Cyber Security and Digital Forensics BSc | Middlesex University London
Section navigation
Main Baner Image

Cyber Security and Digital Forensics BSc

Learn about the course below
Code
I123
Start
October 2019
Duration
3 years full-time
4 years full-time with placement
Usually 5 years part-time
Attendance
Full-time
Part-time
Fees
£9,250 (UK/EU) *
£13,500 (INT) *
Course leader
Dr Mahdi Aiash

Any organisation that has a system that stores data will need to protect it. This degree will give you the skills and knowledge to identify breaches, vulnerabilities and threats to any organisation by conducting a digital investigation that will maximise the data acquisition, whilst minimising the contamination to data. You will have the latest information on standards to relevant industries and be aware of compliance management.

Why study BSc Cyber Security and Digital Forensics at Middlesex University?

This is a multidisciplinary course, with exciting work experience placement opportunities during your second year.

You will also have the opportunity to choose interesting and unique options in your final year that will develop the skills that are in high demand from industry.

Course highlights

  • A dedicated network lab, allowing you to put theory into practice
  • A dedicated Cyber Security and Digital Forensic lab with industry standard software
  • You will have the opportunity to gain industry recognised certifications such as Cisco's CCNA and CCNP

What will you study on BSc Cyber Security and Digital Forensics?

Core modules such as programming, networks, and IT security are covered in this course extensively. You will develop expert knowledge in the technological, ethical, regulatory and legal issues in this field, including security, encryption, operating systems and information systems. After Year 2, you will have the opportunity to put what you've learned to practical use with a work experience placement at an organisation.

What will you gain?

You will be prepared to deal with the legal implications of investigations and be able to collect, analyse and report on and present your findings on digital artefacts seized. You will be prepared to investigate unauthorised access or data breaches in an organisation.

  • Year 1

    • Computer Networks (30 credits) - Compulsory

    • Computer Systems Architecture and Operating Systems (30 credits) - Compulsory

      This module will provide you with fundamental concepts and principles of computer hardware and operating systems in order to explain the structure and operation of modern computers.

      By taking this module, you will gain an understanding of how the computer’s hardware enables it to function as a networked, multi-media machine as this module will focus on the understanding of concepts, theory and associated terminology. Practical hands-on laboratory experiments will be used to illustrate the application of theory and concepts. Consideration will also be given to likely future developments in the area of computer architecture.

      The development of a range of transferable skills with respect to communicating and demonstrating relevant knowledge will be encouraged and supported throughout.

    • Programming for Data Communications and Networks (30 credits) - Compulsory

      This module introduces fundamental computational concepts and programming constructs relevant to understanding and use of a range of widely used programming languages.

      The main aim is to provide you with the opportunity to learn to program effectively. This takes place in the context of learning to solve a range of problems arising in the context of the processing, storing and transmitting data. You will understand the role of a basic but important range of data structures and types, and their use. Several data structures of interest within CCE will be considered, for example those to represent RTP packets (and associated operations on these) in order that audiovisual data can be sent using transport protocols such as the UDP protocol. The concept of an algorithm is introduced early on together with the techniques for program implementation. You will be encouraged and supported in undertaking - both individually and within a small group setting - a variety of laboratory-based problem solving tasks.

    • Information in Organisations (30 credits) - Compulsory

      This module will enable you to differentiate between data, information and knowledge in an organisation and to investigate efficient ways of storing, preserving, searching, retrieving and displaying information in an organisation. Undertaking this module will help you to visualise and conceptualise information in organisations through knowledge of modelling techniques and to design and implement a database system, and to utilise a mark-up language, to reflect the information in an organisation. The module will enable you to query and manipulate data that is stored in relational database using Structured Query Language (SQL).

  • Year 2

    • Digital Incident Scene Investigation (30 credits) - Compulsory

      This module will provide you with experiential knowledge of the four phases of a Digital Investigation for digital landscapes, which are, Seizure (covers areas from the beginning of the crime scene and will discuss the current guidelines and standards, Locard’s exchange principle, the physical and appropriate process of “bagging and tagging” of digital devices and making and referring to contemporaneous notes), imaging (covers areas of why it is necessary to image, types of imaging methods, verification of an image, evidentiary integrity and how-to image using Write-Blocker hardware), analysis (uses various software to build up profiles of users from their digital fingerprints using appropriate software) and reporting (uses appropriate software be able to explain, justify and defend any decision made in the analysis stage).

    • Internet Technologies (30 credits) - Compulsory

      In the past years there has been an increase in attacks on websites that can result in the disclosure of information that is of a personal and confidential nature. With the introduction of GDPR it is no longer acceptable to collect information overtly and then not protect that information adequately. The purpose of this module is to consider GDPR compliancy for websites and more importantly implement them for the protection of collected data. Compliancy is taught in another module, so this module has some overlap, but relies on some knowledge of GDPR.

    • Cyber Security and Digital Forensic Compliance (30 credits) - Compulsory

      The aim of this module is to enable you to understand both the requirements for cybersecurity legislation and standards and the effects of compliance with them.

      Whilst taking this module you will become proficient at how to identify and comply with relevant legislation and standards. The module will include a consideration of the language and terminology of laws and standards and how `in house’ regulation can be written to facilitate the following of best practise and legal requirements by a wide range of end users.

      Through this module you will become familiar with the complete standardisation process from creation to replacement or withdrawal and also consider the role of and requirements for legislation in this area.

    • Network and Protocol Analysis (30 credits) - Compulsory

      The module looks at Network and Protocol Analysis and attempts to cover all aspects of networking and protocols including Internet Protocols, Network Services and Cloud Environments as well as Network Monitoring and Analysis. The main goal of the module is to equip you with the ability to build and analyse any networking environment independent of the underlying physical networking technology. Internet Protocols are the backbone of global communications and will be thoroughly examined in this course: including ARP, IP, UDP and TCP. This is then followed by the examination of the use of Network services including DNS, DHCP, CIFS and Ecommerce platforms such as LAMP. The course then moves on to show how these systems now run on Cloud Service Platforms leading to the development of the Intelligent Edge Environment (IEE). The course finishes by looking issues of network monitoring, network analysis and network performance.

  • Year 3 - Optional Placement Year

    • Supervised Industrial Placement (120 credits) - Optional

      The overall aim of the module is to provide a minimum of nine months (39 weeks) and a maximum of 12 months (52 weeks) experience in a relevant work placement. The specific aims of this module are to enable you to experience a technical employment role in a real work setting and apply theoretical knowledge to the solution of practical problems. It will help you to build your skills to assess practical problems effectively and provide well-grounded solutions developing and enhancing your professional qualities, to work in a management structure, to develop team skills and communication skills. This opportunity will develop the maturity that will enable you to perform well in your final year, contributing with the development of the skills of autonomous learning.

  • Year 4

    • Memory Analysis (30 credits) - Compulsory

      This module aims to look into complete memory extraction and distinguish and identify memory artefacts. You will be exposed to how memory Analysis can help to determine information about running programs, the operating system, and the overall state of a computer.

      You will also look into memory forensics in the form of cyber investigation that allows an investigator to identify unauthorised and anomalous activity on a target computer or server. You will be able to run a special software that is able to capture the current state of the system's memory that is known as memory dump (snapshot file).

    • Defensive Security (30 credits) - Compulsory

      This module will provide an overview of the different types of cyber security threats to computer systems and networks and the measures that can be put in place to counteract and mitigate against these threats.

    • Individual Project (30 credits) - Compulsory

      This module provides you with the opportunity of choosing and working on a project that reflects your interests and aims and outcomes of your programme. It should constitute a practical problem-solving project relevant to your programme of study. The primary aim of the module is to consolidate and deepen your understanding of material taught on your programme, to exercise professional judgement, to undertake individual research and to conduct an investigation and/or develop a product, process or application relevant to the focus of your programme. It provides you with the opportunity of engaging in significant system development, the typical output of which represents the solution of a problem akin to those that you as a fledgling professional practitioner are likely to encounter in future employment. The module intends that your choice of individual project will provide you with a significant opportunity to reflect on your learning progress and to develop your learning for life-long and career development.

    • Blockchain Engineering and Analytics (30 credits) - Optional

      Blockchain Technology is changing how organisations communicate and operate, with this change there is a challenge and opportunity for Blockchain developers and analysts. This module aims is to enable to gain knowledge behind the blockchain technology and how it can be applied, to gain skills to develop and implement blockchain technology and to enable you to combine knowledge and skills to complete blockchain analytics.

    • Artificial Intelligence (30 credits) - Optional

      The aim of the module is to introduce you to a range of AI theories and techniques, including the most commonly used. This will extend to the ability to implement these techniques, to facilitate you to extend your own development skills.

    • Network Security and Forensics (30 credits) - Optional

      This module aims to provide you with an understanding of network security and forensics. It provides an overview of some key issues, such as CIA and AAA, current systems and infrastructures, Cloud Computing and define some key principles, such as defence-indepth and de-militarisation zones (DMZ).

You can find more information about this course in the programme specification. Optional modules are not offered on every course. If we have insufficient numbers of students interested in an optional module, or there are staffing changes which affect the teaching, it may not be offered. If an optional module will not run, we will advise you after the module selection period when numbers are confirmed, or at the earliest time that the programme team make the decision not to run the module, and help you choose an alternative module.

How is the BSc Cyber Security and Digital Forensics taught?

The emphasis of this course is very much on learning by doing. You will learn how to use specialist equipment in our computer laboratories and will work on group and individual projects, as well as consolidating your learning at seminars. You can opt to extend the course by a year, and spend the third year doing a paid work placement, which will lead to a certificate of industrial achievement.

Assessment

You will be assessed through practical assignments, laboratory exercises, demonstrations of your work and group and individual projects and presentations. You will also sit exams and submit coursework, including research reports and design documents, and there will be some seminar-based assessment. You will receive regular feedback on your work, including your assessed coursework and exams.

  1. UK & EU
  2. International
  3. How to apply
  1. UK & EU
  2. International
  3. Additional costs

How can the BSc Cyber Security and Digital Forensics support your career?

You will be expected to complete case studies that reflect real-world investigations. Standard Operating Procedures, theory and practice will all be completed and compliant to current regulations. Understanding of regulations and how they are applied is important in organisations that rely on data. These teaching experiences will help prepare you for your future career.

This course can provide a range of job opportunities in a variety of sectors. Previous graduates have gone on to work with:

CompanyRole
AccentureTester
Alvarez and MarsalAnalyst
Bedfordshire PoliceDigital Forensic Examiner
Competition and Markets Authority (CMA)Digital Forensics Officer / Senior Digital Forensic Specialist
DMA UKIT Manager
EpicOperations Analyst / Cyber Forensics Investigator
Ernst and YoungForensic ad Integrity Services Assistant Director / e-Discovery Associate
Eurofins Forensic ServiceSenior Computer Investigator
Financial Conduct Authority (FCA)Cyber Forensics Coordinator / e-Discovery Administrator
Grant ThorntonDigital Forensic Consultant
The Insolvency ServiceForensic Computing Examiner
Inventuse-Discovery Consultant
MindshareBusiness Intelligence Analyst
QACyber Security Researcher
The Royal Marsden Cancer CharitySenior Database Manager
SAPTechnical Consultant / Developer
Serious Fraud OfficeDigital Forensic Investigator
Sussex PoliceDigital Forensic Investigator
Transport for LondonCompliance Manager

Mahdi Aiash
Senior lecturer

Dr Aiash is a computer security researcher and practitioner with industry, academic, and research experience. He is an active contributor to the academic as well as broader international community working on Information and Network Security issues. He has published in excess of 50 peer reviewed papers in prestigious journals and conferences and is a recipient of a number of "Best Research Paper Awards". Dr Aiash presently maintains nearly two dozen certifications including Ethical/White Hat Hacker, Licenced Pen-tester and Information Security Officer. He has also conducted workshops and corporate training's around the world apart from his speaking engagements.

Dr Sukhvinder Hara
Senior lecturer

Dr Hara has spent 7 years as a Digital Forensic Analyst in the Serious Fraud Office and brings invaluable experience to the programme. She has published many articles and is currently completing research in Crytocurrencies.

Dr Ian Mitchell
Associate professor

Dr Mitchel has been teaching for over 20 years in higher education and has over 40 articles published in domains extending to Neural Networks, Evolutionary Algorithms, Digital Forensics and Blockchain Engineering.

Other courses

Computer Networks BSc

Start: October 2019, EU/International induction: September 2019

Duration: 3 years full-time, 4 years with placement, Usually 5 years part-time

Code: G400

Computer Communication and Networks BEng (Hons)/MEng

Start: October 2019, EU/International induction: September 2019

Duration: 3 years full-time, 4 years with placement, Usually 5 years part-time

Code: BEng: G425, MEng: I120

Computer Science BSc

Start: October 2019, EU/International induction: September 2019

Duration: 3 years full-time, 4 years with placement

Code: G404

KIS information

Back to top