Girl at computer smiling

Computer Science (Cyber Security) BSc (Hons)

Prepare for a career in cyber security at our London campus, learning how to secure networks, protect sensitive data and respond to cyber threats. Develop practical skills in areas such as penetration testing, cryptography, digital forensics and vulnerability analysis while building the technical expertise needed to defend modern digital systems.

UoP London logo

Key information

For:

starting September 2026

UCAS code:

I910

Typical offer:

96-104 points from 2 or 3 A levels, or equivalent, including an A level in a relevant subject.

See full entry requirements
Study mode and duration
Start date

Showing content for section Overview

Overview

Study BSc (Hons) Computer Science (Cyber Security) at University of Portsmouth London, a TEF Gold-rated University in the dynamic borough of Walthamstow. 

This degree combines core computer science with specialist cyber security knowledge to help you understand how secure systems are designed and maintained. You’ll develop programming skills while exploring how computer systems operate, how networks communicate, and how software and databases are built and protected. 

As you progress, you’ll focus on key cyber security areas including cryptography, secure network architecture, digital forensics and ethical hacking. Through practical activities, you’ll learn how to identify vulnerabilities, analyse cyber attacks, investigate digital evidence and test system security using professional techniques. 

In your final year, you’ll complete an independent project addressing a real cyber security challenge. Graduates can pursue roles such as cyber security analyst, penetration tester, security engineer, digital forensics investigator or network security specialist across industries including finance, technology, government and digital infrastructure.

Course highlights

  • Gain expertise in network security, encryption and secure system design.

  • Learn practical ethical hacking and penetration testing techniques used to identify vulnerabilities.

  • Investigate cyber incidents through digital forensics and malware analysis.

  • Understand how organisations manage risk, compliance and cyber security governance.

  • Apply your knowledge in a final-year project tackling a real cyber security challenge.

 

Your new home at UoP London

Located just a minute’s walk from Walthamstow’s tube and bus stations, our campus provides easy access to the entire city, placing you at the centre of London’s dynamic business scene.

Come along to an Open Day

Open Days at the London campus vary to those held in Portsmouth.

Book a London Open Day

Contact information

London Campus Enquirieslondon@port.ac.uk

Entry requirements

BSc (Hons) Computer Science (Cyber Security) entry requirements

Typical offers
  • A levels - BCC-CCC
  • UCAS points - 96-104 points from 2 or 3 A levels, or equivalent, including an A level in a relevant subject (calculate your UCAS points)
  • T-levels - Merit
  • BTECs (Extended Diplomas) - DMM-MMM
  • International Baccalaureate - 27

You may need to have studied specific subjects or GCSEs - see full entry requirements and other qualifications we accept.

English language requirements
  • English language proficiency at a minimum of IELTS band 6.0 with no component score below 5.5.

See alternative English language qualifications.

If you don't meet the English language requirements yet, you can achieve the level you need by successfully completing a pre-sessional English programme before you start your course.

Careers and opportunities

Cyber security professionals are essential in protecting organisations from digital threats as businesses and services become increasingly online. On this course, you’ll develop skills in areas such as network security, ethical hacking, digital forensics and cryptography that are needed to defend modern systems and data.

Graduates can progress to roles such as:

  • Cyber security analyst
  • Penetration tester
  • Security engineer
  • Digital forensics investigator
  • Artificial intelligence and machine learning engineer
  • Research and development (R&D) scientist

Graduates may work for companies such as:

  • IBM
  • BT Group
  • BAE Systems
  • Deloitte

and other government or financial institutions.

Modules

Modules studied

Through practical workshops, collaborative activities and short reflective tasks, you’ll learn how to communicate clearly, work with others respectfully and make purposeful use of technology in your learning. You’ll explore how to find and evaluate reliable information, use academic sources correctly, and reference your work following university guidelines.

You’ll also reflect on your own strengths, goals and areas for development. This will help you build self-awareness, support your wellbeing and develop as an independent learner.

Assessment includes a portfolio of short tasks that demonstrate your developing academic skills, and a short oral presentation where you will communicate your ideas clearly and appropriately.

You’ll learn about common network structures, communication protocols and the principles that allow devices to connect and share information. The module also examines the risks that networks face, including security threats and system vulnerabilities, and how these can be reduced through protective strategies.

You’ll also explore emerging technologies in networking and cybersecurity, and consider how they shape the way organisations and society use computing systems.

Throughout the module, you’ll apply what you learn to practical scenarios. This will help you understand how networking and security concepts can be used to address real-world computing challenges.

This module will provide you with a strong foundation in networking and security that will support your future study in computing.

You’ll explore key programming concepts, including control structures, algorithms and object-oriented programming. You’ll also learn how to choose and use appropriate data structures to solve different computational problems.

As you progress, you’ll develop practical coding skills and gain experience in designing, building and testing applications. This includes working with both console-based programs and graphical user interface (GUI) applications, helping you understand how different types of software are created.

The module focuses on hands-on learning, giving you opportunities to practise writing code and developing your own solutions to programming challenges.

This module will prepare you for more advanced study in software development, algorithm design and specialised areas of computing.

You’ll explore access control, authentication methods, and the core ideas behind network security, gaining a clearer sense of how organisations protect their systems and data.

You’ll develop practical skills in vulnerability management, intrusion detection, and incident response. These skills will help you recognise security weaknesses, understand how attacks unfold, and take appropriate action when something goes wrong.

You’ll also examine risk assessment methods, governance frameworks, and the compliance standards that shape professional security practice. This will help you see how technical decisions connect to wider organisational responsibilities.

Across the module, you’ll learn to explain key security principles, apply processes for identifying and managing threats, and understand the legal, ethical, and organisational expectations placed on cyber security professionals.

This module gives you both the confidence and the knowledge to engage with real security challenges in modern digital environments.

You’ll explore how computer systems operate, examining hardware components, processor architectures, and the way these elements work together to run programs and manage tasks.

You’ll also investigate key operating system functions, including process management, memory management, and file systems. This will help you understand how the system coordinates resources and keeps everything running smoothly.

A major part of this module is learning to write low‑level programs using assembly language. You’ll create simple system‑level programs and see how software interacts directly with hardware and system resources.

This module will see you learn structured approaches to software development, including requirements analysis, design methods, implementation techniques, and testing strategies. These skills will guide you as you design, build, and deploy relational databases that meet real user and organisational needs.

You'll develop professional practices such as version control, clear documentation, and Agile ways of working. As you create functional databases, you’ll learn how to apply appropriate security measures and access controls to protect data effectively.

You'll create database schemas, identify security threats and apply safeguards, use established software development and quality assurance techniques, and understand how software engineering principles guide the entire process of database creation.

This module covers core cryptanalysis methods that help you identify vulnerabilities and assess the robustness of cryptographic implementations. Through practical investigation, you’ll learn how weaknesses can be exploited and how systems can be improved.

You’ll explore a range of encryption techniques and cryptographic protocols, gaining insight into how secure systems are designed and how information is protected in practice. You’ll also examine how different architectural choices influence the strength and reliability of secure systems.

By looking at emerging cryptographic technologies you'll be able to consider their wider professional and societal implications; such as ethical, legal, and technical challenges.

On this module, you'll discover the security architectures, protocols, and cryptographic standards that support secure communication across modern networks.

You’ll analyse the role of cryptographic technologies in protecting data and evaluate how secure communication protocols are applied to prevent interception, tampering and unauthorised access.

You'll take a look at wireless and mobile security threats, helping you understand how vulnerabilities emerge and how different protection methods address these risks.

This module introduces you to digital forensics methodologies and malware analysis techniques used in cybercrime investigation and incident response.

Uncover how evidence is acquired, preserved, analysed and documented in line with legal and professional expectations. You’ll also investigate how malicious software behaves through both reverse engineering and behavioural techniques.

 

The skills you learn will help you to identify characteristics and understand attack methods to form integrated investigation workflows.

You’ll practise linking evidence acquisition with technical analysis and learn how these processes guide real investigative decisions.

This module introduces you to the legal, ethical, and professional responsibilities that shape ethical hacking and penetration testing.

You’ll explore how security testing is carried out within strict legal and ethical boundaries and examine the methods attackers use during social engineering and exploitation. Understanding these techniques helps you identify system vulnerabilities safely and responsibly.

You’ll learn how to plan and structure a penetration test; ensuring your approach is evidence‑based and aligned with organisational requirements.

You’ll produce clear and professional security assessment reports that demonstrate impact and support effective decision‑making.

This module gives you the space to demonstrate what you can achieve when you take full ownership of a significant piece of work, from identifying a topic to presenting your final outcomes.

You’ll begin by defining a clear problem or question and examining its feasibility. This involves exploring the wider context, understanding the needs and expectations of relevant stakeholders and clarifying the objectives of your proposed project. You’ll develop a plan that sets out the methods you’ll use, supported by a careful consideration of ethical responsibilities.

Through guided workshops, you’ll explore each stage of the project process, looking at research design, data collection, analysis and project organisation.

You'll also explore how appropriate technologies and research methods can support your investigation. You'll work with a supervisor to provide you with specialist guidance as you refine your approach and move towards producing your final output.

Your project may take the form of a written investigation, practical solution, digital artefact, or another approved format, but all projects must include evidence‑based conclusions or recommendations.

Alongside this hands-on element, you'll present your findings to different audiences and explain their significance or potential impact. These reflections will enhance your communication skills to support your future professional ambitions.

Changes to course content

We use the best and most current research and professional practice alongside feedback from our students to make sure course content is relevant to your future career or further studies.

Therefore, some course content may change over time to reflect changes in the discipline or industry. If a module doesn't run, we'll let you know as soon as possible and help you choose an alternative module.

How you'll spend your time

A typical week

We recommend you spend at least 35 hours a week studying for this degree.

As you will be studying at our London campus, you can expect:

  • a class size of no more than 30 students - your academics will know you by name
  • no traditional lectures - focus on interactive sessions for more one-on-one time with your academics
  • on-campus learning - attend classes on campus two consecutive days a week, engaging directly with your peers and staff
  • online provision - some learning is delivered online, providing further flexibility to balance your studies with other responsibilities

Term dates

The academic year runs from September to June. There are breaks at Christmas and Easter.

Course costs and funding

Tuition fees

  • UK, Channel Islands and Isle of Man students – £9,790 a year (may be subject to annual increase)
  • EU students – £10,300 a year (including EU Scholarship – may be subject to annual increase)
  • International students – £18,600 a year (subject to annual increase)

Apply

Ready to apply?

To start this course in 2026/27, apply through UCAS. You'll need:

  • the UCAS course code – I910
  • our institution code – P80

Apply now through UCAS

If you'd prefer to apply directly, use our online application forms:

You can also sign up to an Open Day to:

  • Tour our campus and facilities
  • Speak with lecturers and chat with our students 
  • Get information about where to live, how to fund your studies and any other information you need

If you're new to the application process, read our guide on applying for an undergraduate course.

Admissions terms and conditions

When you accept an offer to study at the University of Portsmouth, you also agree to abide by our Student Contract (which includes the University's relevant policies, rules and regulations). You should read and consider these before you apply.