Course summary
Learn how to make operational level decisions on cyber security that protect modern businesses.
- Understand the scope of the cyber security threat landscape – from actors to tools and techniques.
- Design and develop governance and risk compliance structures that enable businesses to operate securely and efficiently.
- Develop strategies for maintaining operational resilience to keep organisations moving in the face of cyber attack.
Modules
Cyber Security Bootcamp offers a holistic perspective of cyber security. You’ll learn about threat detection and prevention strategies, risk management, investigative tools, and the way in which each are leveraged by organisations to secure operations and minimise disruption. Critical Vulnerability Analysis exposes specific strategies for evaluating and reporting, for example, structural vulnerabilities and inadequate cybersecurity safeguards. Business preparations that include a degree of penetration testing are examined. Business Security Architecture aims to develop your understanding of how to define an appropriate security architecture for a business. You also learn about established architectures, trade-offs between security and business functionality, and strategies of information governance. Offensive and Defensive Cyber Operations aims to provide you with an in-depth understanding of the techniques used in computer and network defence. As cyber defenders you learn about the strategies and technical skills to protect and harden cyber systems such as collecting appropriate data through logging, detecting persistent hacking attempts, and responding to intrusions. Critical National Infrastructure (CNI) is about learning to define the relevant CNI for your country and analyse its potential impact on a chosen business or sector. You explore the unique operational resilience challenges and the emerging industry and government standards for that sector. Protecting CNI is of developing concern that is rising up the national risk registers internationally. An understanding of this topic is therefore a key part of a cyber security professionals knowledge base. Cyber War is about who the threat actors currently are, and who they may be in the near future. It examines how attackers identify targets of opportunity and how they work to disrupt them. Across the module you analyse case studies of past cyberwars with a view to understanding their motivations, attack strategies and impacts. Dissertation: taking into account relevant theories, practice and organisational contexts, you first identify a target for enquiry in agreement with your supervisor. Following approval of your plan, you proceed to conduct the research, evaluate data, and articulate findings and recommendations in the form of an academic report. The final stage of your dissertation is a viva in which you defend your arguments.
Assessment method
You're assessed by a combination of reports, presentations, and set exercises. Tasks such as table top scenarios and cyber wargames give assessment a real-world edge, while providing insight into practical methods of communicating complex cyber security topics to key stakeholders.
Entry requirements
You should have a good honours degree in Computing or a related subject. However, we'll consider applications from you, without a relevant degree, if you're able to demonstrate that you have relevant skills in computing and a passion for the subject.
Fees and funding
Tuition fees
Channel Islands | £4413 | Year 1 |
Republic of Ireland | £4413 | Year 1 |
England | £4413 | Year 1 |
Northern Ireland | £4413 | Year 1 |
Scotland | £4413 | Year 1 |
Wales | £4413 | Year 1 |
Tuition fee status depends on a number of criteria and varies according to where in the UK you will study. For further guidance on the criteria for home or overseas tuition fees, please refer to the UKCISA website .
Additional fee information
Provider information
Bath Spa University
Newton Park
Newton St Loe
Bath
BA2 9BN