BSc (Hons) Cyber Security (with International Foundation Year)

Course details
Year of entry
2025
Duration
4 YRS (FT)
Institution Code
G53
Location
Blended Learning, Wrexham
Course Highlights
Access
to a wide range of hardware and software
Research Active
department in future and emerging technologies
Opportunity
to qualify for CISCO accreditation
Why choose this course?
Our BSc (Hons) Cyber Security course provides you with a comprehensive foundation in cybersecurity, equipping you with the technical expertise, practical experience, and professional skills needed for a successful career in this dynamic field.
You will:
- Gain expertise and hands-on experience to defend digital systems against evolving threats
- Study in state-of-the-art facilities such as our Cyber Innovation Academy, where you’ll gain the knowledge to tackle real-world cybersecurity challenges and develop skills in threat detection, risk analysis, secure system development, and incident response
- Learn cutting-edge cybersecurity practices aligned with industry demands and emerging trends
- Apply theoretical concepts through lab work, real-world projects, and cybersecurity simulations to develop practical problem-solving skills
- Learn from experienced professionals and experts in the field

Computing atWrexham University
Thinking of a career in Computing? Hear from lecturers and students about our Computing course at Wrexham University.
Key course features
- The course will reflect the latest advancements in cyber security ensuring exposure to cutting-edge technology and industry-relevant skills
- In your final year, you’ll undertake a project module, offering an opportunity to specialise in an area aligned with your personal interests
- Gain a deep understanding of networking, network security, information security governance, and computer systems architecture
- Build proficiency in key programming languages and secure software development methodologies
- Explore formal languages, computability, and complexity theory to enhance analytical and problem-solving abilities
- Understand the ethical, legal, and social implications of cybersecurity, including privacy, security, and intellectual property
- Develop professional skills such as teamwork, communication, and adherence to industry standards
- Master the art of technical writing and presentation, enabling you to communicate cybersecurity concepts to both technical and non-technical audiences
- Cultivate a mindset of continuous learning to stay ahead in the fast-evolving cybersecurity landscape
- Foundation Year provides a supportive entry point to degree-level education, ensuring that you have the necessary academic skills, subject knowledge, and confidence for success
What you will study
YEAR 1 (INTERNATIONAL FOUNDATION YEAR)
You will be enrolled in the International Foundation Year programme that will be co-taught alongside home students, fostering an inclusive and collaborative learning environment. This integration allows you to benefit from diverse perspectives, enhance your cultural awareness, and build strong academic and social connections within the university community.
MODULES
- English for Academic Purposes (Core): Strengthen your academic English skills in reading, writing, listening, and speaking. This module supports IELTS preparation, helping you meet English language requirements for degree entry while building confidence for university-level study.
- Study Skills for Success (Core): Develop the essential academic, digital, and organisational skills you will need to thrive at university. From managing your time and structuring assignments to researching and referencing, you will build the confidence to study independently and successfully.
- Maths and Computing for Problem Solving (Core): Strengthen your maths skills while learning how to apply them through programming. Topics include algebra, trigonometry, statistics, and problem-solving techniques relevant to computing and engineering.
- Collaborative Practice (Core): Work with students from other subject areas to explore cross-disciplinary challenges. You will develop key skills in teamwork, communication, and research while tackling relevant themes across different fields.
- Computer Hardware and Software (Core): Gain a solid grounding in how computers work, from processors and memory to operating systems and software. You will also explore emerging technologies and trends shaping the IT sector today.
- Foundations of Cyber Security (Core): Learn how to identify and respond to cyber threats like malware, phishing, and social engineering. You will explore security principles and hands-on methods to protect systems and data.
Students entering the programmes with an IELTS score of 5.5 with no skills score below 5.0 will be required to undertake the non-credit bearing English for Academic Support module alongside English for Academic Purpose.
- English for Academic Support (Core): Enhance your academic English throughout your studies. This module supports continued development in reading, writing, speaking, and listening, with a focus on IELTS improvement and meeting the language demands of your degree.
YEAR 2 (LEVEL 4)
Year two provides a strong foundation in cybersecurity, computing, and software development. You will gain hands-on experience in network defence, governance, risk management, and programming, applying computational thinking to real-world challenges. You’ll also explore ethical, legal, and social aspects of cybersecurity while developing teamwork, communication, and project management skills through agile methodologies.
MODULES
- Programming Fundamentals: This module introduces fundamental programming concepts using a contemporary programming language. Upon completion, you will understand programming's role, syntax, and logic within your subject area and apply fundamental techniques to solve contextual problems effectively.
- Computer Systems and Architecture: This module provides a comprehensive understanding of computer systems and their architecture. It covers hardware, software, and their interactions, providing you with a strong foundation in computer architecture and the practical knowledge of system components and functionalities.
- Information Security and Governance: This module equips you with the knowledge, skills, and professional mindset to address complex information security challenges, ensure governance, and protect organisational information assets. It emphasises regulatory frameworks and their implementation through policies and procedures in a digital context.
- Applied Computational Methods: This module introduces the computational and mathematical concepts essential for applications in computer science, software engineering, and cybersecurity. It emphasises the relevance of these concepts in computing and the broader digital industries, aiming to enhance both cognitive and practical skills related to the field of computing.
- Network Defence: This module equips you with essential network security concepts, strategies and techniques, focusing on threat analysis, mitigation, and best practices. Through hands-on exercises and simulations, you will develop critical thinking and practical expertise in network defence. Aligned with industry standards, it prepares you for certifications, enhancing career prospects in cybersecurity.
- Network Fundamentals: This module introduces the architecture, structure, and functionality of computer networks and the Internet. Using OSI and TCP models, you will examine protocols and services across network layers. You will explore IPv4/IPv6 addressing, Ethernet fundamentals, and routing protocols in order to build a strong foundation in network communication and infrastructure.
YEAR 3 (LEVEL 5)
In year three, you will deepen your knowledge of cybersecurity theories, including distributed architecture, security by design, and secure programming. You will tackle real-world challenges, exploring ethical, legal, and sustainability issues and gain hands-on experience in system defence, detection, mitigation, and ethical hacking using industry tools. Through agile methodologies and collaborative projects, you'll refine your teamwork, communication, and organisational skills, preparing you to address industry challenges and protect digital infrastructure.
MODULES
- Group Project: This module offers essential industry-simulated experience, equipping you to manage tasks, challenges, and scenarios encountered in real-world, group-based digital projects. You will develop skills in organisation, communication, and coordination while focusing on the design, development, and implementation of a digital product aligned with professional methodologies and real-world contexts.
- Systems Engineering and Project Management: This module explores the concepts and practices essential for managing complex digital projects, emphasising the application of systems engineering principles. It provides a comprehensive understanding of systems engineering methodologies, principles, and processes, alongside advanced project management techniques required to effectively oversee the design, development, and implementation of digital solutions.
- Cloud and Distributed Architecture and Security: This module introduces the concepts, principles, and technologies underpinning cloud computing, distributed architectures, and security. You will explore the design principles and challenges of cloud and distributed systems, critically examine security risks and mitigation strategies, and investigate various cloud computing models and deployment approaches and develop practical skills in designing, implementing, and managing cloud-based and distributed systems to tackle real-world challenges.
- Cyber Operations: This module offers a comprehensive understanding of offensive and defensive cyber operations, covering key strategies, tools, and methodologies. You will explore threat mitigation, digital asset protection, and industry best practices. Hands-on learning develops practical skills for securing networks and responding to cyber threats. Preparing you for careers in cybersecurity operations and defence, this module equips you to tackle evolving cyber challenges and safeguard critical systems.
- Ethical Hacking: This module provides a comprehensive understanding of ethical hacking principles, techniques, and tools, enabling you to take a proactive approach to securing digital assets. By adopting the perspective of an ethical hacker, you will be exposed to industry-relevant methodologies, tools, and techniques used by hackers to learn, identify, assess, and address system vulnerabilities. Practical exercises will enhance your ability to analyse threats, exploit weaknesses responsibly, and implement effective security measures, preparing you for careers in cybersecurity and penetration testing.
- Secure Software Development: This module equips you with a deep understanding of software security fundamentals and its critical role in modern applications. You will identify risks and consequences of insecure development practices while familiarising yourself with industry-standard methodologies for secure software development. Key topics include secure coding practices, design principles, SDLC models, and security testing techniques such as penetration testing and vulnerability scanning. Additionally, the module covers the legal, ethical, and regulatory aspects of secure software development, preparing students to navigate the complexities of creating secure, reliable software.
YEAR 4 (LEVEL 6)
In your final year, you will apply advanced theories to real-world challenges, integrating practical experience to develop solutions for complex cybersecurity issues. You will tackle social, ethical, and sustainability concerns while refining your skills in system defence, detection, and mitigation. Through your final-year project, you'll demonstrate independence and critical thinking, applying development tools to solve industry-relevant problems. Graduate-level competencies in research, self-management, and communication will prepare you to lead in the fast-paced cybersecurity industry.
MODULES
- Project: The project module is designed to prepare you for the tasks and challenges that you may encounter in the workplace after your graduation. Its objectives are to equip you with the skills to independently plan, manage, and report on a substantial, long-term project, apply theoretical knowledge from taught modules to practical, real-world problems, and critically evaluate diverse and often conflicting information from manuals, books, and research journals. Additionally, the project offers an opportunity to specialise in an area aligned with your personal interests, enhancing your expertise and career readiness.
- Cryptography and Defensive Systems: This module provides a comprehensive understanding of cryptography and defensive systems, blending theoretical foundations with practical applications. You will explore core principles and techniques, including encryption algorithms, cryptographic protocols, and key management. Additionally, the module covers advanced defensive strategies to safeguard sensitive information and secure communication channels.
- Threat Detection and Incident Response: This module equips you with essential skills to identify, analyse, and respond to cybersecurity threats. Focusing on best practices and proven techniques, you will learn to detect and mitigate security incidents across diverse organisational contexts. The module also emphasises developing your ability to investigate and assess security incidents, create incident response plans, and implement effective remediation strategies, preparing you to confidently handle real-world security challenges.
- Digital Forensics: This module equips you with the knowledge and skills to investigate and analyse digital evidence in legal and cybersecurity contexts. Focusing on core principles and methodologies of digital forensics, it fosters critical thinking and problem-solving, enabling you to apply forensic techniques to real-world scenarios.
- Security Optimisation and Automation: This module covers the integration of security optimisation and automation using machine learning in digital environments. You will learn to apply machine learning algorithms and models for threat detection, anomaly detection, and pattern recognition, etc. to enhance security systems. Additionally, you will gain expertise in optimising security controls like access management and intrusion detection. Through practical exercises, you'll develop skills to design and implement machine learning-driven security solutions to strengthen defences against cyber threats.
The information listed in this section is an overview of the academic content of the programme that will take the form of either core or option modules. Modules are designated as core or option in accordance with professional body requirements and internal academic framework review, so may be subject to change.
Entry requirements & applying
The International Foundation Year (IFY) programme is aimed at international applicants who normally be aged 17 or over before 31 December in the year of registration, will have completed a 12-year school system, and reached at least AS level at the appropriate grade as defined by Ecctis (formerly UK NARIC), in their respective relevant discipline.
Applicants will fulfil the English language requirements for the respective programme entry, via possession of a UKVI approved Secure English Language Test (SELT) from an approved Centre.
Depending on the applicant’s IELTS score the following programme options are available:
IELTS 5.5 With No Skill Score Below 5.0
Applicants with IELTS score of 5.5 with no skills score below 5.0 are only eligible to apply for the 1-year standalone International Foundation Year. If applicants hold an alternative SELT, acceptance maybe granted subject to Wrexham University admissions assessment on eligibility. Once accepted on to the International Foundation Year, applicants will be issued a one-year confirmation of Acceptance for Studies (CAS).
Students will initially apply for a subject specialism (e.g. International Foundation Year Engineering) with the intention of progressing to a subject specific honours degree route (e.g. BEng (Hons) Aeronautical & Mechanical Engineering), subject to the successful completion of the International Foundation Year.
Students are required to sit an approved UKVI SELT at the end of Semester 1 to apply for their chosen bachelor’s degree programme at Wrexham University or any other higher education institution (HEI) requiring a second CAS.
Support and guidance from the international team will be provided, and applications will be assessed based on individual merit, entry requirements, and programme availability.
IELTS 5.5 With No Skill Score Below 5.5
Applicants with an IELTS score of 5.5 with no skills score below 5.5 are to apply for the 4-year integrated International Foundation Year pathway. In some cases, acceptance of alternative English language proficiency certificates with an equivalent of IELTS 5.5 with no skill score below 5.5, can be accepted subject to Wrexham University admissions assessment on eligibility.
Once accepted on to the International Foundation Year, applicants will be issued with a four-year Confirmation of Acceptable for Studies (CAS). This CAS will cover the full duration of the programme.
During the International Foundation Year, the chosen undergraduate course pathway can be changed, subject to approval from the academic department and in accordance with UKVI regulations, e.g. from Aeronautical & Mechanical Engineering to Electrical & Electronic Engineering.
Any course transfer would need to be completed within time limits set by the academic admissions tutors, usually before the end of semester 2 of the International Foundation Year at the latest.
Non-Standard Entry Criteria
Students who have successfully completed a pre-sessional programme at Wrexham University with an IELTS Academic overall score of 5.5 with no skill score below 5.5 will be eligible to apply for the International Foundation Year. Applications will be evaluated based on individual merit and programme
Teaching & Assessment
Teaching
The computing program suite employs a diverse range of cutting-edge industry tools and software, complemented by innovative teaching methods. This dynamic approach not only imparts industry-relevant skills but also empowers you to elevate your work to new heights when possible. The entire staff enthusiastically embraces the active learning framework (ALF), resulting in numerous enhancements to the teaching and learning experience.
Assessment
Assessments in cyber security at university level are designed to evaluate your understanding, application, and proficiency in various aspects of the discipline. These assessments encompass a diverse range of methods, including:
- Coursework and Projects: Assignments and projects provide hands-on experience, allowing you to apply theoretical knowledge to real-world scenarios. This may include software development projects, research papers, or problem-solving tasks.
- Coding Assignments: Practical coding assignments assess your programming skills, logical reasoning, and ability to develop efficient and effective code.
Group Projects: Collaborative projects evaluate teamwork, communication, and the ability to work in diverse teams, reflecting the collaborative nature of the tech industry. - Presentations: You may be required to present your findings, solutions, or project outcomes, enhancing your communication and presentation skills.
- Laboratory Work: Practical sessions in computer labs assess your ability to apply concepts, troubleshoot issues, and work with various tools and technologies.
- Problem-solving Exercises: These exercises challenge you to solve complex problems, encouraging critical thinking and analytical skills.
- Reports and Documentation: Writing reports or documenting project processes assesses your ability to communicate technical information clearly and concisely.
Career prospects
Our dedicated Careers and Employability team is committed to helping you achieve your professional goals. They provide personalised advice, useful resources, and extracurricular employability events to prepare you for the job market.
Graduates of this course can pursue careers in:
- Cyber Security Architect
- Cyber Security Analyst
- Cyber Assurance Manager
- Network Security Engineer
- Network Administrator
- Penetration Tester
- Information Security consultant
- Security Operations Centre Analyst
- Network Engineer
- IT Systems Engineer
- Application Security Engineer
- Chief Information Security Officer
- Security Consultant
Additionally, you may choose to further your expertise through postgraduate studies. Explore our postgraduate courses for more information.
Fees & funding
You do not have to pay your tuition fees upfront.
The fees you pay and the support available will depend on a number of different factors. Full information can be found on our fees & finance pages. You will also find information about what your fees include in the fee FAQs.
All fees are subject to any changes in government policy, view our undergraduate fees.
Programme specification
You can see the full programme specification here.Accommodation
At Wrexham University, we offer on-campus en-suite rooms within our Wrexham Student Village. These private, fully furnished spaces are conveniently located, providing easy access to campus facilities, study areas, and social spaces. Plus, you’re just a 10-minute walk from the city centre!
With all bills included, free Wi-Fi, 24/7 security, and large social areas, you’ll find everything you need for a great student experience.
Explore our student accommodation options to find your perfect home away from home.
Subject to validation
Courses shown as “subject to validation” are new courses which are in development and the details of these courses are in the process of being finalised through the approval cycle, known as the ‘validation’ process. As soon as the programmes are validated the details of the course will be confirmed. The majority of new courses that are still ‘subject to validation’ are approved by the validation process; however, this is not guaranteed and should the course not go ahead as planned, or be significantly amended, you will be informed by the university and assistance will be provided to those who have been offered a place to find a suitable alternative course either at Wrexham University or at another provider.