BEng (Hons) Cyber security

Relevant course providers

Relevant specialisations

Apprenticeships 


Course:

BSc IT Software Development (Graduate Apprenticeship)


Study:

Online

Undergraduate 


Course:

BA Business Analysis & Technology


Study:

In-Person

Undergraduate 


Course:

BSc Artificial Intelligence and Computer Science


Study:

In-Person

Undergraduate 


Course:

BSc Artificial Intelligence


Study:

In-Person

Further Education 


Course:

Networking HND (BEng (Hons.) Cyber Security, Networks and Systems – University Route)


Study:

Online

Further Education 


Course:

Cyber Security HND (BEng(Hons) Cyber Security and Forensics


Study:

In-Person

Further Education 


Course:

Web Development HND (BSc Web Development – University Route)


Study:

In-Person

Further Education 


Course:

Software Development HND


Study:

In-Person

Apprenticeships 


Course:

BSc Software Engineering (Graduate Apprenticeship)


Study:

In-Person

Apprenticeships 


Course:

BSc (Hons) Graduate Apprenticeship AI and Data Science


Study:

In-Person

Apprenticeships 


Course:

BSc (Hons) Graduate Apprenticeship Cyber Security


Study:

In-Person

Undergraduate 


Course:

BSc Environmental Management


Study:

In-Person

Related roles

Cybersecurity Analyst

Are you intrigued by protecting financial data and ensuring the security of digital transactions? As cyber threats evolve, financial institutions… read more

IT Support Specialist

IT Support Specialists in the financial services sector are responsible for maintaining and troubleshooting the organisation’s technology infrastructure. They provide… read more

Security Architect

Are you passionate about designing secure IT frameworks? As cyber threats evolve, financial institutions need skilled Security Architects to develop… read more

Technology Consultant

Technology Consultants provide expert advice to organisations on the effective use of technology to achieve business goals. They assess current… read more

AI Risk Manager

An AI Risk Manager is responsible for identifying, assessing, and mitigating the risks associated with implementing AI technologies in financial… read more

Related skills

Computing / IT

Computing and IT encompass the technical knowledge required to manage, maintain, and develop an organisation’s technology infrastructure. This includes proficiency… read more

Data Analytics

Proficiency in data analysis tools such as Excel, SQL, Python, and advanced statistical methods is essential. Analysing financial data to… read more

Digital skills

With the increasing reliance on technology, having strong digital skills is essential for navigating today’s work environments. read more

Analytical skills

Analytical skills involve the ability to collect, interpret, and analyse data to solve problems, make decisions, and understand complex issues. read more

Problem solving

Problem-solving is the ability to identify, analyse, and find effective solutions for complex issues and challenges. read more

Sense making

Sense making is the ability to interpret complex information and understand its deeper meaning. This skill is crucial in the… read more

Continuous learning

Continuous learning refers to the ability to continually acquire new knowledge and skills throughout one’s career or life. read more

Curiosity

Curiosity is the desire to learn or know more about something, driven by a sense of wonder and the need… read more

Communication

Communication skills involve interacting with other people in order to effectively convey information, ideas, and feedback both verbally and in… read more

Risk management

Risk management as a skillset involves identifying, assessing, and controlling threats. read more

Initiative

Initiative is the readiness to take action and seize opportunities without being prompted. read more

Integrity

Integrity involves acting in accordance with moral principles and being honest and ethical in all actions. read more

Related interests

Cybersecurity

Cybersecurity focuses on protecting computer systems, networks, and data from unauthorised access, attacks, or damage. It encompasses a range of… read more

Back to top of the page