BSc (Hons) — 2027 entry Computer Science and Cyber Security
This program provides you with a comprehensive understanding of computer science principles, with a specialism in cyber security to prepare you for exciting careers in software, healthcare, finance, government and defence, telecoms, AI, energy infrastructure, cloud services, consulting and many more.
In a rapidly expanding digital age, safeguarding our data is of vital importance. Our focus in this programme is to develop strong computer science skills, learn how to safeguard our data and how to respond to cyber threats. In a constantly evolving threat landscape, we believe it is vital for our students to be forward-looking, innovative and to have the opportunity to personalise their studies to reflect their interests.
Beyond the classroom, you will gain from our strong partnerships with industry, both locally and internationally, ensuring you graduate with the skills to thrive in one of the world’s most critical fields.
The Surrey Centre for Cyber Security is a designated Academic Centre of Excellence in Cyber Security Research. The University, meanwhile, has been recognised as a gold-standard Academic Centre of Excellence in Cyber Security Education. Both accreditations were awarded by the National Cyber Security Centre (NCSC), which is a part of the Government Communications Headquarters.
This means your teaching will be informed by world-class research conducted by nationally and globally rated experts in the subject. You’ll also benefit from our strong links with local and international industry.
We’re preparing you for the future by integrating AI into every course, building digital skills, confidence and creativity that employers value in tomorrow’s workplace.
Of our computer science and electronic engineering graduates are in employment or further study within 15 months of graduating (Graduate Outcomes 2025, HESA)
Top 7 in the UK
We're ranked top 7 in the UK and world top 75 for computer science and engineering (ShanghaiRanking Global Ranking of Academic Subjects, 2025)
15th in the UK
For overall student satisfaction* (2025 National Student Survey)
*Measured by % positivity based on Q1-24 for all institutions listed in the Guardian University Guide league tables.
Our degree will equip you with the skills to develop your understanding of the concepts and principles behind modern computing systems. You will gain the right balance of knowledge and skills to design, implement, troubleshoot and secure software systems to a professional standard. You will also acquire skills to assess risk in systems and understand how businesses design, develop and deploy systems in the context of being able to analyse the business impact of security breaches.
You’ll explore a wide range of topics, including:
Cyber Security
Software Engineering
Internet scale systems
Privacy Enhancing Technologies
Ethical Hacking
Distributed Systems
Artificial Intelligence threats for Cyber Security
In your first year, shared with the BSc Computer Science programme, you’ll build a strong foundation in object-oriented programming and database systems. This knowledge is brought to life in structured, hands-on lab sessions, where you’ll gain real-world experience using industry-standard tools and practices, preparing you to thrive in both academic and professional environments.
Building on the solid mathematical foundations of Year 1, covering topics such as algebra, calculus, logic, and probability, you’ll advance in Year 2 into the practical world of algorithms, parallelisation, and artificial intelligence, tackling challenges of increasing complexity. You’ll also explore programming paradigms beyond object-oriented approaches, sharpening your ability to design and manage large-scale systems. In our OpenNebula cluster of 15 servers with 520 cores and 1.6 TB RAM, you’ll gain on-premise cloud experimentation capabilities, while our self-hosted GitLab instance helps you master collaborative workflows.
In Year 2, you’ll start to specialise in cyber security, preparing you for a placement year. Modules in Year 2 equip students with a mix of technical and transferable skills that mirror industry demands. You’ll acquire a deep understanding of cyber security theory, including cryptographic principles and network security protocols through modules such as Computer Security and Computer Networks Security. You will apply these concepts in real‑world scenarios through hands‑on lab work and vulnerability‑exploitation exercises. The curriculum also covers secure software development practices, enabling learners to design and build resilient web applications that adhere to industry best practices through a yearlong software design module called Collaborative Project Using Secure Web Applications.
In Year 3, you’ll deepen your cyber security expertise through advanced optional modules in network security, ethical hacking, digital forensics, formal verification, and privacy-enhancing technologies. These modules build practical skills in cyber defence, vulnerability testing, forensic analysis, and secure system design. A capstone project lets you apply these techniques to real-world challenges while developing technical and professional skills. You’ll also take a compulsory module on Information Security Management, which reinforces that security is not just technical but organisational - requiring cultural awareness and integration across people, processes, and policies. Our curriculum is aligned with the Cyber Security Body of Knowledge (CyBOK), a comprehensive framework that defines the core concepts and skills in cyber security. This alignment ensures your learning is continuously updated to reflect emerging trends and industry best practices.
Flexible First Year
Our Year 1 programme is common across the BSc in Computer Science, the BSc in Computer Science and Cyber Security and the BSc in Computer Science and Artificial Intelligence, so transfer between these programmes is readily possible at the start of Year 2.
Placement Year After Year 2, you’ll have the option to take a professional placement year, gaining invaluable real-world experience in the cyber security industry. This hands-on exposure ensures you graduate with both academic excellence and practical insight into one of the world’s most critical industries.
Accreditation by National Cyber Security Centre (NCSC) Our course is undergoing a Full Certification from NCSC. Taught by experts, the programme will equip you with the theoretical grounding and hands-on experience demanded by the cyber security sector.
The structure of our programmes follow clear educational aims that are tailored to each programme. These are all outlined in the programme specifications which include further details such as the learning outcomes.
Please note: Thefull module listing for the optional Professional Training placement part of your course is available in the relevant programme specification.
Modules
Modules listed are indicative, reflecting the information available at the time of publication. Modules are subject to teaching availability, student demand and/or class size caps.
The University operates a credit framework for all taught programmes based on a 15-credit tariff.
New for 2026 entry: At Surrey, we want you to be a future-ready graduate. That’s why all our courses will offer at least one module that integrates and teaches AI tools in discipline-specific ways. You’ll develop the digital skills that employers are looking for and get comfortable with the tech of the future.
To introduce the fundamental principles of digital logic, circuits and systems starting with symbolic logic through to the concept of logic gates to the structure and operation of digital logic circuits and systems. This module provides an understanding of the underlying computer architecture and internal operation of computer systems.
This module aims to introduce students to some of the key concepts of set theory, relations, functions, automata, logic, graphs, trees, proof methods, probability and statistics in order to highlight the importance and power of abstraction within computer science. These concepts are useful throughout the programme.
This module introduces students to the fundamental concepts of data storage with a focus on relational database systems. Students will learn database design and development to solve real-world problems. The module uses a problem-based approach to provide students with the necessary support to develop their analytical and problem-solving skills.
Appropriate choices of data structures can expedite algorithm efficiency and also aid clear thinking when designing algorithms. It is thus natural for data structures to be studied with algorithms. An algorithm is a sequence of steps for performing some process. A computer program is not an algorithm but a representation of an algorithm. There is a need to be able to create effective algorithms, quantify their efficiency and classify them independently of any computing system or language.
The module covers the main concepts of modern operating systems (OS), including process, memory, file, and input/output management, as well as fundamental security principles that ensure the protection and reliability of system resources.The first part of the course provides a short history of operating systems and their purposes. It also introduces the student to multiprocessing and multithreading, i.e. how an OS manages multiple tasks that execute at the same time (concurrently) and share resources.The second part of the course addresses the problem of memory management.The final part of the course introduces file systems, input/output handling, and core OS security principles, including the models and design approaches used to safeguard data and processes in modern systems.Throughout the module, case studies of various operating systems are presented with high-level concepts that students explore as exercises or deploy during labs. All taught material is compatible with existing operating systems and is suitable to run on a platform such as Linux.
This module will introduce software engineering principles with a technical focus on Object-Oriented Programming (OOP). Students will explore software development through the lens of the systems development lifecycle. In doing so, experience will be gained in requirements engineering, software design, implementation, testing and how to tackle real-world collaboration. Throughout, software engineering methods will be put into practice, and Java programming skills will be taught. Starting with understanding the basic data types and programming structures, students will progress to more advanced datatypes, programming structuring techniques and key principles of object-oriented programming. The module culminates with a capstone project utilising the software engineering and programming skills taught in the first year.
Computers have become commonplace in many areas of our lives and are able to accomplish many things that humans would find difficult, if not impossible, to do by their own unaided efforts. Whilst computers can perform many calculations in a very short time they generally do not possess the ability to learn or to reason about novel situations or to process incomplete or uncertain data. They will need knowledge of the environment in which they operate so that they can understand what their sensors are monitoring and so that they can behave rationally. This module demonstrates the basic principles and methods of Artificial Intelligence (AI) and provides the basis for understanding and later choosing the correct tools for building such systems. Applications that motivate the development of Artificial Intelligence technology include intelligent robots, automated navigation for autonomous vehicles, object recognition and tracking, medical diagnosis, language communications and many others. Any application that requires human-like intelligence is an application for Artificial Intelligence.
The digital world critically relies on cyber security to prevent harm and misuse. This module provides a foundational introduction to computer security, focusing on how to protect information, systems and networks from attackers. Students explore foundational cryptography and security protocols, covering core principles such as confidentiality, integrity and availability across various domains. Students will also study business orientated security practice through threat modelling concepts to reason systematically about security risks in simple systems.
This module will introduce fundamental concepts of Theory of Programming Languages using two programming paradigms: Object-Oriented Paradigm and the Functional Paradigm. The module will provide a foundation for the theoretical and practical aspects of building programs using these paradigms. Object Orientated Paradigm is first introduced as a popular methodology for large application development. The module will then cover an alternative programming paradigm, Functional Programming, with a focus on both their theoretical underpinnings and computation models. The module will cover practical aspects of implementing algorithms and larger applications in these paradigms.
The module introduces algorithmic techniques for various sets of problems and teaches how to analyse algorithms in terms of their complexity. The techniques build upon the data structures and algorithms module provided in level 4 (COM1029) so that students can further develop their use of methods for solving complex problems. Examples will be used throughout to demonstrate the relevance of each approach.
This course introduces the core concepts of parallel computing by examining the algorithms and architectures that support it. Students will implement parallel solutions during our labs and evaluate their performance, gaining hands-on experience and insight into the challenges and potential tradeoffs involved. The course places particular emphasis on making algorithmic decisions that are informed by hardware characteristics, providing a strong foundation for designing high¿performance computing systems.
Computer networks are an essential part of almost all corporate computing facilities and even most domestic ones. Interoperability is the key ¿ all components must conform to the same hardware and packet specifications in order that they can be interconnected successfully. This module introduces essential concepts about all the computer networking layering levels with some emphasis on the routing algorithms and implementation of network sensing. This module also provides a introduction to network security.
Software engineering projects are run in teams that must fulfil a variety of roles including project management, background research, design, implementation, quality control and training, whilst also providing sufficient evidence of robust processes to demonstrate compliance with the relevant government and industry standards. This module introduces students to best practices in software engineering, development and security, as well as technologies for building modern web applications. Students will gain first-hand experience of teamwork through the application of software development and engineering practices by collaboratively designing and delivering a software system using web technologies.In Semester 1, students will develop interactive web applications and learn about the best practices in their design and development. This provides students with an understanding of the core concepts underpinning web applications and their secure design and provides students with the necessary skills to improve their broader development and problem-solving skills. A practical project-based lab work assessment allows students to demonstrate their proficiency in using and applying frameworks to client- and server-side development as well as use of hosted version control platforms.In Semester 2, teams take ownership of a pre-defined high-level specification and must refine it into a software system which they then implement and test, whilst demonstrating adherence to best software engineering practices. Through this group project, students gain an understanding of how to successfully design a secure software system that meets the specification, independently research and choose technologies, and implement and evaluate their system before delivering it to clients. Throughout the project, the team is expected to plan and document their activities, hold regular project meetings, and will be evaluated on how they approach the different tasks and adhere to industry standards.
Security is probably the greatest challenge for computer and information system in the near future. Many users have lost data due to viruses, both on home and business computers. Most of us have seen a range of emails massages attempting different kinds of fraud. Vulnerabilities are everywhere. Some are obvious or well-known; others are obscure and harder to spot. Security is not limited to secrecy and confidentiality, but also involves problems like integrity, availability, and effectiveness of information. Moreover, security issues can potentially affect all of us, from innocent home users to companies and even governments.Security is not just a technical problem but needs to be embedded throughout an organisation to be effective. As such good security solutions build on a complete understanding of the values at stake, and the supporting business processes and requirements. This includes people as well as information systems and physical resources. Consequently, raising security awareness and embedding security within roles and policies is as important, if not more, as secure software. In short, secure solutions can only be implemented with both good technical skills and a good understanding of cultures and people skills.
This module introduces general concepts of privacy enhancing technologies and aligns with key concepts recommended by the CyBoK. It will motivate the need for privacy in the modern world and touch on legal considerations, introduce concepts of transparency, control and confidentiality for privacy, and look at privacy preserving and democratic values. This module will also explore how these are realised in a range of applications.
A distributed system is built of a network of computing devices, which coordinate their actions via message passing to achieve a common goal. Typically, system components are assumed to operate concurrently, lack a global clock and to fail independently. This module shall build and consolidate your knowledge of advanced algorithms, computer networking and/or parallel computing. You shall learn to describe the principles of distributed systems, such as communication, scheduling and fault tolerance as well as to compare and contrast between a broad set of instances of distributed systems, algorithms and protocols (e.g., peer-to-peer systems, distributed hash tables, MixNets, distributed ledger technologies) within the context of various applications.
The module teaches digital forensics models and techniques used by analysts and law enforcement officers in practice. It also teaches the theory and application of real-world digital forensics tools and puts an emphasis on data recovery and the analysis of multimedia artifacts. Relationships and links between multimedia security, digital forensics and broader cyber security topics are also covered.
This module introduces students to the techniques and tools to discover known vulnerabilities in systems and applications, and use appropriate techniques to carry out attacks. A practical project-based assessment allows students to demonstrate their ability to successfully exploit vulnerable systems to exfiltrate data and circumvent access controls. The module will introduce students to the legal and ethical considerations of ethical hacking, as well as the processes by which vulnerabilities are reported, classified, documented, and mitigated by security practitioners.
The course is an introduction in formal methods for system specification and verification. It will focus on logic-based formalisms and techniques, and specifically on model checking. The main logics taught will be temporal logics, which are mainstream in verification, especially analysis of hardware systems. Other logics and verification techniques (such as theorem proving) will be included to a smaller extended. Model checkers will be used in the labs, on different system-verification problems. Elements of building model checking tools will be presented and explored. Some elements of advanced verification techniques (e.g., abstraction) will be mentioned.
In an era where data is a key driver of innovation and growth, practical expertise in data science is essential for solving complex business challenges. This module uses a case study-based approach to teach data science concepts and techniques, providing students with real-world contexts to develop their skills. Each case study focuses on a different industry or application, such as healthcare, finance, telecommunication, social media, and marketing, allowing students to explore the diverse ways data science creates value. Through hands-on experience with tools, methods, and datasets, students will gain practical insights into solving problems, generating predictions, and making data-driven decisions.
The module explores network security principles, challenges and goals. It focuses on main security mechanisms and protocols for protecting network communication across different layers of the Internet protocol stack, down to the physical layer. This module analyses various attacks on networks, distributed systems and cyber-physical systems through penetration testing tools and possible countermeasures to ensure protection of authentication, confidentiality and end-to-end security of communications. In labs students will be able to practice experience with various network security protocols and tools.
The project consists of a substantial written report and accompanying video presentation and software submission, completed by the student towards the end of their programme of studies. These are based on a major piece of work with a significant computer security element that involves applying material encountered in the taught component of the degree, and extending that knowledge with the student's contribution, under the guidance of a supervisor. The project lasts over both semesters, and usually involves software development, experimental or theoretical research, or a substantial analysis on a specific topic. Students are also expected to consider the legal, social, ethical and professional aspects of the project.
Students must select one optional module in Semester 1 and one optional module in Semester 2
Year 1 - BSc (Hons) with placement
Semester 1
Compulsory
To introduce the fundamental principles of digital logic, circuits and systems starting with symbolic logic through to the concept of logic gates to the structure and operation of digital logic circuits and systems. This module provides an understanding of the underlying computer architecture and internal operation of computer systems.
This module aims to introduce students to some of the key concepts of set theory, relations, functions, automata, logic, graphs, trees, proof methods, probability and statistics in order to highlight the importance and power of abstraction within computer science. These concepts are useful throughout the programme.
This module introduces students to the fundamental concepts of data storage with a focus on relational database systems. Students will learn database design and development to solve real-world problems. The module uses a problem-based approach to provide students with the necessary support to develop their analytical and problem-solving skills.
Appropriate choices of data structures can expedite algorithm efficiency and also aid clear thinking when designing algorithms. It is thus natural for data structures to be studied with algorithms. An algorithm is a sequence of steps for performing some process. A computer program is not an algorithm but a representation of an algorithm. There is a need to be able to create effective algorithms, quantify their efficiency and classify them independently of any computing system or language.
The module covers the main concepts of modern operating systems (OS), including process, memory, file, and input/output management, as well as fundamental security principles that ensure the protection and reliability of system resources.The first part of the course provides a short history of operating systems and their purposes. It also introduces the student to multiprocessing and multithreading, i.e. how an OS manages multiple tasks that execute at the same time (concurrently) and share resources.The second part of the course addresses the problem of memory management.The final part of the course introduces file systems, input/output handling, and core OS security principles, including the models and design approaches used to safeguard data and processes in modern systems.Throughout the module, case studies of various operating systems are presented with high-level concepts that students explore as exercises or deploy during labs. All taught material is compatible with existing operating systems and is suitable to run on a platform such as Linux.
This module will introduce software engineering principles with a technical focus on Object-Oriented Programming (OOP). Students will explore software development through the lens of the systems development lifecycle. In doing so, experience will be gained in requirements engineering, software design, implementation, testing and how to tackle real-world collaboration. Throughout, software engineering methods will be put into practice, and Java programming skills will be taught. Starting with understanding the basic data types and programming structures, students will progress to more advanced datatypes, programming structuring techniques and key principles of object-oriented programming. The module culminates with a capstone project utilising the software engineering and programming skills taught in the first year.
Computers have become commonplace in many areas of our lives and are able to accomplish many things that humans would find difficult, if not impossible, to do by their own unaided efforts. Whilst computers can perform many calculations in a very short time they generally do not possess the ability to learn or to reason about novel situations or to process incomplete or uncertain data. They will need knowledge of the environment in which they operate so that they can understand what their sensors are monitoring and so that they can behave rationally. This module demonstrates the basic principles and methods of Artificial Intelligence (AI) and provides the basis for understanding and later choosing the correct tools for building such systems. Applications that motivate the development of Artificial Intelligence technology include intelligent robots, automated navigation for autonomous vehicles, object recognition and tracking, medical diagnosis, language communications and many others. Any application that requires human-like intelligence is an application for Artificial Intelligence.
The digital world critically relies on cyber security to prevent harm and misuse. This module provides a foundational introduction to computer security, focusing on how to protect information, systems and networks from attackers. Students explore foundational cryptography and security protocols, covering core principles such as confidentiality, integrity and availability across various domains. Students will also study business orientated security practice through threat modelling concepts to reason systematically about security risks in simple systems.
This module will introduce fundamental concepts of Theory of Programming Languages using two programming paradigms: Object-Oriented Paradigm and the Functional Paradigm. The module will provide a foundation for the theoretical and practical aspects of building programs using these paradigms. Object Orientated Paradigm is first introduced as a popular methodology for large application development. The module will then cover an alternative programming paradigm, Functional Programming, with a focus on both their theoretical underpinnings and computation models. The module will cover practical aspects of implementing algorithms and larger applications in these paradigms.
The module introduces algorithmic techniques for various sets of problems and teaches how to analyse algorithms in terms of their complexity. The techniques build upon the data structures and algorithms module provided in level 4 (COM1029) so that students can further develop their use of methods for solving complex problems. Examples will be used throughout to demonstrate the relevance of each approach.
This course introduces the core concepts of parallel computing by examining the algorithms and architectures that support it. Students will implement parallel solutions during our labs and evaluate their performance, gaining hands-on experience and insight into the challenges and potential tradeoffs involved. The course places particular emphasis on making algorithmic decisions that are informed by hardware characteristics, providing a strong foundation for designing high¿performance computing systems.
Computer networks are an essential part of almost all corporate computing facilities and even most domestic ones. Interoperability is the key ¿ all components must conform to the same hardware and packet specifications in order that they can be interconnected successfully. This module introduces essential concepts about all the computer networking layering levels with some emphasis on the routing algorithms and implementation of network sensing. This module also provides a introduction to network security.
Software engineering projects are run in teams that must fulfil a variety of roles including project management, background research, design, implementation, quality control and training, whilst also providing sufficient evidence of robust processes to demonstrate compliance with the relevant government and industry standards. This module introduces students to best practices in software engineering, development and security, as well as technologies for building modern web applications. Students will gain first-hand experience of teamwork through the application of software development and engineering practices by collaboratively designing and delivering a software system using web technologies.In Semester 1, students will develop interactive web applications and learn about the best practices in their design and development. This provides students with an understanding of the core concepts underpinning web applications and their secure design and provides students with the necessary skills to improve their broader development and problem-solving skills. A practical project-based lab work assessment allows students to demonstrate their proficiency in using and applying frameworks to client- and server-side development as well as use of hosted version control platforms.In Semester 2, teams take ownership of a pre-defined high-level specification and must refine it into a software system which they then implement and test, whilst demonstrating adherence to best software engineering practices. Through this group project, students gain an understanding of how to successfully design a secure software system that meets the specification, independently research and choose technologies, and implement and evaluate their system before delivering it to clients. Throughout the project, the team is expected to plan and document their activities, hold regular project meetings, and will be evaluated on how they approach the different tasks and adhere to industry standards.
Security is probably the greatest challenge for computer and information system in the near future. Many users have lost data due to viruses, both on home and business computers. Most of us have seen a range of emails massages attempting different kinds of fraud. Vulnerabilities are everywhere. Some are obvious or well-known; others are obscure and harder to spot. Security is not limited to secrecy and confidentiality, but also involves problems like integrity, availability, and effectiveness of information. Moreover, security issues can potentially affect all of us, from innocent home users to companies and even governments.Security is not just a technical problem but needs to be embedded throughout an organisation to be effective. As such good security solutions build on a complete understanding of the values at stake, and the supporting business processes and requirements. This includes people as well as information systems and physical resources. Consequently, raising security awareness and embedding security within roles and policies is as important, if not more, as secure software. In short, secure solutions can only be implemented with both good technical skills and a good understanding of cultures and people skills.
This module introduces general concepts of privacy enhancing technologies and aligns with key concepts recommended by the CyBoK. It will motivate the need for privacy in the modern world and touch on legal considerations, introduce concepts of transparency, control and confidentiality for privacy, and look at privacy preserving and democratic values. This module will also explore how these are realised in a range of applications.
A distributed system is built of a network of computing devices, which coordinate their actions via message passing to achieve a common goal. Typically, system components are assumed to operate concurrently, lack a global clock and to fail independently. This module shall build and consolidate your knowledge of advanced algorithms, computer networking and/or parallel computing. You shall learn to describe the principles of distributed systems, such as communication, scheduling and fault tolerance as well as to compare and contrast between a broad set of instances of distributed systems, algorithms and protocols (e.g., peer-to-peer systems, distributed hash tables, MixNets, distributed ledger technologies) within the context of various applications.
The module teaches digital forensics models and techniques used by analysts and law enforcement officers in practice. It also teaches the theory and application of real-world digital forensics tools and puts an emphasis on data recovery and the analysis of multimedia artifacts. Relationships and links between multimedia security, digital forensics and broader cyber security topics are also covered.
This module introduces students to the techniques and tools to discover known vulnerabilities in systems and applications, and use appropriate techniques to carry out attacks. A practical project-based assessment allows students to demonstrate their ability to successfully exploit vulnerable systems to exfiltrate data and circumvent access controls. The module will introduce students to the legal and ethical considerations of ethical hacking, as well as the processes by which vulnerabilities are reported, classified, documented, and mitigated by security practitioners.
The course is an introduction in formal methods for system specification and verification. It will focus on logic-based formalisms and techniques, and specifically on model checking. The main logics taught will be temporal logics, which are mainstream in verification, especially analysis of hardware systems. Other logics and verification techniques (such as theorem proving) will be included to a smaller extended. Model checkers will be used in the labs, on different system-verification problems. Elements of building model checking tools will be presented and explored. Some elements of advanced verification techniques (e.g., abstraction) will be mentioned.
In an era where data is a key driver of innovation and growth, practical expertise in data science is essential for solving complex business challenges. This module uses a case study-based approach to teach data science concepts and techniques, providing students with real-world contexts to develop their skills. Each case study focuses on a different industry or application, such as healthcare, finance, telecommunication, social media, and marketing, allowing students to explore the diverse ways data science creates value. Through hands-on experience with tools, methods, and datasets, students will gain practical insights into solving problems, generating predictions, and making data-driven decisions.
The module explores network security principles, challenges and goals. It focuses on main security mechanisms and protocols for protecting network communication across different layers of the Internet protocol stack, down to the physical layer. This module analyses various attacks on networks, distributed systems and cyber-physical systems through penetration testing tools and possible countermeasures to ensure protection of authentication, confidentiality and end-to-end security of communications. In labs students will be able to practice experience with various network security protocols and tools.
The project consists of a substantial written report and accompanying video presentation and software submission, completed by the student towards the end of their programme of studies. These are based on a major piece of work with a significant computer security element that involves applying material encountered in the taught component of the degree, and extending that knowledge with the student's contribution, under the guidance of a supervisor. The project lasts over both semesters, and usually involves software development, experimental or theoretical research, or a substantial analysis on a specific topic. Students are also expected to consider the legal, social, ethical and professional aspects of the project.
Optional modules for Year 3 (with PTY) - FHEQ Level 6
Students must select one optional module in Semester 1 and one optional module in Semester 2
Professional Training Year (PTY)
Semester 1 & 2
Core
This module supports students’ development of personal and professional attitudes and abilities appropriate to a Professional Training placement. It supports and facilitates self-reflection and transfer of learning from their Professional Training placement experiences to their final year of study and their future employment. The PTY module is concerned with Personal and Professional Development towards holistic academic and non-academic learning, and is a process that involves self-reflection, documented via the creation of a personal record, planning and monitoring progress towards the achievement of personal objectives. Development and learning may occur before and during the placement, and this is reflected in the assessment model as a progressive process. However, the graded assessment takes place primarily towards the end of the placement. Additionally, the module aims to enable students to evidence and evaluate their placement experiences and transfer that learning to other situations through written and presentation skills.
This module supports students' development of personal and professional attitudes and abilities appropriate to a Professional Training placement. It supports and facilitates self-reflection and transfer of learning from their Professional Training placement experiences to their final year of study and their future employment. The PTY module is concerned with Personal and Professional Development towards holistic academic and non-academic learning, and is a process that involves self-reflection, documented via the creation of a personal record, planning and monitoring progress towards the achievement of personal objectives. Development and learning may occur before and during the placement, and this is reflected in the assessment model as a progressive process. However, the graded assessment takes place primarily towards the end of the placement. Additionally, the module aims to enable students to evidence and evaluate their placement experiences and transfer that learning to other situations through written skills.
You’ll benefit from an integrated range of learning methods including the use of interactive voting handsets.
In the early stages of your course, the methods of teaching and assessment aim to ensure you gain the relevant knowledge and skills.
The methods used in your final year broaden and deepen the knowledge you’ve already gained, and help you develop the specialist skills you’ll need as a professional.
Group work
Laboratory work
Lectures
Practical sessions
Tutorials
Assessment
We use a variety of methods to assess your skills and knowledge, including:
Coursework
Examinations
Presentations
Projects (individual and group)
Reports
Tests
General course information
Contact hours
Contact hours can vary across our modules. Full details of the contact hours for each module are available from the University of Surrey's module catalogue. See the modules section for more information.
Timetable
New students will receive their personalised timetable during Welcome Week. In later semesters, at least one week before the start of the semester.
Scheduled teaching can take place on any day of the week (Monday – Friday), with part-time classes normally scheduled on one or two days. Wednesday afternoons tend to be for sports and cultural activities.
This course is based at Stag Hill campus. Stag Hill is the University's main campus and where the majority of our courses are taught.
We offer careers information, advice and guidance to all students whilst studying with us, which is extended to our alumni for three years after leaving the University.
We offer careers information, advice and guidance to all students whilst studying with us, which is extended to our alumni for three years after leaving the University.
Cyber security skills are the foundation of careers in critical sectors such as technology, finance, health, and government. Our degrees prepare you to work at the forefront of protecting systems and data against evolving threats. We combine cutting-edge technical training, industry relevance, and professional development to produce graduates who can design secure systems, manage risk, and respond to real-world challenges, making you highly employable in this fast-growing field.
The University has strong, established links with many national and international businesses and institutions including Airbus, BAE Systems, CGI Group, DSTL, IBM, Infineon, Microsoft, Sophos and Sky TV. Our graduates are sought after and involved in many different fields, from software development and building simulation systems; to devising IT strategies and managing organisations.
Over the last decade, our employment figures have been among the best in the UK, with 95 per cent of our computer science and electronic engineering graduates going on to employment or further study within 15 months of graduating (Graduate Outcomes 2025, HESA).
Recent graduate roles
Recent graduates of our BSc Computer Science programme are employed as:
Analyst Programmer, Avco Systems Ltd
Computer Programmer, Stanhope-Seta
Forensic Data Analyst, PwC
Software Developer, ID Business Solution
Software Engineer, Xceptor
Technology Associate, Morgan Stanley
Technical Architecture Consultant, Accenture UK Ltd
Testing and Continuous Delivery Architecture, Vodafone.
Our key facilities include:
£1.7m multi-purpose Computer Science Laboratory with state-of-the-art audio-visual equipment. View a video tour
Six open access PC labs and four dedicated specialist labs
Specialist desktop solutions, including development software, research packages and dedicated printing.
Learn more about the qualifications we typically accept to study this course at Surrey.
Typical offer
ABB
Required subjects: Mathematics
Please note: A-level General Studies and A-level Critical Thinking are not accepted.
GCSE or equivalent: English Language at Grade 4 (C).
DDD. Additionally, A-level Mathematics at Grade B.
GCSE or equivalent: English Language at Grade 4 (C).
We can also consider a number of other BTEC qualifications or combinations of A-levels and BTEC qualifications. Please contact the Admissions team, specifying your programme of interest, along with details of your own particular combination of qualifications.
33
Required subjects: Mathematics Analysis and Approaches HL5/SL6 or Mathematics Applications and Interpretations HL5.
GCSE or equivalent: English A HL4/SL4 or English B HL5/SL6.
78%.
Required subjects: At least grade 7.5 in Mathematics (5 Period).
GCSE or equivalent: English Language (1/2) - 6 or English Language (3) - 7.
QQAA-recognised Access to Higher Education Diploma, with 45 Level 3 credits including 30 Level 3 Credits at Distinction and 15 Level 3 Credits at Merit. Additionally, A-level Mathematics at Grade B.
GCSE or equivalent: English Language at Grade 4 (C).
AABBB
Required subjects: Mathematics.
GCSE or equivalent: English Language Scottish National 5 - grade C .
ABB from a combination of the Advanced Skills Baccalaureate Wales and two A-levels
Required subjects: A-level Mathematics.
Please note: A-level General Studies and A-level Critical Thinking are not accepted.
GCSE or equivalent: Please check the A-level dropdown for the required GCSE levels.
If you do not currently meet the level required for your programme, we offer intensive pre-sessional English language courses, designed to take you to the level of English ability and skill required for your studies here.
International Foundation Year
If you are an international student and you don’t meet the entry requirements for this degree, we offer the International Foundation Year at the Surrey International Study Centre. Upon successful completion, you can progress to this degree course.
If you are a suitable candidate, you will be invited to an offer holder event. During your visit to the University you can find out more about the course and meet staff and students.
We recognise that many students enter their higher education course with valuable knowledge and skills developed through a range of professional, vocational and community contexts.
If this applies to you, the recognition of prior learning (RPL) process may allow you to join a course without the formal entry requirements or enter your course at a point appropriate to your previous learning and experience. There are restrictions on RPL for some courses and fees may be payable for certain claims.
Contextual offers
Did you know eligible students receive support through their application to Surrey, which could include a grade reduction on offer?
Explore UKCISA’s website for more information if you are unsure whether you are a UK or overseas student. View the list of fees for all undergraduate courses.
The annual tuition fees for courses starting in September 2027
* Professional training placement year fees are approximately 20% of the full-time UK fees of the academic year in which you undertake your placement.
We have thousands of placement providers to choose from, most of which offer pay. So, become one of our many students who have had their lives and career choices transformed.
Statistics
Placement Statistics
92%
of students who did a placement entered into graduate level employment*
80%
of placements are paid, with 60% paying between £18,000 - £30,000
48%
of our students have been offered a graduate role from their placement provider**
*Graduate Outcomes 2025, HESA
**Professional training year returners survey 2024
Computer science placements
Many computer science students continue working with their placement employers by basing their final-year project on work related to that company. This results in a project with a strong industrial focus that demonstrates their ability to apply academic knowledge to real-world problems.
Our students take up placements at a wide range of companies both in the UK and abroad. Recent examples include:
Accenture
Avco Systems Ltd
BAE Systems
Cisco Systems Ltd
IBM
Microsoft
Movilitas
Nintendo
Pfizer
Sky TV
Sony Europe Ltd
Xceptor
Yokogawa.
Applying for placements
Students are generally not placed by the University. But we offer support and guidance throughout the process, with access to a vacancy site of placement opportunities.
Studying at Surrey opens a world of opportunity. Take advantage of our study and work abroad partnerships, explore the world, and expand your skills for the graduate job market.
The opportunities abroad vary depending on the course, but options include study exchanges, work/research placements, summer programmes, and recent graduate internships. Financial support is available through various grants and bursaries, as well as Student Finance.
Perhaps you would like to volunteer in India or learn about Brazilian business and culture in São Paulo during your summer holidays? With 140+ opportunities in 36+ different countries worldwide, there is something for everyone. Explore your options via our search tool and find out more about our current partner universities and organisations.
Apply for your chosen course online through UCAS, with the following course and institution codes.
We provide these terms and conditions at offer stage and are shown again at registration. You will be asked to accept these terms and conditions when you accept the offer made to you.
Disclaimer
This online prospectus has been published in advance of the academic year to which it applies.
Whilst we have done everything possible to ensure this information is accurate, some changes may happen between publishing and the start of the course.
It is important to check this website for any updates before you apply for a course with us. Read our full disclaimer.
Computer Science and Cyber SecurityBSc (Hons) - 2027 entry