by employers.
Distinctive features
The course does not require any prior knowledge or experience of computer science or computer security. You will begin your studies with a month-long module which establishes core concepts and competencies and supports the transition to studying at a university. You will develop your understanding of computer science, information security and digital forensics through project work and module options. A dedicated cybersecurity and digital forensics teaching laboratory supports this study.
Our approach to security and forensics is that they should be considered first from a business needs and requirements perspective, then follow a systematic implementation into corporate environments via risk assessment, security policy, and finally technical implementation of security techniques.