{"id":3019,"date":"2026-03-19T00:00:41","date_gmt":"2026-03-19T00:00:41","guid":{"rendered":"https:\/\/www.newman.ac.uk\/courses\/course\/bsc-single-honours-computer-science-with-cybersecurity-full-time\/"},"modified":"2026-03-19T00:00:41","modified_gmt":"2026-03-19T00:00:41","slug":"bsc-single-honours-computer-science-with-cybersecurity-full-time","status":"publish","type":"course","link":"https:\/\/newman.ac.uk\/courses\/course\/bsc-single-honours-computer-science-with-cybersecurity-full-time\/","title":{"rendered":"Computer Science with Cyber Security BSc (Hons)"},"content":{"rendered":"\t<div class=\"course-header-container has-blue-color has-sky-background-color alignfull mt-0 pt-0\">\n\t\t<div class=\"course-header-layout\">\n\t\t\t<div class=\"course-info-column\">\n\t\t\t\t<div id=\"apply-now\" class=\"course-info\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wp-block-newman-back-button mb-4 has-7-font-size\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/newman.ac.uk\/courses\/subject-area\/computer-science\/\" class=\"line has-text-weight-normal\">Back to subject area<\/a>\n\t\t\t\t\t\t\t<svg width=\"16\" height=\"16\" viewBox=\"0 0 24 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t<path d=\"M15 18L9 12L15 6\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t<h1 class=\"course-title has-3-font-size--mobile\">Computer Science with Cyber Security BSc (Hons)<\/h1>\n\n\t\t\t\t\t<p class=\"course-level\">Undergraduate<\/p>\n\n\t\t\t\t\t<div class=\"course-dynamic-content\">\n\t\t\t\t\t\t<div class=\"loader is-hidden\"><\/div>\n\t\t\t\t\t\t<dl class=\"course-details-list\">\n\t\t\t\t\t\t\t<div class=\"course-details-item\">\n\t\t\t\t\t\t\t\t<dt class=\"detail-label\">Start date<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"detail-value\" data-start-date=\"-\">&#8211;<\/dd>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"course-details-item\">\n\t\t\t\t\t\t\t\t<dt class=\"detail-label\">Study mode<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"detail-value\" data-study-mode=\"-\">&#8211;<\/dd>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"course-details-item\">\n\t\t\t\t\t\t\t\t<dt class=\"detail-label\">Course length<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"detail-value\" data-course-length=\"-\">&#8211;<\/dd>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"course-details-item\" id=\"ucas-code-field\">\n\t\t\t\t\t\t\t\t<dt class=\"detail-label\">UCAS Code<\/dt>\n\t\t\t\t\t\t\t\t<dd class=\"detail-value\" data-ucas-code=\"-\">&#8211;<\/dd>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/dl>\n\n\t\t\t\t\t\t<div class=\"course-actions\" id=\"course-actions\">\n\t\t\t\t\t\t\t<div class=\"wp-block-button is-style-outline\">\n\t\t\t\t\t\t\t\t<a href=\"#\" data-open-day-link=\"\" class=\"button button--outline button--quinary is-block\"><span>Book an open day<\/span><\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"course-image-column\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/uploads\/sites\/3\/2025\/08\/Computer-Science-4-1280x720.webp\" class=\"course-image wp-post-image\" alt=\"Computer Science student in class on laptop\" \/>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"course-header-modes has-blue-background-color pt-5 pb-5 is-hidden\">\n\t\t\t<div class=\"container is-flex pl-4 pr-4\">\n\t\t\t\t<div class=\"course-info-column ml-0\">\n\t\t\t\t\t<h2 class=\"has-6-font-size course-mode-title has-white-color is-marginless\">Interested in a different start date?<\/h2>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"course-header-modes-list\">\n\t\t\t\t\t<ul class=\"is-flex is-flex-wrap-wrap gap is-marginless is-paddingless\">\n\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<label aria-label=\"Set course mode to September 2026\" class=\"button button--outline button--secondary has-text-weight-normal\">\n\t\t\t\t\t\t\t\t<input type=\"radio\" value=\"4902\" name=\"course_mode\" class=\"is-sr-only\" checked \/>\n\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span class=\"is-block\">September 2026<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\n<div class=\"course-section-menu-mobile alignfull\">\n\t\t<header class=\"has-blue-background-color pl-4 pr-4 pt-4 pb-4\">\n\t\t\t<div class=\"container is-flex is-align-items-center is-justify-content-space-between\">\n\t\t\t\t<div class=\"is-flex gap-2 is-align-items-center\">\n\t\t\t\t\t<h2 class=\"has-white-color has-5-font-size has-secondary-font-family is-marginless\">Computer Science with Cyber Security BSc (Hons)<\/h2>\n\t\t\t\t\t<time class=\"has-white-color has-6-font-size has-secondary-font-family\">Start date: <span data-start-date=\"xxx\">September 2025<\/span><\/time>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"is-flex gap-2\">\n\t\t\t\t\t<a href=\"#apply-now\" class=\"button button--outline button--quaternary is-block mt-0\"><span>Apply now<\/span><\/a>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/header>\n\t\t<select id=\"course-section-menu-select\" aria-label=\"Select a course section to jump to\">\n\t\t\t<option class=\"course-section-item\" data-section=\"course-section-e751398f-d2a8-4c34-bf94-06ad741291ee\" value=\"course-section-e751398f-d2a8-4c34-bf94-06ad741291ee\">Course Overview<\/option><option class=\"course-section-item\" data-section=\"course-section-d0859888-57be-444c-bb8c-064ea6aa2ad1\" value=\"course-section-d0859888-57be-444c-bb8c-064ea6aa2ad1\">Why study this course?<\/option><option class=\"course-section-item\" data-section=\"course-section-436de81a-8c09-43ab-bc85-7c852c429dff\" value=\"course-section-436de81a-8c09-43ab-bc85-7c852c429dff\">Entry requirements<\/option><option class=\"course-section-item\" data-section=\"course-section-d5f9fcdc-c2b5-4fc9-9678-c8982951528d\" value=\"course-section-d5f9fcdc-c2b5-4fc9-9678-c8982951528d\">Course fees<\/option><option class=\"course-section-item\" data-section=\"course-section-5ceb46b1-c086-4eb6-abb1-12512e682b88\" value=\"course-section-5ceb46b1-c086-4eb6-abb1-12512e682b88\">News &amp; events<\/option><option class=\"course-section-item\" data-section=\"course-section-19da4b33-593d-4cdd-bc4f-03a02ea46063\" value=\"course-section-19da4b33-593d-4cdd-bc4f-03a02ea46063\">Course modules<\/option><option class=\"course-section-item\" data-section=\"course-section-d671d741-dfa0-4d70-b3a0-7420fa7a8f60\" value=\"course-section-d671d741-dfa0-4d70-b3a0-7420fa7a8f60\">Placement information<\/option><option class=\"course-section-item\" data-section=\"course-section-8f6e75ed-5fce-4fbf-ad04-448521381e17\" value=\"course-section-8f6e75ed-5fce-4fbf-ad04-448521381e17\">Studying in Birmingham<\/option><option class=\"course-section-item\" data-section=\"course-section-a721aa09-a63a-4872-8d8d-b5dadf742892\" value=\"course-section-a721aa09-a63a-4872-8d8d-b5dadf742892\">What careers can I consider?<\/option><option class=\"course-section-item\" data-section=\"course-section-9c466f90-046d-401c-a69f-f14cbcc142a7\" value=\"course-section-9c466f90-046d-401c-a69f-f14cbcc142a7\">Accreditations and exemptions<\/option><option class=\"course-section-item\" data-section=\"course-section-4823e317-c34b-4040-ad54-17b9a6f073d9\" value=\"course-section-4823e317-c34b-4040-ad54-17b9a6f073d9\">Courses you might like<\/option>\n\t\t<\/select>\n\t<\/div><ul aria-label=\"Course Sections\" id=\"course-sections-menu\" class=\"course-sections-menu\"><li class=\"course-section-item\" data-section=\"course-section-e751398f-d2a8-4c34-bf94-06ad741291ee\"><a id=\"section-link-course-section-e751398f-d2a8-4c34-bf94-06ad741291ee\" href=\"#course-section-e751398f-d2a8-4c34-bf94-06ad741291ee\">Course Overview<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-d0859888-57be-444c-bb8c-064ea6aa2ad1\"><a id=\"section-link-course-section-d0859888-57be-444c-bb8c-064ea6aa2ad1\" href=\"#course-section-d0859888-57be-444c-bb8c-064ea6aa2ad1\">Why study this course?<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-436de81a-8c09-43ab-bc85-7c852c429dff\"><a id=\"section-link-course-section-436de81a-8c09-43ab-bc85-7c852c429dff\" href=\"#course-section-436de81a-8c09-43ab-bc85-7c852c429dff\">Entry requirements<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-d5f9fcdc-c2b5-4fc9-9678-c8982951528d\"><a id=\"section-link-course-section-d5f9fcdc-c2b5-4fc9-9678-c8982951528d\" href=\"#course-section-d5f9fcdc-c2b5-4fc9-9678-c8982951528d\">Course fees<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-5ceb46b1-c086-4eb6-abb1-12512e682b88\"><a id=\"section-link-course-section-5ceb46b1-c086-4eb6-abb1-12512e682b88\" href=\"#course-section-5ceb46b1-c086-4eb6-abb1-12512e682b88\">News &amp; events<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-19da4b33-593d-4cdd-bc4f-03a02ea46063\"><a id=\"section-link-course-section-19da4b33-593d-4cdd-bc4f-03a02ea46063\" href=\"#course-section-19da4b33-593d-4cdd-bc4f-03a02ea46063\">Course modules<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-d671d741-dfa0-4d70-b3a0-7420fa7a8f60\"><a id=\"section-link-course-section-d671d741-dfa0-4d70-b3a0-7420fa7a8f60\" href=\"#course-section-d671d741-dfa0-4d70-b3a0-7420fa7a8f60\">Placement information<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-8f6e75ed-5fce-4fbf-ad04-448521381e17\"><a id=\"section-link-course-section-8f6e75ed-5fce-4fbf-ad04-448521381e17\" href=\"#course-section-8f6e75ed-5fce-4fbf-ad04-448521381e17\">Studying in Birmingham<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-a721aa09-a63a-4872-8d8d-b5dadf742892\"><a id=\"section-link-course-section-a721aa09-a63a-4872-8d8d-b5dadf742892\" href=\"#course-section-a721aa09-a63a-4872-8d8d-b5dadf742892\">What careers can I consider?<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-9c466f90-046d-401c-a69f-f14cbcc142a7\"><a id=\"section-link-course-section-9c466f90-046d-401c-a69f-f14cbcc142a7\" href=\"#course-section-9c466f90-046d-401c-a69f-f14cbcc142a7\">Accreditations and exemptions<\/a><\/li><li class=\"course-section-item\" data-section=\"course-section-4823e317-c34b-4040-ad54-17b9a6f073d9\"><a id=\"section-link-course-section-4823e317-c34b-4040-ad54-17b9a6f073d9\" href=\"#course-section-4823e317-c34b-4040-ad54-17b9a6f073d9\">Courses you might like<\/a><\/li><\/ul>\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-e751398f-d2a8-4c34-bf94-06ad741291ee\" data-name=\"Course Overview\" data-count=\"0\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;courseContent&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;AND&quot;}\"><div class=\"happypress-custom-fields happypress-custom-fields-courseContent has-text-color has-primary-color wp-elements-45ca8353a206103032ac8754a39fddee\"><p>Discover how computing expertise and cyber security skills combine to protect digital systems and data. The BSc (Hons) Computer Science with Cyber Security at Birmingham Newman University is a full-time, three-year undergraduate degree designed for students who want to build strong computing foundations while developing specialist knowledge in cyber security. You will begin on the BSc (Hons) Computer Science programme and choose the Cyber Security pathway towards the end of your first year. On successful completion, you will graduate with a degree that demonstrates your ability to design, implement and evaluate secure computing systems. Whether you are interested in secure software development, digital forensics or cyber threat analysis, this course prepares you to respond to real-world challenges with confidence, creativity and technical skill. <\/p>\n<details class=\"wp-block-details is-layout-block is-icon-caret\">\n<summary style=\"color: #fff;background-color: #65696a\"><span>What does this course cover?<\/span><svg class=\"icon icon-caret\" aria-hidden=\"true\" viewBox=\"0 0 320 512\"><path d=\"M310.6 246.6l-127.1 128C176.4 380.9 168.2 384 160 384s-16.38-3.125-22.63-9.375l-127.1-128C.2244 237.5-2.516 223.7 2.438 211.8S19.07 192 32 192h255.1c12.94 0 24.62 7.781 29.58 19.75S319.8 237.5 310.6 246.6z\"><\/path><\/svg><\/summary>\n<div>\n\t\t\t\t\tWhat does this course cover<\/p>\n<p>You will explore core areas of computer science including programming, algorithms, databases and systems design, alongside specialist topics such as ethical hacking, cryptography, vulnerability assessment and information assurance. Learning is delivered through lectures, practical workshops and project-based activities, encouraging you to apply your skills to real-world scenarios and emerging technologies. You will also examine the legal, ethical and societal dimensions of cyber security, helping you make informed and responsible decisions in professional contexts. Learning is designed to be applied and inclusive, supporting your development as a reflective and adaptable practitioner.\n\t\t\t\t\t<\/p><\/div>\n<\/details>\n<details class=\"wp-block-details is-layout-block is-icon-caret\">\n<summary style=\"color: #fff;background-color: #65696a\"><span>How will I be assessed?<\/span><svg class=\"icon icon-caret\" aria-hidden=\"true\" viewBox=\"0 0 320 512\"><path d=\"M310.6 246.6l-127.1 128C176.4 380.9 168.2 384 160 384s-16.38-3.125-22.63-9.375l-127.1-128C.2244 237.5-2.516 223.7 2.438 211.8S19.07 192 32 192h255.1c12.94 0 24.62 7.781 29.58 19.75S319.8 237.5 310.6 246.6z\"><\/path><\/svg><\/summary>\n<div>\n\t\t\t\t\tHow will I be assessed <\/p>\n<p>Assessment is designed to support your development into a confident and capable graduate. You will complete coursework-based tasks that reflect academic and professional practice, including programming assignments, technical reports, security audits, presentations and project work. These assessments help you apply theory to real-world scenarios, develop critical reasoning and build professional judgement. You will receive regular feedback and academic guidance to support your progress and help you grow as a reflective and independent thinker.\n\t\t\t\t\t<\/p><\/div>\n<\/details>\n<\/div>\n\n\n<div style=\"height:51px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group has-sky-blue-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\" id=\"book-a-free-consultation\">Book a free consultation<\/h3>\n\n\n\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-cf27ef00f5b18a039f6a0dc0922a52f6\">Want to find out more about your options? Book a free consultation with an Academic<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button has-custom-width wp-block-button__width-100\">\n\t\t\t<a class=\"wp-block-button__link wp-element-button button button--secondary\" href=\"https:\/\/outlook.office.com\/book\/ComputerScienceatBirminghamNewmanUniversity@newmanacuk.onmicrosoft.com\/\" target=\"_blank\" rel=\"noopener\"><span>Book a Call with an Academic<\/span><\/a>\n\t\t<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-d0859888-57be-444c-bb8c-064ea6aa2ad1\" data-name=\"Why study this course?\" data-count=\"1\" style=\"margin-bottom:0px\">\n<div class=\"wp-block-group alignfull has-clay-ash-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;whyStudyThisCourse&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;AND&quot;}\"><div class=\"happypress-custom-fields happypress-custom-fields-whyStudyThisCourse has-text-color has-primary-color wp-elements-ad3b0fbfec7eb487d89a7564e773bb6b\"><p>Why study this course<\/p>\n<p>Studying the BSc (Hons) Computer Science with Cyber Security at Birmingham Newman University offers a professionally relevant and future-focused route into one of the most in-demand areas of the digital economy. Whether defending networks, developing secure software or investigating digital threats, you will gain the knowledge and skills to work with integrity and precision. The course prepares you to understand and respond to complex technical challenges, empowering organisations and communities through ethical and informed practice. With a strong focus on applied learning and reflective development, you will graduate ready to make a real impact. <\/p>\n<p>\u2018Every expert begins as a novice. Each line of command in the pursuit of cyber security represents a step toward safeguarding digital infrastructure and every innovation expands the boundaries of protection while introducing new ethical and operational responsibilities. Writing your first instruction is not merely a technical command, it is a commitment to securing the future of our interconnected world.\u2019 Adnan Qureshi, Senior Lecturer, Computer Science <\/p>\n<p>Explore Cyber Security Through Practical Learning <\/p>\n<p>You will study programming, databases, algorithms and system design, alongside modules in network security, ethical hacking, cryptography, cyber forensics and threat analysis. Workshops, case studies and project-based learning help you develop practical skills in secure coding, vulnerability assessment and digital investigations. You will also explore legal and ethical frameworks, learning how to contribute to responsible innovation and improvement in cyber security. The course reflects the evolving nature of digital threats and prepares you to engage confidently with technical and organisational challenges. <\/p>\n<p>Supportive and Professional Learning <\/p>\n<p>At Birmingham Newman University, you will be part of a close-knit academic community that supports your growth. Teaching blends lectures, seminars and practical workshops, enriched by insights from industry professionals and current research. You will receive tailored feedback, professional mentoring and career guidance throughout your studies. The learning environment is inclusive and student-focused, helping you build confidence and resilience. On graduation, you will be equipped with the skills and insight needed to pursue a wide range of careers or further study in computing and cyber security.<\/p>\n<p>Complimentary Surface Pro<\/p>\n<p>All Computer Science students set to start in 2026 will receive a Surface Pro laptop. This will be automatically loaned to you for the entire duration of your course. This exclusive, dedicated device is yours to support your studies from day one.<\/p>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"complimentary-surface-pro\">Complimentary Surface Pro<\/h3>\n\n\n\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-ae1e306b4e36a90d11aca9edc6ca2a22\">All Computer Science students set to start in 2026 will receive a Surface Pro laptop.<\/p>\n\n\n\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-1ccb7625e42b688e0f308f4b4b468fa4\">This will be automatically loaned to you for the entire duration of your course. This exclusive, dedicated device is yours to support your studies from day one.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"margin-top:0px;margin-bottom:0px;min-height:268px;aspect-ratio:unset;\"><img decoding=\"async\" class=\"wp-block-cover__image-background wp-image-896 size-large\" alt=\"\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/themes\/birmingham-newman-parent\/assets\/dist\/img\/newman-campus.webp\" data-object-fit=\"cover\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-dark-blue-background-color has-background-dim-80 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center has-large-font-size\" id=\"got-a-question-you-d-like-to-ask\">Got a question you&#8217;d like to ask?<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button \">\n\t\t\t<a class=\"wp-block-button__link wp-element-button button button--outline button--secondary\" href=\"https:\/\/newman.ac.uk\/contact\"><span>Contact us<\/span><\/a>\n\t\t<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-436de81a-8c09-43ab-bc85-7c852c429dff\" data-name=\"Entry requirements\" data-count=\"2\" style=\"margin-top:0px\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;entryRequirements&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;AND&quot;}\">\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-dark-blue-color has-text-color has-link-color wp-elements-12689296eedc1881160be6d317526b47\" id=\"entry-requirements\">Entry requirements<\/h3>\n\n\n\n<div class=\"wp-block-newman-tab-container\" style=\"--tab-color:#002c4b\"><div class=\"tab-container\" data-tab-container=\"true\"><div class=\"tab-header\"><div class=\"tab-list\" role=\"tablist\"><button id=\"tab-uk-students-412c6fcf-0\" role=\"tab\" class=\"tab has-secondary-font-family\" aria-controls=\"panel-uk-students-412c6fcf-0\" data-tab-id=\"uk-students-412c6fcf-0\">UK students<\/button><button id=\"tab-international-students-412c6fcf-1\" role=\"tab\" class=\"tab has-secondary-font-family\" aria-controls=\"panel-international-students-412c6fcf-1\" data-tab-id=\"international-students-412c6fcf-1\">International students<\/button><\/div><\/div><div class=\"tab-content\" data-tabs-content=\"true\">\n<div class=\"wp-block-newman-tab\" id=\"panel-uk-students-412c6fcf-0\" role=\"tabpanel\" aria-labelledby=\"tab-uk-students-412c6fcf-0\" data-tab-panel=\"true\" data-tab-id=\"uk-students-412c6fcf-0\" aria-hidden=\"false\"><div class=\"tab-block-content content\">\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-0731f9c0ac84457299f02359dbb570f3\">We welcome students from all backgrounds and accept a wide range of qualifications. If yours aren\u2019t listed, don\u2019t worry &#8211; our Admissions Team can help you explore your options. See full <a href=\"https:\/\/www.newman.ac.uk\/study\/how-to-apply\/entry-requirements\/\">entry requirements<\/a>.<\/p>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"happypress-custom-fields happypress-custom-fields-entryRequirements has-text-color has-primary-color wp-elements-23221a5065d02b8df43b85327f223610\"><p>\u2022 A-Level: Grade profile of BBC or 112 UCAS Tariff Points.<br \/>\n\u2022 BTEC: Grade profile of DMM. This can be achieved from either an Extended National Diploma or a combination of smaller BTEC qualifications.<br \/>\n\u2022 T-levels: A T-level with an overall Merit grade.<\/p>\n<p>If English is not your first language, you must have the following IELTS score:<br \/>\n\u00b7 Foundation courses: A Secure English Language Test equivalent to IELTS 5.5 IELTS with a minimum of 5.5 in each component.<br \/>\n\u00b7 Undergraduate courses: A Secure English Language Test equivalent to IELTS 6.0 with a minimum of 5.5 in each component.<br \/>\nOther English language qualifications are also accepted. Please contact admissions for further information.<\/p>\n<\/div>\n\n\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-e708bcb5345f601a447c30709c223fae\">Please <a href=\"https:\/\/newman.ac.uk\/contact-us\/\">contact Admissions<\/a> if you have any questions.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button \">\n\t\t\t<a class=\"wp-block-button__link wp-element-button button\" href=\"#apply-now\" ><span>Apply Now<\/span><\/a>\n\t\t<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-newman-tab\" id=\"panel-international-students-412c6fcf-1\" role=\"tabpanel\" aria-labelledby=\"tab-international-students-412c6fcf-1\" data-tab-panel=\"true\" data-tab-id=\"international-students-412c6fcf-1\" aria-hidden=\"true\"><div class=\"tab-block-content content\">\n<h4 class=\"wp-block-heading has-dark-blue-color has-text-color\" id=\"academic-entry-requirements-for-international-students\">Academic entry requirements for international students<\/h4>\n\n\n\n<p>If you are an international applicant, you can use the button below to see specific entry requirements for your country.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button \">\n\t\t\t<a class=\"wp-block-button__link wp-element-button button button--tertiary\" href=\"https:\/\/newman.ac.uk\/international-students\/entry-requirements-and-visa-information\/\"><span>Country entry requirements<\/span><\/a>\n\t\t<\/div><\/div>\n\n\n\n<h5 class=\"wp-block-heading has-dark-blue-color has-text-color\" id=\"english-requirements\">English requirements<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Foundation courses: A Secure English Language Test equivalent to IELTS 5.5 IELTS with a minimum of 5.5 in each component*<\/li>\n\n\n\n<li>Undergraduate courses: A Secure English Language Test equivalent to IELTS 6.0 with no component below IELTS 5.5*<\/li>\n\n\n\n<li>Postgraduate courses: A Secure English Language Test equivalent to IELTS 6.5 with no component below IELTS 6.0*<\/li>\n<\/ul>\n\n\n\n<p><em>*Some courses may have a higher requirement to meet regulatory or professional body requirements. Your offer letter will state any variation to the above advertised requirements.<\/em><\/p>\n\n\n\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-599ef7c62be4576dfad492791b4f19a8\">For further help you can email&nbsp;<a href=\"mailto:international@newman.ac.uk\"><strong>international@newman.ac.uk<\/strong><\/a>&nbsp;or telephone&nbsp;<a href=\"tel:+441218160449\"><strong>+441213874776<\/strong><\/a> to speak with our Admissions Team.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button \">\n\t\t\t<a class=\"wp-block-button__link wp-element-button button button--tertiary\" href=\"https:\/\/www.newman.ac.uk\/international-students\/\"><span>International students<\/span><\/a>\n\t\t<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-d5f9fcdc-c2b5-4fc9-9678-c8982951528d\" data-name=\"Course fees\" data-count=\"3\" style=\"margin-top:0px;margin-bottom:0px\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;tuitionFee&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;},{&quot;field&quot;:&quot;tuitionFeeInternational&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;OR&quot;}\">\n<div class=\"wp-block-group alignfull has-sky-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\" id=\"course-fees\">Course fees<\/h3>\n\n\n\n<div class=\"wp-block-newman-tab-container\" style=\"--tab-color:#002c4b\"><div class=\"tab-container\" data-tab-container=\"true\"><div class=\"tab-header\"><div class=\"tab-list\" role=\"tablist\"><button id=\"tab-uk-students-8d597e9e-0\" role=\"tab\" class=\"tab has-secondary-font-family\" aria-controls=\"panel-uk-students-8d597e9e-0\" data-tab-id=\"uk-students-8d597e9e-0\">UK students<\/button><button id=\"tab-international-students-8d597e9e-1\" role=\"tab\" class=\"tab has-secondary-font-family\" aria-controls=\"panel-international-students-8d597e9e-1\" data-tab-id=\"international-students-8d597e9e-1\">International students<\/button><\/div><\/div><div class=\"tab-content\" data-tabs-content=\"true\">\n<div class=\"wp-block-newman-tab\" id=\"panel-uk-students-8d597e9e-0\" role=\"tabpanel\" aria-labelledby=\"tab-uk-students-8d597e9e-0\" data-tab-panel=\"true\" data-tab-id=\"uk-students-8d597e9e-0\" aria-hidden=\"false\"><div class=\"tab-block-content content\"><p class=\"happypress-custom-fields happypress-custom-fields-tuitionFee has-text-color has-primary-color wp-elements-723af383edf4600119b31875f1e3c613\">The tuition fee for academic year 2026\/27 is: \u00a39,790. Tuition fees for courses starting April to May 2026, fall within the 2025\/26 academic cycle.<\/p>\n\n\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-fce3c84eb95ddb1993119b0364fd9a1f\">Fees for the 2025\/26 academic year can be found on our <a href=\"https:\/\/newman.ac.uk\/student-life-and-support\/student-finance\/\">Student Finance pages<\/a>.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-newman-tab\" id=\"panel-international-students-8d597e9e-1\" role=\"tabpanel\" aria-labelledby=\"tab-international-students-8d597e9e-1\" data-tab-panel=\"true\" data-tab-id=\"international-students-8d597e9e-1\" aria-hidden=\"true\"><div class=\"tab-block-content content\">\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-f0bd83da4ba9e4787668c8d1f2c9d7f0\">For detailed information on course fees for international students, please visit our&nbsp;International Students page, linked below.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button \">\n\t\t\t<a class=\"wp-block-button__link wp-element-button button button--outline button--primary\" href=\"https:\/\/www.newman.ac.uk\/international-students\/\"><span>International students<\/span><\/a>\n\t\t<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-6-font-size\" id=\"additional-costs\">Additional costs<\/h3>\n\n\n\n<p class=\"has-primary-color has-text-color has-link-color wp-elements-24be4c29f2d9877aef7119e714f1036a\">The University will review tuition fees and increase fees in line with any inflationary uplift as determined by the UK Government, if permitted by law or government policy, in subsequent years of your course. It is anticipated that such increases would be linked to RPI (the Retail Price Index excluding mortgage interest payments).<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button \">\n\t\t\t<a class=\"wp-block-button__link wp-element-button button button--outline button--primary\" href=\"https:\/\/newman.ac.uk\/study\/how-to-apply\/additional-course-information\/\"><span>Find out more about additional costs<\/span><\/a>\n\t\t<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-5ceb46b1-c086-4eb6-abb1-12512e682b88\" data-name=\"News &amp; events\" data-count=\"4\" style=\"margin-top:0px;margin-bottom:0px\"><section class=\"wp-block-newman-query query-block newman-query alignfull  has-3-columns\"  style=\"padding-top:80px;padding-bottom:80px;\">\n\t\t\t<div class=\"query-block__container\">\n\t\t\t\t<div class=\"query-block__header mb-4 fade-in-up is-flex is-justify-content-space-between is-align-items-center\">\n\t\t\t\t\t<h2 class=\"mb-0 query-block__title has-primary-color\">Computer Science News<\/h2>\n\t\t\t\t\t<div class=\"is-flex gap-2 is-align-items-center is-justify-content-flex-end\">\n\t\t\t\t\t\t<div class=\"query-block__desktop-buttons\"><\/div>\n\t\t\t\t\t\t\n\t\t<div class=\"query-block__buttons is-flex is-justify-content-space-between\">\n\t\t\t<button class=\"prev next-button carousel-nav-button button-reset carousel-prev\" title=\"Scroll carousel left\">\n\t\t\t\t<span class=\"next-button__text is-sr-only\">Slide carousel left<\/span>\n\t\t\t\t<span class=\"next-button__icon\">\n\t\t\t\t\t<svg viewBox=\"0 0 512 512\" width=\"24\" height=\"24\"><path fill=\"#002c4b\" d=\"M9.4 233.4c-12.5 12.5-12.5 32.8 0 45.3l128 128c12.5 12.5 32.8 12.5 45.3 0s12.5-32.8 0-45.3L109.3 288 480 288c17.7 0 32-14.3 32-32s-14.3-32-32-32l-370.7 0 73.4-73.4c12.5-12.5 12.5-32.8 0-45.3s-32.8-12.5-45.3 0l-128 128z\" vector-effect=\"non-scaling-stroke\"\/><\/svg>\n\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t\t<button class=\"next prev-button carousel-nav-button button-reset carousel-next\" title=\"Scroll carousel right\">\n\t\t\t\t<span class=\"prev-button__text is-sr-only\">Slide carousel right<\/span>\n\t\t\t\t<span class=\"prev-button__icon\">\n\t\t\t\t\t<svg viewBox=\"0 0 512 512\" width=\"24\" height=\"24\"><path fill=\"#002c4b\" d=\"M502.6 278.6c12.5-12.5 12.5-32.8 0-45.3l-128-128c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3L402.7 224 32 224c-17.7 0-32 14.3-32 32s14.3 32 32 32l370.7 0-73.4 73.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0l128-128z\" vector-effect=\"non-scaling-stroke\"\/><\/svg>\n\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"newman-query__loop query-block__loop query-block__content fade-in-up is-flex\">\n\t\t\t\t<div class=\"scroll-offset\" aria-hidden=\"true\"><\/div>\n<article class=\"card card--basic has-primary-color\">\n\t<a class=\"faux-link\" aria-label=\"Read more about Andrew Csizmadia Named Fellow of the British Computer Society for Excellence in Computing Education\" href=\"https:\/\/newman.ac.uk\/andrew-csizmadia-named-fellow-of-the-british-computer-society-for-excellence-in-computing-education\/\"><\/a>\n\t\t\t<div class=\"card--image \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"390\" height=\"223\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/uploads\/sites\/2\/2025\/12\/Andrew-Csizmadia-390x223.webp\" class=\"attachment-window size-window wp-post-image\" alt=\"Andrew Csizmadia\" \/>\t\t<\/div>\n\t\t<div class=\"card--info mt-4 has-primary-color\">\n\t\t\t\t\t<time class=\"has-6-font-size mb-2 mt-0 is-block\" datetime=\"2025-12-01\">1 December 2025<\/time>\n\t\t\n\t\t\t\t\t<h3 class=\"mb-2 mt-0 is-inline has-4-font-size has--font-size--mobile\">Andrew Csizmadia Named Fellow of the British Computer Society for Excellence in Computing Education<\/h3>\n\t\t\n\t\t<p class=\"card--info-excerpt mt-2 mb-0 has-primary-color\">\n\t\t\tAndrew Csizmadia SFHEA, Emeritus Fellow in Computing Education at Birmingham Newman University, has been appointed&#8230;\t\t<\/p>\n\t<\/div>\n<\/article>\n\n\n\t\t\t<\/div>\n\t\t\t<div class=\"query-block__container\">\n\t\t\t\t<div class=\"query-block__meta is-flex gap-2 is-align-items-center\">\n\t\t\t\t\t<div class=\"query-block__mobile-buttons is-hidden mt-5\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\n\n<div class=\"wp-block-cover alignfull\" style=\"padding-top:80px;padding-bottom:80px;min-height:310px;aspect-ratio:unset;\"><img decoding=\"async\" class=\"wp-block-cover__image-background wp-image-896 size-large\" alt=\"\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/themes\/birmingham-newman-parent\/assets\/dist\/img\/newman-campus.webp\" data-object-fit=\"cover\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-blue-background-color has-background-dim-80 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center has-large-font-size\" id=\"book-an-open-day\" style=\"margin-bottom:16px\">Book an open day<\/h2>\n\n\n\n<p class=\"has-text-align-center\" style=\"margin-top:0px;margin-bottom:28px\">Find out about our next open day. Book now to secure your place.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button \">\n\t\t\t<a class=\"wp-block-button__link wp-element-button button button--outline button--secondary\" href=\"https:\/\/newman.ac.uk\/study\/open-days\/\"><span>Find out more<\/span><\/a>\n\t\t<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-19da4b33-593d-4cdd-bc4f-03a02ea46063\" data-name=\"Course modules\" data-count=\"5\" style=\"margin-top:0px;margin-bottom:0px\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;has_course_modules&quot;,&quot;operator&quot;:&quot;is_true&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;AND&quot;}\">\n<div class=\"wp-block-group has-clay-ash-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-newman-tab-container wp-block-newman-course-modules\">\n\t\t\t<div class=\"tab-container\" data-tab-container=\"true\">\n\t\t\t\t<div class=\"tab-header\">\n\t\t\t\t\t<div class=\"tab-list\" role=\"tablist\">\n\t\t\t\t\t\t<button\n\t\t\t\t\tid=\"tab-year-1\"\n\t\t\t\t\trole=\"tab\"\n\t\t\t\t\tclass=\"tab active\"\n\t\t\t\t\taria-selected=\"true\"\n\t\t\t\t\taria-controls=\"panel-year-1\"\n\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\tdata-tab-id=\"year-1\"\n\t\t\t\t>Year 1\n\t\t\t\t<\/button><button\n\t\t\t\t\tid=\"tab-year-2\"\n\t\t\t\t\trole=\"tab\"\n\t\t\t\t\tclass=\"tab\"\n\t\t\t\t\taria-selected=\"false\"\n\t\t\t\t\taria-controls=\"panel-year-2\"\n\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\tdata-tab-id=\"year-2\"\n\t\t\t\t>Year 2\n\t\t\t\t<\/button><button\n\t\t\t\t\tid=\"tab-year-3\"\n\t\t\t\t\trole=\"tab\"\n\t\t\t\t\tclass=\"tab\"\n\t\t\t\t\taria-selected=\"false\"\n\t\t\t\t\taria-controls=\"panel-year-3\"\n\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\tdata-tab-id=\"year-3\"\n\t\t\t\t>Year 3\n\t\t\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"tab-content\" data-tabs-content=\"true\">\n\t\t\t\t\t<div class=\"wp-block-newman-tab gap\" id=\"panel-year-1\" role=\"tabpanel\" aria-labelledby=\"tab-year-1\" data-tab-panel=\"true\" data-tab-id=\"year-1\" aria-hidden=\"false\">\n\t\t\t\t\t\t<div class=\"tab-block-content content\"><details name=\"module-year-1\" class=\"wp-block-details is-layout-block is-icon-arrow\" open>\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tProgramming Fundamentals\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>This module provides the first exposure to programming in this undergraduate degree programme, and for some students their first encounter with programming at all. It introduces problem-solving and structured, procedural and function-oriented programming. Emphasis is placed on designing, developing and deploying correct, efficient, maintainable and scalable programs.<\/p>\n<p>Introduction to problem solving, a brief review of Von-Neumann architecture, introduction to programming, role of compiler and linker, introduction to functions &amp; algorithms, basic data types and variables, input\/output constructs, arithmetic, comparison and logical operators, conditional statements and repetitive statements with understanding of execution flow, translation of counting, permutations and combinations into programs, introduction to modular programming, function definition and calling, stack rolling and unrolling, string and string operations, pointers\/references, memory allocation and file handling.<\/p>\n<p>The focus of this module is on developing knowledge, skills and understanding as they demonstrate mastery of software development. The module is based on several example programmes and emphasis is placed on practical work with the aim of ensuring that theory covered in lectures is reinforced by practical programming tasks.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-1\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tFundamentals of Web Design\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>This module will provide students with the opportunity to be proficient with tools and techniques used to create content accessed across a variety of mobile, tablet and desktop devices reliant on current front-end web design technologies. Students will also recognise appropriate accessibility standards and apply compliance guidelines to interactive websites. Students will develop web design skills for creating usable and interactive front-end web pages based on the principles of Human-Computer Interaction (HCI). Students will be encouraged to explore the requirements of organisations and interactive front-end development. Students will review appropriate literature on website design to gain understandings of the planning and implementation process and identify areas for further development or study.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-1\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tDatabase Design &amp; Development\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>The module will give students the opportunity to learn the fundamentals of database design. They will investigate the structure of data within a relational database, interact with, and protect the data within the database.  Students will develop practical experience of problem analysis, especially concepts of data modelling, sets, relational theory and relational algebra. Students will develop database implementation skills for optimisation using structured data, held in relational databases, accessed via SQL and explore the data storage requirements of on-line businesses, companies and organisations.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-1\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tFundamentals of Systems and Networking\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>This module will introduce students to concepts involved in the fundamentals of computer networking and security. The emphasis is on the design of computer networks and fundamentals of cyber security.<\/p>\n<p>In this module, students develop the knowledge, skills and understanding required to comprehend computer models, methodologies, structures, number representation, security, Boolean Algebra, logic gates and their role in basic computer systems. Knowledge of fundamentals of computer architecture is becoming increasingly important in business and finance, and are applicable to problems which have been considered mainstream computing.<\/p>\n<p>An operating system is typically the lowest layer of software in a computer. It provides an abstracted interface so that applications can run on diverse hardware without modification and it provides security which prevents misbehaving software from \u2018crashing\u2019 the hardware or disturbing other tasks which may be running simultaneously. This module provides an introduction to the major principles of implementing an operating system and ensuring that these are secure.These fundamentals cover the principles and structures of network addressing, , system architecture design, transmission of media, security and operations.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-1\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tDeveloping As a Computer Scientist\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>In this module, students will develop an understanding of the ethical, professional, sustainable and legal issues relating to computer science. Students will develop critical investigative skills in applying ethical theories to novel and emerging technological outcomes. . This module will provide students with the opportunity to identify and reflect on their strengths and weaknesses and to consider requirements for their future career in computer science. Development of problem-solving skills using number theory, propositional and predicate logic will enable understanding of a range of computer science concepts. Students will participate in critical reading, writing and develop their referencing techniques with emphasis on evaluating reliability and validity of sources.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-1\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tObject Oriented Programming &amp; Data Structures\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>This module teaches object-oriented programming to those who have learnt fundamental programming concepts. The main concepts discussed are: Objects, Data Abstraction, Data Encapsulation, Polymorphism, and Inheritance with practical implementation using contemporary programming language constructs. The aim is to familiarise students to the object-oriented programming paradigm, analysis and software development. The programming skills are further enhanced by teaching data structures and algorithms underpinning efficient manipulation, storage and retrieval of data. Students are exposed to the concepts of time and space complexity of computer programs.<\/p>\n<p>The module introduces object-oriented design, history and advantages of the paradigm, classes, objects, data encapsulation, constructors, destructors, access modifiers, function overloading, operator overloading, association of classes: composition, aggregation and inheritance; polymorphism, abstract classes and interfaces, generic programming concepts, data and object serialization using object streams and exception handling. The module further familiarizes students with concepts of creating, storing, retrieving, ordering, and manipulation of abstract data structures and the basics of analysis of algorithms and growth of functions. Concepts of linked lists, stacks, queues, trees and graphs are discussed along with recursion and divide and conquer algorithms. Techniques of sorting (selection, insertion, merge, quick, bubble, heap and radix etc.), priority queues, sorted linked lists, binary search, traversal of trees and graphs, greedy algorithms, spanning trees, hashing and indexing are discussed and practical implementation of these using a contemporary programming language is demonstrated.<\/p>\n<p>The focus of this module is on developing algorithmic thinking, object-oriented programming knowledge, skills and understanding based on medium complexity programmes. Emphasis is placed on practical work with the aim of ensuring that theory covered in lectures is reinforced by practical programming tasks.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><\/div>\n\t\t\t\t\t<\/div><div class=\"wp-block-newman-tab gap\" id=\"panel-year-2\" role=\"tabpanel\" aria-labelledby=\"tab-year-2\" data-tab-panel=\"true\" data-tab-id=\"year-2\" aria-hidden=\"true\">\n\t\t\t\t\t\t<div class=\"tab-block-content content\"><details name=\"module-year-2\" class=\"wp-block-details is-layout-block is-icon-arrow\" open>\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tSoftware Security\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>The module aims to develop core competencies in the fields of secure software concepts, secure software requirements, design, implementation, coding and testing. Nowadays, almost all the software dependent appliances, devices, business services and industries are susceptible and vulnerable to hostile cyber-attacks intended to exploit security weaknesses in operating systems, mobile apps, web apps, databases and web servers.<\/p>\n<p>This module teaches a systematic method applied throughout the development lifecycle that places security at the centre of product development with focus on people, processes, and technology components of software, networks, and host defences to prevent, mitigate and recover from malicious interventions. Topics of discussion include security concepts in the SDLC, risk management, best practices (e.g., NIST and OWASP etc.), trusted computing, secure software design, known vulnerabilities and malware attacks, SQL Injection and legal and ethical issues.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-2\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tINFORMATION SECURITY FOR INDUSTRY\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>The module aims to develop understanding of the role and interaction of policies, laws, procedures, management issues, and technical issues in protecting critical infrastructure and corporate processes including confidentiality, integrity and availability in computer systems. Cyber-Physical security serves an understanding to risks and attack models for information systems and cyber-physical systems. This module is presented along with industry-standard guidance for implementing and maintaining secure information systems with proactive approaches to assure resilience.<\/p>\n<p>This module introduces concept, design, functions, architecture, components and applications of secure information systems (IS), information security policies and procedures, IS system planning and administration, asset management, organizational and human security, cyber security management concepts, NIST cyber security framework, enterprise roles and structures, security plans and, security policies.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-2\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tAdvanced Web Development\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>Advanced web development solidifies skills in website development for second-year students. The module strengthens knowledge in modern web application development using contemporary full-stack development technologies. Students will gain an understanding of applying these technologies to develop interactive and functional websites. During the module students will engage with literature and techniques for building, customising, and extending web-based development through modern implementation practices. The students will apply this knowledge by implementing techniques such as external libraries, application programming interfaces, and the interconnection between server-side and front-end development. Students will engage in industry skill building through understanding the best practices and ethical considerations of modern web development.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-2\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tIndustry Project\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>The industry project module introduces students to the concepts, skills, and knowledge of working in a collaborative team environment in technical development projects. As part of the project, students are expected to work professionally to design, develop, and evaluate an industry-oriented project using contemporary project management principles. The module will allow students to work on an open-ended project collaboratively. Students will experience working with industry-standard approaches for managing computing projects while also building self-directed skills in their chosen specialisations. Students may seek to develop projects in their specialisms or emerging interests in Computer Science. Students will critically evaluate their work as part of the industry project and present\/demonstrate the technologies to a wider audience.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-2\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tCyber Security\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>The Cyber Security module introduces students to the concepts required to understand and to work with computer security. These security concepts include, for example: historical background, security and security threats, practical measures (such as identification, authentication), security models, cryptography, network security). The second part of the module provides students with the opportunity to explore computer system security via hands-on activities. Current issues relating to cyber security will be discussed and possible solutions will be investigated through practical and hands-on labs Students will critically reflect, design, and develop their learning into a security-centric project to understand historical and novel cyber security threats and learn how to defend against these through practical experience.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-2\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tMachine Learning\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>Machine Learning, is a subset of Artificial Intelligence, is concerned with creating learning models that allow a computer to exhibit behaviour that would normally require a human to do. Typical applications include: computer vision, speech recognition, and intelligent robots. The learning models come in various forms, such as parametric and non-parametric and probability distributions. The emphasis is on creating these models automatically from data provided and for them to act without necessarily being explicitly programmed, for example, creating a face recognition system from a data set of facial images. In the past decade, machine learning has given society effective web search, self-driving cars, practical speech recognition, and an understanding of the human genome.<\/p>\n<p>In this module, students will learn about the most effective machine learning techniques, and gain practice in implementing them successfully. Additionally, students will learn about the theoretical underpinnings of machine learning. Topics covered include: concepts of statistics &amp; probability, supervised learning, unsupervised learning, matrix operations, backpropagation using partial derivatives, eigenvalues and eigenvectors, support vector machines and best practices in machine learning. Case studies and applications will be used to illustrate best practice in machine learning.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><\/div>\n\t\t\t\t\t<\/div><div class=\"wp-block-newman-tab gap\" id=\"panel-year-3\" role=\"tabpanel\" aria-labelledby=\"tab-year-3\" data-tab-panel=\"true\" data-tab-id=\"year-3\" aria-hidden=\"true\">\n\t\t\t\t\t\t<div class=\"tab-block-content content\"><details name=\"module-year-3\" class=\"wp-block-details is-layout-block is-icon-arrow\" open>\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tCyber forensics\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>This module enables students to build on their cyber security knowledge using digital evidence collection, preservation, and analysis. The module explores the tools and techniques used to investigate data, for example; data recovery, network forensics, and malware analysis. The module also explores the legal and ethical considerations in cyber forensics, ensuring students understand the importance of confidentiality, integrity, and availability. By the end of the module, students will have an awareness of cyber forensics approaches and consider how these could be applied in practice. The module encourages students to understand how digital data can be used in cyber security.<\/p>\n<p>This module covers the investigation and forensics of digital technologies, including; security mechanisms, cryptography, encryption, hash functions, digital signatures, key management, authentication and access control; software security, digital forensics tools, malware, firewalls, intrusion detection, security policies, law and ethics in information security, privacy and anonymity of data.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-3\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tProject\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">40 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>The final project and critical evaluation will be structured to assess the knowledge and understanding by means appropriate to individual students, though all approaches will lead to the production of a significant piece of work that involves the demonstration of advanced practice in computer science. All approaches will be accompanied by a critical self- evaluation of the outcomes achieved.  Students would integrate concepts and skills learned throughout the degree course to substantial open-ended problems. The module will increase students understanding of applied, investigational or theoretical approaches to real word problems.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-3\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tEthical Hacking\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>This module teaches students the concepts and processes of vulnerability assessment and ethical hacking covering software, networks, and Web applications. Students will use state-of-the-art tools to identify real-world vulnerability issues in modern software and the protection mechanisms found in operating systems. Students will learn how to detect, patch, and develop extensions of protection mechanisms to mitigate attacks and improve security features of software. This module introduces the core methodological approaches to application vulnerability assessment, reverse engineering, and ethical hacking. Students will engage with novel technologies to attack or \u2018penetration test\u2019 vulnerable systems and applications. Students will then learn how to defend against such attacks using a mix of academic and industry-focused techniques.<\/p>\n<p>This module covers need for security assessments, classifying vulnerabilities: software, penetration testing, memory corruption, cross site scripting, fundamentals of the C to understand code analysis, reverse engineering of software, simulated attacks, security assessment, intercepting data, and privilege escalation.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-3\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tDeep Learning\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p>Deep learning is a group of exciting new technologies for neural networks. Through a combination of advanced training techniques and neural network architectural components, it is now possible to create neural networks that can handle tabular data, images, text, and audio as both input and output. Deep learning allows a neural network to learn hierarchies of information in a way that is like the function of the human brain.<\/p>\n<p>This module will further build on the concepts of machine learning, neural networks and artificial intelligence and will introduce advanced topics in neural networks, convolutional and recurrent network structures, Long Short-Term Memory (LSTM), Gated Recurrent Neural Networks (GRU), General Adversarial Networks (GAN), and reinforcement learning. Application of these architectures to computer vision, time series, security, natural language processing (NLP), and data generation will be covered. High-Performance Computing (HPC) aspects will demonstrate how deep learning can be leveraged on graphical processing units (GPUs) using contemporary architectures and frameworks. Focus is primarily upon the application of deep learning to problems, with some introduction to mathematical foundations, and implementation of algorithms using programming languages.<\/p>\n<p>In this module, students will learn about the most effective machine learning techniques, and gain practice in implementing them successfully. Additionally, students will learn about the theoretical underpinnings of machine learning. Topics covered include: supervised learning, unsupervised learning and best practices in machine learning. Case studies and applications will be used to illustrate best practice in deep learning.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><details name=\"module-year-3\" class=\"wp-block-details is-layout-block is-icon-arrow\" >\n\t\t\t\t\t<summary class=\"has-white-background-color has-blue-color\">\n\t\t\t\t\tinternet of Things\n\t\t\t\t\t<svg class=\"icon icon-arrow\" aria-hidden=\"true\" viewBox=\"0 0 448 512\"><path fill=\"inherit\" d=\"M432.6 209.3l-191.1 183.1C235.1 397.8 229.1 400 224 400s-11.97-2.219-16.59-6.688L15.41 209.3C5.814 200.2 5.502 184.1 14.69 175.4c9.125-9.625 24.38-9.938 33.91-.7187L224 342.8l175.4-168c9.5-9.219 24.78-8.906 33.91 .7187C442.5 184.1 442.2 200.2 432.6 209.3z\"><\/path><\/svg>\n\t\t\t\t\t<\/summary>\n\t\t\t\t\t\t<div class=\"wp-block-details__content has-stone-color has-white-background-color pl-4 pr-4 pb-4\">\n\t\t\t\t\t\t\t<span class=\"is-block\">\n\t\t\t\t\t\t\t\t<span class=\"credits\">20 Credits<\/span>\n\t\t\t\t\t\t\t\t<span class=\"compulsary\">(Compulsory)<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<p> Low-cost network devices add eyes, ears or sensors and arms, legs or actuators to the Internet. These devices are then connected to a computer, either physically, via wireless or through the cloud, communicating live data. This computer will then utilise machine or deep learning in the cloud. This field of study is referred to as the Internet of Things (IoT).<\/p>\n<p>This module will cover the context and the history of the IoT, the hardware, communications protocols and security systems it relies on, and the cloud-side analytics that makes sense of the data produced. It will provide practical hands-on experience of common IoT devices (sensors, actuators, microcontrollers) and examine a range of commercial platforms.<\/p>\n<p>Students will work with a Wi-Fi microcomputer and will program live IoT applications using that device. Students will have the opportunity to produce their own IoT device with a range of hardware and capabilities. Emphasis is placed on the versatility of components that can be integrated into such systems, as well as the diversity of data types produced by IoT edge nodes. Development of IoT applications also requires communication between different level (layers) of IoT architecture with the associated security and privacy issues.<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/details><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-d671d741-dfa0-4d70-b3a0-7420fa7a8f60\" data-name=\"Placement information\" data-count=\"6\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;placementInformation&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;AND&quot;}\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"happypress-custom-fields happypress-custom-fields-placementInformation has-text-color has-primary-color wp-elements-818ad5da1a1b48012189a19eee2aa4c8\"><p>Placement information<\/p>\n<p>Our Careers team provides tailored advice, placements and workshops to help you build confidence and prepare for life after university. <\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-8f6e75ed-5fce-4fbf-ad04-448521381e17\" data-name=\"Studying in Birmingham\" data-count=\"7\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;studyingAndLivingInBirmingham&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;AND&quot;}\">\n<div class=\"wp-block-cover alignfull\" style=\"padding-top:80px;padding-bottom:80px;min-height:354px;aspect-ratio:unset;\"><img decoding=\"async\" class=\"wp-block-cover__image-background wp-image-896 size-large\" alt=\"\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/themes\/birmingham-newman-parent\/assets\/dist\/img\/birmingham-brindley-place.webp\" data-object-fit=\"cover\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-blue-background-color has-background-dim-80 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-block-cover-is-layout-constrained\"><div class=\"happypress-custom-fields happypress-custom-fields-studyingAndLivingInBirmingham\"><p>Studying and living in Birmingham<\/p>\n<p>At Birmingham Newman University, you\u2019ll enjoy the best of both worlds: a peaceful, green campus that creates the ideal setting for focused study and personal reflection, yet remains just eight miles from the vibrant city centre.<\/p>\n<p>As the UK\u2019s second-largest city, Birmingham is also one of the youngest and most diverse in Europe, offering a dynamic blend of culture, innovation and opportunity. From world-renowned museums and music venues to a thriving food scene alongside a growing business and tech sector, it\u2019s a place where creativity and ambition naturally thrive.<\/p>\n<p>Experience Birmingham: A City Full of Possibilities<\/p>\n<p>Whether you&#039;re discovering the Midlands for the first time or already know the area well, Birmingham provides a lively and inclusive environment for students. As one of the most energetic and multicultural cities in the UK, it\u2019s a place where you can grow academically while developing personally. Its rich cultural heritage, creative energy and broad range of opportunities make it an inspiring backdrop for your university journey.<\/p>\n<p>A City That Loves Great Food<\/p>\n<p>Birmingham is a brilliant place to explore diverse culinary experiences. You might wander through the famous Balti Triangle, sample global street food at Digbeth Dining Club or enjoy a relaxed meal by the canals in Brindleyplace. The city is also home to independent caf\u00e9s, vegan-friendly eateries and countless hidden gems. Whether you&#039;re grabbing a quick bite between lectures or planning an evening out, there\u2019s always something new to discover.<\/p>\n<p>Arts, Culture and Entertainment<\/p>\n<p>The city pulses with creativity. You could catch live music at the O2 Academy, experience a world-class performance at the Birmingham Hippodrome or browse exhibitions at the Birmingham Museum and Art Gallery. Creative spaces like the Custard Factory showcase local talent while hosting events that celebrate innovation. With festivals, sporting fixtures and cultural celebrations taking place year-round, there\u2019s never a shortage of things to enjoy.<\/p>\n<p>Simple &amp; Convenient Travel<\/p>\n<p>Getting around Birmingham is straightforward thanks to its well-connected public transport system. Buses, trams and trains make it easy to reach campus, explore the city or travel further afield. Whether you&#039;re commuting daily or heading off for a weekend adventure, transport is both accessible and affordable.<\/p>\n<p>Life Beyond the Lecture Hall<\/p>\n<p>Your time at Birmingham Newman University extends far beyond academic study. You\u2019ll have the chance to join student societies, contribute to community projects or try something entirely new. The university\u2019s supportive atmosphere encourages you to build confidence, develop practical skills and feel genuinely at home throughout your studies.<\/p>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-a721aa09-a63a-4872-8d8d-b5dadf742892\" data-name=\"What careers can I consider?\" data-count=\"8\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;whatCareersCanIConsider&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;AND&quot;}\"><div class=\"happypress-custom-fields happypress-custom-fields-whatCareersCanIConsider has-text-color has-primary-color wp-elements-274c72f54a34fc50debc5576fea5a2c8\"><p>What careers can I consider<\/p>\n<p>Graduates of this degree are well-prepared for roles in cyber analysis, software development, security consultancy or digital investigations across public, private or voluntary sectors. You may choose to work in areas such as penetration testing, secure systems design or threat intelligence. The course also supports progression into postgraduate study or professional certification. You will be equipped to contribute confidently to digital security teams and help protect systems, data and networks. Support from Birmingham Newman University\u2019s Careers and Employability Service includes mentoring, networking opportunities and guidance on further study or employment.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-9c466f90-046d-401c-a69f-f14cbcc142a7\" data-name=\"Accreditations and exemptions\" data-count=\"9\" data-conditional-meta=\"{&quot;conditions&quot;:[{&quot;field&quot;:&quot;accreditationsAndExemptions&quot;,&quot;operator&quot;:&quot;isset&quot;,&quot;valueType&quot;:&quot;static&quot;,&quot;value&quot;:&quot;&quot;,&quot;compareField&quot;:&quot;&quot;}],&quot;relationship&quot;:&quot;AND&quot;}\">\n<div class=\"wp-block-group alignfull has-opal-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"happypress-custom-fields happypress-custom-fields-accreditationsAndExemptions has-text-color has-primary-color wp-elements-bf803926b1bcc926ee7592b5008160dc\"><p>Accreditations and exemptions <\/p>\n<p>This degree is academically rigorous and professionally relevant, preparing you for careers that require strong technical knowledge, ethical awareness and problem-solving skills. The curriculum is informed by current industry standards and reflects the expectations of bodies such as the UK Cyber Security Council and BCS. As a student at Birmingham Newman University, you will benefit from a programme that is intellectually challenging, socially engaged and aligned with the evolving demands of the digital sector. You will graduate prepared to contribute confidently to cyber security and computing roles. <\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-newman-course-section alignfull course-section\" id=\"course-section-4823e317-c34b-4040-ad54-17b9a6f073d9\" data-name=\"Courses you might like\" data-count=\"10\"><section class=\"wp-block-newman-query query-block newman-query alignfull  has-3-columns\"  style=\"padding-top:0px;padding-bottom:0px;\">\n\t\t\t<div class=\"query-block__container\">\n\t\t\t\t<div class=\"query-block__header mb-4 fade-in-up is-flex is-justify-content-space-between is-align-items-center\">\n\t\t\t\t\t<h2 class=\"mb-0 query-block__title has-primary-color\">Courses we think you&#039;ll also like<\/h2>\n\t\t\t\t\t<div class=\"is-flex gap-2 is-align-items-center is-justify-content-flex-end\">\n\t\t\t\t\t\t<div class=\"query-block__desktop-buttons\"><\/div>\n\t\t\t\t\t\t\n\t\t<div class=\"query-block__buttons is-flex is-justify-content-space-between\">\n\t\t\t<button class=\"prev next-button carousel-nav-button button-reset carousel-prev\" title=\"Scroll carousel left\">\n\t\t\t\t<span class=\"next-button__text is-sr-only\">Slide carousel left<\/span>\n\t\t\t\t<span class=\"next-button__icon\">\n\t\t\t\t\t<svg viewBox=\"0 0 512 512\" width=\"24\" height=\"24\"><path fill=\"#002c4b\" d=\"M9.4 233.4c-12.5 12.5-12.5 32.8 0 45.3l128 128c12.5 12.5 32.8 12.5 45.3 0s12.5-32.8 0-45.3L109.3 288 480 288c17.7 0 32-14.3 32-32s-14.3-32-32-32l-370.7 0 73.4-73.4c12.5-12.5 12.5-32.8 0-45.3s-32.8-12.5-45.3 0l-128 128z\" vector-effect=\"non-scaling-stroke\"\/><\/svg>\n\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t\t<button class=\"next prev-button carousel-nav-button button-reset carousel-next\" title=\"Scroll carousel right\">\n\t\t\t\t<span class=\"prev-button__text is-sr-only\">Slide carousel right<\/span>\n\t\t\t\t<span class=\"prev-button__icon\">\n\t\t\t\t\t<svg viewBox=\"0 0 512 512\" width=\"24\" height=\"24\"><path fill=\"#002c4b\" d=\"M502.6 278.6c12.5-12.5 12.5-32.8 0-45.3l-128-128c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3L402.7 224 32 224c-17.7 0-32 14.3-32 32s14.3 32 32 32l370.7 0-73.4 73.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0l128-128z\" vector-effect=\"non-scaling-stroke\"\/><\/svg>\n\t\t\t\t<\/span>\n\t\t\t<\/button>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"newman-query__loop query-block__loop query-block__content fade-in-up is-flex\">\n\t\t\t\t<div class=\"scroll-offset\" aria-hidden=\"true\"><\/div>\n<article class=\"card card--course faux-link--element\">\n\t<a class=\"faux-link\" aria-label=\"Read more about Computer Science BSc (Hons)\" href=\"https:\/\/newman.ac.uk\/courses\/course\/bsc-single-honours-computer-science-full-time\/\"><\/a>\n\t<div class=\"card--image\">\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"390\" height=\"223\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/uploads\/sites\/3\/2025\/09\/Computer-Science-2-390x223.webp\" class=\"attachment-window size-window wp-post-image\" alt=\"Computer Science robot equipment\" \/>\t<\/div>\n\t<div class=\"card--info mt-4 has-primary-color\">\n\t\t\t\t<h3 class=\"mb-2 mt-0 is-inline has-4-font-size has--font-size--mobile\">Computer Science BSc (Hons)<\/h3>\n\n\t\t<dl class=\"mt-2 mb-0\">\n\t\t\t\t\t\t\t<div class=\"dl-item mb-2\">\n\t\t\t\t\t<dt class=\"has-text-weight-bold is-inline has-primary-color\">Start date:<\/dt>\n\t\t\t\t\t<dd class=\"ml-0 is-inline\">September 2026<\/dd>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/dl>\n\t<\/div>\n<\/article>\n\n<article class=\"card card--course faux-link--element\">\n\t<a class=\"faux-link\" aria-label=\"Read more about Computing BSc (Hons)\" href=\"https:\/\/newman.ac.uk\/courses\/course\/bsc-single-honours-computing\/\"><\/a>\n\t<div class=\"card--image\">\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"390\" height=\"223\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/uploads\/sites\/3\/2025\/12\/Computing-390x223.webp\" class=\"attachment-window size-window wp-post-image\" alt=\"\" \/>\t<\/div>\n\t<div class=\"card--info mt-4 has-primary-color\">\n\t\t\t\t<h3 class=\"mb-2 mt-0 is-inline has-4-font-size has--font-size--mobile\">Computing BSc (Hons)<\/h3>\n\n\t\t<dl class=\"mt-2 mb-0\">\n\t\t\t\t\t\t\t<div class=\"dl-item mb-2\">\n\t\t\t\t\t<dt class=\"has-text-weight-bold is-inline has-primary-color\">Start date:<\/dt>\n\t\t\t\t\t<dd class=\"ml-0 is-inline\">September 2026<\/dd>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/dl>\n\t<\/div>\n<\/article>\n\n<article class=\"card card--course faux-link--element\">\n\t<a class=\"faux-link\" aria-label=\"Read more about Computer Science with Artificial Intelligence BSc (Hons)\" href=\"https:\/\/newman.ac.uk\/courses\/course\/bsc-single-honours-computer-science-with-artificial-intelligence-full-time\/\"><\/a>\n\t<div class=\"card--image\">\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"390\" height=\"223\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/uploads\/sites\/3\/2025\/08\/Computer-Science-5-390x223.webp\" class=\"attachment-window size-window wp-post-image\" alt=\"Computer Science student in class on laptop\" \/>\t<\/div>\n\t<div class=\"card--info mt-4 has-primary-color\">\n\t\t\t\t<h3 class=\"mb-2 mt-0 is-inline has-4-font-size has--font-size--mobile\">Computer Science with Artificial Intelligence BSc (Hons)<\/h3>\n\n\t\t<dl class=\"mt-2 mb-0\">\n\t\t\t\t\t\t\t<div class=\"dl-item mb-2\">\n\t\t\t\t\t<dt class=\"has-text-weight-bold is-inline has-primary-color\">Start date:<\/dt>\n\t\t\t\t\t<dd class=\"ml-0 is-inline\">September 2026<\/dd>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/dl>\n\t<\/div>\n<\/article>\n\n<article class=\"card card--course faux-link--element\">\n\t<a class=\"faux-link\" aria-label=\"Read more about Computer Science with Bioinformatics BSc (Hons)\" href=\"https:\/\/newman.ac.uk\/courses\/course\/bsc-single-honours-computer-science-with-bioinformatics\/\"><\/a>\n\t<div class=\"card--image\">\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"390\" height=\"223\" src=\"https:\/\/newman.ac.uk\/courses\/wp-content\/uploads\/sites\/3\/2026\/01\/Bioinformatics-390x223.webp\" class=\"attachment-window size-window wp-post-image\" alt=\"Student in classroom, working on laptop\" \/>\t<\/div>\n\t<div class=\"card--info mt-4 has-primary-color\">\n\t\t\t\t<h3 class=\"mb-2 mt-0 is-inline has-4-font-size has--font-size--mobile\">Computer Science with Bioinformatics BSc (Hons)<\/h3>\n\n\t\t<dl class=\"mt-2 mb-0\">\n\t\t\t\t\t\t\t<div class=\"dl-item mb-2\">\n\t\t\t\t\t<dt class=\"has-text-weight-bold is-inline has-primary-color\">Start date:<\/dt>\n\t\t\t\t\t<dd class=\"ml-0 is-inline\">September 2026<\/dd>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/dl>\n\t<\/div>\n<\/article>\n\n\t\t\t<\/div>\n\t\t\t<div class=\"query-block__container\">\n\t\t\t\t<div class=\"query-block__meta is-flex gap-2 is-align-items-center\">\n\t\t\t\t\t<div class=\"query-block__mobile-buttons is-hidden mt-5\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":15,"featured_media":1848,"parent":0,"template":"","tags":[],"subject-area":[21,86],"study-mode":[67],"class_list":["post-3019","course","type-course","status-publish","has-post-thumbnail","hentry","subject-area-computer-science","subject-area-undergraduate","study-mode-full-time"],"acf":[],"_links":{"self":[{"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/course\/3019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/course"}],"about":[{"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/types\/course"}],"author":[{"embeddable":true,"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/users\/15"}],"version-history":[{"count":5,"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/course\/3019\/revisions"}],"predecessor-version":[{"id":7510,"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/course\/3019\/revisions\/7510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/media\/1848"}],"wp:attachment":[{"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/media?parent=3019"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/tags?post=3019"},{"taxonomy":"subject-area","embeddable":true,"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/subject-area?post=3019"},{"taxonomy":"study-mode","embeddable":true,"href":"https:\/\/newman.ac.uk\/courses\/wp-json\/wp\/v2\/study-mode?post=3019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}