Home > Undergraduate > Information Quality and Security > Poole > BSc (Hons) Cyber Security Management - Poole - Dorset

BSc (Hons) Cyber Security Management

Speak without obligation to Bournemouth University

To contact you must accept the privacy policy

Comments about BSc (Hons) Cyber Security Management - At the institution - Poole - Dorset

  • Entry requirements
    For September 2021 entry: 104 - 120 UCAS tariff points, including 2 A-Levels, or equivalent. BTEC Extended Diploma DMM.

    For September 2021 entry: If English is not your first language you'll need IELTS (Academic) 6.0 (with minimum 5.5 in each of the 4 components) or equivalent.
  • Academic Title
  • Course description
    Are you interested in understanding the evolving security threats to end-users of technology in order to prevent hackers, computer viruses, and large-scale cyber-attacks? The rate and prevalence of threats to Information Technology systems means that government agencies, police authorities and defence organisations need people who can efficiently create systems to combat them. On this course, you will explore the evolving threat landscape and gain applied skills in building and managing secure systems. In addition to core computing skills, you will learn the fundamental concepts of psychology, business, law, and management that relate to cyber security in technology. With the threat landscape constantly developing, this course will teach you to be a strategic thinker and be a step ahead of the hackers – understanding the threats and implementing the solutions to combat them. This is one of eight undergraduate computing courses we offer at BU. As we understand that it can be difficult to know what area you’d like to specialise in, all of these courses share a common first year, giving you the time to really explore the subject before deciding on a specialism. You only need to apply for one of the courses and you will have the opportunity to change your final degree title during your study with us.

Other programs related to Information Quality and Security

This site uses cookies. If you continue navigating, the use of cookies is deemed to be accepted. See more  |