{"id":258909,"date":"2025-02-04T09:18:32","date_gmt":"2025-02-04T09:18:32","guid":{"rendered":"https:\/\/www.edgehill.ac.uk\/?post_type=course&#038;p=258909"},"modified":"2026-03-03T10:56:08","modified_gmt":"2026-03-03T10:56:08","slug":"cyber-security-2","status":"publish","type":"course","link":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":551,"featured_media":259502,"menu_order":0,"template":"","snippet":[],"feature":[11386,11390,11391],"module":[],"mode":[],"level":[],"qualifications":[],"venues":[],"types":[],"class_list":["post-258909","course","type-course","status-publish","has-post-thumbnail","hentry","course_feature-international-students-can-apply","course_feature-sandwich-year","course_feature-overseas-study-available"],"acf":{"course_setup":{"ehu_course_code":"BAS000457","kis_code":"BAS000457\/F, BAS000457\/P","course_qualification":11531,"course_type":11496,"display_clearing":false,"apply_direct":true,"jacs_codes":"","jacs_subjects":"","course_study_level":103,"prospects_study_level_override":"Off","taughtresearch":"Taught","course_hero_cta_1":"","course_hero_cta_2":{"title":"Apply through UCAS","url":"https:\/\/digital.ucas.com\/coursedisplay\/courses\/5366cd98-8402-4c26-9778-157a10ad1a35?academicYearId=2026","target":""},"book_open_day_link":"https:\/\/www.edgehill.ac.uk\/study\/visit-us\/open-days\/","covid-19_course_statement":"Our blended delivery involves a mix of online and face-to-face sessions in computing laboratories. We introduce theoretical concepts by building on concrete practical activity.\r\n\r\nSessions are highly interactive, with practical application of concepts a key factor, as well as cases drawn from real-life. Workshops, seminars, group tutorials, supervised support sessions and practical exercises provide opportunities for you to work with your peers and develop the essential people skills to complement your technical ability.\r\n\r\nStudying on a full-time basis, you will be required to attend a mix of online and face-to-face sessions for up to four days a week.\r\n\r\nYou will be assessed through a combination of practical exercises, coursework, portfolios, reports, essays, presentations, or examinations. We want you to develop the ability to work effectively both independently and as part of a team, therefore assessment includes some small group activities, though the emphasis is strongly on individual work."},"course_overview":{"abstract":"Become a front-line defender in the crucial fight for cyber safety. Our industry-aligned BSc (Hons) Cyber Security degree provides the knowledge, tools, and techniques in high-demand areas like ethical hacking, security operations, trustworthy intelligent systems and secure coding, preparing you for a career in this fast-paced field.","announcement":"","announcement_styling":{"enable_announcement_styling":false,"announcement_icon":"Exclamation:fa-solid fa-exclamation","announcement_icon_colour":"","announcement_text_colour":"","announcement_background_colour":""},"example_offers_preview":"BCC-BBC (A Level) or DMM (BTEC)104-112 UCAS Tariff points","overview":"Are you fascinated by the challenge of safeguarding networks and protecting them from cyber criminals? Do you have a strong interest in computing, secure software development, and emerging technologies?\r\n\r\nFor families, businesses, and governments, the systems and data within their networks are critical assets. With cyber criminals constantly devising more inventive methods to breach, disrupt, and deceive, the need to secure digital information is now more urgent than ever.\r\n\r\nThis degree is structured to immerse you in cutting-edge subjects such as Behavioural Cyber Security, Ethical Hacking, Machine Learning in Cyber Security, Trustworthy Intelligent Systems, Cyber Security Operations and Secure Software Development.\r\n\r\nYou will develop specialised knowledge in high-demand, advanced fields, with a significant emphasis on artificial intelligence including Machine Learning in Cyber Security and Secure Software Development which are shaped by current industry trends, giving you up-to-date knowledge and the in-demand skills that employers are looking for.\r\n\r\nModules such as Trustworthy Intelligent Systems and Cyber Security Operations focus on emerging areas like smart infrastructure and large-scale security operations, ensuring the programme remains current and closely aligned with developments in the sector.\r\n\r\nWe will give you opportunities to use industry-standard tools and apply your knowledge to real-world situations within our Tech Hub laboratories and workspaces, which are dedicated to cyber security training.\r\n\r\nYou will graduate possessing the technical abilities and professional qualities that employers highly value. By understanding global cyber security trends, you will also be ready to pursue international career paths. We will provide you with the highly sought-after knowledge and skills that organisations require to defend themselves against impending cyber-attacks.","accreditation":"","partner":"","youtube_video_id":"","course_features":[11390,11391,11386]},"course_study":[{"study_period":{"start":"20260101","end":"20270101"},"study_snippet":[11657],"study_thematic":"","study_modules":[{"year_title":"Year 1","modules_overview":"Year 1 is designed to help you grasp the principles, technologies and science that combine to create computer networks and explore the foundations of cyber security. You\u2019ll learn how to analyse computer systems and suggest improvements. We\u2019ll introduce you to the basics of computer architectures and networking, and the fundamentals of programming. You\u2019ll also receive an introduction to the computing industry and develop essential transferable skills.","modules_year":[{"acf_fc_layout":"modules_compulsary","compulsory_text":"Compulsory Modules: ","modules":[13482,15986,13481,13484,7636,13483]}]},{"year_title":"Year 2","modules_overview":"In Year 2 of the BSc (Hons) Cyber Security, you will engage with key topics such as Machine Learning in Cyber Security, Ethical Hacking, and Behavioural Cyber Security, enhancing their technical proficiency and understanding of contemporary threats. The curriculum includes a focus on protecting personal data during online transactions. You will study Database Systems and Computer Networks, providing essential knowledge for managing and securing information. The professional practice module in this year emphasises teamwork through collaborative projects, also helping to boost your employability before entering Year 3.","modules_year":[{"acf_fc_layout":"modules_compulsary","compulsory_text":"Compulsory Modules: ","modules":[15989,13532,13526,15988,15987,13553]}]},{"year_title":"Year 3","modules_overview":"In Year 3, you will deepen your expertise through a series of compulsory modules designed to prepare you for advanced roles in the field. The Cyber Security and Incident Response module equips you with critical skills to identify, manage, and respond to security incidents effectively. In Trustworthy Intelligent Systems, you will explore the integration of artificial intelligence in security frameworks, ensuring systems are both reliable and secure. The Cyber Security Operations module focuses on operational practices and strategies for protecting information systems, while Secure Software Development teaches best practices for creating resilient applications. The Cyber Security Project allows you to apply your knowledge to real-world challenges, culminating in a piece of work that showcases your skills and readiness for the professional landscape.","modules_year":[{"acf_fc_layout":"modules_compulsary","compulsory_text":"Compulsory Modules:","modules":[15992,15995,15997,15996,15994]}]}],"study_timetable-snippet":[11654],"study_method":"Cyber Security involves considerable practical activity and many classes are based in computer workshops, focusing on student activity as a means of learning. Theoretical concepts will then be introduced by building on solid practical activity.\r\n\r\nTo enhance your employability, you'll be given opportunities to work together and develop the essential people skills to complement your technical ability. You will also have the opportunity to undertake a work placement.","study_assessment":"The pattern of assessment is varied and designed to ensure you acquire a range of skills, particularly those required by future employers. You will design and write programs, write reports and essays, critically analyse documents, deliver oral presentations and undertake examinations. We want you to develop an ability to work both independently and as part of a team.","study_teaching":"You will be taught by staff who are experts and passionate about student learning and development. The programme team are specialists in computing and cyber security, and active researchers in areas including security, networks and associate areas. Academic staff are regular contributors to academic conferences and journals."}],"course_criteria":[{"criteria_period":{"start":"20260901","end":"20270901"},"criteria_snippet":[11650],"criteria_requirements_type":"Custom","criteria_requirements_custom":"Typical offer 104-112 UCAS Tariff points, for which no specific subjects are required. You will also need GCSE Mathematics at Grade C or Grade 4 or above, or equivalent.\r\n\r\nPlease note, for all programmes in the Department of Computer Science, a level 2 numeracy qualification is not considered as equivalent to GCSE Grade C or Grade 4 in Mathematics.\r\n\r\n&nbsp;","criteria_requirements_snippet":[],"criteria_example_type":"Snippet","criteria_example_custom":"","criteria_example_snippet":[11630],"criteria_links_alternative":["Fastrack","STEM Foundation Year"],"entry_criteria_ske_cta_link":"","entry_criteria_links_further":["UK","EU","International"],"entry_criteria_language_type":"Snippet","entry_criteria_language_custom":"","entry_criteria_language_snippet":[13593,16029]}],"prospectus_entry_requirements":"Typical offer 104-112 UCAS Tariff points, for which no specific subjects are required. You will also need GCSE Mathematics at Grade C or Grade 4 or above, or equivalent.\r\n\r\nPlease note, for all programmes in the Department of Computer Science, a level 2 numeracy qualification is not considered as equivalent to GCSE Grade C or Grade 4 in Mathematics.\r\n\r\nExample Offers\r\n\r\nSome examples of how you can achieve 104-112 UCAS Tariff points are detailed below.\r\nA Level: BCC-BBC;\r\n\r\nBTEC Extended Diploma (or combination of BTEC QCF qualifications): Distinction, Merit, Merit (DMM);\r\nT Level: Overall grade of Merit;\r\n\r\nInternational Baccalaureate (IB): We are happy to accept IB qualifications which achieve the required number of UCAS Tariff points;\r\n\r\nAccess to Higher Education Diploma: 45 credits at Level 3, for example 9 credits at Distinction and 36 credits at Merit or 15 credits at Distinction and 30 credits at Merit. The required total can be attained from various credit combinations.\r\n\r\nPlease note, the above examples may differ from actual offers made. A combination of A Level and BTEC awards may also be accepted.\r\n\r\nIf you have a minimum of two A Levels (or equivalent), there is no maximum number of qualifications that we will accept UCAS points from. This includes additional qualifications such as Extended Project Qualification (EPQ), AS Levels that haven\u2019t been continued to A Level, and General Studies AS or A Level awards.","course_applications":[{"application_period":{"start":"20260901","end":"20270901"},"application_snippet":[11585],"application_methods":[{"acf_fc_layout":"methods_full-time","acfe_layout_col":"4","apply_type":"Snippet","apply_link":{"title":"Apply through UCAS","url":"https:\/\/digital.ucas.com\/coursedisplay\/courses\/5366cd98-8402-4c26-9778-157a10ad1a35?academicYearId=2026","target":""},"apply_snippet":[11582],"apply_text":""},{"acf_fc_layout":"methods_international","acfe_layout_col":"4","apply_type":"Snippet","apply_link":{"title":"Apply as an international student","url":"https:\/\/www.edgehill.ac.uk\/international\/applying\/","target":""},"apply_snippet":[15956],"apply_text":""}],"apply_text":""}],"course_facilities":{"facilities":"The Department of Computer Science is based in the state-of-the-art \u00a313million Tech Hub. This purpose-built development offers highly contemporary suites of outstanding facilities for Computer Science and Engineering students. Our modern computing and engineering laboratories are equipped with comprehensive test and measurement equipment, high-specification computers, high-resolution screens and the latest hardware and software. There are also specialist laboratories for networking and games programming, in addition to a specialist research laboratory, open access laboratory and a Harvard style lecture theatre.","facilities_locations":[9836],"learning_resources":"Learning resources include robots and a robotics simulator, wired and wireless networking hardware, graphics software, web development tools, software development environments, big data servers, eye trackers, giant 3D interactive teaching screens, and other specialist software required for studying forensics and internet security techniques."},"course_finance":[{"finance_period":{"start":"20260101","end":"20270101"},"finance_snippet":[11583],"finance_terms_conditions_snippet":[11589],"finance_fees":[{"acf_fc_layout":"fees_UK_full-time","acfe_layout_col":null,"fee_fee":"\u00a39,790","fee_basis":"a year"},{"acf_fc_layout":"fees_international","acfe_layout_col":null,"fee_fee":"\u00a318,000","fee_basis":"a year"},{"acf_fc_layout":"fees_bespoke","acfe_layout_col":null,"fee_type":"Snippet","fee_snippet":[11584],"fee_text":""}],"finance_support_1":[{"support_type":"Snippet","support_custom":"","support_snippet":[11596]}],"finance_support":[{"matters_guide":{"title":"Money Matters ","url":"https:\/\/www.edgehill.ac.uk\/study\/fees-and-funding","target":""}}]},{"finance_period":{"start":"20250101","end":"20260101"},"finance_snippet":[11583],"finance_terms_conditions_snippet":[11589],"finance_fees":[{"acf_fc_layout":"fees_UK_full-time","acfe_layout_col":null,"fee_fee":"\u00a39,535","fee_basis":"a year"},{"acf_fc_layout":"fees_international","acfe_layout_col":null,"fee_fee":"\u00a317,000","fee_basis":"a year"},{"acf_fc_layout":"fees_bespoke","acfe_layout_col":null,"fee_type":"Snippet","fee_snippet":[11584],"fee_text":""}],"finance_support_1":[{"support_type":"Snippet","support_custom":"","support_snippet":[13999]}],"finance_support":[{"matters_guide":{"title":"Money Matters","url":"https:\/\/www.edgehill.ac.uk\/study\/fees-and-funding\/","target":""}}]}],"course_future_career":{"career_prospects":"With the opportunity to participate in cybersecurity conferences, workshops, and industry events, you\u2019ll gain exposure to the latest trends and be able to grow your connections with professionals in the field. We\u2019ll also help you to build a portfolio of work that showcases your skills to potential employers.\r\n\r\nThe core computing skills you will master on this degree, such as programming languages and network management, will serve as a foundation for many cybersecurity roles. There is a strong focus on ethical awareness and professional standards, which are essential for cyber security roles.\r\n\r\nOur<strong> BSc (Hons) Cyber Security<\/strong> degree equips you with the knowledge and skills you need to launch a career in the rapidly-growing field of cyber security.\r\n\r\nThe real-world scenarios on this degree will also give you the practical skills needed for working in a number of roles including:\r\n<ul>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Cyber Security Analyst<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Ethical Hacker\/Penetration Tester<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Security Consultant<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Incident Response Specialist<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Network Security Engineer<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Information Security Manager<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Cyber Security Architect<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Compliance Officer<\/strong><\/li>\r\n<\/ul>","prospectus_career_prospects":"With the opportunity to participate in cybersecurity conferences, workshops, and industry events, you\u2019ll gain exposure to the latest trends and be able to grow your connections with professionals in the field. We\u2019ll also help you to build a portfolio of work that showcases your skills to potential employers.\r\n\r\nThe core computing skills you will master on this degree, such as programming languages and network management, will serve as a foundation for many cybersecurity roles. There is a strong focus on ethical awareness and professional standards, which are essential for cyber security roles.\r\n\r\nOur<strong> BSc (Hons) Cyber Security<\/strong> degree equips you with the knowledge and skills you need to launch a career in the rapidly-growing field of cyber security.\r\n\r\nThe real-world scenarios on this degree will also give you the practical skills needed for working in a number of roles including:\r\n<ul>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Cyber Security Analyst<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Ethical Hacker\/Penetration Tester<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Security Consultant<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Incident Response Specialist<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Network Security Engineer<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Information Security Manager<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Cyber Security Architect<\/strong><\/li>\r\n \t<li data-gc-list-depth=\"1\" data-gc-list-style=\"bullet\"><strong>Compliance Officer<\/strong><\/li>\r\n<\/ul>"},"course_intakes":[{"intake_period":"20260901","intake_study-code":" I291","intake_study_code-type":"UCAS","intake_study-mode":11396,"intake_study-locations":[{"intake_study-location":7197}],"intake_study-venue-relationship":"or","intake_study-duration":"3 years ","intake_study-duration-months":36},{"intake_period":"20270901","intake_study-code":" I291","intake_study_code-type":"UCAS","intake_study-mode":11396,"intake_study-locations":[{"intake_study-location":7197}],"intake_study-venue-relationship":"or","intake_study-duration":"3 years","intake_study-duration-months":36}],"contact_options":{"course_enquiry_phone_number":"","enquire_online_url":"https:\/\/www.edgehill.ac.uk\/study\/enquire\/","course_enquiry_email":"","ask_our_students":"https:\/\/www.edgehill.ac.uk\/chat-with-our-students\/","live_chat":true,"webinars_url":""},"related_section_heading":"","related_courses":[{"title":"","courses":[{"course":4876},{"course":4875},{"course":4877}]}],"changes_snippet":[12248],"course_changes":null,"themes":"","selection_process":"","progression_criteria":"","course_expander_tab":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BSc (Hons) Cyber Security | Edge Hill<\/title>\n<meta name=\"description\" content=\"Enter the exciting world of Cyber Security at Edge Hill University. Develop essential cyber safety knowledge &amp; skills. Apply today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BSc (Hons) Cyber Security | Edge Hill\" \/>\n<meta property=\"og:description\" content=\"Enter the exciting world of Cyber Security at Edge Hill University. Develop essential cyber safety knowledge &amp; skills. Apply today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Edge Hill University\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T10:56:08+00:00\" \/>\n<meta property=\"og:image\" content=\"\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2025\/01\/EHU640ProspectusDay2-043-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/\",\"url\":\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/\",\"name\":\"BSc (Hons) Cyber Security | Edge Hill\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgehill.ac.uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2025\/01\/EHU640ProspectusDay2-043-scaled.jpg\",\"datePublished\":\"2025-02-04T09:18:32+00:00\",\"dateModified\":\"2026-03-03T10:56:08+00:00\",\"description\":\"Enter the exciting world of Cyber Security at Edge Hill University. Develop essential cyber safety knowledge & skills. Apply today.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#primaryimage\",\"url\":\"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2025\/01\/EHU640ProspectusDay2-043-scaled.jpg\",\"contentUrl\":\"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2025\/01\/EHU640ProspectusDay2-043-scaled.jpg\",\"width\":2560,\"height\":1708},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.edgehill.ac.uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Courses\",\"item\":\"https:\/\/www.edgehill.ac.uk\/course\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security BSc (Hons)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.edgehill.ac.uk\/#website\",\"url\":\"https:\/\/www.edgehill.ac.uk\/\",\"name\":\"Edge Hill University\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.edgehill.ac.uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.edgehill.ac.uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.edgehill.ac.uk\/#organization\",\"name\":\"Edge Hill University\",\"url\":\"https:\/\/www.edgehill.ac.uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.edgehill.ac.uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2022\/06\/screenshot.png\",\"contentUrl\":\"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2022\/06\/screenshot.png\",\"width\":1200,\"height\":900,\"caption\":\"Edge Hill University\"},\"image\":{\"@id\":\"https:\/\/www.edgehill.ac.uk\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BSc (Hons) Cyber Security | Edge Hill","description":"Enter the exciting world of Cyber Security at Edge Hill University. Develop essential cyber safety knowledge & skills. Apply today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/","og_locale":"en_GB","og_type":"article","og_title":"BSc (Hons) Cyber Security | Edge Hill","og_description":"Enter the exciting world of Cyber Security at Edge Hill University. Develop essential cyber safety knowledge & skills. Apply today.","og_url":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/","og_site_name":"Edge Hill University","article_modified_time":"2026-03-03T10:56:08+00:00","og_image":[{"width":2560,"height":1708,"url":"\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2025\/01\/EHU640ProspectusDay2-043-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/","url":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/","name":"BSc (Hons) Cyber Security | Edge Hill","isPartOf":{"@id":"https:\/\/www.edgehill.ac.uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#primaryimage"},"image":{"@id":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2025\/01\/EHU640ProspectusDay2-043-scaled.jpg","datePublished":"2025-02-04T09:18:32+00:00","dateModified":"2026-03-03T10:56:08+00:00","description":"Enter the exciting world of Cyber Security at Edge Hill University. Develop essential cyber safety knowledge & skills. Apply today.","breadcrumb":{"@id":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#primaryimage","url":"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2025\/01\/EHU640ProspectusDay2-043-scaled.jpg","contentUrl":"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2025\/01\/EHU640ProspectusDay2-043-scaled.jpg","width":2560,"height":1708},{"@type":"BreadcrumbList","@id":"https:\/\/www.edgehill.ac.uk\/course\/cyber-security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.edgehill.ac.uk\/"},{"@type":"ListItem","position":2,"name":"Courses","item":"https:\/\/www.edgehill.ac.uk\/course\/"},{"@type":"ListItem","position":3,"name":"Cyber Security BSc (Hons)"}]},{"@type":"WebSite","@id":"https:\/\/www.edgehill.ac.uk\/#website","url":"https:\/\/www.edgehill.ac.uk\/","name":"Edge Hill University","description":"","publisher":{"@id":"https:\/\/www.edgehill.ac.uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.edgehill.ac.uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.edgehill.ac.uk\/#organization","name":"Edge Hill University","url":"https:\/\/www.edgehill.ac.uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.edgehill.ac.uk\/#\/schema\/logo\/image\/","url":"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2022\/06\/screenshot.png","contentUrl":"https:\/\/www.edgehill.ac.uk\/wp-content\/uploads\/2022\/06\/screenshot.png","width":1200,"height":900,"caption":"Edge Hill University"},"image":{"@id":"https:\/\/www.edgehill.ac.uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/course\/258909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/course"}],"about":[{"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/types\/course"}],"author":[{"embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/users\/551"}],"version-history":[{"count":1,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/course\/258909\/revisions"}],"predecessor-version":[{"id":308787,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/course\/258909\/revisions\/308787"}],"acf:term":[{"embeddable":true,"taxonomy":"course_snippet","href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/snippet\/12248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/media\/259502"}],"wp:attachment":[{"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/media?parent=258909"}],"wp:term":[{"taxonomy":"course_snippet","embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/snippet?post=258909"},{"taxonomy":"course_feature","embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/feature?post=258909"},{"taxonomy":"course_module","embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/module?post=258909"},{"taxonomy":"course_mode","embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/mode?post=258909"},{"taxonomy":"course_level","embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/level?post=258909"},{"taxonomy":"course_qualifications","embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/qualifications?post=258909"},{"taxonomy":"course_venues","embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/venues?post=258909"},{"taxonomy":"course_types","embeddable":true,"href":"https:\/\/www.edgehill.ac.uk\/wp-json\/wp\/v2\/types?post=258909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}