Everything you need to know...
-
What is the fee?
Home: See fees section below
International/EU: £18,000 per year -
How long will I study?
4/5 Years
-
Where will I study?
-
What are the entry requirements?
-
What is the UCAS code?
A093
-
When do I start?
September 2026
-
Placement year available?
Yes
Course summary
- Gain experience in building and testing in-depth cyber defences.
- Develop a strong understanding of network, application and systems cyber security.
- Explore the tools and techniques used to secure data and detect threats.
- Create complex technical solutions to real-world cyber security problems.
- Prepare for a high-demand industry through applied learning and expert teaching.
On this BSc Cyber Security degree, you’ll explore practical and theoretical approaches to digital security – developing the confidence and technical expertise to protect networks, applications and systems from evolving threats. You’ll apply core principles to ethical hacking, penetration testing and cyber defence, gaining the experience you’ll need to become a skilled cyber security professional.
Accredited by
This course includes a foundation year to help you build core knowledge and skills. The foundation year itself is not accredited. However, the full degree you’ll progress to is accredited by BCS, The Chartered Institute for IT , providing you with a professionally recognised qualification upon successful completion of the course.
Come to an open day
Visit us to learn more about our gold-rated teaching and why we were awarded the highest possible rating in the Teaching Excellence Framework.
How you learn
With organisations across all sectors urgently seeking experts to secure their data, this degree prepares you to meet the growing demand with confidence.
You’ll be taught by experienced experts from all areas of cyber security, blending academic knowledge with real-world insight. You’ll build secure network applications, develop robust defences, and test systems using the core principles of ethical hacking. You’ll also use specialist tools and platforms adopted by industry, working in our Home of Digital Technologies – a world-class facility with seven dedicated cyber security labs, (the largest set-up of its kind in the UK).
Designed with industry needs in mind, the course includes real-world projects and simulated environments that encourage collaboration, critical thinking and hands-on skills development. You’ll also be able to take part in national cyber security competitions – growing your confidence and experience through active, project-based learning.
You learn through:
- lectures
- hands-on lab sessions and tutorials
- regular feedback
- teamwork and group-based learning
- practice-based applied learning
- discussions
- self-study
Key themes
You’ll begin by developing core skills in cyber security through lectures and tutorials – building knowledge in areas like network fundamentals, cryptography and information security. You’ll learn when and how to apply processes, tools and technologies to solve real cyber security challenges.
As the course progresses, you’ll work on real-world projects – including collaborations with organisations such as the Yorkshire and Humber Regional Cyber Crime Unit. These projects give you insight into industry practices while building your technical and problem-solving skills.
In your final year, you’ll complete a major individual project, supported by an academic supervisor. You’ll conduct research and apply your knowledge to create a solution to a complex cyber security issue – with guidance throughout the process.
Course support
You’ll be supported in your learning journey towards highly skilled, graduate-level employment through a number of key areas. These include:
- specialist support services to help with your personal, academic and career development
- Skills Centre one-to-ones, webinars and online resources, where you can get help with planning and structuring your assignments
- industry-specific employability activities such as live projects, learning in simulated environments and networking opportunities
Applied learning
Work placements
You’ll have the opportunity to arrange a year-long work placement in between your second and third years. This gives you valuable work experience and allows you to graduate with an Applied Professional Diploma to enhance your CV.
Students have previously secured placements with Microsoft, IBM, BAE Systems, UK government departments, the NHS and Police forces.
We’ll help you prepare you for success in your placement, and you’ll be supported before and during the experience. You’ll apply knowledge from your course to real scenarios involving information security, cyber analysis and intrusion detection.
Live projects
Throughout the course, you’ll apply your learning to industry-led projects that replicate real-world cyber security problems. These projects help develop teamwork, technical and project management skills in a supportive learning environment.
You’ll also have the opportunity to work with the North East Business Resilience Centre (NEBRC) – a not-for-profit organisation that employs students to deliver services for local businesses. Established with support from police and public-sector partners, NEBRC provides experience with live cyber security challenges.
Field trips
In previous years, students have visited Bletchley Park – the historic site of Britain’s WWII code-breaking efforts and home to the National Museum of Computing. These trips bring the subject to life by connecting cyber security history to its modern-day application.
Networking opportunities
You’ll benefit from our membership of the Chartered Institute of Information Security (CIISec) Academic Partner Programme – offering access to talks, contacts and networking events with cyber security experts.
You’ll engage with organisations such as the NEBRC and Yorkshire Cyber Security Cluster (YCSC) through guest lectures and collaborative projects. You can also attend talks from industry professionals sharing insights on cyber threats, career pathways and innovations in the field.
As part of the Check Point SecureAcademy program at Sheffield Hallam, you’ll access free industry-recognised training platforms. You’ll gain practical experience with real tools and work towards certifications in areas like cloud security and security automation – helping you align with industry demands.
Course leaders and tutors
Modules
Important notice: The structure of this course is periodically reviewed and enhanced to provide the best possible learning experience for our students and ensure ongoing compliance with any professional, statutory and regulatory body standards. Module structure, content, delivery and assessment may change, but we expect the focus of the course and the learning outcomes to remain as described above. Following any changes, updated module information will be published on this page.
You will be able to complete a placement year as part of this course. See the modules table below for further information.
Year 1
Compulsory modules
This module introduces basic computing knowledge and skills to a level that will give you confidence you can study and practice computing at Honours level.
Indicative Content
- Essential concepts of computer programming
- Database queries
- Web technologies
- Basics of how computers and computer networks operate
- Issues of Security
- Awareness of own pace of learning, and how to learn effectively.
The focus of the module is on helping you gain a well-rounded understanding of computing, on able to see common threads in development methods, and being able to apply your learning about computing, and your learning about study approaches into project work on other areas on the course.
This module extends on “Foundations in Computing 1” (and has study of that module as a prerequisite). You will explore computing to a greater depth - for example further program design and implementation, and explore wider uses of computing used in business, social contexts and embedded into other technologies. .
Indicative Content:
-
Programming simple programs effectively
-
Understanding example application areas (e.g. IoT, Games)
-
Understanding how computing supports businesses
-
Further practise of skills in a topic area you are considering selecting for Honours studies
The module maintains the ethos of its prerequisite (Foundations in Computing 1), by provide you with a broad but largely integrated understanding of computing. A further strong aim is to help you make a properly informed choice as to which branch(es) of computing you wish to follow for study at Honours level.
This module develops your mathematics skills relevant to the IT discipline. You choose whether to target an “Advanced” level (which includes topics relevant to degrees in the Computer Science area), or “Standard” level (which includes topics that can occur in any IT-related studies).
You’ll study topics such as:
-
Fractions and decimals
-
Percentages, rounding, estimations
-
Standard form, metric units, indices, powers
-
Algebra and solving linear equations
-
Factorisations
-
Matrices
-
Logic gates and truth tables
-
Binary number system
-
Statistics
Indices and powers (advanced level)
-
Factorising and solving quadratic equations (advanced)
-
Simultaneous equations and matrices (advanced)
-
Correlation and linear regression (advanced)
This module is specifically designed to help support students on the Foundation Year of a BSc Honours course in a computing area. You will develop an understanding of, and practise, skills needed for study at Honours level and for eventual employment.
Indicative Content
-
Disability and Inclusiveness
-
Understanding learning processes and its relationship to success in assessment
-
Finding appropriate information
-
Effective communication
-
Effective use of IT Tools for clear communications and personal professional organisation
-
Academic Integrity
An underlying theme of the module is to help you gain an ability to see for yourself where your study skills lie, and which areas you can make further improvements.
Year 2
Compulsory modules
Aims:
In this module students gain a fundamental understanding of the way computer networks operate and the core components of computer systems.
This module introduces the fundamental principles and features that underpin all modern computing systems. Students will learn about computer and network components and their functions, as well as how network communication is structured.
By the end of this module, students will understand the core components of computer systems, be able to build local area networks (LANs), configure and manage switches, and implement IPv4 and IPv6 address infrastructures.
INDICATIVE CONTENT
-
Introduction to computer architecture and systems, including memory, I/O devices and interfaces, CPU, memory and buses
-
Structure and variety of Operating systems
-
High and low level languages, device drivers and processes
-
Memory (internal, external and cache) in computer systems
-
CPU structure, function and instruction sets
-
Digital logic (Boolean algebra, gates and circuits)
-
Build and configure a PC
-
Introduction to network protocols and models
-
IPv4 and IPv6 addressing and address resolution
-
Network services and routing
-
Packet and Datagram structures
-
Basic device network configuration
-
Switching concepts and configuration
-
Build a small network
The module introduces the fundamental concepts and principles of cyber security and digital forensics. It consolidates your understanding of numerical skills, providing a foundation of mathematical and statistical knowledge, skills and concepts for applications in cryptography and cyber security.
You’ll study topics such as:
- Confidentiality, integrity and availability in computer systems
- Authentication and identification schemes
- Malware and viruses
- Cryptography
- Network security threats and defences
- Security planning, policies and training
- Digital Forensics
- Cyber law and standards
- Numerical and algebraic processes and two-dimensional geometry
- Computer number systems, e.g. binary, hexadecimal, etc.
- Set theory and logic
- Symmetric block ciphers, e.g. DES (triple-DES), AES (Rijndael) and
- Public-key ciphers, e.g. RSA including prime numbers, modular arithmetic and exponentiation
- Classical ciphers, e.g. shift, substitution, transposition, poly-alphabetic
- Statistics and probability
The module has two aims; to prepare students for higher education and to prepare students for placement. Firstly, preparation for higher education will be done by developing skills which students will need to apply in other first year modules, their second year and placement years and ultimately their careers. These skills will include problem-solving, group working, communicating and innovating. A great deal of emphasis will be placed on developing reflective learners.
Secondly, students will be invited to consider the kind of career they would like to pursue, their current ability to secure it, what gaps need to be closed and to plan for actions that will lead to securing an appropriate placement.
Indicative Content:-
- Professionalism and ethics
- Placement workspace
- Client engagement and intrapreneurship
- Personal performance planning and appraisal processes
- Career planning
- Pre placement preparation, such as CV writing and covering letter
- A minimum of 120 hours work experience placement, which may include a residency.
This module introduces practical computer programming using a procedural problem-solving approach. It will develop your awareness of the design and implementation of programs in a modern, industry-standard programming language.
You’ll study topics such as:
- Procedural programming concepts
- Problem-solving and top-down design
- Software development processes: specification, design, implementation, testing
- Data structures
- Algorithmic analysis and design
- Input/output
- String and file handling
- Procedures and functions, parameters, and return values
- Program quality
Year 3
Compulsory modules
This module introduces the theoretical insights and practical skills required to administer and maintain a secure database using industry-standard database systems and tools. It will develop your understanding of database design and the provision of data integrity as well as your critical thinking to validate a database administration strategy in a business context.
You’ll study topics such as:
-
Database administration to support security measures: authentication, authorisation, views, stored procedures, trigger
-
Database programming
-
Backup and recovery strategies: data transfer, data type transformation, enforcing integrity
-
Employability skills: personal responsibility and teamwork.
-
Social, ethical, professional, legal, and sustainable practice and values, including equality, diversity, and inclusion
This module introduces ethical hacking to analyse and test common security vulnerabilities. It will develop your use of intrusion detection and incident response approaches for their mitigation.
You’ll study topics such as:
- Laws and professional codes of conduct relevant to ethical hacking
- Manual and automated processes to build a profile of computer systems
- Vulnerabilities in protocols, computer systems and web applications
- Tools and techniques to compromise computer system security
- Classifying and assessing the risk of vulnerabilities
- Network data features to aid forensic analysis, incident response and cyber security
- Capturing, filtering and analysis of network traffic and malicious content
- Host- and network-based intrusion detection systems
- Anomaly and signature approaches to network defence
- Threat intelligence
This module develops your understanding of project requirements to design, develop and deliver a solution against a client project. As you engage with the client, you will enhance your project management and teamworking skills while being introduced to models and techniques that are commonly used in information system development. You will critically assessing successes and failures of the project, and reflect on your personal and professional performance.
You’ll study topics such as:
-
Project management methodologies
-
Systems development methodologies
-
Collaboration, equality, diversity and inclusion considerations
-
Identifying stakeholders
-
Understanding requirements
-
Requirements and systems modelling techniques
-
Project planning
-
Time management
-
Task management
-
Social, professional, ethical, and legal issues
-
Presentation of information
-
Report writing, oral presentation
-
Project evaluation
-
Professional reflection
The aim of the module is to enable students to analyse and test common security vulnerabilities through ethical hacking and to apply appropriate intrusion detection and incident response approaches for their mitigation.
Indicative content
Module content may vary in response to changing technical and professional landscapes but could include:
-
Security Requirements for Networks and Networking Devices over TCP/IP layers.
-
Data Confidentiality through Encryption, Public-Key Cryptography, Digital Signature and Data Integrity, including Access Control (local and remote) and Blockchain Technology.
-
Understanding wireless Networks and Wireless security
-
Secure Socket Programming (client-server) and Secure Application Development to maintain CIA Triad & transparency and trust for data and maintaining network security.
-
Understanding Security Policies, Business Continuity/Disaster Recovery, Relevant legislation, such as licences, data protection and storage security.
-
Fundamentals of operating systems.
-
Installation, management and monitoring of typical networked services and operating systems.
-
Configuration and management of user and group authentication polices and services.
-
Networked file systems, and the management of secure access to content stored/made available through these file systems.
Year 4
Compulsory modules
Module aim:
The aim of this module is to enhance students’ professional development through the completion of and reflection on meaningful work placement(s).
A work placement will provide students with opportunities to experience the realities of professional employment and experience how their course can be applied within their chosen industry setting. The placement will:
- Allow student to apply the skills, theories and behaviours relevant and in addition to their course
- Enable students to enhance their interpersonal skills in demand by graduate employers – communication, problem-solving, creativity, resilience, team work etc.
- Grow their student network and relationship building skills.
- Provide student with insights into the industry and sector in which their placement occurs
- Help student make informed graduate careers choices.
Indicative Content:
In this module students undertake a sandwich placement (min 24 weeks / min 21 hours per week) which is integrated, assessed and aligned to their studies.
Their personal Placement Academic Supervisor (PAS) will be their key point of contact during their placement and will encourage and support students to reflect on their experience, learning and contribution to the organisation they work for.
To demonstrate gains in professional development, students will be required to share their progress, learning and achievements with their Placement Academic Supervisor and reflect on these for the summative piece of work.
Final year
Compulsory modules
This module critically evaluates and applies appropriate information security methodologies and principles to reduce organisational risk. You’ll develop skills to apply appropriate tools and techniques to test and audit application vulnerabilities and security threats, in line with information security management standards and frameworks
You’ll study topics such as:
-
Identification of controls to meet standards requirements
-
Risk management and assessment methodologies
-
Policies, standards and procedures supporting an ISMS
-
Security awareness, continuity and handling incidents
-
Attack frameworks and response planning
-
Session management and injection attacks
-
Web application security and testing methodologies
-
Authentication system vulnerabilities
-
Privilege escalation and pivoting
-
Social engineering
This module develop the skills to apply and manage on-premise and cloud-based virtualised computing systems. In groups you’ll use team development theories, perform organisational requirements and risk analyses to design, develop, apply and critically evaluate an appropriate virtualised enterprise system to address an enterprise computing need.
You’ll study topics such as:
-
Cloud computing platform theory and administration
-
On-premise virtualisation theory, installation and management
-
Containerisation theory, implementation and orchestration
-
Enterprise level system availability
-
Team building, project management and systems design methodology
This module enables you to demonstrate your knowledge and skills in a consultancy or employer-led research project, exploring a specific research or consultancy topic. You’ll review existing literature, choose appropriate methods and provide suitable recommendations to the existing body of knowledge.
You’ll apply your skills and learning to:
-
Analysing and synthesising library resources, literature and databases
-
Methods for the specification, design, implementation and outcomes
-
Time management and project planning
-
Report writing, presentation and demonstration
-
Critical evaluation and reflection
-
Due consideration of ethics, values in the workplace and professionalism
-
What it means to be a computing professional
-
Awareness of employability issues
-
Enhancing your own employability
Elective modules
This module explores Blockchain technology and IoT security, privacy and ethics, with opportunities to design and develop applications of smart solutions. You’ll study the performance of the systems and the network, investigating different security, privacy scenarios and feature requirements in terms of computation, memory, bandwidth and storage.
You’ll study topics such as:
-
Blockchain technology principles and features
-
Healthcare, smart homes and cities, supply chain, transport and environment
-
Cryptocurrency designs and industrial application
-
Consensus techniques, miners, wallets, DeFi and network fees
-
Blockchain scalability, privacy issues and challenges and solutions
-
IoT and its applications
-
IoT security issues, challenges and solutions
-
IoT in smart home, smart city, supply chain and healthcare
-
Design, develop, implement and test Blockchain
-
Secure IoT application development
Aims: The aim of this module is to introduce students to network security for business and other organizations. The student will be able to understand and apply standard techniques required for a secure network and troubleshoot appropriate network security scenarios. The module also provides a space within which students can develop the skills and knowledge necessary for beginning the process of preparing them for professional network security certification. INDICATIVE CONTENT · Applying a methodology to network security · Implementing the appropriate network security · Implementing secure Authentication, Authorization and Accounting process. · Securing switching topologies · Identify and design firewall technologies · Identifying appropriate encryption processes · Implementing secure Wide Area Network technologies such as VPN · Troubleshooting Network Security
This module shows you how to detect and respond to security threats and vulnerabilities within a computing system. You’ll gain experience with the key phases of reconnaissance and intelligence analysis.
You’ll study topics such as:
-
The vulnerability of computer systems
-
Penetration testing methodology
-
System reconnaissance and information gathering
-
Secure web-based applications
-
Web application security testing
-
Web application testing methodologies
-
Intelligence and information analysis
Future careers
This course prepares you for a career in:
- information security
- incident response analysis
- information security analysis
- penetration testing
- security architecture
- IT security engineering
- security systems administration
- IT security consultancy
Previous graduates of this course have gone on to work for:
- 3Squared
- Cisco
- Citrix
- Exponential-e
- F-Secure
- G-Research
- Hewlett-Packard
- IBM
- Info-Assure
- NextGen Security
- Sec-1
- Servelec Group
- Sky
- UK government organisations
Equipment and facilities
You’ll study in our Home of Digital Technologies – a modern facility with seven dedicated cyber security labs. These specialist labs simulate professional environments and support your development of applied technical skills.
You’ll work with:
- open source intelligence platforms
- security appliances
- virtualised desktops and servers
- SIEMs
- intrusion detection systems
- vulnerability discovery tools
- penetration testing applications
- mobile, web and desktop platforms
- in-house cyber-attack ranges
- industry-standard targets such as Hack The Box
We’ve also invested over £100 million in our facilities – including 24-hour libraries, digital learning tools and student-designed study spaces to support flexible learning.
Where will I study?
You study at City Campus through a structured mix of lectures, seminars and practical sessions as well as access to digital and online resources to support your learning.
City Campus
City Campus is located in the heart of Sheffield, within minutes of the train and bus stations.
City Campus map | City Campus tour
Adsetts library
Adsetts Library is located on our City Campus. It's open 24 hours a day, every day.
Learn moreLearn more about your department
Computing facilities tour
Take a look around the facilities and equipment in the Department of Computing at Sheffield Hallam University.
Entry requirements
All students
UCAS points
- 80
This must include at least 32 points from one A level or equivalent BTEC qualifications. For example:
- CDD at A Level
- MMP in BTEC Extended Diploma
- Pass overall from a T level qualification with C from core
- A combination of qualifications, which may include AS levels, EPQ and general studies.
You can find information on making sense of UCAS tariff points here and use the UCAS tariff calculator to work out your points.
GCSE
- Maths at grade C or 4
• Access - an Access to HE Diploma with at least 45 credits at level 3 and 15 credits at level 2. At least 15 level 3 credits must be at merit grade or above from a QAA-recognised Access to HE course, or an equivalent Access to HE certificate.
We may also accept you, if you have limited qualifications but can show evidence of ability and a genuine commitment to studying the subject.
Some applicants may be invited to attend an informal interview with the course leader to ensure that the programme is suitable for themselves and their aspirations.
UK students may be able to claim financial support for the course.
If English is not your first language, you will need an IELTS score of 6.0 with a minimum of 5.5 in all skills, or equivalent.
Additional information for EU/International students
If you are an International or non-UK European student, you can find out more about the country specific qualifications we accept on our international qualifications page.
For details of English language entry requirements (IELTS), please see the information for 'All students'.
Fees and funding
Home students
Tuition fees for 2026/27 are not yet confirmed. Our tuition fee for UK students on full-time undergraduate degree courses in 2025/26 is £9,535 per year (capped at a maximum of 20% of this during your placement year). These fees are regulated by the UK government and therefore subject to change in future years.
If you are studying an undergraduate course, postgraduate pre-registration course or postgraduate research course over more than one academic year then your tuition fees may increase in subsequent years in line with Government regulations or UK Research and Innovation (UKRI) published fees. More information can be found in our terms and conditions under student fees regulations.
International students
Our tuition fee for International/EU students starting full-time study in 2026/27 is £18,000 per year (capped at a maximum of 20% of this during your placement year)
Financial support for home/EU students
How tuition fees work, student loans and other financial support available.
Additional course costs
The links below allow you to view estimated general course additional costs, as well as costs associated with key activities on specific courses. These are estimates and are intended only as an indication of potential additional expenses. Actual costs can vary greatly depending on the choices you make during your course.
General course additional costs
Additional costs for School of Computing and Digital Technologies (PDF, 600.1KB)Legal information
Any offer of a place to study is subject to your acceptance of the University’s Terms and Conditions and Student Regulations.
