Skip to main content Skip to navigation

What have we updated?

About this page

We will update this page when we make significant changes to course information. This does not necessarily include minor corrections or formatting.

If you ever want to ask us about a change, you can contact us at webeditor at warwick dot ac dot uk.


11 November 2024

A-level requirements have been updated

Old

AAA (STEM subjects preferred: Physics, Chemistry, Biology, General Sciences, Computer Science, Engineering, Mathematics).

New

AAA (applicants from all academic profiles welcome, but STEM subjects are recommended for ease of study onto the programme)

22 April 2024

What is the difference between computer science and cyber security? text has been added to the Course Overview tab.

Computer science is a broad field that covers the fundamentals of computer systems, including algorithms, data structures, software development, and more. It’s about understanding how computers work and how to create software applications that solve problems. On the other hand, cyber security is a specialised field that focuses on protecting systems, networks, and data from digital attacks. You’ll dive into understanding potential threats, implementing security measures, and constantly updating defences in response to new risks.

The text in the Assessment tab has also been updated:

Old:

Your performance will be assessed predominantly by coursework with a small number of written examinations. The coursework may be individual or group work involving aspects of cyber system development, cyber system analysis, cyber research, and presentation of findings. The second and final year place particular emphasis on coursework with a practitioner focus.

The final degree classification is determined by your second (30%) and final year marks (70%).

New:

Your performance will be assessed predominantly by coursework with a small number of written examinations. The coursework may be individual or group work, involving aspects of cyber system development, cyber system analysis, cyber research, and presentation of findings. The second and final year place particular emphasis on coursework, designed to provide practical skills and knowledge that can be directly applied in a professional setting.

For the Individual Project in the final year, you will use a range of methods, tools, and techniques to address your chosen research question. This project will help you to develop a range of transferable skills, including critical thinking, problem solving, and communication. These are skills you will carry into a successful career beyond Warwick.

17 April 2024

Following University approval to this course, we have updated the course modules.

Old:

Year One

Software Development and Security

This module focuses on the cyber context of the entire software development process, identifying those concepts and skills that should be mastered in the first year of the programme. This includes:

  • The design and simple analysis of algorithms
  • Fundamental programming concepts and data structures
  • Basic software development methods and tools

You will learn to collaborate on the development of software using standard development tools and components to create robust implementations.

Read more about the Software Development and Security moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Cyber Systems Architecture and Organisation

This module gives broad coverage to computer systems and will enable you to develop a deeper understanding of the hardware environment upon which all computing is based, as well as the interface it provides to higher software layers.

You will learn about a computer system’s functional components, their characteristics, performance, and interactions, and, in particular, the challenge of harnessing parallelism to sustain performance improvements now and into the future.

Read more about the Cyber Systems Architecture and Organisation moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Discrete Structures for Cyber Security

This module will give you a greater insight into the reasoning behind much of the more applied cyber security material that you will be studying throughout the course. You will learn to perform abstract operations on discrete structures and apply the tools and techniques you've learned to solving cyber security problems.

At the end of this module you should be able to:

  • Operate on sets, relations and functions
  • Apply logic to support reasoning about problems
  • Select and apply appropriate proof techniques in the solution of problems
  • Map real world examples to appropriate counting formalisms
  • Model a variety of real world problems using appropriate data structures
  • Apply the tools and techniques of discrete probability to solve cyber security problems

Read more about the Discrete Structures for Cyber Security moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Networks, Communications and Cyber Defence

Networks, Communications and Cyber Defence will explore the key principles behind the organisation and operation of typical communication networks and layered protocols. You will learn to configure network devices to achieve required operating characteristics and explain network behaviour from captured network traffic. This module covers key themes, including:

  • Networked applications
  • Reliable data delivery
  • Routing and forwarding
  • Local area networks
  • Resource allocation
  • Mobility

Read more about the Networks, Communications and Cyber Defence moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Operating Systems in the Cyber Context

This module will outline the principles of how an operating system is constructed, how it works, and its critical role in cyber security. It will provide you with a solid understanding of how a modern operating system satisfies its requirements in the cyber context. You will learn to explain the key principles behind the organisation and operation of a typical general-purpose operating system, and explain how process, memory and file management algorithms and data structures work. You will also learn to select and apply appropriate security and protection mechanisms.

Read more about the Operating Systems in the Cyber Context moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Cyber Security Fundamentals

This module introduces you to fundamental cyber security concepts including the cyber lexicon, mechanisms for representing cyber-attacks and enables an opportunity to participate in cyber reconnaissance and vulnerability discovery.

Read more about the Cyber Security Fundamentals moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Year Two

The Cyber Context of Software Engineering

In this module you will look at software engineering in the context of cyber security, applying frameworks such as the 'Trustworthy Software Framework' when developing software systems. You will compare and contrast different software engineering processes, and how they address the relationships between the different phases in the software lifecycle. You will also learn to apply the concepts and principles of software engineering to develop software in a team, using supporting tools and metrics as appropriate.

Read more about The Cyber Context of Software Engineering moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Programming Languages for Cyber Security

This module will enable you to develop insight into the significant differences between different programming paradigms. Object oriented programming, functional programming, and event driven programming are given special emphasis. You will develop solutions under these different paradigms to embed the theoretical concepts you're learning into professional practice.

Read more about the Programming Languages for Cyber Security module,Link opens in a new windowLink opens in a new window including the methods of teaching and assessment (content applies to 2023/24 year of study).

Human Behaviour in Cyber Systems

Human Behaviour in Cyber Systems places the person at the centre of the cyber domain. On this module you will learn to design, implement, and evaluate an interface for a well-defined community of users to interact with an application to achieve worthwhile user objectives. You will also analyse the relationship between the human-computer interface, user behaviour, and cyber security consequences.

Read more about the Human Behaviour in Cyber Systems moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Implementing Secure Systems

This module is concerned with deliberately choosing good patterns of implementation for the long-term well being of the system. You will learn to:

  • Critically analyse the relationship between human trust, and the technological tokens that represent trust, in cyber systems
  • Design a security architecture that satisfies the security needs of a given scenario, potentially spanning multiple platforms
  • Apply cryptographic techniques and configure systems to achieve desired security objectives

Read more about the Implementing Secure Systems moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Information Management

Information Management is primarily concerned with the capture, digitisation, representation, organisation, transformation, and presentation of information. You will learn to apply cyber security concepts and principles in the design of a data model from user requirements. You will also be able to demonstrate the implementation of a data model in a relational database, retaining all necessary data associations and appropriately addressing security, scalability, and performance issues.

Read more about the Information Management moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Information Risk and Security Management

Information security management is about having the strategy, policy, processes, behaviours, and technology, in place and coherently supporting each other. This module explores policy, strategy, awareness and audit, and the legal and regulatory environment. You will learn to adopt a responsible attitude to the social and ethical consequences that flow from professional engagement in security management, and to develop and evaluate the overall coherence of an organisation's approach to cyber security management.

Read more about the Information Risk and Security Management moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Year Three

Low-level Tools and Techniques for Cyber Security

This module will enable you to reverse back from the detail of the executable instance to infer what the overall pattern of behaviour might be. In a similar manner, it will develop your ability to reverse back from the detail of numerous individual network packets to infer what the overall pattern of traffic might represent.

Read more about the Low-level Tools and Techniques for Cyber Security moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Data Science, Algorithms, and Complexity in the Cyber Context

This module develops the central concepts and skills required to design, implement and analyse algorithms for solving problems. You will learn to:

  • Design and implement appropriate algorithms that satisfy the needs of a particular situation within cyber security
  • Critically evaluate a variety of common algorithms, algorithmic strategies and data structures used in cyber security
  • Analyse and assess the complexity and efficiency of an algorithm
  • Critically evaluate the appropriateness of a given algorithm in cyber security

Read more about the Data Science, Algorithms, and Complexity in the Cyber Context moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Operational Security Management

This module draws together the content from earlier other modules and presents the various interacting topics in an operational context. The focus is on operational security management relating to the cyber domain: maximising the benefits that flow from cyber engagement, whilst minimising the harms, through deliberate, managed activity. Some of this activity is obvious and directly cyber related: crypto key management or firewall rule change-control for example. Some is less obvious and indirectly cyber related: HR protocols for joiners and leavers for example.

Read more about the Operational Security Management moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Cyber Security Incident Management

This module comprises two related but distinct themes: cyber incident response and digital forensics. There are a number of principles that have been established by the digital forensics community and from these a range of tools and techniques have been developed for doing standard things in typical circumstances. Analysing the capabilities and limitations of these tools and techniques is an important part of the module. Representing what has been inferred to a non-specialist audience is also a critical part of any investigation and is practised in the module.

Read more about the Cyber Security Incident Management moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Individual Project

With support from a supervisor, you will undertake the full life cycle of a research or development project in the cyber security domain.

Read more about the Cyber Security Project module,Link opens in a new windowLink opens in a new window including the methods of teaching and assessment (content applies to 2023/24 year of study).


Optional modules

We do not have any optional modules. However, modules will evolve to reflect the dynamic cyber environment and the ever-changing cyber-threat landscape.

New:

Year One

Programming for Cyber Security

Fluency in the process of software development is a prerequisite to the study of much of the remainder of this programme. This module brings together the fundamental concepts and skills related to the software development process. It will provide you with a foundation for other software-oriented aspects of the programme, such as: programming languages for cyber security, data science for algorithms and complexity in the cyber context, and the cyber context of software engineering.

Read more about the Programming for Cyber Security moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2025/26 year of study).

Computer Architecture and Operating Systems

This module aims to equip you with a comprehensive understanding of modern computer architectures and system software concepts. It starts by providing essential principles and concepts of computer systems to develop a deeper understanding of the hardware environment upon which all computing is based, and the interface it provides to higher software layers. You will learn about computer systems’ functional components, their characteristics, performance, and interactions, and the challenge of harnessing parallelism to sustain performance improvements now and in the future. This module then outlines the principles of how an operating system is constructed, how it works, and its critical role in cyber security by providing a solid understanding of how a modern operating system satisfies its requirements in the cyber context.

Read more about the Computer Architecture and Operating Systems moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2025/26 year of study).

Discrete Mathematics

Discrete mathematics forms the mathematical foundation of computer science and cyber security. It forms the basis of how computers work, allows us to prove system correctness and security, and underlies modern cryptography. On this module, you will be introduced to the discrete structures used by computers, as well as how to use them to solve problems in cyber security.

Read more about the Discrete Mathematics moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2025/26 year of study).

Algorithms and Data Structures

Algorithms are the fundamental building blocks of computer science – but how can we prove that an algorithm does what we want it to? How can we improve the efficiency of existing algorithms? This module will provide you with a comprehensive understanding of the fundamental principles and techniques in algorithm design and optimisation. You will explore a wide range of topics, including sorting, searching and pathfinding algorithms, while evaluating their correctness and efficiency.

Read more about the Algorithms and Data Structures moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2025/26 year of study).

Computer Networks

Currently, networks, whether wired or wireless, are an integral component of the present and future computing landscape. Computer networks form the foundation of modern information technology systems, enabling the seamless communication and transfer of data between devices and systems. This module aims to equip you with the essential knowledge and skills required to understand and work with computer networks effectively by providing a solid grounding of core networks and communication concepts.

Read more about the Computer Networks moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2025/26 year of study).

Cyber Security Fundamentals

This module will equip you to better understand the stages and concepts of a cyberattack. You will develop a practical understanding, as well as applying the common tools, techniques, and procedures utilised by adversaries and attackers during each phase of a cyberattack in a manner that is both legal and ethical.

Read more about the Cyber Security Fundamentals moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2025/26 year of study).

Security Testing I

This module aims to equip you with the knowledge and practical experience of performing security testing and producing professional penetration testing reports for client organisations. You will learn the importance of acting professionally, in an ethical manner, and will be made aware of ‘responsible reporting’ programmes. This module is partly taught by professional practitioners involved with professional penetration testing on a daily basis and also equipped with years of university academic experience.

Read more about the Security Testing I moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2025/26 year of study).

Digital Forensics Fundamentals

This module exposes you to the entire investigative lifecycle of a case, from a criminal and corporate perspective. You will develop:

  • A critical understanding of the process of digital investigation
  • An applied understanding of how to perform a digital investigation
  • The ability to apply appropriate tools to investigate a cutting edge digital investigation scenario

Read more about the Digital Forensics Fundamentals moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2025/26 year of study).

Year Two

Secure Software Development

This module aims to equip you with the knowledge and practical experience of secure software design and development principles. You will look at software engineering in the context of cyber security, applying frameworks such as the Trustworthy Software Framework and the Secure Software Development Life Cycle when developing software systems.

Read more about the Secure Software Development moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2026/27 year of study).

Behavioural Cyber Security

This module places the person at the centre of the cyber domain by addressing issues of usability and human factors. As such, the focus is on trade-offs between usability and security on the one hand, and human psychology and human error on the other hand. Human vulnerabilities will be addressed in detail to build greater cyber resilience, and narrative around security awareness/training programmes and security culture will be also introduced for understanding broader, non-technical influences on security through minimising human related risks.

Read more about the Behavioural Cyber Security moduleLink opens in a new windowLink opens in a new window including the methods of teaching and assessment (content applies to 2026/27 year of study).

Cryptosystems

On this module you will develop your ability to design robust security architectures tailored to specific scenarios. Moreover, you will acquire practical expertise in configuring systems using cryptographic techniques to achieve the desired security objectives. By actively participating in this module, you will enhance your overall understanding of trust and security, equipping you with the necessary tools to thrive in the dynamic landscape of cyber security.

Read more about the Cryptosystems moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2026/27 year of study).

Secure Networks

This module covers basic concepts of cyber security, such as confidentiality, integrity, availability, authentication, and authorization. These concepts will be explored within the context of several generic asset configurations, enabling you to understand the potential threats that may arise and various security measures that will be used to defend against these threats.

Read more about the Secure Networks moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2026/27 year of study).

Databases and Information Management

On this module, you will be introduced to the essential concepts of databases, data modelling, and optimisation. This knowledge will empower you to craft efficient databases for superior information management. From understanding Database Management Systems (DBMS) and data modelling to mastering Structured Query Language (SQL) and optimizing queries, you will gain indispensable skills for designing and maintaining robust databases.

Read more about the Databases and Information Management moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2026/27 year of study).

Information Security and Risk Management

This module aims to provide you with the skills that will allow you to have the confidence to recognise and assess information security risks and identify appropriate ways to manage information security within an organisational context. It is about designing and evaluating the solutions that have the strategy, policy, processes, behaviours, and technology, in place and coherently supporting each other.

Read more about the Information Security and Risk Management moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2026/27 year of study).

Security Testing II

This module covers the latest techniques of ethical hacking and provides practical experience in selecting and applying suitable tools and techniques. It is also designed to ensure that you are able to define the scope of testing under certain requirements and develop a relevant project plan, and carry out a security assessment by applying appropriate testing methodologies and tools.

Read more about the Security Testing II moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2026/27 year of study).

Research and Professional Skills

This module is designed to equip you with the knowledge and tools to research cross-cutting issues in cyber security contexts. You will learn about a range of data collection methods and analytical options relevant to this, and develop relevant skills in data collection and analysis. You will also be introduced to ethical issues in cyber security research, as well as provided with guidance on how to design, plan and manage your dissertation effectively. Lastly, the module will involve careers-oriented tasks, giving you the opportunity to consider your professional skills and career aspirations.

Read more about the Research and Professional Skills moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2026/27 year of study).

Year Three

Malware Analysis and Exploit Development

This module aims to explore the essential low-level techniques and analysis concepts relevant to identifying malicious code and exploiting vulnerabilities that reside in the binaries.

Read more about the Malware Analysis and Exploit Development moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2027/28 year of study).

AI and Cyber Security

AI-based solutions are having a significant impact in a number of areas, including cyber security. This module aims to develop your knowledge of the development and application of the most common machine learning models, and in particular a critical understanding of the applicability of each machine learning algorithms in the solution of a particular problem (class of problems). It will cover the best practice and main steps of developing AI-based solutions, including data collection/engineering and pre-processing, model design, training and evaluation, and deployment.

Read more about the AI and Cyber Security moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2027/28 year of study).

Cyber Security Operations

This module seeks to introduce you to the state-of-the-art in effective and proactive cyberattack deterrents, including tools and techniques that can have long-term benefits in organisational policies while maintaining the resilience of our agile and delicate cyber infrastructures.

Read more about the Cyber Security Operations moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2027/28 year of study).

Cyber Security Incident Management

This module comprises two related but distinct themes: cyber incident response and digital forensics. There are a number of principles that have been established by the digital forensics community and from these a range of tools and techniques have been developed for doing standard things in typical circumstances. Analysing the capabilities and limitations of these tools and techniques is an important part of the module. Representing what has been inferred to a non-specialist audience is also a critical part of any investigation and is practised in the module.

Read more about the Cyber Security Incident Management moduleLink opens in a new windowLink opens in a new window, including the methods of teaching and assessment (content applies to 2023/24 year of study).

Cyber Security Project

With support from a supervisor, you will undertake the full life cycle of a research or development project in the cyber security domain.

Read more about the Cyber Security Project moduleLink opens in a new windowLink opens in a new window including the methods of teaching and assessment (content applies to 2027/28 year of study).


Optional modules

In the final year, you will select two modules from the following list of optional modules:

Advanced Forensics and Investigations

This module advances on previously gained skills in digital forensics and explores different themes. One part of the module places a strong emphasis on engagement with applied research advances on contemporary topics in the field and current professional practises. The other part of the module strongly focuses on the technical analysis and techniques involved when investigating different devices and technologies.

Read more about the Advanced Forensics and Investigations moduleLink opens in a new windowLink opens in a new window including the methods of teaching and assessment (content applies to 2027/28 year of study).

Privacy and Online Rights

Privacy is recognised as a fundamental human right, however, it can be easily exploited in the digital domain due to the large scale of use and spread of advanced digital technologies for data mining and surveillance. This module aims to provide you with a critical awareness of privacy issues in cyber security and allow you to apply advanced technical concepts and practices for managing privacy in organisations using a psychological and usability perspectives.

Read more about the Privacy and Online Rights moduleLink opens in a new windowLink opens in a new window including the methods of teaching and assessment (content applies to 2027/28 year of study).

Cloud and Virtualisation Security

This module considers the cyber security consequences of virtualised systems and the opportunities that they offer. Focusing on software containerisation systems such as Docker, and comparing their properties with other virtualisation tools and techniques, the module looks at the trust relationships and the available security controls between the underlying operating system, the container, or other virtualised environment, and the software executing within the container.

Read more about the Cloud and Virtualisation Security moduleLink opens in a new windowLink opens in a new window including the methods of teaching and assessment (content applies to 2027/28 year of study).

Cyber-Physical Systems

Much attention relating to communication in the cyber domain is focused around the Internet. A range of other communication protocols and technologies are widely deployed in industrial control, vehicle and other systems. Understanding the significant characteristics of the physical manifestations of digital information, understanding the interconnectedness of the cyber domain with the physical domain via sensors and actuators, and understanding non-Internet technologies and protocols reduces the risk of inadvertently leaving a cyber system in a vulnerable position. The overall aim of this module is to enable you to have a meaningful conversation with practising engineers concerning the security of cyber-physical systems.

Read more about the Cyber-Physical Systems moduleLink opens in a new windowLink opens in a new window including the methods of teaching and assessment (content applies to 2027/28 year of study).