Computer Science lecturers teaching students in a classroom6.

Year of study

2025

Key details

Start date(s)
September 2025
Location
Leeds City Campus
School
Computer Science
UCAS tariff points
112-144
Study Mode
Full-time (3 years)
Study abroad
Yes

Are you interested in how cyber security is used to help defend computer systems against digital crime?

Would you like to learn to design, implement and manage cyber resilience initiatives?

This course provides a comprehensive introduction to computer science with a focus on cyber security, including the tools and techniques used to secure and protect computer systems, networks and data.

The Student Contract

About this course

There is an urgent need to find solutions and answers to the ongoing threat of digital crimes, coupled with a skills gap in information security and data privacy across the employment sector.

This degree is designed to equip you with the theoretical, conceptual and practical skills needed to defend and mitigate possible threats in computing and networking environments.

You’ll gain a broad perspective on the handling of sensitive and confidential information, including consideration of government regulation and ethics.

Our academic experts will introduce you to the tools, frameworks and concepts used by adversaries (black hat) to compromise computer systems. You’ll use this knowledge to develop mitigation strategies and build strong defensive walls across the computer network and computing infrastructure.

You’ll develop practical hands-on, technical skills and awareness of the core concepts, theories and principles of how to secure data and information against breach and compromise.

Through the professional work placement and employer projects included in your degree, you’ll learn about current practices in the cyber security industry and be able to put theory into practice, while building your employability skills, such as teamwork and leadership.

The course provides additional opportunities to obtain professional industry-recognised certifications in areas relevant to hacking and cyber security, such as Cisco Certified Network Associate (CCNA), Microsoft Certified Ethical Hacker and CompTIA Penetration Tester (PenTest), which can help you stand out in the job market.

You’ll graduate ready to apply your acquired knowledge to design, implement, manage and lead initiatives on cyber intelligence, cyber resilience and threat mitigation, working to secure data for both public and private employers in a range of computing and business-related contexts.

Why study with us?

  • Gain a comprehensive understanding of threat mitigation strategies and cyberdefense intelligence.
  • Develop your applied knowledge of core theories, concepts, principles and policy regulations of data privacy.
  • Undertake professional work placements to apply theory in a real-world setting and gain highly desirable employability skills.
  • Enhance your CV through opportunities to obtain professional certifications from tech giants, including Cisco and Microsoft.
Computer Science student working at a computer.

Course modules

You will study a variety of modules across your programme of study. The module details given below are subject to change and are the latest example of the curriculum available on this course of study.

Year 1

During your first year, you will study five core modules.

Software Development - Core

You'll be introduced to the fundamentals required to develop software artefacts fit for real-world organisational and commercial purposes. 

Explore three stages of software development: problem specification, programming and architectural design.

We'll look at problem decomposition and programming, mathematical algorithms and computing problems, writing modular code and adopting relevant stylistic conventions and testing in project planning and implementation.

 

 

Tech Stack - Core

The web is now a ubiquitous medium that crosses platforms from desktop and mobile to the Internet of Things (smart; homes, car, cities) for both personal and collaborative experiences.

The ways in which we design for, develop and deploy these applications constantly evolves, due to the increasing and changing needs of users, society and enterprise. With this in mind, designers need to evolve the way that they design for future platforms.

With a rise in web-based solutions, data driven philosophies are founded upon a platform agnostic approach to designing for the web. This data needs to be stored securely, parsed and presented to the user in a way that builds trust, and is interactive and insightful.

You'll focus on modern web applications in the era of cloud computing.

Computing Skills - Core

You'll be encouraged to engage in a comprehensive audit and introspection of your computing skills and career aspirations. The aim is to create a dynamic learning environment that empowers you to not only understand you current proficiency in computing but also to reflect upon and refine your career goals throughout your academic journey.

Learn the basics of computer networking, both from a technical approach and a holistic viewpoint. Enhance your problem-solving abilities, refine your communication skills and acquire a keen attention to detail.

You'll be equipped students with a well-rounded toolkit that goes beyond the technical aspects of computing, preparing you for the multifaceted challenges in your future careers.

You'll also actively participate in a Professional Challenge Project or undertake a meaningful work placement.

User Experience - Core

Discover the processes of interface design, evaluation and user experience.

You'll cover computer users, interaction technology and concepts, interaction applications, and the context of computer use. 

Learn about user interface design using prototyping, and about methods for evaluating user experience. Practise key design and evaluation techniques in the context of your assessments.

In the UX Team Project activities, you'll learn how to work in teams and apply Agile development methods to deliver a UX solution. This may be employer led and be accompanied by a live brief. 

Year 2

During your second year, you will be required to study four core modules.

Ethical Hacking - Core

Ethical hacking embodies the idea of proactively identifying vulnerabilities before malicious attackers can exploit them, allowing for timely fixes and the mitigation of associated risks. This approach not only aids in fortifying cybersecurity defences but also serves as a vital tool to assess the resilience of computer systems. 

You'll explore a diverse range of ethical hacking concepts, tools and techniques. Acquire the knowledge and skills necessary to implement effective solutions for identified threats, contributing to the overall enhancement of cybersecurity measures.

 

Algorithms and Data Structures - Core

You'll develop computational thinking as fundamental problem solving expertise within the realm of core computer science knowledge, expected of and utilised by all computing practitioners.

Study the core algorithms and data structures and be introduced to algorithm analysis and basic computability.

Learn about data types such as stacks, queues, trees and graphs, understand time and space complexity, write and explain commonly used algorithms, use a variety of different data structures and understand the concepts of computability and complexity.

Delve into the computational facets of data representation and fostering familiarity with established, proven solutions to recurring problems encountered in various computing contexts and practical applications.

Computer Networking and Security - Core

Networks are integral components of most computer systems. You'll be  introduced to the fundamentals of networking and networked systems, with the necessary knowledge to explore computer network standards and protocols with a specific focus on security considerations.

Delve into practical skills required to design a network tailored to a particular business scenario, emphasising the importance of incorporating robust security measures. 

You'll obtain a combination of theoretical knowledge and hands-on experience to enable you to not only comprehend networking concepts but also apply them in real-world scenarios, ensuring the creation of secure and efficient computer networks.

 

Thematic Project - Core

You'll cultivate the essential project leadership skills demanded by computer practitioners through a people-centric approach. 

Through the lens of Agile methodology, you'll engage in a programme-specific group project, immersing themselves in collaborative and dynamic work environments

Your comprehension of the social, professional, ethical and legal dimensions of computing, as well as a focus on equality and diversity within the context of their programme will be reinforced.

This module will act as a crucial preparatory step for your final year project by introducing vital elements such as teamwork, project planning and investigative skills.

The immersive experience not only enhances your technical acumen but also provides ample opportunities for reflection, fostering the development of personal and communication skills crucial for effective teamwork and future employability. 

Year 3

During your final year, you will study four core modules.

Secure Development and Deployment - Core

Cover principles, methodologies and processes that enable secure and effective end-to-end software product development and deployment.

Build on your software design and development skills gained in earlier modules so you can securely develop, deploy, and retire software using platforms such as Azure and AWS.

You'll mainly be doing practical work, with code review forming a substantial part of the module.

Project - Core

Bring together your learning across previous modules and your elective specialist modules to take on an independent project.

You'll demonstrate advanced skills and knowledge in a specific subject area, define problem boundaries and investigate plausible solutions with reference to wider social and cultural contexts.

The goal is to deliver a software artefact that has real context.

You'll communicate your findings in oral and written forms.

Cyber Security - Core

Get equipped with theoretical and practical skills to defend and mitigate threats in computing and network environments.

You'll learn about government regulation and ethics around handling sensitive and confidential information.

Discover tools, frameworks and concepts used by adversaries (black hat) to compromise networks.

You'll use this knowledge to come up with a mitigation strategy and build strong defensive walls across your network and computing infrastructure.

Data Science - Core

Explore topics from a range of application areas and work with real data to explore and solve known problems with the analysis of different types of datasets through a practical approach to learning by exploring topics through the study of applied examples.

You'll be prepared for roles which combine data analysis with data-driven decision making and be introduced to the basics of big data processing. 

Professional work placements

Experience matters. That's why we embed professional work placements within the majority of our standard undergraduate degrees.

How does it work?

Careers and Placements will work with you to find a placement or help you to arrange your own, whether that's in Leeds, another part of the UK or even abroad. You will be able to take part in a series of workshops, events and live ‘employer challenges’ to boost your confidence and prepare you for your placement.

During your placement, you could have an opportunity to gain degree-relevant work experience, build your knowledge of career sectors and secure valuable employer references and industry contacts. This experience will help you to shape your career decisions and find the right path for you.

Our established links with business and tech companies across the region means there are a wide range of sectors where you can undertake your placement. Previous placement providers for Computer Science students include Sky, Infinity Works, Aire Logic and TwentySix Digital. However, cybersecurity opportunities exist across the public and private sector, and we aim to match your placement to your chosen area of interest.

During your placement, you'll gain valuable work experience and acquire relevant skills in different cybersecurity roles such as ethical hacker, IT security operations, cyber-analyst, cyber-operations (CyberOps), operations management, risk management, security architect, penetration testing (Pentest), public policy and regulation, information security analyst, Cyber technical support, risk and compliance, cyberpolicy and regulation. 

To find out how we can help you make your career ambitions a reality, visit:

Professional Work Placements

Got a question about the course?

Our Computer Science team are on hand to answer your questions, whether you want to know about the modules you'll be studying, where you can complete your professional placement or the types of assessments you'll do, they are here to help.

Learning and teaching

Assessment

A variety of assessment methods are used, matched to the learning outcomes for your programme, allowing you to apply and demonstrate the full range of knowledge and skills that you have developed.

For more details on specific assessment methods for this course contact [email protected]

Programme delivery

Your time on campus, learning through in-person teaching, is at the heart of your academic experience and the way we deliver our programmes. This is supported and further enhanced by additional engagement activities and opportunities provided online and through digital teaching materials. This blended approach seeks to ensure a positive learning and teaching student experience.

Your programme of study has been carefully designed around a three-phase model of delivery:

  1. Preparation: You will be given clear tasks to support you in preparing for live teaching. This could include watching a short-pre-recorded lecture, reading a paper or text chapter or preparing other material for use in class.
  2. Live: All your live teaching will be designed around active learning, providing you with valuable opportunities to build on preparation tasks, interact with staff and peers, and surface any misunderstandings.
  3. Post: Follow-up activities will include opportunities for you to check understanding, for staff to receive feedback from you and your peers to inform subsequent sessions, and for you to apply learning to new situations or context.

Preparation, Live and Post teaching and learning and the digital materials used will vary by course, but will be designed to help you structure your learning, take a full and active part in your course, and apply and test your developing knowledge and skills.

Learning and teaching

At Leeds Trinity we aim to provide an excellent student experience and provide you with the tools and support to help you achieve your academic, personal and professional potential.

Our Learning, Teaching and Assessment Strategy delivers excellence by providing the framework for:

  • high quality teaching
  • an engaging and inclusive approach to learning, assessment and achievement
  • a clear structure through which you progress in your academic studies, your personal development and towards professional-level employment or further study.

We have a strong reputation for developing student employability, supporting your development towards graduate employment, with relevant skills embedded throughout your programme of study.

We endeavour to develop curiosity, confidence, courage, ambition and aspiration in all students through the key themes in our Learning and Teaching Strategy:

  • Student Involvement and Engagement
  • Inclusion
  • Integrated Programme and Assessment Experience
  • Digital Literacy and Skills
  • Employability and Enterprise

To help you achieve your potential we emphasise learning as a collaborative process, with a range of student-led and real-world activities. This approach ensures that you fully engage in shaping your own learning, developing your critical thinking and reflective skills so that you can identify your own strengths and weaknesses, and use the extensive learning support system we offer to shape your own development.

We believe the secret to great learning and teaching is simple: it is about creating an inclusive learning experience that allows all students to thrive through:

  • Personalised support
  • Expert lecturers
  • Strong connections with employers
  • An international outlook
  • Understanding how to use tools and technology to support learning and development

Entry requirements

Leeds Trinity University is committed to recruiting students with talent and potential and who we feel will benefit greatly from their academic and non-academic experiences here. We treat every application on its own merits; we value highly the experience you illustrate in your personal statement.

Information about the large range of qualifications we accept, including A-Levels, BTECs and T Levels, can be found on our entry requirements page. If you need additional advice or are taking qualifications that are not covered in the information supplied, please contact our Admissions Office.

Entry requirements for this course:
QualificationGrade
UCAS tariff112-144
GCSE requirementsGCSEs at grade C or 4 (or higher) are required in English Language and Maths

Fees and finance

UK Home fees £9,535 per year
Full-time

Funding

UK Home Students:

Tuition fees cost £9,535 a year for this course in 2025/2026. Students who enrolled in 2024/2025 will also be charged £9,535 for academic year 2025/2026.

Tuition fees for part-time study are charged a pro-rata amount of the full-time equivalent.

Depending on government policy, tuition fees may change in future years.

Tuition fees for 2026/2027 entry will be set in summer 2025.

Living costs, e.g. accommodation, travel, food, will also need to be taken into consideration.

Leeds Trinity offers a range of bursaries and scholarships to help support students while you study.

International Students, including EU Students:

Visit our webpage for international students.

Part-time study is not available for international students on a Student Route Visa. 

Additional costs

We advise students that there may be additional course costs in addition to annual tuition fees:

  • Recommended and required reading lists will be provided at the start of your course. All the books and e-books are available from our Library to borrow but you may choose to purchase your own.
  • On some courses there may be additional costs, such as field trips, equipment, accreditations, that may be part-funded by the University. More details will be provided at the start of the course.
  • You'll need to include placement/s travel and associated costs too, however the University will contribute a standard amount towards your total expenditure.
  • The University provides students with a £6 printing credit each academic year which can be topped up either on campus or online.

How to apply

For full-time undergraduate courses, you apply through UCAS. That's the University and Colleges Admissions Service.

On your application form, you'll need to know our institution code - it's L24 - and the course code. If you click through to the UCAS website using the button below, it'll take you to the right place with all the information you need.

You'll need to write a personal statement - we've prepared a guide to help you.

Applications are now open for courses starting in September 2025. The UCAS application deadline for courses starting in September 2025 is 29 January 2025.

There's lots more information about the application process on the UCAS website, or you can get in touch with our admissions team who will be happy to help:

Graduate opportunities

Providing you with the opportunity to develop the professional skills and experience you need to launch your career is at the heart of everything we do at Leeds Trinity University.

There is an increasing demand for cyber security professionals and graduates from this course will be well-positioned to exploit the wide range of career opportunities in this growing field across the public and private sector, including penetration tester, cyber security analyst, network security engineer, security architect and security risk and governance or become self-employed. The degree also offers a solid foundation for postgraduate study or academic research in related disciplines.

After you graduate, Careers and Placements will help you as you pursue your chosen career through our mentoring scheme, support with CV and interview preparation and access to graduate employability events.

To find out how we can help you make your career ambitions a reality, visit:

Careers

Meet the team

Computer Science Nicky Danino
View Profile
Computer Science Yash Baradaranshokouhi
View Profile
Computer Science Antesar Shabut
View Profile
Computer Science Jim Diockou
View Profile

Find out more about LTU from our students

Chat with our students

What is Discover Uni?

Discover Uni is the official, authoritative source of information and guidance on higher education in the UK. The website allows you to search for and compare data and information on university and college programmes from across the UK.

It helps you make sense of all the information out there by linking to other quality resources and explaining what can be found where. It also allows you to search for and compare information and data for individual undergraduate courses across the UK.

r