Faculty of Computing, Engineering and Science - Treforest - University of South Wales

Bachelor Computer Security - Grado en Seguridad Informática

Faculty of Computing, Engineering and Science - Treforest - University of South Wales
Este curso no está actualmente activo en nuestra Web

Presentación

The security of computer systems is vital, with more and more of our details collected and held by companies and government.

As attempts to breach these security systems become more sophisticated, preventing unauthorised access is an important role in society.

This degree has a practical emphasis to prepare you for a career in computer security. You’ll understand how computer systems are designed and secured, and learn how to protect them against all kinds of attacks. Your studies will also cover effective computer systems management and how to complete an effective IT health check.

The University is recognised as a Centre of Excellence for information security and computer forensics by the Association of Chief Police Officers (ACPO). University of South Wales is also one of a select band of universities from which MI5 selects graduates.

This four-year Master of Computing course is the highest award for undergraduate study in computing and is designed for more able students. It allows you to further distinguish yourself with an advanced set of professional and technical skills.

Requisitos

Titulo de Bachillerato or the Selectividad with an average mark of 6.
Curso de Orientación Universitaria (COU) with an average mark of 6.
Técnico Especialista (Formación Profesional – segundo grado).
Ingeniero Técnico (from Escuela de Ingeniero Técnico).
Diplomado / Diplomatura.
English language qualifications:

GCSE pass in English at Grade C or above
IELTS with an average overall score of 6.0 with at least 5.5 in each component
TOEFL IBT minimum score for Undergraduate of 80 IBT
Cambridge English: Advanced (CAE): exams taken from January 2015 – overall score of 169 with at least 162 in each component ; exams taken before January 2015 – Grade C and no less than borderline in each skill
Trinity College English Language qualifications: ISE II Distinction or ISE III Pass for undergraduate courses
City and Guild’s IESOL/ISESOL tests, in some cases, we may also be able to accept the communicator level (B2)
Pearson Test of English Academic (PTE Academic) with a minimum of 51 points in each element for the majority of undergraduate programmes
Don’t worry if you do not meet these requirements, we run a number of courses to prepare you for academic studies.

Programa

Year One
Computer Systems and Network Technologies
Information Engineering
Professional Computer Forensics and Security
Website Development
Mathematics and Statistics for Computing
Procedural Programming
C++ Programming
Year Two
Operating Systems
Data Structures and Algorithms
Project Management and Professional Practice
Team Project Pen Testing
Computer Systems Security
Cryptography and Information Assurance
Year Three
Advanced Legal, Social, Ethical and Professional Issues (LSEPI)
Ethical Hacking
System Security and Administration
Computers and the Law
Computing Individual Project
Choice of a range of option modules.
Year Four
Major Group Project (40 credits)
Independent Study
Practical Unix Security
Practical Windows Security
Vulnerability Development
The above information is a sample module description for illustrative purposes. Modules and module content may change from time to time.

Learning and teaching methods
Your study involves 16 hours of lectures, tutorials and practical sessions each week. You also need to spend an extra four hours per week, per module, on coursework, general reading and other preparation. We strongly recommend you take advantage of a sandwich year working in industry. The skills you will gain can boost your employability and your grades, plus it could lead to employment opportunities with your placement company.

Salidas profesionales

The call for computer security specialists have increased in recent years, as there has been a large growth in the number of cyber attacks on data and networks. You may have to educate users about computer security, install security software, monitor the network for security breaches, respond to cyber attack and, in some cases, gather data and evidence to be used in prosecuting cyber crime.

Publicidad

Ver otros estudios de...