School of Engineering, Computing and Mathematics

BSc (Hons) Cyber Security

Cyber security is essential for all organisations, with hacking, malicious code and social engineering ever present threats to data. This course provides holistic coverage of cyber security, from governance and policy, to cryptography, penetration testing and digital forensics. Grounded in core computer science, the course develops the knowledge and skills to design, develop and manage secure systems to produce highly employable cyber security professionals.

Being very applied in nature, you will spend a significant proportion of your time in our Security and Forensics Laboratory putting theory in practice whilst working alongside world-leading academics.

The Plymouth Computing Scholarship

Up to £1,000. 

Students can obtain a computing scholarship of up to £500 by gaining two A grades at A level. This is awarded to home/EU applicants who put us as their firm choice before the 1 August 2020. The computing scholarship can also be obtained by students who have put us as their first choice and have acquired three D* at BTEC level (this needs to be an IT and Computing related BTEC). The scholarship is paid during the first semester of the first year.

Careers with this subject

A wide variety of career opportunities exist within the field of cyber security, with the marketplace for jobs increasing year on year. Historically, the demand for security professionals has historically outstripped many IT roles. Typical career profiles include secure software developer, penetration tester, digital forensic examiner, intrusion analyst and information systems auditor. Our graduates have gone on to work for organisations such as: Lockheed Martin, L3, BT, RSA, the Met Office, Apple and Microsoft.

Key features

  • Make use of our links to professional and industry bodies, including the Chartered Institute of Information Security Academic Partnership
  • Pursue industry-recognised professional certifications, such as the EC-Council’s Certified Ethical Hacker (CEH), forensics ACE (AccessData Certified Examiner). 
  • Access a wide variety of specialist software and up-to-date facilities, including a dedicated security and forensics lab. 
  • Enhance your knowledge of a variety of computing disciplines, including programming, networking, databases, data centres and defensive coding. 
  • Benefit from specialised course material covering the legal and regulatory aspects of cyber security.
  • Seeking accreditation by BCS for 2020. 
  • Academic Partner status by the Chartered Institute of Information Security (CIISec).
  • Hone your research skills - we work closely with our Centre for Security, Communications and Network Research

Course details

  • Year 1
  • We introduce you to the world of information security: hackers, crackers, viruses, trojans, worms, botnets, zombies, phishing and pharming. You underpin your computing knowledge in programming, computer systems, networks, and systems analysis and design.

    • COMP1000 Software engineering 1 
    • COMP1001 Computer systems 
    • COMP1002 Cyber security and networks 
    • COMP1003 Algorithms and data structures 
    • COMP1004 Computing practice 
    • BPIE111 Stage 1 computing placement preparation

  • Year 2
  • Explore topics in the development of secure systems: access control, authentication, biometrics, trusted computing, secure coding, cryptography, vulnerability management and malware analysis. Security project drawing on your studies so far enables you to design, develop and evaluate security software and prepare you for placement.

    • COMP2000 Software engineering 2 
    • COMP2001 Information management and retrieval 
    • COMP2002 Artificial intelligence 
    • COMP2003 Computing group project 
    • COMP2006 Security architectures and cryptography 
    • BPIE211 Stage 2 computing placement preparation

  • Optional placement year
  • We strongly recommend that you take a placement year to develop your professional experience and significantly enhance your CV.

    • BPIE330 Computing placement

  • Final year
  • Deepen your understanding of key network security concepts and develop the skills required to undertake penetration testing, intrusion analysis and digital forensics. Master all the varying elements of security by studying information security management, and gain an appreciation of the human, legal and regulatory aspects involved in the design and implementation of information security. A substantial project also helps you to develop specialised skills and expertise, resulting in a showcase of your skills that will help you to stand out when applying for jobs,

    • COMP3000 Computing individual project 
    • COMP3009 Information security management and governance 
    • COMP3010 Security operations and incident management 
    • COMP3011 Ethical hacking 
    • COMP3012 Digital forensics and malware analysis

Entry requirements

UCAS tariff

112 - 120

Applicants exceeding our entry requirements may be eligible for an offer under our Computing Excellence Scheme.

GCSE: English C/4 and mathematics grade C/5. If you have a grade C/4 in mathematics please contact the admissions team.

A levels: A typical offer is 112-20 points from a minimum of 2 A levels in any subject. Excluding general studies.

International Baccalaureate: 30 overall – English and mathematics must be included.

18 Unit BTEC National Diploma/QCF Extended Diploma: DDM – science related subjects: IT, Humanities, Engineering, Software Development, IT Practitioners, Business, Computing, Science (GCSE English C/4 and Mathematics grade C/5. If you have a grade C/4 in mathematics please contact admissions team).

BTEC National Diploma modules
If you hold a BTEC qualification it is vital that you provide our Admissions team with details of the exact modules you have studied as part of the BTEC. Without this information we may be unable to process your application quickly and you could experience significant delays in the progress of your application to study with us. Please explicitly state the full list of modules within your qualification at the time of application.

All Access courses: 33 credits at merit and/or distinction and to include at least 12 level 3 credits in mathematics with merit. Including a minimum of GCSE English and mathematics grade C/4. If mathematics not included please contact the admissions team at admissions@plymouth.ac.uk.

Other qualifications will be considered individually; please contact us for information.

For a full list of all acceptable qualifications please refer to our tariff glossary.

Fees, costs and funding

EU applicants should refer to our dedicated Brexit webpage for details of the implications of the UK’s plans to leave the European Union.

New Student 2019 2020
Home/EU N/A £9,250
International N/A £13,800
Part time (Home/EU) N/A £770
Full time fees shown are per annum. Part time fees shown are per 10 credits. Please note that fees are reviewed on an annual basis. Fees and the conditions that apply to them shown in the prospectus are correct at the time of going to print. Fees shown on the web are the most up to date but are still subject to change in exceptional circumstances.

The Plymouth Computing Scholarship

Up to £1,000.

Students can obtain a computing scholarship of up to £500 by gaining two A grades at A level. This is awarded to home/EU applicants who put us as their firm choice before the 1 August 2020. The computing scholarship can also be obtained by students who have put us as their first choice and have acquired three D* at BTEC level (this needs to be an IT and Computing related BTEC). The scholarship is paid during the first semester of the first year.   

Undergraduate scholarships for international students

To reward outstanding achievement the University of Plymouth offers scholarship schemes to help towards funding your studies.

Find out whether you are eligible and how you can apply

Additional costs

This course is delivered by the Faculty of Science and Engineering and more details of any additional costs associated with the faculty's courses are listed on the following page: Additional fieldwork and equipment costs.

How to apply

All applications for undergraduate courses are made through UCAS (Universities and Colleges Admissions Service). 

UCAS will ask for the information contained in the box at the top of this course page including the UCAS course code and the institution code. 

To apply for this course and for more information about submitting an application including application deadline dates, please visit the UCAS website.

Support is also available to overseas students applying to the University from our International Office via our how to apply webpage or email international-admissions@plymouth.ac.uk.

Why choose a computing course at Plymouth?

Graduate view: watch our short film

Hear the views of one of our graduates and see some of our facilities.

Find out what it's like to study computing at Plymouth.

Dedicated laboratory facilities

As well as accessing our standard computing laboratories, you’ll be able to make extensive use of a 42-seat dedicated security and digital forensics laboratory, purpose-built to represent a range of network topologies and monitoring conditions.

Practical activities and tools used include: Webgoat, secure coding, analysis of honeynet challenges, scapy, nmap, metasploit, Snort, and FTK.

Dedicated laboratory facilities in the Smeaton Building

Industry participation and endorsement

Cyber Security students have the opportunity to meet and interact with industry speakers and attendees at the Secure South West event series.

You can also enjoy many opportunities to engage with industry practitioners, such as hands-on sessions about targeted threats run by David Emm (Senior Regional Researcher with Kaspersky’s Global Research and Analysis Team) and Ram Herkanaidu (Kaspersky Lab’s UK Education Manager).


The Plymouth security degree provides a really strong foundation for those looking for a career in the industry.

Having worked with the staff and students, there is clearly an equally strong environment of research and project activity that supports the course.

Ram Herkanaidu, Kaspersky Lab’s UK Education Manager

Benefits for our students

Computer and Information Security Society (CISS)

You’ll get the chance to join the active student-led Computer and Information Security Society (CISS), which organises additional seminars and other activities in order to further enhance your experience at Plymouth.

Previous activities have included a trip to the historic WWII code-breaking centre at Bletchley Park.


Pursue industry-recognised certification

Benefit from the University’s agreement with the International Council of E-Commerce Consultants (EC-Council) to provide courseware scholarships for the Certified Ethical Hacker (CEH) certification.

You can also get access to the AccessData Certified Examiner (ACE) courseware, to improve your proficiency with Forensic Toolkit FTK.


The Tamar Engineering Project

Funding and mentoring for high achievers who might not otherwise consider higher education as a route to a career in computing and engineering.

Learn if you are eligible for this scholarship at the University of Plymouth through the Tamar Engineering Project.

Successful applicants will receive:

  • £3,000 towards living costs per year of study
  • £1,500 course fee waiver per year of study
  • one-to-one mentoring from an industry expert.

Meet some of your lecturers