BSc (Hons)
Ethical Hacking and Cybersecurity

The specialist skills and knowledge to thoroughly test the security of computer systems, make them secure and investigate properly if they are compromised are not typically taught within a standard computer science course. In contrast, our course has been developed to provide a good practical and theoretical understanding of cybersecurity, hacking, digital forensics, and the underlying computer science.


ST4056CEM Introduction to Web Development and Database System

Python, MySQL, Django, HTML, CSS, JavaScript


ST4059CEM Legal and Ethical Foundations in Cybersecurity

Cyber Law in Nepal, Internal Laws and Regulations


ST4060CEM Digital Forensics Fundamentals

Device, Network, Memory Forensics; Preparation of forensics investigation report


ST4061CEM Programming and Algorithms 1

Python, C/C++, Assembly X86, unit testing, version control


ST4062CEM Skills Development 1

Linux operation system (Kali Linux), System tools, Ethical Hacking tools.


ST4063CEM The Security Professional

Ethical framework for Hackers


ST4064CEM Foundations of Cybersecurity

Social engineering, vulnerability assessment and exploitation based on network and devices


ST4065CEM Computer Systems and Networks

LAN, WAN, Routing, Firewall, Network Security


STA103IAE Creative Thinking for Business

How to create a new business venture or solve a problem?

ST5062CEM Programming and Algorithms 2

Advanced data structures, compiler analysis, multi-threading, file I/O, device drivers


ST5063CEM Practical Pen-Testing

Penetration testing on networks and applications


ST5064CEM Networking

Networked applications, file systems, enterprise scale network security, VPN, Virtualisation and simulation


ST5065CEM Applied Forensics

Using forensics tools like SIFT or FTK, Mobile devices forensics, Legislation


ST5066CEM Skills Development 2

Intermediate Linux skills, Network traversal, Privilege Escalation


ST5067CEM Web Security

OWASP list, Proxy, two factor authentication, Cookies, Session Hacking


ST5068CEM Platforms and Operating Systems

Memory Management, Concurrency, Security mechanism of OS, Virtualisation and Isolation, Security as a service


ST5069CEM Cybersecurity Careers

Plan for self-learning and improvement, candidate screening and hiring


STA201IAE Be Your Own Boss

Business start-ups, ideation, market research, competitor analysis, financing

ST6047CEM Cybersecurity Project

Individual research project in ethical hacking and cybersecurity


ST6048CEM Exploit Development

Fuzzing applications, Memory corruption, Compiler defences, Stack and Head overflows, Anti-forensic techniques


ST6049CEM Managing Red Teams and Pen-testing

Security vulnerabilities and limitations of penetration testing techniques, Assessing network and application design for security


ST6050CEM Security Audit and Monitoring

Information system security auditing, internal audit, Intrusion detection systems and methods, Intrusion response


ST6051CEM Practical Cryptography

Cipher and algorithm types, Public/Private key encryption, Integrity, PKI, Digital certificates


ST6052CEM Reverse Engineering

Malware analysis, obfuscation and de-obfuscation of code, tools for reverse engineering


ST6053CEM Skills Development 3

Remote host audit, exploitation of vulnerable services, privilege escalation mechanisms


ST6054CEM Security Management

Security Control Assessment, Threat modelling, Third-party assessment and monitoring


STA309IAE Design Thinking and Innovation

Entrepreneurship and design thinking, applied scenario activities, creativity, business feasibility study

Why Coventry University?

An award-winning university, we are committed to providing our students with the best possible experience. We continue to invest in both our facilities and our innovative approach to education. Our students benefit from industry-relevant teaching, and resources and support designed to help them succeed. These range from our modern library and computing facilities to dedicated careers advice and our impressive Students’ Union activities.

Global Ready

An international outlook, with global opportunities


Career-ready graduates, with the skills to succeed

Teaching Excellence

Taught by lecturers who are experts in their field

Course essentials

A degree which offers you more, at no extra cost

Course Summary

On this course, students will have the opportunity to learn to identify and analyse the threats posed to modern information structures and develop the knowledge and skills to be able to advise a company on how to set up secure systems.

Fee Structure

Course Duration: 3 Years
Approved by Ministry of Education, Nepal Apply Now
Download Brouchure

Admission Eligibility:

Minimum 2.0 GPA in 10+2 level or 3.5 Credit in A level (Science/management/Humanities)

English requirement:

GETS English test (65 or above in all individual bands) Or IELTS 5.5.

We provide free preparation course for GETS English test.
We regularly review our course content, to make it relevant and up-to-date for the benefit of our students. For these reasons, course modules may be updated, please contact us for the latest information