The BSc (Hons) Cyber Security and Forensic Computing (Top-up) is a final-year undergraduate programme designed for learners who already hold a relevant Level 5 qualification and wish to progress to a full honours degree in a specialised and high-demand field. It is ideal for individuals aiming to build advanced expertise in protecting digital systems and investigating cyber incidents.
This programme focuses on key areas such as cyber security principles, ethical hacking, digital forensics, network defence, cybercrime investigation, incident response, and security risk management. Learners develop practical and analytical skills to detect vulnerabilities, secure computer systems, and investigate digital evidence in real-world scenarios.
The qualification is suitable for students and professionals who want to advance their careers in cybersecurity, digital forensics, IT security, or related technical fields. It provides a strong pathway into roles such as cyber security analyst, forensic investigator, security consultant, and IT security specialist, as well as progression to postgraduate study.
Inspire Institute of Technologies is an approved partner to deliver this program.
Program Highlights
Study Units
- Network and Cloud Security
- Digital Investigation and E-Discovery
- Ethical Hacking
- Project
- Risk, Crisis and Security Management
- Project Analysis and Practice
- Career Development Learning
Entry Requirements
- Age Requirement: Applicants should generally be 18 years or older at the time of enrolment.
- Educational Requirement: A Level 5 qualification (such as HND or equivalent diploma) in Cyber Security, Computer Science, Information Technology, Software Engineering, Networking, or a related computing field is required. Applicants with other relevant IT qualifications may also be considered for advanced entry.
- English Language Proficiency: Strong English reading, writing, and communication skills are essential. Non-native speakers may need IELTS or equivalent qualification, or proof of prior education completed in English.
- Work Experience (Preferred): Relevant experience in IT support, networking, cybersecurity, or digital systems is beneficial but not mandatory.
This programme is suitable for learners who want to progress from a diploma level qualification into a full honours degree in cybersecurity and forensic computing.
Learning Outcomes
Network and Cloud Security
On completing the module, students will be able to:
- understand the security risks associated with computer networks generally and within cloud computing environments specifically.
- explain and demonstrate the role of network security protocols and policies.
- demonstrate a critical understanding of commonly employed network security measures.
- describe and analyse authentication mechanisms and security modelling techniques.
- apply appropriate network security measures to particular scenarios.
- understand the fundamentals of network and cloud computing security with specific reference to Legal, Social, Professional, and Ethical Issues (LSPEI).
- critically evaluate and reflect on their learning, development, and achievements within the context of the subject.
Digital Investigation and E-Discovery
On successful completion of the module students will be able to:
- identify and apply major developments in the digital crime investigation and E-discovery field.
- demonstrate an understanding of how advances in digital technology are related to criminal behaviour.
- appreciate the relationships between the advances in digital technology such as encryption, data hiding techniques and obstruction and their retrieval.
- evaluate and select appropriate tools and techniques for the detection and prevention of digital crime and e-discovery.
- perform a digital forensic analysis using suitable the appropriate investigation tools and approaches on different types of crime, platforms and contexts.
- Understand the e-discovery landscape through the Electronic Discovery Reference Model (EDRM) and notably Identification, Preservation, Collection, Processing, Review & Analysis, Production and Presentation.
- be familiar with the different approaches that can be applied to real-time cybercrime investigation at law enforcement level and e-discovery at corporate level.
- be prepared for the CompTIA Security+ certification exam.
Ethical Hacking
On completing the module, the student will be able to:
- Demonstrate an understanding of the various types of hacking methods, techniques, tactics approaches and strategies that undermine the integrity, availability and confidentiality of computer systems and networks.
- Use appropriate tools, techniques and methods to identify, detect, analyse, evaluate, test and document the various types of hacking attacks on computer system and networks.
- Develop and implement practical solutions and countermeasures to thwart and reduce the various threats posed by hacking attacks on computer system and networks.
- Apply ethical hacking guiding principles in undertaking the various leaning activities and tasks.
- Critically reflect and evaluate the activities within the topic area in the context of Legal, Social, Ethical and Professional (LSEP) issues.
Project
On completion of the module the student should be able to:
- Carry out independent research and investigative work.
- Apply knowledge, skills and abilities to the solution of a previously unfamiliar real-life problem.
- Apply a structured design process to the development of the solution.
- Apply project management techniques to ensure that the project is completed in a timely manner, meeting the requirements of the appropriate professional body or industry standards.
- Select from a range of alternatives the optimal solution to a problem and to justify that selection, giving due consideration to risk management and security issues.
- Carry that solution through to final implementation, demonstrating an ability to work in a team, if appropriate.
- Formally and correctly report on the progress and outcomes of the process, and reflect upon their personal development, legal, social, ethical and professional issues.
Risk, Crisis and Security Management
By the end of this module students should be able to:
- understand the issues with information security and security risks;
- identify the security risks and risk control strategies in a particular context;
- appreciate the security controls for a particular security threat in a particular context;
- evaluate various security technologies;
- describe business continuity planning;
- understand security policy, standard, and practices;
- discuss issues related to legal, ethical, and professional issues in security management.
Project Analysis and Practice
On successful completion of this module students will be able to:
- Understand how the process of project analysis, development, and management in a business setting.
- Develop an understanding of how a project team is structured.
- Understand Security and Privacy by Design principles.
- Understand the role of UML and other tools in project management.
- Report on research into current directions in project management within the IT sector through case studies.
- Understand how risk affects a project and why it is important.
Career Development Learning
At the end of this module, students should be able to:
- Demonstrate that they can function effectively as independent learners in supervised and unsupervised learning environments, including selecting and applying appropriate methods and procedures to accomplish the required tasks.
- Communicate effectively with internal/external teams, clients, colleagues, decision-makers and budget holders.
- Apply analytical, creative and advanced problem-solving skills relevant to the subject.
- Critically evaluate skills and performance and plan for their systematic improvement.
- Evidence an enhanced understanding and awareness of important commercial, social and professional factors and their impact on society as a whole and business in particular.
Target Audience
The BSc (Hons) Cyber Security and Forensic Computing (Top-up) is designed for individuals who already have a foundational qualification in computing and want to advance into a specialised and high demand area of cybersecurity and digital forensics.
- HND Or Level 5 IT Graduates Looking To Convert Their Qualification Into A Full Honours Degree
- Cyber Security And Networking Students Seeking Advanced Knowledge In Security And Forensics
- IT Support And Technical Professionals Aiming To Progress Into Cyber Security Roles
- Software And Systems Students Interested In Security, Ethical Hacking, And Digital Investigation
- Aspiring Digital Forensic Analysts Looking To Work In Cybercrime Investigation
- Career Switchers With IT Background Wanting To Enter Cyber Security Industry
- Students Planning Postgraduate Study In Cyber Security, Digital Forensics, Or Advanced Computing
This course is ideal for motivated individuals who want to specialise in protecting and investigating digital systems. It supports career development in cyber security, forensic computing, IT security analysis, and digital crime investigation roles.
