Two students face a server stack, one plugs in a cable

Course details

UCAS Code

8L6D

Year of entry

2025, 2026

Duration

3 YRS (FT) 5 YRS (PT)

UCAS Tariff

96-112

Institution Code

G53

Location

Blended Learning, Wrexham

Course Highlights

Access

to a wide range of hardware and software

Research Active

department in future and emerging technologies

 

Opportunity

to qualify for CISCO accreditation

Why choose this course?

Our BSc (Hons) Cyber Security course provides you with a comprehensive foundation in cybersecurity, equipping you with the technical expertise, practical experience, and professional skills needed for a successful career in this dynamic field.

 

You will:

  • Gain expertise and hands-on experience to defend digital systems against evolving threats
  • Study in state-of-the-art facilities such as our Cyber Innovation Academy, where you’ll gain the knowledge to tackle real-world cybersecurity challenges and develop skills in threat detection, risk analysis, secure system development, and incident response
  • Learn cutting-edge cybersecurity practices aligned with industry demands and emerging trends
  • Apply theoretical concepts through lab work, real-world projects, and cybersecurity simulations to develop practical problem-solving skills
  • Learn from experienced professionals and experts in the field
Two students face a server stack, one plugs in a cable

Computing atWrexham University

Thinking of a career in Computing? Hear from lecturers and students about our Computing course at Wrexham University.

Key course features

  • The course will reflect the latest advancements in cyber security ensuring exposure to cutting-edge technology and industry-relevant skills
  • In your final year, you’ll undertake a project module, offering an opportunity to specialise in an area aligned with your personal interests
  • Gain a deep understanding of networking, network security, information security governance, and computer systems architecture
  • Build proficiency in key programming languages and secure software development methodologies
  • Explore formal languages, computability, and complexity theory to enhance analytical and problem-solving abilities
  • Understand the ethical, legal, and social implications of cybersecurity, including privacy, security, and intellectual property
  • Develop professional skills such as teamwork, communication, and adherence to industry standards
  • Master the art of technical writing and presentation, enabling you to communicate cybersecurity concepts to both technical and non-technical audiences
  • Cultivate a mindset of continuous learning to stay ahead in the fast-evolving cybersecurity landscape

What you will study

YEAR 1 (LEVEL 4)

Year one provides a strong foundation in cybersecurity, computing, and software development. You will gain hands-on experience in network defence, governance, risk management, and programming, applying computational thinking to real-world challenges. You’ll also explore ethical, legal, and social aspects of cybersecurity while developing teamwork, communication, and project management skills through agile methodologies.

MODULES

  • Programming Fundamentals: This module introduces fundamental programming concepts using a contemporary programming language. Upon completion, you will understand programming's role, syntax, and logic within your subject area and apply fundamental techniques to solve contextual problems effectively.
  • Computer Systems and Architecture: This module provides a comprehensive understanding of computer systems and their architecture. It covers hardware, software, and their interactions, providing you with a strong foundation in computer architecture and the practical knowledge of system components and functionalities.
  • Information Security and Governance: This module equips you with the knowledge, skills, and professional mindset to address complex information security challenges, ensure governance, and protect organisational information assets. It emphasises regulatory frameworks and their implementation through policies and procedures in a digital context.
  • Applied Computational Methods: This module introduces the computational and mathematical concepts essential for applications in computer science, software engineering, and cybersecurity. It emphasises the relevance of these concepts in computing and the broader digital industries, aiming to enhance both cognitive and practical skills related to the field of computing.
  • Network Defence: This module equips you with essential network security concepts, strategies and techniques, focusing on threat analysis, mitigation, and best practices. Through hands-on exercises and simulations, you will develop critical thinking and practical expertise in network defence. Aligned with industry standards, it prepares you for certifications, enhancing career prospects in cybersecurity.
  • Network Fundamentals: This module introduces the architecture, structure, and functionality of computer networks and the Internet. Using OSI and TCP models, you will examine protocols and services across network layers. You will explore IPv4/IPv6 addressing, Ethernet fundamentals, and routing protocols in order to build a strong foundation in network communication and infrastructure.

YEAR 2 (LEVEL 5)

In year two, you will deepen your knowledge of cybersecurity theories, including distributed architecture, security by design, and secure programming. You will tackle real-world challenges, exploring ethical, legal, and sustainability issues and gain hands-on experience in system defence, detection, mitigation, and ethical hacking using industry tools. Through agile methodologies and collaborative projects, you'll refine your teamwork, communication, and organisational skills, preparing you to address industry challenges and protect digital infrastructure. 

MODULES

  • Group Project: This module offers essential industry-simulated experience, equipping you to manage tasks, challenges, and scenarios encountered in real-world, group-based digital projects. You will develop skills in organisation, communication, and coordination while focusing on the design, development, and implementation of a digital product aligned with professional methodologies and real-world contexts.
  • Systems Engineering and Project Management: This module explores the concepts and practices essential for managing complex digital projects, emphasising the application of systems engineering principles. It provides a comprehensive understanding of systems engineering methodologies, principles, and processes, alongside advanced project management techniques required to effectively oversee the design, development, and implementation of digital solutions.
  • Cloud and Distributed Architecture and Security: This module introduces the concepts, principles, and technologies underpinning cloud computing, distributed architectures, and security. You will explore the design principles and challenges of cloud and distributed systems, critically examine security risks and mitigation strategies, and investigate various cloud computing models and deployment approaches and develop practical skills in designing, implementing, and managing cloud-based and distributed systems to tackle real-world challenges.
  • Cyber Operations: This module offers a comprehensive understanding of offensive and defensive cyber operations, covering key strategies, tools, and methodologies. You will explore threat mitigation, digital asset protection, and industry best practices. Hands-on learning develops practical skills for securing networks and responding to cyber threats. Preparing you for careers in cybersecurity operations and defence, this module equips you to tackle evolving cyber challenges and safeguard critical systems. 
  • Ethical Hacking: This module provides a comprehensive  understanding of ethical hacking principles, techniques, and tools, enabling you to take a proactive approach to securing digital assets. By adopting the perspective of an ethical hacker, you will be exposed to industry-relevant methodologies, tools, and techniques used by hackers to learn, identify, assess, and address system vulnerabilities. Practical exercises will enhance your ability to analyse threats, exploit weaknesses responsibly, and implement effective security measures, preparing you for careers in cybersecurity and penetration testing.
  • Secure Software Development: This module equips you with a deep understanding of software security fundamentals and its critical role in modern applications. You will identify risks and consequences of insecure development practices while familiarising yourself with industry-standard methodologies for secure software development. Key topics include secure coding practices, design principles, SDLC models, and security testing techniques such as penetration testing and vulnerability scanning. Additionally, the module covers the legal, ethical, and regulatory aspects of secure software development, preparing students to navigate the complexities of creating secure, reliable software. 

YEAR 3 (LEVEL 6)

In your final year, you will apply advanced theories to real-world challenges, integrating practical experience to develop solutions for complex cybersecurity issues. You will tackle social, ethical, and sustainability concerns while refining your skills in system defence, detection, and mitigation. Through your final-year project, you'll demonstrate independence and critical thinking, applying development tools to solve industry-relevant problems. Graduate-level competencies in research, self-management, and communication will prepare you to lead in the fast-paced cybersecurity industry.

MODULES

  • Project: The project module is designed to prepare you for the tasks and challenges that you may encounter in the workplace after your graduation. Its objectives are to equip you with the skills to independently plan, manage, and report on a substantial, long-term project, apply theoretical knowledge from taught modules to practical, real-world problems, and critically evaluate diverse and often conflicting information from manuals, books, and research journals. Additionally, the project offers an opportunity to specialise in an area aligned with your personal interests, enhancing your expertise and career readiness.  
  • Cryptography and Defensive Systems: This module provides a comprehensive understanding of cryptography and defensive systems, blending theoretical foundations with practical applications. You will explore core principles and techniques, including encryption algorithms, cryptographic protocols, and key management. Additionally, the module covers advanced defensive strategies to safeguard sensitive information and secure communication channels.
  • Threat Detection and Incident Response: This module equips you with essential skills to identify, analyse, and respond to cybersecurity threats. Focusing on best practices and proven techniques, you will learn to detect and mitigate security incidents across diverse organisational contexts. The module also emphasises developing your ability to investigate and assess security incidents, create incident response plans, and implement effective remediation strategies, preparing you to confidently handle real-world security challenges.
  • Digital Forensics: This module equips you with the knowledge and skills to investigate and analyse digital evidence in legal and cybersecurity contexts. Focusing on core principles and methodologies of digital forensics, it fosters critical thinking and problem-solving, enabling you to apply forensic techniques to real-world scenarios. 
  • Security Optimisation and Automation: This module covers the integration of security optimisation and automation using machine learning in digital environments. You will learn to apply machine learning algorithms and models for threat detection, anomaly detection, and pattern recognition, etc. to enhance security systems. Additionally, you will gain expertise in optimising security controls like access management and intrusion detection. Through practical exercises, you'll develop skills to design and implement machine learning-driven security solutions to strengthen defences against cyber threats. 

The information listed in this section is an overview of the academic content of the programme that will take the form of either core or option modules. Modules are designated as core or option in accordance with professional body requirements and internal academic framework review, so may be subject to change.

Entry requirements & applying

The academic requirements for the course are 96-112 UCAS tariff points at GCE A-level or equivalent, including IT, computing, maths or physics. 

Applicants who do not meet the criteria above will be assessed on an individual basis by interview.

Teaching & Assessment

Teaching

The computing program suite employs a diverse range of cutting-edge industry tools and software, complemented by innovative teaching methods. This dynamic approach not only imparts industry-relevant skills but also empowers you to elevate your work to new heights when possible. The entire staff enthusiastically embraces the active learning framework (ALF), resulting in numerous enhancements to the teaching and learning experience.

Assessment

Assessments in cyber security at university level are designed to evaluate your understanding, application, and proficiency in various aspects of the discipline. These assessments encompass a diverse range of methods, including:

  • Coursework and Projects: Assignments and projects provide hands-on experience, allowing you to apply theoretical knowledge to real-world scenarios. This may include software development projects, research papers, or problem-solving tasks. 
  • Coding Assignments: Practical coding assignments assess your programming skills, logical reasoning, and ability to develop efficient and effective code. 
    Group Projects: Collaborative projects evaluate teamwork, communication, and the ability to work in diverse teams, reflecting the collaborative nature of the tech industry. 
  • Presentations: You may be required to present your findings, solutions, or project outcomes, enhancing your communication and presentation skills. 
  • Laboratory Work: Practical sessions in computer labs assess your ability to apply concepts, troubleshoot issues, and work with various tools and technologies. 
  • Problem-solving Exercises: These exercises challenge you to solve complex problems, encouraging critical thinking and analytical skills. 
  • Reports and Documentation: Writing reports or documenting project processes assesses your ability to communicate technical information clearly and concisely. 

Teaching and Learning

We offer workshops and support sessions in areas such as academic writing, effective note-making and preparing for assignments.

Students can book appointments with academic skills tutors dedicated to helping deal with the practicalities of university work. Our student support section has more information on the help available.

In terms of particular needs, the University’s Inclusion Services can provide appropriate guidance and support should any students require reasonable adjustments to be made because of a recognised prevailing disability, medical condition, or specific learning difference.

Career prospects

Our dedicated Careers and Employability team is committed to helping you achieve your professional goals. They provide personalised advice, useful resources, and extracurricular employability events to prepare you for the job market.

Graduates of this course can pursue careers in: 

  • Cyber Security Architect
  • Cyber Security Analyst
  • Cyber Assurance Manager
  • Network Security Engineer
  • Network Administrator
  • Penetration Tester
  • Information Security consultant
  • Security Operations Centre Analyst
  • Network Engineer
  • IT Systems Engineer
  • Application Security Engineer
  • Chief Information Security Officer
  • Security Consultant

Additionally, you may choose to further your expertise through postgraduate studies. Explore our postgraduate courses for more information.

Fees & funding

You do not have to pay your tuition fees upfront.

The fees you pay and the support available will depend on a number of different factors. Full information can be found on our fees & finance pages. You will also find information about what your fees include in the fee FAQs.

All fees are subject to any changes in government policy, view our undergraduate fees.

For international students looking to study this course please see our international fees.

Programme specification

You can see the full programme specification here.

Accommodation

At Wrexham University, we offer on-campus en-suite rooms within our Wrexham Student Village. These private, fully furnished spaces are conveniently located, providing easy access to campus facilities, study areas, and social spaces. Plus, you’re just a 10-minute walk from the city centre!

With all bills included, free Wi-Fi, 24/7 security, and large social areas, you’ll find everything you need for a great student experience.

Explore our student accommodation options to find your perfect home away from home.

International

If you are applying as an European / International Student, and live outside of the UK, you should make your application through our online application system, Centurus.

For information about the university’s entry requirements for EU/international students, please visit our international section