Key facts

Entry requirements

112 or DMM

Full entry requirements

UCAS code

G450

Institution code

D26

Duration

3 yrs full-time

3 years full time, 4 years with placement

Fees

2025/26 UK tuition fees:
£9,535*

Entry requirements

UCAS code

G450

Institution code

D26

Duration

3 yrs full-time

3 years full time, 4 years with placement

Fees

2025/26 UK tuition fees:
£9,535*

This degree programme will equip graduates who are capable of meeting the increasing demands for combining computer networks, security, and programming expertise raised by the growing adoption of the next-generation network (NGN) services, e.g., VoIP, and Next Generation Network Model, i.e., SDN and NFV, where network devices have turned to be a programmable virtual entity on the cloud.

In addition to core computer science and cyber security modules, this course includes key networking modules prepared carefully according to the new Cisco certification path, in consultation with our Cisco partner. These modules focus on industry level requirements and are certification oriented and will prepare graduates to meet the new skill demands to maximise employability.

The structure of the course and programme modules makes it possible for graduates to also prepare for traditional and emerging computer science, software engineering, or cyber security roles. Professionalism within an industry context is emphasised throughout, with strong links to BCS, The Chartered Institute for IT.

  • You will join Cisco Networking Academy. This course covers the syllabus of three Cisco certificates: The new Cisco Certified Network Associate, Cisco CyberOps Associate, and Cisco DevNet Associate and one additional Cisco Networking Academy course: Network Security.
  • Free Cisco assessment for related modules to gain a Course Completion Certificate/Digital Badge from Cisco Networking Academy verifying the acquired skills and preparing the students to optionally obtain the commercial certifications at a 3rd party exam centre.
  • We have more than 50 years of computing experience that you can learn from. This long-standing history allows you to draw on a wealth of research and academic expertise to inform your studies.
  • This course is taught by experts from DMU’s Cyber Technology Institute, which boasts an international reputation in cyber security, influencing the approach taken by the UK government and leading organisations.
  • DMU has been named a gold standard ‘Academic Centre of Excellence in Cyber Security Education’ by the leading authority on cyber security in the UK, the National Cyber Security Centre (NCSC) - part of GCHQ. DMU is the first university in the East Midlands to achieve this prestigious status.
  • DMU has been recognised for conducting world-leading cyber security research, having been named and Airbus Centre of Excellence in Cyber Security.
  • Gain valuable industry experience by undertaking a placement, with students taking up placements at Airbus, GCHQ, and Vauxhall Motors.
  • Benefit from block teaching, where most students study one subject at a time. A simple timetable will allow you to really engage with your learning, receive regular feedback and assessments, get to know your course mates and enjoy a better study-life balance.

Our next Open Day is on
Saturday 08 February

Join us in 11 days and 13 hours.

Student ambassador waiting to welcome guests with a sign that reads here to help.

What you will study

Block 1: Foundation of Computing and Cyber Security

This module introduces you to the professional context of computer science, software engineering, cyber security, and digital forensics. It introduces mathematical structures that provide a basis for computer science and cyber security to prepare students with the necessary skills in this domain. You will gain skills to learn the concepts of computer science cyber security. In this module you will learn the mathematical foundation of computing such as logic and Boolean algebra, set theory, probability and statistics, relations, functions, and modular arithmetic.

Block 2: Endpoint Security

Designed to provide a foundation in computer ethics, computer architecture and operating systems with a specific emphasis on their security. It will introduce the ethical theories affecting information systems, information security, software engineering, computer science and digital forensics. It requires you to develop critical analytical skills in applying ethical theories to technological outcomes regarding information systems, information security, software engineering, computer science and digital forensics.

Block 3: Secure Coding

This module covers introduction to secure and object-oriented programming using C++. The programming concepts covered in this module are fundamental in almost any other programming language. You will initially learn about the fundamental problem-solving skills using algorithms and basic programming concepts that enable you to create, edit, compile, execute and test computer programs, then about applying key syntax rules for variables, expressions, statements, arrays, and functions in C++.

This module also covers developing/building trusted and reliable software to meet user's requirements including, e.g., naming conventions, initialisation of variables, variable scope and lifetime, validation of input, bound checking, string manipulation and reliability. You will learn about the latest security standards to understand the best practises for writing a software.

Block 4: Computer Networks

The module introduces the architectures, models, protocols, and networking elements that connect users, devices, applications and data through the Internet and across modern computer networks - including IP addressing and Ethernet fundamentals. It also includes switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLAN) and security concepts. By the end of the course, you can build simple local area networks (LAN) that integrate IP addressing schemes, foundational network security, and perform basic configurations for routers and switches. They can also perform troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN.

Block 1: Secure Scripting and Business Applications

This module covers the fundamentals of database design and implementation as well as the ethical and legal responsibilities associated with storing data. The module also considers how secure scripting techniques can address unauthorised access to stored data through poor business application design and implementation.

Block 2: Enterprise Networking

This module describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks – including wide area network (WAN) technologies, quality of service (QoS) mechanisms for secure remote access, along with software-defined networking, virtualization, & automation concepts supporting network digitization.

It also covers on IP telephony technologies to prepare you with the necessary skills in this domain in line with the convergence of voice, video, data and mobile applications.

You will gain skills to configure and troubleshoot enterprise networks, and learn to identify/ protect against cybersecurity threats and are introduced to network management tools and key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation.

Block 3: Penetration Testing

This module shows you how to think like a hacker, how to probe systems for exploitable vulnerabilities and to report findings for implementing mitigation strategies. From social engineering and physical attacks to client-side and server-side attacks, you will replicate the same Tactics, Techniques, and Procedures (TTPs) that a malicious hacker would use, whilst being compliant with current ethics, law and regulations. In this module you will learn how to perform reconnaissance on a target, how to identify possible victims and how to enumerate their services, how to gain access, how to escalate an individual’s privileges and how to create a final penetration test report.

Block 4: Industrial Cryptography

Cryptography constitutes today a fundamental and ingrained part of the security of all modern communication. Everything from web browsing, email, and telephony, to messaging apps, data storage and video conferencing, is today secured by cryptographic techniques.

This module will introduce the central principles, methods, and definitions of cryptography, as well as presenting some of the most important applications and implementations. Modern cryptography is concerned with an enormous variety of scenarios where the involved parties do not fully trust each other such as internet banking, electronic voting, integrity of data, security of computer networks, and many more.

In Blocks 3 and 4 you will have a choice of modules

Block 1: Network Security

This module discusses the architectures, protocols, and networking elements to secure your network and respond to incidents. It helps to meet the growing demand for network security professionals to maintain the integrity, confidentiality, and availability of data and devices. The curriculum introduces the security concepts and skills needed to monitor, detect, analyse and respond to cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory requirements, and other cybersecurity issues facing organizations.

Emphasizing the practical application of the skills needed to maintain and ensure security operational readiness of secure networked systems, it prepares you for a career as a network security engineer or in the rapidly growing area of cybersecurity operations working in or with a security operations centre (SOC) in roles such as: Security SOC Analyst and Incident Responder.

Block 2: Network Development

In this module we will discuss the methodologies and tools of modern software development, applied to the IT and Network operations. It covers a 360 view of the domain including microservices, testing, containers and DevOps, as well as securely automating infrastructures with Application Programming Interfaces (APIs).

You will gain hands-on lab experience on using GIT, common data formats (JSON, XML and YAML), deploying applications as containers, using Continuous Integration/Continuous Deployment (CI/CD) pipelines and automating infrastructure using code. In addition, you will critically appraise Software Defined Network (SDN), Network Function Virtualization (NFV) and address the issue of code quality and reliability assurance via DevSecOps.

Block 3/4: Final Project

The project provides you with the opportunity to carry out a significant piece of work that reflects the aims and outcomes of their specific programme. It provides you with the opportunity to demonstrate practical and analytical skills present in their programme of study; to work innovatively and creatively; to synthesise information, ideas, and practices to provide a quality solution, together with an evaluation of that solution. The project should meet some real need in a wider context.

Block 3/4: Emerging Technologies in Computer Networks and Security

After completing several networking and programming modules, you will get the chance to really put these skills together while practicing the latest network technologies, e.g., Software Defined Network (SDN) and Network Function Virtualisation (NFV). You will also get introduced to the cloud environments and have hands-on experience on cloud network and security management. Moreover, security and privacy issues that are related to IoT, mobile networks, and modern autonomous systems will be discussed and analysed. 

Block 3/4: Artificial Intelligence for Cyber Security

The application of AI algorithms to the domain of cyber security has gained a lot of momentum in the last few years, especially with the proliferation of Deep Neural Network architectures and applications. In this module, the application of AI to cyber security will be examined in detail. You will be trained on how to collect, pre-process, and analyse cyber security datasets. You will gain fundamental knowledge about AI algorithms, including statistical machine learning algorithms and deep neural networks, and how such algorithms are applied to cyber security applications. State-of-the-art tools and software libraries will be used to apply taught concepts to train and evaluate different AI models to develop cyber security solutions. 

Blocks 3/4: Digital Forensics and Cyber Crime Investigation

This module will guide you through the Digital Forensics Incident Response (DFIR) life cycle in traditional and/or enterprise crime scenes involving digital devices such as computers/laptops/mobile devices/networks and the associated legal and ethical considerations and requirements.

You will use a combination of proprietary and open-source forensic tools to collect and analyse digital evidence in a forensically sound manner whilst completing the appropriate and necessary paperwork, prior to presenting their findings for a given audience.

Note: All modules are indicative and based on the current academic session. Course information is correct at the time of publication and is subject to review. Exact modules may, therefore, vary for your intake in order to keep content current. If there are changes to your course we will, where reasonable, take steps to inform you as appropriate.

Student work

Open Days at DMU
Join us on-campus, find your new home at DMU at our Open Day 8 February
Book Now

Our facilities

Computer Networks and Cyber Security laboratories

The specialist Computer Networks and Cyber Security laboratories are among the best equipped facilities of this type in the UK. Developed in consultation with Cisco and leaders in the industry, they are designed to meet the highest computer networks and cyber security standards.

Find out more

Library and learning zones

Kimberlin Library offers a space where you can work, study and access a vast range of print materials, with computer stations, laptops, plasma screens and assistive technology also available. As well as providing a physical space in which to work, we offer online tools to support your studies, and our extensive online collection of resources.

Library and learning zones

Accreditations, awards or memberships

BCS logo

British Computer Society (BCS)

This course has achieved initial accreditation from the British Computer Society (BCS), subject to a final review of degree outputs after the first cohort has graduated. Confirmation is expected in 2025.

What makes us special

Students working on a laptop

Block learning

Through block teaching, you will focus on one subject at a time instead of several at once. This means that you will be able to focus closely on each subject and absorb your learning material in more depth, whilst working more closely with your tutors and course mates.

DMU-global

DMU Global

Enjoy an international experience with DMU Global, which can enrich your studies and expand your cultural horizons. Previous DMU Global trips have included New York, Berlin, Hong Kong, China, Canada, Japan, South Africa and Italy to name a few.

Where we could take you

Students at the DMU Careers Hub

Graduate careers

This programme has been developed to help give you the skills needed for careers in the computer networks and cyber security industry.

Graduates have excellent opportunities to pursue careers in industry, government, or law enforcement in roles such as a Network Engineer, Network Security Engineer, Network Automation Engineer, Security Analyst, Penetration Tester, Cyber Security Engineer or working in a Security Operations Centre (SOC) in roles such as SOC Analyst and Incident Responder. Previous graduates from our Cyber Security programmes have gone on to work for organisations such as Deloitte, GCHQ, Airbus, and Rolls-Royce.

Student discussing placements with an advisor

Placements

Work placements are offered as part of this course as one of the best ways to boost your skills and experience while studying, as well as improving your chances of gaining a graduate level job.

We have links with organisations both in the UK and internationally, and the placements team will help you find a placement to suit your interests and aspirations.

Students on related courses have taken part in placements at Airbus, GCHQ, and Vauxhall Motors to develop their skills and put their learning into practice.

Course specifications

Course title

Computer Networks and Security

Award

BSc (Hons)

UCAS code

G450

Institution code

D26

Study level

Undergraduate

Study mode

Full-time

Start date

September

Duration

3 years full time, 4 years with placement

Fees

2025/26 UK tuition fees:
£9,535*

*subject to the government, as is expected, passing legislation to formalise the increase.

Entry requirements

GCSEs

  • Five GCSEs at grade 4 or above including English and Maths

Plus one of the following:

A levels

  • A minimum of 112 points from at least two A levels

T Levels

  • Merit

BTEC

  • BTEC National Diploma - Distinction/Merit/Merit
  • BTEC Extended Diploma - Distinction/Merit/Merit

Alternative qualifications include:

  • Pass in the QAA accredited Access to HE overall 112 UCAS tariff with at least 30 L3 credits at Merit.
  • English GCSE required as separate qualification. Equivalency not accepted within the Access qualification. We will normally require students to have had a break from full-time education before undertaking the Access course.
  • International Baccalaureate: 30+ points

English language requirements

If English is not your first language, an IELTS score of 6.0 overall with 5.5 in each band (or equivalent) when you start the course is essential.

English language tuition, delivered by our British Council-accredited Centre for English Language Learning, is available both before and throughout the course if you need it.

Additional costs