This course is being put forward for accreditation by the British Computer Society. Renewal of accreditation for this course is considered by the BCS for each graduating cohort and is applied retrospectively.
The School of Computing, Mathematics and Digital Technology is an academic partner of the Institute of Information Security.
The full-time four year sandwich route provides the opportunity to spend your third year on placement in industry. The School offers help with finding suitable placements and experience has shown that taking a placement year can lead to improved performance in the final year of your degree as well as improved employment prospects after graduation.
Typical units of study may include:
The aim of this unit is to introduce students to the fundamental concepts of digital forensics and computer security, including:
This unit provides an introduction to the fundamental principles and mathematics underpinning the design and construction of computer systems, including:
An introduction to the use of information systems in organisations which will show you how to develop key systems analysis techniques to be applied to information systems built on a commercial Relational Database Management System (RDBMS). You will also develop essential communication and teamworking skills. Topics include:
This unit introduces computer programming in a high level programming language and includes principles and practice in problem solving, program design, solution implementation and testing, including:
Typical units of study may include:
This unit covers concepts relating to object-oriented program design, the use of framework libraries, web server and mobile application development.
The unit covers object-oriented concepts: introduction to objectoriented concepts including class, object, instantiation, attributes, constructor, methods, overloading, inheritance, overriding, polymorphism and design techniques using Unified Modeling Language (UML). Testing of object-oriented programs. Advanced topics: interfaces, inner classes, collections, exception handling, stream based file input/output, building a Graphical User Interface (GUI) using libraries, event handling, graphics and threads. Implementation: practical application and implementation of concepts studied above. Use of Integrated Development Environment (IDE). Implementation of a UML diagram. Documentation and coding standards. Case studies.
The unit provides an introduction to the operation of computer networks operating systems theory and practice.
Concurrency: the solutions to and the problems of concurrency, race conditions, livelock deadlock starvation and priority inversion. The use of semaphores and/or monitors in solving classical problems such as: i) the bounded buffer and ii) multiple readers and writers. Computer Networks: network components repeaters, hubs, switches, routers, gateways; protocol stacks OSI TCP/IP, basic network performance characteristics. Process management: processes and threads, performance benefits of multiprogramming, scheduling algorithms, two-level schedulers. Input/Output: principles of I/O hardware; devices and controllers; principles of I/O software device drivers, device interrupt, handlers device, independent software. Memory Management: evolution of physical and virtual memory management, algorithms and computer architecture for memory management. File systems: structure and organisation of the file system; disk space storage allocation using contiguous linked indexed and inode based schemes.
The unit provides content to enable an understanding of the theory and practice of computer forensics. It covers: Forensic process: types of investigations, role of investigator, processes, toolkits, legal aspects. Forensic response: collecting volatile data, MAC times, login data, open ports, running processor, current/ recent connections, reviewing event logs and registry data, obtaining system passwords, dumping system RAM, forensic duplication. File system analysis: data acquisition, volume analysis, journaling, write blockers, signatures, locating and restoring deleted content. Memory: capturing memory, memory contents identification, flash memory devices, data persistence. Information hiding & malware analysis: scanning/evaluating data streams, steganography, slack space, host protected area, static and dynamic analysis, post-mortem analysis, program confinement, rootkits.
The unit covers the related areas of professional and legal issues and professional and career development and includes a pathway-specific group project.
The current legal framework of computing e.g. data protection legislation, intellectual property rights, e-waste recycling law, computer misuse, freedom of information, computer contracts and employment contracts. Overview and comparison of workable ethical theories e.g. utilitarianism and duty based approaches. Professional bodies in computing role, structures, codes of conduct and practice. Employment application process and continuing professional development. Themed case study mini-project linked to subject pathway which may include the following elements: project planning and control concepts, planning techniques (e.g. Gantt/PERT charts) and monitoring, individual reflective diary/log book, academic research, software prototype and project report.
If you opt for the four year sandwich route your third year will be spent on placement.
Typical units of study may include:
Option units (indicative and may be subject to change year on year):
This unit will cover a diverse set of topics related to information and network security with emphasis on cryptographic methods and security protocols. It includes an overview of security, cryptography and encryption algorithms e.g. DES, RSA, AES. Access control and multilevel security, internet security protocols and firewalls.
The unit builds on forensic evidence and analysis and provides content on network forensics, internet forensics and latest developments in the area. Network traffic monitoring and analysis: sniffers, events, trap and trace, full content, session data, reassembling sessions, filters, router investigation, routing tables, access control lists, monitoring and network intrusion detection. Internet Forensics: internet threats, addresses and domain names, email structure and routing, URL obfuscation, HTTP transactions, log analysis, browser history, cookie storage, temporary files. Recent Developments: latest developments in the field; topics such as anti-forensics and anti-forensic countermeasures.
Provides experience in the critical review of literature and the design, implementation, evaluation and writing up. Working with your supervisor, students develop their project description and specify aims, objectives, methodology and timetable for completion. Final year projects are normally pathway-specific. For group projects, individual and collective aims, objectives and plans are specified.
Students will build secure, robust, maintainable enterprise level applications using a variety of current distributed programming techniques. Includes use of common enterprise design patterns and implementation in a suitable language, professional programming techniques, distributed programming creation and analysis of distributed applications in a high level language, web service architectures e.g. web services, WSDL, SOAP, XML/ JSON processing, current techniques in enterprise application development e.g. Hadoop, cloud computing, reference architectures, models and frameworks and enterprise frameworks e.g. Hibernate, Struts.
This unit provides a thorough grounding in smartphone application development, location aware applications and mobile device technologies. Includes smartphone development, creation of mobile applications using a current mobile device development environment e.g. iPhone, iPad, Android, wireless technologies and security, technologies available, characteristics and security models e.g. RFID, WiFi, Bluetooth. Location-aware mobile applications, access and analysis of location on mobile devices and creation of intelligent applications. Current practice in mobile application development. New and emerging mobile application techniques and devices e.g. context aware computing. Wireless sensors and sensor networks. Smart Environments.
Students will be introduced to the fundamental concepts in evolutionary algorithms and agentbased simulation, and develop their proficiency in the development, application and analysis of these methodologies. The unit includes evolution and natural selection, fitness landscapes and search, optimisation and approximation, encodings and fitness functions, evolutionary search and optimisation, and applications. Software agent concepts, intelligent agent design and implementation of multi-agent systems.
Each programme of study that we offer undergoes an annual review to ensure an up-to-date curriculum supported by the latest online learning technology. In addition, we undertake a major review of the programme, normally at 6-yearly intervals, but this can take place at a more frequent interval where required. Applicants should note that the programme currently provided may be subject to change as a result of the review process. We only make changes where we consider it necessary to do so or where we feel that certain changes are in the best interests of students and to enhance the quality of provision. Occasionally, we have to make changes for reasons outside our control. Where there are changes which may materially affect the current programme content and/or structure, offer holders will be informed.
All students will study the same core units at Level 4 and Level 5. Subject to satisfactory progress, and the availability of placement, students may then transfer onto the BSc (Hons) Computer Forensics and Security (Sandwich). If you fail the Sandwich year you will revert to the BSc (Hons) Computer Forensics and Security.
You will be assessed by examinations and continuous assessment including laboratory reports, poster presentations, oral presentations and on-line assessments, together with a final year project.
10 credits equates to 100 hours of study, which is a combination of lectures, seminars and practical sessions, and independent study. A 3 year degree qualification typically comprises 360 credits (120 credits per year). The exact composition of your study time and assessments for the course will vary according to your option choices and style of learning, but it could be:
Students are expected to behave in a professional and business like manner when on placement or conducting projects with external partners.
Your studies are supported by a team of committed and enthusiastic teachers and researchers, experts in their chosen field. We also work with external professionals, many of whom are Manchester Met alumni, to enhance your learning and appreciation of the wider subject. Details of departmental staff can be found at: http://www.scmdt.mmu.ac.uk/our-staff/
A degree in computing will prepare you for a wide range of careers in a fast-growing industry.
Jobs in computing include systems manager, web designer and programmer, as well as roles managing technology to support a range of public and private sector organisations.
In addition, the skills you learn on this degree are highly valued by a range of employers and opportunities may exist in areas such as accountancy, management, technical sales and teaching.
Manchester is a major hub for the digital media industry.
The close proximity of MediaCity and local initiatives such as the 100bps Oxford Road "Corridor" broadband project, are attracting key players in the digital media sector along with smaller web design and new media agencies to the city.
In 2014, over 94% of our graduates went directly into work or further study within 6 months of graduation
DHLE survey 2014, for all respondents available for employment or further study and whose destinations are known
Remember to use the correct institution code for Manchester Metropolitan University on your application: our institution code is M40
The Higher Education Funding Council for England is the principal regulator for the University.
This online prospectus provides an overview of our programmes of study and the University. We regularly update our online prospectus so that our published course information is accurate and up to date. Please note that our programmes are subject to review and development on an ongoing basis. Changes may sometimes be necessary. For example, to comply with the requirements of professional or accrediting bodies or as a result of student feedback or external examiners’ reports. We also need to ensure that our courses are dynamic and current and that the content and structure maintain academic standards and enhance the quality of the student experience.
Please check back to the online prospectus before making an application to us.
The provision of education by the University is subject to terms and conditions of enrollment and contract. The current Terms and Conditions Applicable to the provision of the University’s Educational Services are available online. When a student enrolls with us, their study and registration at the University will be governed by various regulations, policies and procedures. It is important that applicants/students familiarize themselves with our Terms and Conditions and the Key Contract Documents referred to within. Applicants will be provided with access to an up to date version at offer stage. This can be found within the Information for Offer Holders document.