BSc (Hons) Forensic Computing
|3 years full-time||29 April 2019*|
|* - Please note that students need to complete the programme within the normal duration of study. No deferments or extensions will be allowed by Staffordshire University. If they are unable to complete the programme by March 2023; they may not be eligible for the award of the Staffordshire University Degree.|
|Malaysian students||International students|
|Year 1: RM 23,800 + £ 250
Year 2: RM 24,500 + £ 250
Year 3: RM 25,500 + £ 250
|Year 1: RM 26,300 (USD 6,840) + £ 250
Year 2: RM 27,800 (USD 6,240) + £ 250
Year 3: RM 28,100 (USD 7,300) + £ 250
|Total: RM 73,800 + £ 750||Total: RM 82,200 (USD 20,380) + £ 750|
Entry into the Programme will be via one of the following routes:
Route 1: Entry to Year 1 Degree
Direct Entry to Year 2 Degree
- Successful completion of the relevant APIIT Diploma, or
- Successful completion of study in another recognised institution with academic credits equivalent to level 4 of an honours degree in relevant subjects
All students must demonstrate that they have met the equivalent of IELTS 6 either through formal English language assessment or through success in prior study at “A” level or equivalent in English.
Programme at a glance
As computers are an intrinsic part of normal life, they are also important as a tool in criminal activity. Hence, they can provide a vital source of evidence. This award provides a solid grounding in the skills you need to follow a career in forensic investigation of computer systems and related areas of security. The same skills that enable you to track down evidence also equip you with the abilities necessary to help organisations and individuals recover data/information that may have been lost or corrupted as a result of accidental or malicious activity. You can not only detect criminal activity but also help to save people from the consequences of such activity.
The first year provides a general grounding in fundamental computing skills and introduces you to the use of standard software tools. In the following years, you will deepen your knowledge and skills required for the investigation, evidence gathering and forensic analysis of that evidence from computer systems (including mobile devices), as well as understanding the legal context and the role of expert witness testimony.
Related areas of computer security are studied to provide a fuller context to your forensic computing studies. You will also extend your underpinning knowledge of computer networks and the hardware and system software of computer systems.
Topics you will experience include:
- Algorithms & Data Structures in C
- Hardware & Software Systems & Graphics
- Introduction to Forensic Tools & Techniques
- Introduction to Networking with LANs & WANs
- Introduction to Security Technologies
- Introduction to Software Development
- Mathematics & Statistics for Computing
- Systems and Database Analysis
- Forensics Data Recovery
- Hardware & Software Systems & Networks
- Object Oriented Methods
- Professional & Enterprise Development
- Computer Systems Low Level Techniques
- Information Systems Organisations & Management
- Ethical Hacking
- Cybercrime Forensic Analysis
- Expert Witness Testimony and the Legal System
- Computer Systems Security
- Group Case Study
- Forensic Data Gathering, Reconstruction and Analysis
- Legal & Evidentiary Aspects of Forensic Computing
- Project: Artefact Realisation, Testing & Evaluation
- Project: Planning, Management, Communication & Appraisal
- Project: Research, Analysis & Artefact Design
In addition to the above, all students are also required to successfully complete four (4) General Studies modules as stipulated by the Malaysian Qualifications Agency, as well as fulfill credit requirements for Co-Curricular Activities.
Graduates will find employment across a wide range of careers destinations including government agencies, local authorities – police department, court & legal firm, banking industries, consultancies, specialist sectors of the digital forensics industry such as cybercrime investigation, IT security consultation, IT security reporting analysis, reverse engineering, mobile security analysis and digital forensics investigation or will enter the industrial or commercial sectors. Others will undertake further postgraduate training across a range of academic and vocational courses.
|All information is correct at the time of publication, but is subject to change in the interest of continuing improvement.|