Everything you need to know...
-
What is the fee?
Home: See fees section below
International/EU: £17,155 per year -
How long will I study?
4/5 Years
-
Where will I study?
-
What are the entry requirements?
-
What is the UCAS code?
A093
-
When do I start?
September 2025
-
Placement year available?
Yes

Come to an open day
Visit us to learn more about our gold-rated teaching and why we were awarded the highest possible rating in the Teaching Excellence Framework.
1. Course summary
- Prepare for the degree with an extra foundation year at the start.
- Learn about aspects of cyber security including penetration testing, systems and network vulnerability assessment and mitigation, ethical hacking, network intrusion detection analysis and prevention.
- Develop your knowledge in web security, mobile device security and management of security policies.
- Prepare for the degree with an extra foundation year at the start
Upon completing the foundation year, you progress to a degree that is accredited by the British Computer Society and accordingly includes a number of topics fundamental to all computing studies, including principles of security, computing, architecture and networking, databases and programming.
2. How you learn
The course is suitable if you don’t meet the entry requirements for our BSc (Hons) Cyber Security course. You share the first year with other computing foundation year students, then move on to the degree. During the first year of study, you will enhance your skills to maximise your academic potential ready to start your learning against the content of the main degree.
You will develop a range of skills through problem solving activities, practical implementations and teamwork, allowing you to take an active approach to learning and encouraging self-development.
Assessments are varied, including reports, presentations, demonstrations, discussions and online activities.
You learn through
- lectures
- seminars
- practical tutorial sessions
In the foundation year, you’ll build on your existing knowledge and experience — developing useful academic, computing and IT skills in preparation for undergraduate study. You’ll benefit from innovative course content that allows you to access and use cutting-edge technology. Throughout, you’ll reflect on your progress, and build valuable communication and interpersonal skills.
Course leaders and tutors
Applied learning
Work placements
In your fourth year, you can take a one-year paid work placement. Work placements offer you valuable experience, and an enjoyable opportunity to apply your knowledge and skills.
Organisations need experienced staff, and a placement will give you the experience you need to add to your CV to secure a desirable security-related position in a competitive job market. We help you to gain a placement and support you through the application process.
During the placement, you will be mentored by a member of academic staff, who will visit you at your place of work. Previous students have worked at organisations including
- Cisco
- Citrix
- 3Squared
- Next
- Servelec Group
- Hewlett-Packard Ltd
- IBM Ltd
Networking opportunities
You will have the opportunity to talk with a number of exciting companies, both those that specialise in the area of cyber security, and others that understand that keeping their system secure is vital to a thriving industry.
In the past we have invited Citrix, Cisco, PwC, Sec-1 and other individual consultants in the cyber security industry to talk.
The Check Point SecureAcademy program at Sheffield Hallam University gives you free access to additional industry-recognised training platforms, hands-on experience with real-world tools, and the opportunity to work towards further certifications in cyber security. The program covers cutting-edge content in cloud security, network security, and security automation, aligning skills with industry demands.
3. Future careers
Employers regularly visit us to recruit our graduates and contribute to our teaching.
Companies that have recruited BSc (Honours) Cyber Security graduates include:
- Cisco
- Citrix
- 3Squared
- Next
- Servelec Group
- Hewlett-Packard
- IBM
- Sec-1
- Info-Assure
4. Where will I study?
You study at City Campus through a structured mix of lectures, seminars and practical sessions as well as access to digital and online resources to support your learning.
City Campus
City Campus is located in the heart of Sheffield, within minutes of the train and bus stations.
City Campus map | City Campus tour

Adsetts library
Adsetts Library is located on our City Campus. It's open 24 hours a day, every day.
Learn moreLearn more about your department
Computing facilities tour
Take a look around the facilities and equipment in the Department of Computing at Sheffield Hallam University.
5. Equipment and facilities
On this course you work with
- specialist computing hardware, tools and applications
- well-equipped security, forensics and network labs furnished with switches, routers, security appliances, virtualised desktops and servers, configurable wireless access points and direct ADSL internet links
- Kali Linux, which can be used for penetration testing and vulnerability assessment against Windows server and client systems hardened against attacks
6. Entry requirements
All students
UCAS points
- 80
This must include at least 32 points from one A level or equivalent BTEC qualifications. For example:
- CDD at A Level
- MMP in BTEC Extended Diploma
- Pass overall from a T level qualification with C from core
- A combination of qualifications, which may include AS levels, EPQ and general studies.
You can find information on making sense of UCAS tariff points here and use the UCAS tariff calculator to work out your points.
GCSE
- English Language or English Literature at grade C or 4
- Maths at grade C or 4
• Access - an Access to HE Diploma with at least 45 credits at level 3 and 15 credits at level 2. At least 15 level 3 credits must be at merit grade or above from a QAA-recognised Access to HE course, or an equivalent Access to HE certificate.
We may also accept you, if you have limited qualifications but can show evidence of ability and a genuine commitment to studying the subject.
Some applicants may be invited to attend an informal interview with the course leader to ensure that the programme is suitable for themselves and their aspirations.
UK students may be able to claim financial support for the course.
If English is not your first language, you will need an IELTS score of 6.0 with a minimum of 5.5 in all skills, or equivalent. If your English language skill is currently below IELTS 6.0 we recommend you consider a Sheffield Hallam University Pre-sessional English course which will enable you to achieve an equivalent English score.
Additional information for EU/International students
If you are an International or non-UK European student, you can find out more about the country specific qualifications we accept on our international qualifications page.
For details of English language entry requirements (IELTS), please see the information for 'All students'.
Modules
Important notice: The structure of this course is periodically reviewed and enhanced to provide the best possible learning experience for our students and ensure ongoing compliance with any professional, statutory and regulatory body standards. Module structure, content, delivery and assessment may change, but we expect the focus of the course and the learning outcomes to remain as described above. Following any changes, updated module information will be published on this page.
You will be able to complete a placement year as part of this course. See the modules table below for further information.
Compulsory modules
This module introduces basic computing knowledge and skills to a level that will give you confidence you can study and practice computing at Honours level.
Indicative Content
-
Essential concepts of computer programming
-
Databases queries
-
Web technologies
-
Basics of how computers and computer networks operate
-
Issues of Security
-
Awareness of own pace of learning, and how to learn effectively.
The focus of the module is on helping you gain a well-rounded understanding of computing, on able to see common threads in development methods, and being able to apply your learning about computing, and your learning about study approaches into project work on other areas on the course.
This module extends on “Foundations in Computing 1” (and has study of that module as a prerequisite). You will explore computing to a greater depth - for example further program design and implementation, and explore wider uses of computing used in business, social contexts and embedded into other technologies. .
Indicative Content:
-
Programming simple programs effectively
-
Understanding example application areas (e.g. IoT, Games)
-
Understanding how computing supports businesses
-
Further practise of skills in a topic area you are considering selecting for Honours studies
The module maintains the ethos of its prerequisite (Foundations in Computing 1), by provide you with a broad but largely integrated understanding of computing. A further strong aim is to help you make a properly informed choice as to which branch(es) of computing you wish to follow for study at Honours level.
This module develops your mathematics skills relevant to the IT discipline. You choose whether to target an “Advanced” level (which includes topics relevant to degrees in the Computer Science area), or “Standard” level (which includes topics that can occur in any IT-related studies).
You’ll study topics such as:
-
Fractions and decimals
-
Percentages, rounding, estimations
-
Standard form, metric units, indices, powers
-
Algebra and solving linear equations
-
Factorisations
-
Matrices
-
Logic gates and truth tables
-
Binary number system
-
Statistics
Indices and powers (advanced level)
-
Factorising and solving quadratic equations (advanced)
-
Simultaneous equations and matrices (advanced)
-
Correlation and linear regression (advanced)
This module is specifically designed to help support students on the Foundation Year of a BSc Honours course in a computing area. You will develop an understanding of, and practise, skills needed for study at Honours level and for eventual employment.
Indicative Content
-
Disability and Inclusiveness
-
Understanding learning processes and its relationship to success in assessment
-
Finding appropriate information
-
Effective communication
-
Effective use of IT Tools for clear communications and personal professional organisation
-
Academic Integrity
An underlying theme of the module is to help you gain an ability to see for yourself where your study skills lie, and which areas you can make further improvements.
Compulsory modules
Aims:
In this module students gain a fundamental understanding of the way computer networks operate and the core components of computer systems.
This module introduces the fundamental principles and features that underpin all modern computing systems. Students will learn about computer and network components and their functions, as well as how network communication is structured.
By the end of this module, students will understand the core components of computer systems, be able to build local area networks (LANs), configure and manage switches, and implement IPv4 and IPv6 address infrastructures.
INDICATIVE CONTENT
-
Introduction to computer architecture and systems, including memory, I/O devices and interfaces, CPU, memory and buses
-
Structure and variety of Operating systems
-
High and low level languages, device drivers and processes
-
Memory (internal, external and cache) in computer systems
-
CPU structure, function and instruction sets
-
Digital logic (Boolean algebra, gates and circuits)
-
Build and configure a PC
-
Introduction to network protocols and models
-
IPv4 and IPv6 addressing and address resolution
-
Network services and routing
-
Packet and Datagram structures
-
Basic device network configuration
-
Switching concepts and configuration
-
Build a small network
The module introduces the fundamental concepts and principles of cyber security and digital forensics. It consolidates your understanding of numerical skills, providing a foundation of mathematical and statistical knowledge, skills and concepts for applications in cryptography and cyber security.
You’ll study topics such as:
- Confidentiality, integrity and availability in computer systems
- Authentication and identification schemes
- Malware and viruses
- Cryptography
- Network security threats and defences
- Security planning, policies and training
- Digital Forensics
- Cyber law and standards
- Numerical and algebraic processes and two-dimensional geometry
- Computer number systems, e.g. binary, hexadecimal, etc.
- Set theory and logic
- Symmetric block ciphers, e.g. DES (triple-DES), AES (Rijndael) and
- Public-key ciphers, e.g. RSA including prime numbers, modular arithmetic and exponentiation
- Classical ciphers, e.g. shift, substitution, transposition, poly-alphabetic
- Statistics and probability
This module will build your employability skills to prepare you for work placement and your future career. It will develop your skills in problem solving, group working, communicating, innovating, and reflective learning.
You’ll study topics such as:
- Professionalism and ethics
- Placement workspace
- Client engagement and intrapreneurship
- Personal performance planning and appraisal processes
- Career planning
- Pre-placement preparation
- CV writing and covering letter
- Employer engagement
This module introduces practical computer programming using a procedural problem-solving approach. It will develop your awareness of the design and implementation of programs in a modern, industry-standard programming language.
You’ll study topics such as:
- Procedural programming concepts
- Problem solving and top-down design
- Software development processes: specification, design, implementation, testing
- Data structures
- Algorithmic analysis and design
- Input/output
- String and file handling
- Procedures and functions, parameters, and return values
- Program quality
Compulsory modules
This module introduces the theoretical insights and practical skills required to administer and maintain a secure database using industry-standard database systems and tools. It will develop your understanding of database design and the provision of data integrity as well as your critical thinking to validate a database administration strategy in a business context.
You’ll study topics such as:
-
Database administration to support security measures: authentication, authorisation, views, stored procedures, trigger
-
Database programming
-
Backup and recovery strategies: data transfer, data type transformation, enforcing integrity
-
Employability skills: personal responsibility and teamwork.
-
Social, ethical, professional, legal, and sustainable practice and values, including equality, diversity, and inclusion
This module introduces ethical hacking to analyse and test common security vulnerabilities. It will develop your use of intrusion detection and incident response approaches for their mitigation.
You’ll study topics such as:
- Laws and professional codes of conduct relevant to ethical hacking
- Manual and automated processes to build a profile of computer systems
- Vulnerabilities in protocols, computer systems and web applications
- Tools and techniques to compromise computer system security
- Classifying and assessing the risk of vulnerabilities
- Network data features to aid forensic analysis, incident response and cyber security
- Capturing, filtering and analysis of network traffic and malicious content
- Host- and network-based intrusion detection systems
- Anomaly and signature approaches to network defence
- Threat intelligence
This module develops your understanding of project requirements to design, develop and deliver a solution against a client project. As you engage with the client, you will enhance your project management and teamworking skills while being introduced to models and techniques that are commonly used in information system development. You will critically assessing successes and failures of the project, and reflect on your personal and professional performance.
You’ll study topics such as:
-
Project management methodologies
-
Systems development methodologies
-
Collaboration, equality, diversity and inclusion considerations
-
Identifying stakeholders
-
Understanding requirements
-
Requirements and systems modelling techniques
-
Project planning
-
Time management
-
Task management
-
Social, professional, ethical, and legal issues
-
Presentation of information
-
Report writing, oral presentation
-
Project evaluation
-
Professional reflection
The aim of the module is to enable students to analyse and test common security vulnerabilities through ethical hacking and to apply appropriate intrusion detection and incident response approaches for their mitigation.
Indicative content
Module content may vary in response to changing technical and professional landscapes but could include:
-
Security Requirements for Networks and Networking Devices over TCP/IP layers.
-
Data Confidentiality through Encryption, Public-Key Cryptography, Digital Signature and Data Integrity, including Access Control (local and remote) and Blockchain Technology.
-
Understanding wireless Networks and Wireless security
-
Secure Socket Programming (client-server) and Secure Application Development to maintain CIA Triad & transparency and trust for data and maintaining network security.
-
Understanding Security Policies, Business Continuity/Disaster Recovery, Relevant legislation, such as licences, data protection and storage security.
-
Fundamentals of operating systems.
-
Installation, management and monitoring of typical networked services and operating systems.
-
Configuration and management of user and group authentication polices and services.
-
Networked file systems, and the management of secure access to content stored/made available through these file systems.
Elective modules
This module is for undergraduate students to study abroad in their second year, Semester 2 (only for courses that offer this option). With this module, you can spend a semester at one of the University’s approved partner institutions worldwide – from Europe to the Americas, Australia or Canada.
Study Abroad plays an important role in the University's commitment to an engaging, challenging, and thriving learning culture. It offers opportunities to experience other academic cultures and foster intellectual maturity while enhancing co-curricular skills and students' long-term employability.
Study abroad for credit is permitted on existing university-approved courses only. Students are awarded credits and grades at the partner institution, which are converted into Sheffield Hallam credits and grades on return and included in the Sheffield Hallam degree classification.
Please check and refer to the webpage How study abroad works. You must submit a Learning Agreement outlining the modules you will be taking at the partner institution. The Learning Agreement will be signed off by your academic tutor to ensure that the Learning broadly covers the Learning Outcomes set out in your course curriculum during your study abroad.
Optional modules
Module aim:
The aim of this module is to enhance students’ professional development through the completion of and reflection on meaningful work placement(s).
A work placement will provide students with opportunities to experience the realities of professional employment and experience how their course can be applied within their chosen industry setting. The placement will:
-
Allow student to apply the skills, theories and behaviours relevant and in addition to their course
-
Enable students to enhance their interpersonal skills in demand by graduate employers – communication, problem solving, creativity, resilience, team work etc.
-
Grow their student network and relationship building skills.
-
Provide student with insights into the industry and sector in which their placement occurs
-
Help student make informed graduate careers choices.
Indicative Content:
In this module students undertake a sandwich placement (min 24 weeks / min 21 hours per week) which is integrated, assessed and aligned to their studies.
Their personal Placement Academic Supervisor (PAS) will be their key point of contact during their placement and will encourage and support students to reflect on their experience, learning and contribution to the organisation they work for.
To demonstrate gains in professional development, students will be required to share their progress, learning and achievements with their Placement Academic Supervisor and reflect on these for the summative piece of work.
Compulsory modules
This module critically evaluates and applies appropriate information security methodologies and principles to reduce organisational risk. You’ll develop skills to apply appropriate tools and techniques to test and audit application vulnerabilities and security threats, in line with information security management standards and frameworks
You’ll study topics such as:
-
Identification of controls to meet standards requirements
-
Risk management and assessment methodologies
-
Policies, standards and procedures supporting an ISMS
-
Security awareness, continuity and handling incidents
-
Attack frameworks and response planning
-
Session management and injection attacks
-
Web application security and testing methodologies
-
Authentication system vulnerabilities
-
Privilege escalation and pivoting
-
Social engineering
This module develop the skills to apply and manage on-premise and cloud-based virtualised computing systems. In groups you’ll use team development theories, perform organisational requirements and risk analyses to design, develop, apply and critically evaluate an appropriate virtualised enterprise system to address an enterprise computing need.
You’ll study topics such as:
-
Cloud computing platform theory and administration
-
On-premise virtualisation theory, installation and management
-
Containerisation theory, implementation and orchestration
-
Enterprise level system availability
-
Team building, project management and systems design methodology
This module enables you to demonstrate your knowledge and skills in a consultancy or employer-led research project, exploring a specific research or consultancy topic. You’ll review existing literature, choose appropriate methods and provide suitable recommendations to the existing body of knowledge.
You’ll apply your skills and learning to:
-
Analysing and synthesising library resources, literature and databases
-
Methods for the specification, design, implementation and outcomes
-
Time management and project planning
-
Report writing, presentation and demonstration
-
Critical evaluation and reflection
-
Due consideration of ethics, values in the workplace and professionalism
-
What it means to be a computing professional
-
Awareness of employability issues
-
Enhancing your own employability
Elective modules
This module explores Blockchain technology and IoT security, privacy and ethics, with opportunities to design and develop applications of smart solutions. You’ll study the performance of the systems and the network, investigating different security, privacy scenarios and feature requirements in terms of computation, memory, bandwidth and storage.
You’ll study topics such as:
-
Blockchain technology principles and features
-
Healthcare, smart homes and cities, supply chain, transport and environment
-
Cryptocurrency designs and industrial application
-
Consensus techniques, miners, wallets, DeFi and network fees
-
Blockchain scalability, privacy issues and challenges and solutions
-
IoT and its applications
-
IoT security issues, challenges and solutions
-
IoT in smart home, smart city, supply chain and healthcare
-
Design, develop, implement and test Blockchain
-
Secure IoT application development
This module provides an understanding of technologies and management requirements for large scale data storage within organisations. You’ll study the network infrastructures and storage media used, as well as identifying the strategies for managing data requirements of various organisations.
You’ll study topics such as:
-
Data storage networks and topologies
-
Data storage media
-
Data storage technologies and interface protocols
-
Storage management and strategy
-
Business continuance, backup and recovery
-
Cloud storage
-
Storage security
This module shows you how to detect and respond to security threats and vulnerabilities within a computing system. You’ll gain experience with the key phases of reconnaissance and intelligence analysis.
You’ll study topics such as:
-
The vulnerability of computer systems
-
Penetration testing methodology
-
System reconnaissance and information gathering
-
Secure web-based applications
-
Web application security testing
-
Web application testing methodologies
-
Intelligence and information analysis
8. Fees and funding
Home students
Our tuition fee for UK students on full-time undergraduate degree courses in 2025/26 is £9,535 per year (capped at a maximum of 20% of this during your placement year). These fees are regulated by the UK government and therefore subject to change in future years.If you are studying an undergraduate course, postgraduate pre-registration course or postgraduate research course over more than one academic year then your tuition fees may increase in subsequent years in line with Government regulations or UK Research and Innovation (UKRI) published fees. More information can be found in our terms and conditions under student fees regulations.
International students
Our tuition fee for International/EU students starting full-time study in 2025/26 is £17,155 per year (capped at a maximum of 20% of this during your placement year)
Financial support for home/EU students
How tuition fees work, student loans and other financial support available.
Additional course costs
The links below allow you to view estimated general course additional costs, as well as costs associated with key activities on specific courses. These are estimates and are intended only as an indication of potential additional expenses. Actual costs can vary greatly depending on the choices you make during your course.
General course additional costs
Additional costs for School of Computing and Digital Technologies (PDF, 131.3KB)Legal information
Any offer of a place to study is subject to your acceptance of the University’s Terms and Conditions and Student Regulations.