Skip to Main Content

Cyber Security – BSc (Hons)

Introduction

If you’re looking to exploit the latest cutting-edge cyber security research to build modern, resilient and secure computing platforms then this is the degree designed for you.

Duration

Full time 3 or 4 years

Direct BSc entry: 3 academic years
Foundation entry: 4 academic years

Intakes

  • January 2026 (Foundation entry only)
  • October 2026
  • January 2027 (Foundation entry only)

Fees 2026/2027

  • International €18,500
  • EU/UK €11,100

Location

Language of Instruction

English

Lancaster University degree is highly ranked in the UK and globally.

Page Section

Programme Overview

Could you lead the future of cyber security? Digital technologies impact every part of our lives and cyber security experts are essential for addressing debates around AI, digital forensics, and hacking. As a cyber security student, you will tackle foundational, advanced, and emergent, cyber security topics such as security and penetration testing, cryptography, network security, resilient distributed systems, security of autonomous systems, secure AI, secure cyber-physical systems, and security metrics. Prepare to influence the systems that shape our world and take the next step towards an exciting career.

As with our other degrees, in your first year you will receive a comprehensive grounding in computer science fundamentals covering both theory and practice. In your second and third years you will begin to specialise in areas that inspire you.

Year 1 Modules

Core modules (20 credits each):

  • Digital Systems
    The creation of the microprocessor revolutionised global innovation and creativity. Without such hardware we would have no laptops, no smartphones, no tablets. Life changing technologies from MRI scanners to the Internet would simply not exist. This module provides an introduction to the field of Digital Systems – the engineering principles upon which all contemporary computer systems are based.We study the elements that work together to form the architecture of digital computers, including computer processors, memory, data storage and input/output. We also unearth the ways in which these are enabled by digital logic – where George Boole’s theory of a binary based algebra meets electronics. Building on SCC.111 we also discover how the software programs we write translate to, and interact with, such hardware. Finally, we also study the effects of multi-process operating systems, and how these interplay with the capabilities and architecture of modern computers to optimise performance and robustness.
  • Fundamentals of Computer Science
    Computing and data drive many critical elements of of modern society, directly or indirectly. It’s vital that there is a strong theoretical foundation to Computer Science. This module begins by examining the hard questions central to Computer Science and reasoning itself to prepare you for the in-depth critical thinking and discussion required at university level. It then proceeds to cover the fundamentals in logic, sets, and mathematics of vectors, matricies, and linear algebra which have practical applications in software such as computer graphics. Algorithms, abstract data types, and analysis of algorithms is introduced to allow you to make reasoned decisions about the design of your programs. Finally, we investigate and apply the principles of Data Science to select, process, and analyse data, and examine the way programs and systems can be designed to efficiently support work with data and question the limits of conclusions that can be drawn from such systems.

 

 

  • Software Development
    Software now forms a central aspect of our lives. From the applications we run on our phones to the satellites in space, all modern technology is enabled by software. This module provides an introduction to the field of Software Development – the processes and skills associated with designing and constructing computer programs. Assuming no previous knowledge of the field, we study the contemporary knowledge, skills and techniques needed to develop high-quality computer software. This includes a thorough treatment of the principles of computer programming and how these principles can be applied using a range of contemporary and established languages such as Python, JavaScript and C. We discover how programming languages can be classified and how to choose the best language for the task at hand.
    We also investigate and apply the practical Software Engineering skills needed to ensure software is correct, robust and maintainable. These include techniques for problem analysis, design formulation, programming conventions, software commenting and documentation, testing and test case design, debugging techniques and version control.

 

 

  • Professional Practice
    This module is designed to provide students with a strong foundation in principles of responsible computing, covering the legal, social, ethical and professional challenges that that a practicing computer scientist regularly faces. It is strongly research-led, delivered by staff actively researching these issues, and draws upon contemporary examples of where technology has resulted in both benefits and harm to people and society. We then develop an understanding of the legal frameworks, professional codes, working practices and civil licenses designed to provide protection from these harms. Particular emphasis is placed on considerations relating to the need for computer systems to be trusted and trustworthy.We discuss the use of participatory research methods in exposing real-world requirements for computing systems, and ensuring equitable distribution of benefits and harms of digital innovation across the population, in alignment with a changing legal landscape. Inclusive design practices through the development phases from research to implementation are reviewed, examining the prevalence and impact of the gender data gap, accessibility constraints and exploring the benefits of diversity in the workplace through real-world examples. We also discover ethical ways to practice personal and professional development for career progression.

Optional modules (select 40 credits):

 

  • Introduction to Accounting and Finance
  • Quantitative Methods for Accounting and Finance
  • Introduction to Financial Accounting for Managers
  • Principles of Economics B
  • Principles of Marketing
  • Introduction to Management
  • Introduction to Business Analytics
  • Transformations: From Mass Media to Social Media

Year 2 Modules

Core modules:

  • Applied Security Methods
    This module explores some of the practical and applied aspects of cyber security: Penetration Testing and Forensics. We discuss common approaches and tools that attackers use to undermine the security of digital systems and gain first-hand experience of the weaknesses that can be present in real-world systems through guided work in highly controlled, small-group practical labs. We then explore ways in which these attacks can be identified, how the digital traces of an attack be captured, appropriately evidenced and then interpreted at a later date. The module will wrap the technical and theoretical aspects within the legal, regulatory and ethical frameworks for the appropriate application of ethical penetration testing.

 

 

  • Computer Networks and Systems
    Building upon the foundations set in SCC.131, this module investigates the deeper concepts that underpin computer networking and operating systems. We explore the role, operation and design rationale of the IP protocol suite – which enables the global internet. Taking a top-down approach, we discover how protocols such as HTTP, DNS and TCP/IP operate on a fundamental level, the metrics and tools we use to evaluate the performance of computer networks. Through the use of laboratory-based simulators, we also explore first-hand how routing protocols ensure user data is efficiently and safely routed across the global internet. We also study the interface between computer networks and operating systems, and how the concept of virtualization has transformed the way computer systems and networks efficiently make use of their hardware resources.

 

 

  • Data Engineering
    This module builds upon knowledge gained in Part I by providing a theoretical background to the design, implementation and use of database management systems, both for data designers and application developers. It incorporates consideration of information quality and security in the design, development and use of database systems. The module includes a brief history of the database management systems, Entity-Relationship Models, the relational model and the data normalisation process, and alternative schema definitions, NoSQL and Object Oriented data models, big data, as well as transaction processing and concurrency control. The module embeds practical access and retrieval considerations and how to interact with databases from a number of programming languages.

 

 

    • Group Project
      The group project will give students experience in executing a project through all stages, working to the demands of a client, and practically combine and apply concepts and skills gained in other modules studied so far in their programme. Students will learn and apply their knowledge about prototyping, project planning, management, design, and user evaluation or testing strategies. Teams will deliver reports, code, and demonstrate a working system. They will also communicate their work through reports, demonstrations, presentations.The actual project content may differ from year to year, and groups may be able to select projects aligned with the School’s main themes of Software, Systems, Data and Theory, Interactions and Implications, and Cyber Security, although each theme may not be available every year. Example topic areas could be desktop application development, game programming, computer graphics, user interfaces, mobile computing, or other areas. The exact requirements of a group project will vary according to the focus of its theme however the course structure of a group project will be the same between themes and different years. Students will receive about 30 hours of workshop contact time throughout the module, in addition to lectures, and then will be expected to work independently as a group.

 

    • Human-Computer Interaction
      Most computing systems are interactive and have people in the loop. Human-computer interaction (HCI) is concerned with all aspects of designing, building, evaluating and studying systems that involve human interaction. From a computing perspective, we focus on enabling interaction through user interfaces, and on creating interactive systems that are usable and provide a good user experience. The module introduces students to the foundations of HCI in understanding human behaviour, technologies for interaction, and human-centred design. We review human perception, cognition and action and relate these to design principles and guidelines; discuss different user interface paradigms and key technologies such as pointing; and introduce practical methods for design and evaluation with users.

 

  • Secure Cyber Systems
    The module will provide information on Authentication, Authorisation & Accountability (AAA) and its building blocks. An emphasis will be given on authorisation, where access control models, policies and mechanisms will be examined. Main categories of existing cryptosystems (e.g. symmetric, asymmetric) will be reviewed to understand their use and offered security properties (e.g. confidentiality, integrity, non-repudiation) in practice. Operating systems security and network security concepts will be discussed, with connection to AAA and cryptosystems. An introduction to formal verification will discuss techniques that can be used to verify properties on cyber security systems. Example models of systems specified along with appropriate properties will be verified to assess their correctness.

 

 

  • Software Design
    Software Development is a collaborative and professional process, requiring far more than a single individual undertaking programming activities. This module investigates the processes, tools, techniques and notations required to successfully undertake the development of commercial grade software. Focussing on the key non-functional parameters of software reuse, scalability, maintainability and extensibility we explore the benefits brought by the rigour associated with Object Oriented, strongly typed languages (such as Java). We practice the concepts of composition, inheritance, polymorphism, interfaces and traits and the commonly employed design patterns that they enable. We also study the processes and notations associated with defining the relationship and behaviour of complex computer software systems.

Optional modules (select 2 of 4):

 

  • Advanced Programming
  • Artificial Intelligence Concepts
  • Algorithms
  • Concurrent and Parallel Systems

Year 3 Modules

Core modules:

 

    • Third Year Project
      The Third Year Project is a substantial individual project, normally involving the principled design, implementation and evaluation of a substantial piece of software, experimental study or theoretical work. Each student choses their topic from a wide selection posted by potential supervisors. The project topic is normally selected prior to the start of the third year. The requirements of the degree scheme, the student’s interests and the supervisor’s area of expertise are taken into account during project allocation.The student normally receives at least bi-weekly guidance (of around 30 minutes) one-to-one from his/her project supervisor (a member of the School of Computing and Communications). Regular supervision ensures a required level of academic achievement and rigour is maintained throughout the project.

 

  • Advanced Cyber Security
    In this module we journey into the development of secure distributed systems. Distributed Systems form the foundation upon which modern community platforms such as Distributed Cloud Infrastructures, and service oriented architectures are based (also known as “as a service” operations). We investigate advanced cryptography techniques used to build such systems, and security infrastructures built into the distributed systems themselves. We study the alternative design approaches to the construction of secure distributed systems and their subsequent security evaluation. More specifically, we investigate the common vulnerabilities and attack surfaces associated with distributed systems, and the widely adopted design patterns used to mitigate them.

 

 

  • Secure Cyber Physical Systems
    This module discusses the security threats to cyber physical systems (CPS) – such as Industrial Control Systems, IoT, Smart Cities, and Connected Vehicles, and techniques to mitigate these threats. Compared to traditional computer systems CPSs have different characteristics (limited CPU, RAM, ROM, and energy) and are typically deployed in situ into the environment This impacts upon the security techniques that can be used and how they are used. The deployment environment necessitates that physical attacks on a system need to be considered in addition to digital attacks. This module introduces how to identify appropriate security techniques and protocols to use depending on the specifics of a CPS. This involves understanding how to write secure applications for CPSs, and alternative technologies to generic approaches such as Transport Layer Secuity (TLS). The module will also explain how the limitations of these systems impact the security guarantees that can be provided. In addition to security, this module will examine the safety and privacy threats CPSs will be subject to and explore the interconnectivity between them and security.

 

 

  • Secure Artificial Intelligence
    The rapid increase in consumption and innovation within Artificial Intelligence (AI) and Machine Learning (ML) has significant repercussions for cyber security. This encompasses both how AI and ML can be leveraged to augment and improve established cyber security techniques (from firewalls, risk analysis, and attack detection), as well as the emerging threat of attacks against AI itself (data poisoning, extraction, membership inference). In this module you will learn key concepts of secure AI, how it is being used to revolutionise the established cyber security field, as well as the emergent threats of adversarial attacks against ML models and data.

 

  • Cyber Security Analytics
    In this module we review the different data types, data storage and access techniques, and problems with handling massive amounts of data that is typically associated with the monitoring and auditing of cyber security systems. Through a combination of lectures and small group practical sessions, we learn how to use and develop tools to address the complexities of real time analytics that are necessary to inform critical decisions in systems administration. We learn and practice exploratory data analysis, data collection and data mining techniques to capture data with security significance, and discover how to produce graphical representations of security data, including dynamic, multivariate, and geospatial data. We also study the fundamental and advanced techniques of security data visualization to enable the extraction and effective communication of insights and incidents, and develop interactive dashboards to enhance monitoring and observability capabilities.

Optional modules (select 2 of 5):

  • Languages and Compilation
  • Computer Vision
  • Deep Learning
  • Distributed Systems
  • Quality of Scalable Software

Teaching and Assessment

Teaching is delivered via a combination of small group lectures and group-based tutorials. Assessment is via individual or group coursework, research projects and examinations. You will be expected to undertake independent study throughout to supplement what is being taught/learned and to broaden your personal knowledge.

Language of Instruction

German language skills are not required for admission into the programme. You will learn in English, and converse with classmates and academics in English.

Degree Award

All BSc (Hons) Cyber Security students will receive their undergraduate degree from Lancaster University’s Bailrigg campus in the UK.

Fees and Funding

  • Fees: 

Our tuition fee is set for a 12-month time frame encompassing one academic year.

There are two types of fees at Lancaster University Leipzig:

  1.  EU/UK fee status: applicable to citizens of EU/UK and EEA member countries
  2.  International fee status: applicable to citizens of the rest of the world

The tuition fee that you will pay depends on your citizenship or your immigration status. International citizens with legal residence in the EU/UK or a EEA member country will be assessed for EU/UK fee status on a case by case basis. The admissions department will provide you with more guidance regarding the fee status review during the application assessment stage. 

  • Funding: 

Eligible students may benefit from various funding options available at Lancaster University Leipzig. Explore what options you may be qualified for.

Careers

Our graduates of our Cyber Security programmes are well-suited to a wide range of computing roles that require advanced-level knowledge. You will graduate having a firm understanding of the theoretical aspects of cyber security, alongside experience in applying your knowledge to a variety of security scenarios, which is essential for many of the more technical roles within the fields of cyber security and computer science.

Particular graduate destinations may include cyber security architect or analyst, roles within penetration testing and digital forensics, security operations centre analyst, and secure software or hardware development. Many of our students also elect to continue in higher education by studying for MSc or PhD qualifications.

For information on Careers Centre at LU Leipzig go to Careers Centre – Lancaster University Leipzig.

Why study Cyber Security at Lancaster?

Professor Neeraj Suri, Distinguished Professor and Chair of Cyber Security explains unique characteristics of Cyber Security at Lancaster University Leipzig.

Professor Neeraj Suri on his research into Cyber Security

Back to Top