-
In this module, students will develop an understanding of the ethical, professional and legal issues relating to computer science. Students will develop critical investigative skills in applying ethical theories to technological outcomes vis-à-vis software engineering, cyber security and digital forensics. This module will provide students with the opportunity to identify and reflect on their strengths and weaknesses and to consider requirements for their future career in computer science. They will develop their understanding of a range of computer science sources and evaluate their reliability and validity. Students will participate in critical reading, writing and develop their referencing techniques.
-
This module provides the first exposure to programming, problem-solving and software designing. The constructs of functional programming and debugging are introduced for designing, developing and deploying correct, efficient, maintainable and scalable programmes.
The focus of this module is on developing knowledge, skills and understanding as they demonstrate mastery of software development. The module is based on several example programmes and emphasis is placed on practical work with the aim of ensuring that theory covered in lectures is reinforced by practical programming tasks.
-
This module will provide students with the opportunity to be proficient with tools and techniques used to create content accessed across a variety of mobile, tablet and desktop devices reliant on current front-end web design technologies. Students will also recognise appropriate accessibility standards and apply compliance guidelines to interactive websites. Students will develop web design skills for creating usable and interactive front-end web pages based on the principles of Human-Computer Interaction (HCI). Students will be encouraged to explore the requirements of organisations and interactive front-end development. Students will review appropriate literature on website design to gain understandings of the planning and implementation process and identify areas for further development or study.
-
This module extends the programming proficiency by introducing object oriented programming and data structures for developing applications. The concepts of abstraction, encapsulation, inheritance, polymorphism, linear and non-linear data structures, algorithms and analyses of time and space complexities are discussed within the context of real-world problems and their solutions.
-
The module will give students the opportunity to learn the fundamentals of database design. They will investigate the structure of data within a relational database, interact with, and protect the data within the database. Students will develop practical experience of problem analysis, especially concepts of data modelling, sets, relational theory and relational algebra. Students will develop database implementation skills for optimisation using structured data, held in relational databases, accessed via SQL and explore the data storage requirements of on-line businesses, companies and organisations.
-
This module will introduce students to concepts involved in the fundamentals of computer networking and security. The emphasis is on the design of computer networks and fundamentals of cyber security.
In this module, students develop the knowledge, skills and understanding required to comprehend computer models, methodologies, structures, number representation, security, Boolean Algebra, logic gates and their role in basic computer systems. Knowledge of fundamentals of computer architecture is becoming increasingly important in business and finance, and are applicable to problems which have been considered mainstream computing.
For students starting in September 2025 you will be loaned a Microsoft Surface Pro for the duration of your study time at Birmingham Newman University.
Computer Science with Cyber Security BSc (Hons)
Honours Degree, Undergraduate, September 2026
Key Details
- G400 Course Code
- 3 Years
- 112 Typical UCAS Tariff
The BSc Computer Science with Cyber Security aims to produce skilled professionals who play a crucial role in protecting sensitive information and systems in today’s digital age from cyber threats. As huge amounts of data get generated from extensive information systems and automation in our daily lives, mitigating and diffusing threats to integrity and accuracy of these data becomes an imperative compulsory need for all individuals and organizations. The specialist modules provide knowledge of the security guidelines and frameworks, preventative measures processes to safeguard digital assets, secure software development, collection of digital evidences and audit trails, analyses of data, identification and fixing of security vulnerabilities, intrusion detection, compliance and legal issues.
The fundamental concepts of computer science, which form technical foundation of the field, are complemented with an essential focus on experiential learning through practical and programming exercises tailored towards cyber security. The graduates get prepared for addressing challenging and intellectually stimulating real-world scenarios by leveraging emerging technologies, computational principles and practical knowledge. The necessary skillset enables them to stay ahead of cyber threats, protect individuals and organization and contribute towards ensuring a safer digital world.
This opportunity is provided as a pathway on our BSc (Hons) Computer Science degree. All students begin their studies on the BSc (Hons) Computer Science degree before choosing the Cyber Security pathway towards the end of their first year of study. Students who complete this pathway will receive the specialist BSc (Hons) Computer Science with Cyber Security award at graduation.
For students starting in September 2025 you will be loaned a Microsoft Surface Pro for the duration of your study time at Birmingham Newman University.
- This course enables students to develop competence in key themes such as computer networking, cyber security, secure software development, information security, vulnerability assessment & reverse engineering, Internet of Things, alongside wisdom in their application domains, sufficient for them to progress to postgraduate study or employability.
- A rigorous, coherent and engaging curriculum that draws on the teaching strengths and research expertise in the subject area, aims to provide students unfettered learning opportunities tailored to address emerging technologies and specialisms.
- Learning opportunities encourage and support the spirit of intellectual curiosity and enquiry, an ability to apply computational thinking to solve problems and the capacity for creative computing.
- Relevant professional bodies (e.g. British Computing Society) inform the learning experiences provided to acquire and develop the practical skills essential within Computer Science.
- Students develop an appreciation of legal, professional, economic, environmental, moral and ethical issues involved with Computer Science and their impact upon society.
The first year covers basics of Computer Science. More specifically, you will analyse small-scale problems and design their solutions by applying algorithmic and mathematical techniques. The programming, web applications development, data structures, computer architecture and networking fundamentals modules would develop necessary skills for computer scientists and also familiarise them to professional ethos and awareness of security implications.
In second year, the core modules ensure developing a deeper understanding of user interface design, mobile application development, cyber security and machine learning. Additionally, the specialist modules within cyber security specialism support tailoring study paths to individual strengths and ambitions. The optional modules like secure software design & development and information assurance will ensure acquiring pertinent technical skills, theoretical foundations and professional responsibility while developing medium-scale, real-world projects within the modules.
As you progress into the third year, higher level and core Computer Science modules, such as Internet of Things and Deep Learning, will underpin the specialist modules like vulnerability assessment & reverse engineering and information security. Each of these modules has an elegant blend of theory and practice and offers a stimulating and challenging learning experience that allows developing an informed and practical understanding. The ability to research, think and analyse critically, design secure software applications and also to reflect and develop both personally and professionally will be entailed in the final year project with the aim of considering the role and career which Computer Science graduates wish to undertake in realms of cyber security.
3 hours of contact time per 20 credit modules, a total of 9 contact hours per week.
Modules are assessed through portfolios, video papers, digital artefacts, case studies and blogs alongside more traditional assessment types such as technical reports, academic essays, presentations, projects or online exams.
As a graduate who has developed a passion for Computer Science, you will be well prepared for post-graduate study, professional training and/or graduate employment in the commercial sector.
You may choose to pursue a career as a programmer, machine learning developer, data scientist, business analyst, network manager, cyber security manager, cloud and web application developer, database developer or games designer.
The course also provides progression to the PGCE Secondary Computing course at Newman as part of a seamless transition if you meet the Department of Education Initial Teacher Training entry requirements.
Birmingham Newman University is located in Britain’s second city – Birmingham. With one of the youngest city populations in Europe, it is a vibrant and dynamic place to study.
Studying at Newman University, you have the advantage of being near to the city, but living in, or commuting to peaceful and comfortable surroundings on campus.
Dining out
Birmingham has lots of wonderful places to dine out with a range of different cuisines. Places where you can dine out include; Brindley Place, Mailbox and Hagley Road (just 10 minutes’ from Newman).
Entertainment
Whether you like to go to; the theatre, gigs or clubs, or enjoy: sports, shopping visiting art galleries or exhibitions – Birmingham will not disappoint and you will be spoilt for choice!
Location
Getting around Birmingham is easy via train, bus or by car. Birmingham has excellent transport links to the rest of Britain, making it easy for those weekend getaways!
Why not explore the city for yourself by visiting one of our Open Days?
Want to find out more about Birmingham? Then take a look at some Birmingham City Secrets.
Entry Requirements
112 UCAS tariff points.
Access Students can achieve this with the following combination of Distinction, Merit and/or Pass grades at level 3 achieved from a completed Access course.
BTEC National Diploma with an overall grade of Distinction, Merit, Merit, or an Access Diploma with a minimum of 39 credits with Merit or Distinction.
Course Fees
The full-time course fee, for UK home students, for September 2025 is £9535 per year.
The University will review tuition fees and increase fees in line with any inflationary uplift as determined by the UK Government, if permitted by law or government policy, in subsequent years of your course. It is anticipated that such increases would be linked to RPI (the Retail Price Index excluding mortgage interest payments).
International students
For detailed information on course fees for international students, please visit our International Students page.
Additional Costs
Find out more about the other additional costs associated with our undergraduate degrees.
The University will review tuition fees and increase fees in line with any inflationary uplift as determined by the UK Government, if permitted by law or government policy, in subsequent years of your course. It is anticipated that such increases would be linked to RPI (the Retail Price Index excluding mortgage interest payments).
Modules
Please be aware that, as with any course, there may be changes to the modules delivered, for information view our Changes to Programmes of Module Changes page.
Timetables: find out when information is available to students
-
The industry project module introduces students to the concepts, skills, and knowledge of working in a collaborative team environment in technical development projects. As part of the project, students are expected to work professionally to design, develop, and evaluate an industry-oriented project using contemporary project management principles.
The module will allow students to work on an open-ended project collaboratively. Students will experience working with industry-standard approaches for managing computing projects while also building self-directed skills in their chosen specialisations. Students may seek to develop projects in their specialisms or emerging interests in Computer Science. Students will critically evaluate their work as part of the industry project and present/demonstrate the technologies to a wider audience.
-
Advanced web development solidifies skills in website development for second-year students. The module strengthens knowledge in modern web application development using contemporary full-stack development technologies. Students will gain an understanding of applying these technologies to develop interactive and functional websites. During the module students will engage with literature and techniques for building, customising, and extending web-based development through modern implementation practices. The students will apply this knowledge by implementing techniques such as external libraries, application programming interfaces, and the interconnection between server-side and front-end development. Students will engage in industry skill building through understanding the best practices and ethical considerations of modern web development.
-
The Cyber Security module introduces students to the concepts required to understand and to work with computer security. These security concepts include, for example: historical background, security and security threats, practical measures (such as identification, authentication), security models, cryptography, network security). The second part of the module provides students with the opportunity to explore computer system security via hands-on activities. Current issues relating to cyber security will be discussed and possible solutions will be investigated through practical and hands-on labs Students will critically reflect, design, and develop their learning into a security-centric project to understand historical and novel cyber security threats and learn how to defend against these through practical experience.
-
Machine Learning, is a subset of Artificial Intelligence, is concerned with creating learning models that allow a computer to exhibit behaviour that would normally require a human to do. Typical applications include: computer vision, speech recognition, and intelligent robots. The learning models come in various forms, such as parametric and non-parametric and probability distributions. In this module, students will learn about the most effective machine learning techniques and gain practice in implementing them successfully. Additionally, students will learn about the theoretical underpinnings of machine learning.
-
The module aims to develop core competencies in the fields of secure software concepts, secure software requirements, design, implementation, coding and testing. Nowadays, almost all the software dependent appliances, devices, business services and industries are susceptible and vulnerable to hostile cyber attacks intended to exploit security weaknesses in operating systems, mobile apps, web apps, databases and web servers.
-
The module aims to develop understanding of the role and interaction of policies, laws, procedures, management issues, and technical issues in protecting critical infrastructure and corporate processes including confidentiality, integrity and availability in computer systems. Cyber-Physical security serves an understanding to risks and attack models for information systems and cyber-physical systems. This module is presented along with industry-standard guidance for implementing and maintaining secure information systems with proactive approaches to assure resilience.
-
The final project and critical evaluation will be structured to assess the knowledge and understanding by means appropriate to individual students, though all approaches will lead to the production of a significant piece of work that involves the demonstration of advanced practice in computer science. All approaches will be accompanied by a critical self- evaluation of the outcomes achieved. Students would integrate concepts and skills learned throughout the degree course to substantial open-ended problems. The module will increase students understanding of applied, investigational or theoretical approaches to real word problems.
-
This module will cover the context and the history of the IoT, the hardware, communications protocols and security systems it relies on, and the cloud-side analytics that makes sense of the data produced. It will provide practical hands-on experience of common IoT devices (sensors, actuators, microcontrollers), and examine a range of commercial platforms. Students will be provided with a Wi-Fi microcomputer and will program live IoT applications using that device with the opportunity to produce their own IoT device with a range of functions and capabilities.
-
Deep learning is a group of exciting new technologies for neural networks. Deep learning allows a neural network to learn hierarchies of information in a way that is like the function of the human brain. This module will introduce the student to classic neural network structures, Convolution Neural Networks (CNN), Long Short-Term Memory (LSTM), Gated Recurrent Neural Networks (GRU), General Adversarial Networks (GAN), and reinforcement learning. Application of these architectures to computer vision, time series, security, natural language processing (NLP), and data generation will be covered.
-
This module teaches students the concepts and processes of vulnerability assessment and ethical hacking covering software, networks, and Web applications. Students will use state-of-the-art tools to identify real-world vulnerability issues in modern software and the protection mechanisms found in operating systems. Students will learn how to detect, patch, and develop extensions of protection mechanisms to mitigate attacks and improve security features of software. This module introduces the core methodological approaches to application vulnerability assessment, reverse engineering, and ethical hacking. Students will engage with novel technologies to attack or ‘penetration test’ vulnerable systems and applications. Students will then learn how to defend against such attacks using a mix of academic and industry-focused techniques.
-
This module enables students to build on their cyber security knowledge using digital evidence collection, preservation, and analysis. The module explores the tools and techniques used to investigate data, for example, data recovery, network forensics, and malware analysis. The module also explores the legal and ethical considerations in cyber forensics, ensuring students understand the importance of confidentiality, integrity, and availability. By the end of the module, students will have an awareness of cyber forensics approaches and consider how these could be applied in practice. The module encourages students to understand how digital data can be used in cyber security.
Additional Information
General Academic Regulations: Terms and Conditions for students attending our courses