Everything you need to know...
-
What is the fee?
Home: See fees section below
International/EU: £17,155 per year -
How long will I study?
3 / 4 Years
-
Where will I study?
-
What are the entry requirements?
-
What is the UCAS code?
F4G4
-
When do I start?
September 2025
-
Placement year available?
Yes
Course summary
- Develop the skills to design and secure complex information systems.
- Learn to respond appropriately to security incidents by gathering evidence.
- Understand the legal and regulatory environment around complex information systems.
- Study the principles employed in cyber security and digital forensics.
- Use the latest digital forensics software and technologies employed in industry.
You will study fundamental cyber security topics, including principles of security, computing, architecture and networking, databases, and programming. You’ll also gain industry certifications such as the Cellebrite Certified Operator (CCO) certification and the Nuix Workstation Forensics Practitioner Foundations and Core certifications.
Employability
80% of our graduates are in highly skilled employment or further study fifteen months after graduating (2021/22 Graduate Outcomes Survey).
Come to an open day
Visit us to learn more about our gold-rated teaching and why we were awarded the highest possible rating in the Teaching Excellence Framework.
How you learn
You’ll start by developing strong practical skills in cyber security though lectures and hands-on tutorial sessions. These sessions will build your understanding of how and when to use appropriate processes, tools, technologies, and management practices in areas including network fundamentals, cryptography, and information security.
You will develop these skills further on real-world projects – collaborating in small teams to produce deliverables inspired by industry. These projects will further your knowledge in areas such as system vulnerabilities, detect network intrusions, and analysing and interpreting digital evidence collected from computers and mobile devices. Previous students have worked with the Yorkshire and Humber Regional Cyber Crime Unit to develop security demos.
During your final year, you will create a significant cyber security deliverable, guided by a dedicated project supervisor. As part of this individual project, you will undertake research and apply new skills while you create a solution to a complex cyber security and forensics problem. The course team offers guidance and support throughout this process.
The course encourages you to take an active approach to learning and self-development to develop highly sought-after cyber security skills through problem-solving activities, practical implementation and teamwork. You learn through
- lectures
- hands-on lab sessions and tutorials
- regular feedback
- teamwork and group-based learning
- practice-based applied learning
- discussions
- self-study
You’ll be supported in your learning journey towards highly skilled, graduate level employment through a number of key areas. These include
- access to specialist support services to help with your personal, academic and career development
- access to our Skills Centre with one to ones, webinars and online resources, where you can get help with planning and structuring your assignments
- industry-specific employability activities such as live projects, learning in simulated environments and networking opportunities
Course leaders and tutors
Myles Dempsey
Senior Lecturer in Digital Forensics and Course Leader for BSc Cyber Security with ForensicsStaff profile for Myles Dempsey, Senior Lecturer in Digital Forensics and Course Leader for BSc Cyber Security with Forensics at Sheffield Hallam University
Applied learning
Work Placements
You’ll have the opportunity to complete a year-long work placement between your second and third year. A placement is widely recognised as the gold standard opportunity to gain personal and professional development through real-world experience.
You will be encouraged to take up this opportunity, as it will benefit your long-term career prospects and salary level, as well as your academic achievements and degree classification. Your course will prepare you to succeed in your placement and you will be supported throughout it.
Your placement will allow you to apply the knowledge and skills gained on your course, in areas such as digital forensics, information security, and network intrusion detection.
Students from this course have worked with companies such as
- 3Squared
- The BBC
- CYFOR
- HSBC
- Next
- Sainsbury’s
- Satisnet
- Sec-1
- Yorkshire & Humber Regional Cyber Crime Unit
Your placement year will allow you to gain an Applied Professional Diploma in addition to your degree which will enhance your graduate profile and give you the edge with future employers.
You’ll also be supported to take advantage of work experience opportunities throughout your course, through access to a range of support activities, resources, and employer events from your Employability Team. This will further enhance your employability skillset, confidence, and opportunity-awareness to help you succeed in your career after graduating.
Live projects
During each year of your course, you’ll be applying your learning using industry projects. These will challenge you to solve real-world cyber security problems while developing team and project management skills. This is great preparation for the world of work, all in a supportive learning environment.
We work in partnership with the North East Business Resilience Centre (NEBRC), a non-profit organisation. NEBRC aims to help protect regional businesses from cybercrime and employs our students to deliver specialist services during their studies. The NEBRC was established in 2019 – funded by a variety of private and public partners including the police, as well as a wide range of business investors and members across England.
Networking opportunities
We’re a member of the Chartered Institute of Information Security (CIISec) Academic Partner Programme. The CIISec is the only information and cyber security institution to have been granted Royal Charter status. This means you’ll be able to develop contacts within the cyber security community. You’ll have access to world-class speakers and the opportunity to network with prospective employers.
The Check Point SecureAcademy program at Sheffield Hallam University gives you free access to additional industry-recognised training platforms, hands-on experience with real-world tools, and the opportunity to work towards further certifications in cyber security. The program covers cutting-edge content in cloud security, network security, and security automation, aligning skills with industry demands.
Future careers
This course prepares you for a career in
- cyber security analysis
- digital forensics consultancy
- security consultancy
- information security analysis
- information security
- incident response analysis
Previous graduates of this course have gone on to work for dedicated security and forensics companies, law enforcement agencies and large-scale businesses and industries such as
- 3Squared
- Cisco
- Citrix
- CYFOR
- Exponential-e
- F-Secure
- G-Research
- Hewlett-Packard
- HSBC
- IBM
- Info-Assure
- Intaforensics
- NextGen Security
- Sec-1
- Serious Fraud Office
- Servelec Group
- Sky
- South Yorkshire Police
- West Yorkshire Police
Where will I study?
You study at City Campus through a structured mix of lectures, seminars and practical sessions as well as access to digital and online resources to support your learning.
City Campus
City Campus is located in the heart of Sheffield, within minutes of the train and bus stations.
City Campus map | City Campus tour
Adsetts library
Adsetts Library is located on our City Campus. It's open 24 hours a day, every day.
Learn moreLearn more about your department
Computing facilities tour
Take a look around the facilities and equipment in the Department of Computing at Sheffield Hallam University.
Equipment and facilities
On this course you’ll have access to specialist security and forensics labs and work with:
- our state-of-the-art internetworking labs
- Cisco switching
- routing and security devices
- virtualised desktops and servers
- intrusion detection systems
- penetration testing applications
- the latest specialist software – including Encase, Magnet Axiom and IEF, FTK, X-Ways, Nuix, Cellebrite Physical Analyzer, UFED Touch 2 and UFED 4PC.
We’ve invested over £100m in new facilities to help you study how and when you want. This means 24-hour libraries and study spaces designed by our students.
Entry requirements
All students
UCAS points
- 112-120
This must include at least 64 points from two A levels or equivalent BTEC National qualifications. For example:
- BBC-BBB at A Level
- DDM in BTEC Extended Diploma
- Merit overall from a T level qualification
- A combination of qualifications, which may include AS Levels, EPQ and general studies.
You can find information on making sense of UCAS tariff points here and use the UCAS tariff calculator to work out your points.
GCSE
- English Language or Literature at grade C or 4
- Maths at grade C or 4
GCSE equivalents
- Level 2 Literacy or Functional Skills Level 2 English
- Level 2 Numeracy or Functional Skills Level 2 Maths
• Access - an Access to HE Diploma with at least 45 credits at level 3 and 15 credits at level 2. At least 15 level 3 credits must be at merit grade or above, from a QAA-recognised Access to HE course, or an equivalent Access to HE certificate.
If English is not your first language, you will need an IELTS score of 6.0 with a minimum of 5.5 in all skills, or equivalent. If your English language skill is currently below IELTS 6.0 we recommend you consider a Sheffield Hallam University Pre-sessional English course which will enable you to achieve an equivalent English score.
We welcome applications from people of any age. We may be flexible in our normal offer if you can show a commitment to succeed and have the relevant skills and experience. This must show that you will benefit from and finish the course successfully.
Additional information for EU/International students
If you are an International or non-UK European student, you can find out more about the country specific qualifications we accept on our international qualifications page.
For details of English language entry requirements (IELTS), please see the information for 'All students'.
Modules
Important notice: The structure of this course is periodically reviewed and enhanced to provide the best possible learning experience for our students and ensure ongoing compliance with any professional, statutory and regulatory body standards. Module structure, content, delivery and assessment may change, but we expect the focus of the course and the learning outcomes to remain as described above. Following any changes, updated module information will be published on this page.
You will be able to complete a placement year as part of this course. See the modules table below for further information.
Year 1
Compulsory modules
Aims:
In this module students gain a fundamental understanding of the way computer networks operate and the core components of computer systems.
This module introduces the fundamental principles and features that underpin all modern computing systems. Students will learn about computer and network components and their functions, as well as how network communication is structured.
By the end of this module, students will understand the core components of computer systems, be able to build local area networks (LANs), configure and manage switches, and implement IPv4 and IPv6 address infrastructures.
INDICATIVE CONTENT
-
Introduction to computer architecture and systems, including memory, I/O devices and interfaces, CPU, memory and buses
-
Structure and variety of Operating systems
-
High and low level languages, device drivers and processes
-
Memory (internal, external and cache) in computer systems
-
CPU structure, function and instruction sets
-
Digital logic (Boolean algebra, gates and circuits)
-
Build and configure a PC
-
Introduction to network protocols and models
-
IPv4 and IPv6 addressing and address resolution
-
Network services and routing
-
Packet and Datagram structures
-
Basic device network configuration
-
Switching concepts and configuration
-
Build a small network
The module introduces the fundamental concepts and principles of cyber security and digital forensics. It consolidates your understanding of numerical skills, providing a foundation of mathematical and statistical knowledge, skills and concepts for applications in cryptography and cyber security.
You’ll study topics such as:
- Confidentiality, integrity and availability in computer systems
- Authentication and identification schemes
- Malware and viruses
- Cryptography
- Network security threats and defences
- Security planning, policies and training
- Digital Forensics
- Cyber law and standards
- Numerical and algebraic processes and two-dimensional geometry
- Computer number systems, e.g. binary, hexadecimal, etc.
- Set theory and logic
- Symmetric block ciphers, e.g. DES (triple-DES), AES (Rijndael) and
- Public-key ciphers, e.g. RSA including prime numbers, modular arithmetic and exponentiation
- Classical ciphers, e.g. shift, substitution, transposition, poly-alphabetic
- Statistics and probability
This module will build your employability skills to prepare you for work placement and your future career. It will develop your skills in problem solving, group working, communicating, innovating, and reflective learning.
You’ll study topics such as:
- Professionalism and ethics
- Placement workspace
- Client engagement and intrapreneurship
- Personal performance planning and appraisal processes
- Career planning
- Pre-placement preparation
- CV writing and covering letter
- Employer engagement
This module introduces practical computer programming using a procedural problem-solving approach. It will develop your awareness of the design and implementation of programs in a modern, industry-standard programming language.
You’ll study topics such as:
- Procedural programming concepts
- Problem solving and top-down design
- Software development processes: specification, design, implementation, testing
- Data structures
- Algorithmic analysis and design
- Input/output
- String and file handling
- Procedures and functions, parameters, and return values
- Program quality
Year 2
Compulsory modules
This module introduces the theoretical insights and practical skills required to administer and maintain a secure database using industry-standard database systems and tools. It will develop your understanding of database design and the provision of data integrity as well as your critical thinking to validate a database administration strategy in a business context.
You’ll study topics such as:
-
Database administration to support security measures: authentication, authorisation, views, stored procedures, trigger
-
Database programming
-
Backup and recovery strategies: data transfer, data type transformation, enforcing integrity
-
Employability skills: personal responsibility and teamwork.
-
Social, ethical, professional, legal, and sustainable practice and values, including equality, diversity, and inclusion
This module introduces the legal and practical tools required to gather, store and analyse digital evidence from security incidents. In will develop your understanding and application of intrusion detection and incident response approaches to mitigate cyber-attacks.
You’ll study topics such as:
- Digital storage technologies
- Audit and log trails in computer operating systems
- Copying, securing and documenting potential forensic information
- Tools and software for analysing and recording digital forensic information
- Sources of forensic information within an IT infrastructure
- Mobile, portable and internet based forensic information
- Legal and ethical considerations
- Classifying and assessing the risk of vulnerabilities
- Network data features to aid forensic analysis, incident response and cyber security
- Capturing, filtering and analysis of network traffic and malicious content
- Host- and network-based intrusion detection systems
- Anomaly and signature approaches to network defence
- Threat intelligence
This module develops your understanding of project requirements to design, develop and deliver a solution against a client project. As you engage with the client, you will enhance your project management and teamworking skills while being introduced to models and techniques that are commonly used in information system development. You will critically assessing successes and failures of the project, and reflect on your personal and professional performance.
You’ll study topics such as:
-
Project management methodologies
-
Systems development methodologies
-
Collaboration, equality, diversity and inclusion considerations
-
Identifying stakeholders
-
Understanding requirements
-
Requirements and systems modelling techniques
-
Project planning
-
Time management
-
Task management
-
Social, professional, ethical, and legal issues
-
Presentation of information
-
Report writing, oral presentation
-
Project evaluation
-
Professional reflection
The aim of the module is to enable students to analyse and test common security vulnerabilities through ethical hacking and to apply appropriate intrusion detection and incident response approaches for their mitigation.
Indicative content
Module content may vary in response to changing technical and professional landscapes but could include:
-
Security Requirements for Networks and Networking Devices over TCP/IP layers.
-
Data Confidentiality through Encryption, Public-Key Cryptography, Digital Signature and Data Integrity, including Access Control (local and remote) and Blockchain Technology.
-
Understanding wireless Networks and Wireless security
-
Secure Socket Programming (client-server) and Secure Application Development to maintain CIA Triad & transparency and trust for data and maintaining network security.
-
Understanding Security Policies, Business Continuity/Disaster Recovery, Relevant legislation, such as licences, data protection and storage security.
-
Fundamentals of operating systems.
-
Installation, management and monitoring of typical networked services and operating systems.
-
Configuration and management of user and group authentication polices and services.
-
Networked file systems, and the management of secure access to content stored/made available through these file systems.
Elective modules
This module is for undergraduate students to study abroad in their second year, Semester 2 (only for courses that offer this option). With this module, you can spend a semester at one of the University’s approved partner institutions worldwide – from Europe to the Americas, Australia or Canada.
Study Abroad plays an important role in the University's commitment to an engaging, challenging, and thriving learning culture. It offers opportunities to experience other academic cultures and foster intellectual maturity while enhancing co-curricular skills and students' long-term employability.
Study abroad for credit is permitted on existing university-approved courses only. Students are awarded credits and grades at the partner institution, which are converted into Sheffield Hallam credits and grades on return and included in the Sheffield Hallam degree classification.
Please check and refer to the webpage How study abroad works. You must submit a Learning Agreement outlining the modules you will be taking at the partner institution. The Learning Agreement will be signed off by your academic tutor to ensure that the Learning broadly covers the Learning Outcomes set out in your course curriculum during your study abroad.
Year 3
Optional modules
Module aim:
The aim of this module is to enhance students’ professional development through the completion of and reflection on meaningful work placement(s).
A work placement will provide students with opportunities to experience the realities of professional employment and experience how their course can be applied within their chosen industry setting. The placement will:
-
Allow student to apply the skills, theories and behaviours relevant and in addition to their course
-
Enable students to enhance their interpersonal skills in demand by graduate employers – communication, problem solving, creativity, resilience, team work etc.
-
Grow their student network and relationship building skills.
-
Provide student with insights into the industry and sector in which their placement occurs
-
Help student make informed graduate careers choices.
Indicative Content:
In this module students undertake a sandwich placement (min 24 weeks / min 21 hours per week) which is integrated, assessed and aligned to their studies.
Their personal Placement Academic Supervisor (PAS) will be their key point of contact during their placement and will encourage and support students to reflect on their experience, learning and contribution to the organisation they work for.
To demonstrate gains in professional development, students will be required to share their progress, learning and achievements with their Placement Academic Supervisor and reflect on these for the summative piece of work.
Final year
Compulsory modules
This module critically evaluates advanced digital forensics tools and techniques, developing expert witness presentations to a variety of audiences within the UK legal system. You’ll explore the UK criminal justice system and the role of expert witnesses, developing skills to manage the flow of admissible evidence from a crime-scene to a courtroom.
You’ll study topics such as:
-
File systems artefacts for a digital forensics investigation
-
Forensics tools and scripting language for evidence analysis
-
Common system architectures relevant to digital forensics
-
Static and dynamic analysis of Malware
-
Digital media in law and limitations of forensic investigations
-
The analysis of viruses, worms, ID theft and related laws
-
Evaluation of digital forensics case studies
-
Critical thinking to produce and evaluate expert reports
-
Ethical practice, EDI, responsibility and conventions
-
Organisational culture in digital forensics and incident response
This module critically evaluates and applies information security methodologies and principles to reduce organisational risk.
You’ll study topics such as:
-
Information security management standards and frameworks
-
Identification of controls to meet standards requirements
-
Risk management and assessment methodologies
-
Developing security awareness training programmes
-
Development of policies, standards and procedures supporting an ISMS
-
Business continuity planning
-
ISMS scoping, planning and policies
This module enables you to demonstrate your knowledge and skills in a consultancy or employer-led research project, exploring a specific research or consultancy topic. You’ll review existing literature, choose appropriate methods and provide suitable recommendations to the existing body of knowledge.
You’ll apply your skills and learning to:
-
Analysing and synthesising library resources, literature and databases
-
Methods for the specification, design, implementation and outcomes
-
Time management and project planning
-
Report writing, presentation and demonstration
-
Critical evaluation and reflection
-
Due consideration of ethics, values in the workplace and professionalism
-
What it means to be a computing professional
-
Awareness of employability issues
-
Enhancing your own employability
Elective modules
This module explores Blockchain technology and IoT security, privacy and ethics, with opportunities to design and develop applications of smart solutions. You’ll study the performance of the systems and the network, investigating different security, privacy scenarios and feature requirements in terms of computation, memory, bandwidth and storage.
You’ll study topics such as:
-
Blockchain technology principles and features
-
Healthcare, smart homes and cities, supply chain, transport and environment
-
Cryptocurrency designs and industrial application
-
Consensus techniques, miners, wallets, DeFi and network fees
-
Blockchain scalability, privacy issues and challenges and solutions
-
IoT and its applications
-
IoT security issues, challenges and solutions
-
IoT in smart home, smart city, supply chain and healthcare
-
Design, develop, implement and test Blockchain
-
Secure IoT application development
This module provides an understanding of technologies and management requirements for large scale data storage within organisations. You’ll study the network infrastructures and storage media used, as well as identifying the strategies for managing data requirements of various organisations.
You’ll study topics such as:
-
Data storage networks and topologies
-
Data storage media
-
Data storage technologies and interface protocols
-
Storage management and strategy
-
Business continuance, backup and recovery
-
Cloud storage
-
Storage security
This module shows you how to detect and respond to security threats and vulnerabilities within a computing system. You’ll gain experience with the key phases of reconnaissance and intelligence analysis.
You’ll study topics such as:
-
The vulnerability of computer systems
-
Penetration testing methodology
-
System reconnaissance and information gathering
-
Secure web-based applications
-
Web application security testing
-
Web application testing methodologies
-
Intelligence and information analysis
Fees and funding
Home students
Our tuition fee for UK students on full-time undergraduate courses in 2025/26 is £9,535 per year (capped at a maximum of 20% of this during your placement year). These fees are regulated by the UK government and therefore subject to change in future years.
If you are studying an undergraduate course, postgraduate pre-registration course or postgraduate research course over more than one academic year then your tuition fees may increase in subsequent years in line with Government regulations or UK Research and Innovation (UKRI) published fees. More information can be found in our terms and conditions under student fees regulations.
International students
Our tuition fee for International/EU students starting full-time study in 2025/26 is £17,155 per year (capped at a maximum of 20% of this during your placement year)
Financial support for home/EU students
How tuition fees work, student loans and other financial support available.
Additional course costs
The links below allow you to view estimated general course additional costs, as well as costs associated with key activities on specific courses. These are estimates and are intended only as an indication of potential additional expenses. Actual costs can vary greatly depending on the choices you make during your course.
General course additional costs
Additional costs for School of Computing and Digital Technologies (PDF, 131.3KB)Legal information
Any offer of a place to study is subject to your acceptance of the University’s Terms and Conditions and Student Regulations.