Overview
Cyber Security seeks to enable the good and prevent the bad in cyber space. For you to contribute to this task, you will learn a broad range of theory and practice. Most things will be viewed from two perspectives: what should happen, and what does happen. Many cyber security challenges lurk in this gap between concept and reality.
You will learn how to construct robust software. You will learn how to store data over time and communicate it over distance. You will learn how computer systems are organised. You will learn the capabilities of cryptographic techniques. You will learn the processes and procedures that provide assurance that things are as they should be. And you will learn the mindset, tools and techniques to discover the shortcomings of cyber systems, duly constrained by ethics and the law.
This course at the University of Warwick has a strong technical focus so that you understand precisely how the digital parts of cyber systems function. However, the role played by people, processes and the physical environment in achieving cyber security is also a critical part of your study. Taken together, you will learn how to harden the security posture of an organisation's cyber systems. You will learn how to think and act coherently in cyber space.
Your career
Career paths can be technical, managerial, and strategic in the public, private, or charity sector; enabling social services, commerce, healthcare, transportation, environmental protection and more generally, a secure digital society.
Early career roles could include:
- Network Security Administrator
- Forensic Analyst
- Threat Analyst
- Penetration Tester
- Secure Software Developer
- Security Engineer
- SOC Analyst
- Cyber Risk Analyst
- Information Assurance
- Critical Infrastructure Cyber Security Practitioner
Programme Structure
Courses include:
- The Cyber Context of Software Engineering
- Programming Languages for Cyber Security
- Human Behaviour in Cyber Systems
- Implementing Secure Systems
- Information Management
- Information Security Management
Key information
Duration
- Full-time
- 36 months
Start dates & application deadlines
- Starting
- Apply before
-
Language
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Credits
Delivered
Campus Location
- Coventry, United Kingdom
Disciplines
Cyber Security View 192 other Bachelors in Cyber Security in United KingdomWhat students do after studying
Academic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
Prepare for Your English Test
AI-powered IELTS feedback. Clear, actionable, and tailored to boost your writing & speaking score. No credit card or upfront payment required.
- Trusted by 300k learners
- 98 accuracy using real exam data
- 4.9/5 student rating
Other requirements
General requirements
A level typical offer
- AAA (applicants from all academic profiles welcome, but STEM subjects are recommended for ease of study onto the programme).
IB typical offer
- 36 ( applicants from all academic profiles welcome, but STEM subjects are recommended for ease of study onto the programme).
Tuition Fees
-
International Applies to you
Applies to youNon-residents33520 GBP / year≈ 33520 GBP / year -
Domestic Applies to you
Applies to youCitizens or residents9535 GBP / year≈ 9535 GBP / year
Living costs
Coventry
The living costs include the total expenses per month, covering accommodation, public transportation, utilities (electricity, internet), books and groceries.
Funding
In order for us to give you accurate scholarship information, we ask that you please confirm a few details and create an account with us.
Scholarships Information
Below you will find Bachelor's scholarship opportunities for Cyber Security.
Available Scholarships
You are eligible to apply for these scholarships but a selection process will still be applied by the provider.
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility
Read more about eligibility