{"id":3492,"date":"2023-04-13T21:36:55","date_gmt":"2023-04-13T21:36:55","guid":{"rendered":"https:\/\/ready4uni.eu\/?page_id=3492"},"modified":"2023-04-17T01:19:22","modified_gmt":"2023-04-17T01:19:22","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3492\" class=\"elementor elementor-3492\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d1f0489 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"d1f0489\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3769a0e\" data-id=\"3769a0e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:2566,&quot;url&quot;:&quot;http:\\\/\\\/ready4uni.eu\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/UWr-grafiki-historia6.webp&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ccbe2c2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"ccbe2c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14856cc\" data-id=\"14856cc\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:3495,&quot;url&quot;:&quot;http:\\\/\\\/ready4uni.eu\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/kobieta-trzyma-baner-nakladki-graficznej-sieci-scaled.jpg&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a7eac4 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3a7eac4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Cyber Security BSc (Hons)<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1eff83 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c1eff83\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62d0fbe\" data-id=\"62d0fbe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f3b55c elementor-widget elementor-widget-text-editor\" data-id=\"0f3b55c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As a result of the continuing digital revolution, computer systems are involved in just about every aspect of modern life.<\/p><p><strong>Course overview<\/strong><\/p><p>As the number of mobile users, digital applications, and data networks increase, so has the number of potential risks and threats, resulting in the need for talented professionals to secure and protect systems and data.<\/p><p>Our BSc (Hons) Cyber Security course is designed to produce high quality graduates who can contribute effectively in one of the fastest growing sectors globally.<\/p><p>The course offers real-life tools and challenges, giving you the opportunity to become an independent learner through practical projects and advanced teaching methods.\u00a0<\/p><p><strong>Accreditation and Professional Recognition<\/strong><\/p><p>This course is accredited and recognized by the following bodies.<\/p><p><strong>The British Computer Society (BCS) \u2013 The Chartered Institute for IT<\/strong><\/p><p>This course is currently accredited by the British Computer Society for the 2022\/23 intake. Students of the programme will be enrolled as student members of the British Computer Society. If the accreditation of this course AND\/OR the modules on this course change, we will notify applicants and students as soon as possible. Please visit the BCS website for full details on the BCS accreditation. Coventry University\u2019s accreditation with BCS is currently ongoing for the relevant modules, but is frequently reviewed and monitored by the BCS through their quality systems. If any changes occur with respect to our accreditation related to these modules, we will seek to notify applicants and students as soon as possible.<\/p><p><strong>What you\u2019ll study<\/strong><\/p><p>This course examines the principles and threats which underpin computer systems, networks and the software development process. You will become competent and confident in a range of prevalent topics, such as operating systems, network security, programming language, penetration testing, ethical hacking and more.<\/p><p><strong>Year one:\u00a0<\/strong><\/p><p>The first year of the course introduces you to the core fundamentals that underpin computing science. You will explore the importance of IT security, and the risks posed to computer systems globally. In addition, you will develop your professional problem-solving skills, as you understand the basic principles of programming. Most of the modules in this year contain a practical element, so that you receive the best combination of theoretical and hands-on learning.<\/p><p><strong>Year two:<\/strong><\/p><p>Building on knowledge gained in year one, this year is aimed at building your skillset to an advanced standard. You\u2019ll develop object-orientated analysis, design and implementation skills as you explore complex subjects such as cryptography, digital forensic science and algorithms. Towards the end of the year our lecturers work with you to refine transferable employability skills, as you prepare for a career in computing as a global citizen.<\/p><p><strong>Placement year:<\/strong><\/p><p>Sandwich years and placement years give you the opportunity to gain further insight into the industry or career you are seeking to follow. This enables you to contextualize the theoretical models and concepts discussed in the classroom in the work place. Furthermore, if you choose to take advantage of a placement or sandwich year, this version of the degree will help to increase your employment prospects by acquiring skills and gaining an understanding of what employers expect of graduates.<\/p><p><strong>Final year:<\/strong><\/p><p>In the final year of study, you look at complex subjects such as the Internet of Things and the underlying principles. You will analyze and evaluate potential risk and exploitation in secure programming, and assess a range of issues such as buffer overflows and how to mitigate a number of security risks. Finally, you\u2019ll get the chance to demonstrate your skills in a number of independent projects, taking charge of processes from inception to delivery.<\/p><p><strong>Careers and opportunities<\/strong><\/p><p>An important vocation in the modern digital age, cyber security professionals work with creativity and analytical thinking to understand how systems can be broken, protected and used.<\/p><ul><li>A career in cyber security is challenging, dynamic and highly transferable, meaning graduates may have the opportunity to work internationally throughout their careers as there is a recognized global demand for trained specialists.<\/li><li>Cyber security is a rapidly growing market, with plenty of scope to develop a very lucrative career. Graduates from this course can enter a number of possible career pathways, such as Cyber Security Consultant, Cyber Crime Investigator, Digital Forensics Analyst or Software Developer Programmer.<\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security BSc (Hons) As a result of the continuing digital revolution, computer systems are involved in just about every aspect of modern life. Course overview As the number of mobile users, digital applications, and data networks increase, so has the number of potential risks and threats, resulting in the need for talented professionals to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":3362,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3492","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security -\" \/>\n<meta property=\"og:description\" content=\"Cyber Security BSc (Hons) As a result of the continuing digital revolution, computer systems are involved in just about every aspect of modern life. Course overview As the number of mobile users, digital applications, and data networks increase, so has the number of potential risks and threats, resulting in the need for talented professionals to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100089823527571\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-17T01:19:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ready4uni.eu\\\/index.php\\\/degrees\\\/coventry-university\\\/cyber-security\\\/\",\"url\":\"https:\\\/\\\/ready4uni.eu\\\/index.php\\\/degrees\\\/coventry-university\\\/cyber-security\\\/\",\"name\":\"Cyber Security -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ready4uni.eu\\\/#website\"},\"datePublished\":\"2023-04-13T21:36:55+00:00\",\"dateModified\":\"2023-04-17T01:19:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ready4uni.eu\\\/index.php\\\/degrees\\\/coventry-university\\\/cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ready4uni.eu\\\/index.php\\\/degrees\\\/coventry-university\\\/cyber-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ready4uni.eu\\\/index.php\\\/degrees\\\/coventry-university\\\/cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ready4uni.eu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Degrees\",\"item\":\"http:\\\/\\\/ready4uni.eu\\\/index.php\\\/degrees\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Coventry University\",\"item\":\"http:\\\/\\\/ready4uni.eu\\\/index.php\\\/degrees\\\/coventry-university\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ready4uni.eu\\\/#website\",\"url\":\"https:\\\/\\\/ready4uni.eu\\\/\",\"name\":\"\",\"description\":\"Realise your dreams\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ready4uni.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security -","og_description":"Cyber Security BSc (Hons) As a result of the continuing digital revolution, computer systems are involved in just about every aspect of modern life. Course overview As the number of mobile users, digital applications, and data networks increase, so has the number of potential risks and threats, resulting in the need for talented professionals to [&hellip;]","og_url":"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100089823527571","article_modified_time":"2023-04-17T01:19:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/","url":"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/","name":"Cyber Security -","isPartOf":{"@id":"https:\/\/ready4uni.eu\/#website"},"datePublished":"2023-04-13T21:36:55+00:00","dateModified":"2023-04-17T01:19:22+00:00","breadcrumb":{"@id":"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ready4uni.eu\/"},{"@type":"ListItem","position":2,"name":"Degrees","item":"http:\/\/ready4uni.eu\/index.php\/degrees\/"},{"@type":"ListItem","position":3,"name":"Coventry University","item":"http:\/\/ready4uni.eu\/index.php\/degrees\/coventry-university\/"},{"@type":"ListItem","position":4,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/ready4uni.eu\/#website","url":"https:\/\/ready4uni.eu\/","name":"","description":"Realise your dreams","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ready4uni.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/pages\/3492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/comments?post=3492"}],"version-history":[{"count":7,"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/pages\/3492\/revisions"}],"predecessor-version":[{"id":3962,"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/pages\/3492\/revisions\/3962"}],"up":[{"embeddable":true,"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/pages\/3362"}],"wp:attachment":[{"href":"https:\/\/ready4uni.eu\/index.php\/wp-json\/wp\/v2\/media?parent=3492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}