1 minute read

Technical Professional Cyber Security Risk

Course Overview

THE BSC (HONS) CYBER SECURITY TECHNICAL PROFESSIONAL DEGREE APPRENTICESHIP PROGRAMME IS DESIGNED TO ENHANCE AND ACCELERATE CAREER PROSPECTS THROUGH ENGAGING IN A WORK BASED LEARNING PROGRAMME PROVIDING OPPORTUNITIES TO DEVELOP AN UNDERSTANDING OF CYBER SECURITY ISSUES AND TECHNOLOGY SOLUTIONS AND CAPITALISE ON OPPORTUNITIES FOR APPLIED LEARNING WITHIN THE CONTEXT OF EMPLOYMENT.

Advertisement

Role Profile

The BSc (Hons) Cyber Security Technical Professional Degree Apprenticeship is designed to enhance and accelerate cyber skills. It is a work-based learning programme that develops advanced understanding of cyber security issues and technology solutions. It is a structured, research-rich learning programme that includes a range of learning experiences – including classroom workshops and work-based activities. As a work-based programme, it supports development of skills needed within an organisation.

Why Choose This Programme

• Programme takes a holistic view covering many fundamental aspects of computing with an overarching focus of how security flows through these

• ‘Grow your own’ graduate talent - develop the skills you need in your business

• Degree awarded by Northumbria University who are recognised for excellence in cyber security by the NCSC

• Designed to meet the requirements of the BCS, The Chartered Institute for IT and intended to meet the educational requirements for Chartered Information Technology Professional (CITP) registration

• Access to our Academic Community of Excellence (ACE) Team who support your academic development throughout your programme

• Professional practice modules allow learners to identify an appropriate mode of study through which they will develop skills and knowledge relevant to their role and personal development.

Entry Requirements

An A Level in ICT

OR an International Baccalaureate at Level 3 in ICT

OR a Level 3 apprenticeship in a similar subject

OR a BTEC Extended Diploma in IT (180 credits)

This article is from: