Computer Security with Forensics – BSc (Honours)

Level
Logo Sheffield Hallam University
Provider rating: starstarstarstar_borderstar_border 5.5 Sheffield Hallam University has an average rating of 5.5 (out of 2 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

At a glance

Learn how to protect computers from cybercrime and gather evidence of crimes such as phishing and hacking, on a course designed to prepare you for a high-demand industry. You gear up for your career with a one year optional placement at a major organisation, such as the police force or HSBC. And you gain industry perspectives with seminars from companies such as IBM and BT.

Key points
• Prepare for roles in security firms, police forces and industries such as finance.• Take advantage of a shortage of IT security graduates.
• Attend seminars from major companies such as IBM, BT and Eli Lilly.
• Go on a one year placement at providers such as Sun Microsystems, Citrix and GCHQ.

What i…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Citrix, IT Security, Security, Computer Hardware, and Internet Security.

At a glance

Learn how to protect computers from cybercrime and gather evidence of crimes such as phishing and hacking, on a course designed to prepare you for a high-demand industry. You gear up for your career with a one year optional placement at a major organisation, such as the police force or HSBC. And you gain industry perspectives with seminars from companies such as IBM and BT.

Key points
• Prepare for roles in security firms, police forces and industries such as finance.• Take advantage of a shortage of IT security graduates.
• Attend seminars from major companies such as IBM, BT and Eli Lilly.
• Go on a one year placement at providers such as Sun Microsystems, Citrix and GCHQ.

What is computer security with forensics?
Computer security with forensics focuses on forensics as a component of security in a business environment. It involves the analysis of security and how it is applied, and the analysis of events after they have taken place.

This course

Prepare for a career designing security systems and identifying and finding evidence of cybercrimes. As a graduate you can find roles in a range of IT security related settings such as large security companies, the police force or a large-scale businesses and industries, such as finance, that regard securing information systems as important. You can also work in the general IT area, but with skills relating to the increasingly important area of cyber-security.

You develop the skills to design and secure complex information systems. You learn to respond appropriately to security incidents by gathering evidence and gaining an understanding of the legal and regulatory environment around complex information systems.

As well as computer security topics you also study more general computing subjects such as • computer architecture • programming • database systems • computer networks • project management.

This gives you a good general knowledge of related IT issues and gives you the flexibility to work in other IT roles such as management.

You get the opportunity to apply your skills in year three, when you can choose to take a one-year paid work placement. This is an excellent chance to enhance your career prospects, and students on this course can apply for positions with major placement providers such as • BT • HSBC • Sun Microsystems • Citrix • GCHQ • the police force.

You are guided in the first steps of your career through career-focused sessions such as interview and presentation skills classes. You also develop your CV and application writing skills and learn how to set up a small business or enterprise. We include seminars and workshops run by The Institution of Engineering and Technology and by employers, such as IBM, BT and Eli Lilly.

Key areas of study
You study the theoretical and practical aspects of computing and computer information security with a focus on computer forensics.

Security and forensic tools covered include • cryptography • data security • digital forensics • investigative forensics • assessing threats and vulnerabilities • network firewalls.

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.