Cyber Security & Digital Forensics BSc (Hons)
Subject and course type
- Computing, Cyber and AI
- Undergraduate
Kickstart your career fighting cyber crime with the Cyber Security & Digital Forensics BSc (Hons) course from ÂÌñ»»ÆÞ. We are an Academic Centre of Excellence in Cyber Security Education (ACE-CSE) and have won a Silver Award from the National Cyber Security Centre (NCSC).
We are also part of GCHQ, which aims to help close the UK's cyber security skills gap by supporting the next generation of cyber experts. This degree is aligned with industry-recognised certifications (e.g., CompTIA, EC-Council, Splunk and more).
You are reading:
Develop your cyber security skills using our forensic software and hardware
There are a wide range of facilities at our Penrhyn Road campus, where this course is based.
Our dedicated cyber security and digital forensics lab provides access to industry standard software and tools, such as Splunk, Nessus, Kali Linux, Autopsy, FTK (Forensic Tool Kit), etc. It also has Linux/Windows dual-boot computers and digital forensic hardware.
Other computing laboratories are fully equipped with fold-flat LCD screens, data-projection systems and high-spec processors. As well as development software, including Linux, Microsoft.net, Eclipse, tools for Android and iOS, UML, CASE tools, and ethical hacking and pen testing environments, including Kali Linux and Metasploit. Plus, a mix of cable and wireless LAN technologies, and quantum key distribution experiment tools for secured communication.
You will have access to our games lab, which includes the latest Sony and Microsoft software, PSPs and large screens.
There are also opportunities to gain vendor certification for mobile forensics (XRY Logical) and FTK.
Why choose this course
Have you considered a career at the cutting-edge of the fight against cybercrime? There is an increasing demand for skilled cyber security professionals with the expertise that this course offers.
You'll study how computers and technology can be used to investigate, prevent and manage cyber attacks. You’ll develop web technology programming skills and study specialised tools and operating system environments. And you’ll examine encryption algorithms, public-key cryptography, network security, endpoint security and digital forensics. Project themes include security and vulnerability analysis, mobile app security and cyber intelligence analysis.
Practical studies include ethical hacking (such as password cracking, vulnerability scanning, social engineering and system exploits). As well as Security Operations Centre (SOC) functions, such as threat intelligence, threat hunting, SIEMs and incident response.
The curriculum is largely applied in nature, with many case studies (used to simulate the working environment) chosen for their topicality and relevance to industry, such as information systems design, programming, networking, and implementation issues. To further set the material in context as well as inspire our students, leading practitioners from industry, such as Google and IBM, are invited to give guest lectures and workshops.
Kingston has been named an Academic Centre of Excellence in Cyber Security Education (ACE-CSE) by the UK's lead technical authority on cyber security. This is a feat only achieved by 11 other higher education institutions across the United Kingdom.
Kingston has achieved a prestigious Silver Award recognition by National Cyber Security Centre (NCSC) – part of GCHQ – we are currently heading towards achieving the Gold Award.
Accreditation
This degree has been accredited by BCS, The Chartered Institute for IT. Accreditation is a mark of assurance that the degree meets the standards set by BCS. An accredited degree entitles you to professional membership of BCS, which is an important part of the criteria for achieving Chartered IT Professional (CITP) status through the Institute. Some employers recruit preferentially from accredited degrees, and an accredited degree is likely to be recognised by other countries that are signatories to international accords. This degree is accredited by BCS for the purposes of fully meeting the academic requirement for registration as a Chartered IT Professional.
This degree has been accredited by BCS, on behalf of the Engineering Council for the purposes of partially meeting the academic requirement for a Chartered Engineer (CEng). Accreditation is a mark of assurance that the degree meets the standards set by the Engineering Council in the UK Standard for Professional Engineering Competence (UK-SPEC). An accredited degree will provide you with some or all of the underpinning knowledge, understanding and skills for eventual registration as an Incorporated (IEng) or Chartered Engineer (CEng).
Course content
Please note
Optional modules only run if there is enough demand. If we have an insufficient number of students interested in an optional module, that module will not be offered for this course.
Foundation year
If you would like to study computing at ÂÌñ»»ÆÞ but are not yet ready to join the first year of a BSc (Hons) course, you can include an extra foundation year within your chosen degree. Please see the foundation year course page for details of modules.
Year 1
In the first year of this degree, students are introduced to computer security, digital forensics and legal aspects of forensic investigative processes. They will also develop web technology (e.g. Javascript, HTML, CSS), Java and Python programming skills; and gain a practical insight into the use of specialised tools and operating system environments. Examples include hex editors, hash functions, Forensic Tool Kit (FTK), Windows 10, Linux, Android, iOS and more.
Core modules
30.00 credits
We designed this module to establish a foundation for key Programming Concepts. We do not assume prior experience of programming, as we know you will all have widely different levels of existing knowledge. The module is designed to be accessible to a beginner while still being exciting for an experienced coder.
We are excited to be able to deliver this module using Kingston's own home-grown learning environment for programming, NoobLab. NoobLab gamifies your learning, making programming enjoyable and accessible for all existing ability levels – no other university offers this platform or unique approach to learning:
You will learn a variety of programming languages. In the first few weeks, we will use visual blocks that will allow you to construct programs and focus on thinking like a programmer rather than getting bogged down in grammar and syntax. Then, with these skills established, you will learn Python, Javascript and optionally Java, solving Code Kata style programming challenges on a weekly basis. This will equip you to build a graphical card game as your capstone project for the module.
30.00 credits
In this module, you will develop a strong foundation of how computers work in terms of hardware and software, and the formal logic behind it. You will have the opportunity to meet several different experts in the topics that form the basis of modern-day computer science.
To equip you to excel in your course, the subject experts will guide you in an exploration of digital logic, data processing, representation and storage, essentials of computer software and hardware including architectural concepts and relevant data structures and algorithms.
You will develop this knowledge further through the introduction of databases, web development, and the underlying technologies of modern-day communication, including Ethernet, Wi-Fi and the Internet.
30 credits
This module will introduce you to the principles and practices of cyber forensics, providing a contextual setting for further modules. In particular, the module has a theoretical perspective (introducing core security concepts and principles, and covering legal, professional and ethical issues, the nature of digital crime and the role of the forensic investigator) as well as a practical technical perspective.
This module presents a methodological approach to digital forensics including searching, imaging, acquisition, preservation, analysis and reporting of digital evidence using a variety of forensic tools such as FTK, Autopsy, Volatility. During this module you will be developing essential skills required for careers in Digital Forensics Investigation, Incident Response and Malware Analysis.
30.00 credits
The goal of the Professional Environments module is to prepare students for professional practice. It will firstly ensure they acquire suitable employability assets and secondly equip them with an understanding of the role of a professional in society and the role of professional bodies.
While the bulk of the taught programme focuses primarily on domain knowledge, the Professional Environments module focuses on developing key skills, personal qualities (e.g. commercial awareness, reliability and punctuality, understanding the centrality of customers and clients), and professional knowledge including the need to engage with continuing professional development. With such assets, students will generate a CV, an employment portfolio, and a professional online presence.
Being a professional also means understanding the key legal, ethical and societal issues pertinent to the domain, and understanding the need for continuing professional development (CPD) especially when technology develops at such a rapid pace. The module is designed to support different domain areas and to integrate experience from other professions. The subject areas being studied demand a global perspective which encourages the inclusion of our diverse of communities and national practices.
Reflecting the fact that team working is ubiquitous in the modern workplace, a significant proportion of the assessment work on the course is based around group work. There is considerable evidence that group work promotes a much deeper engagement with taught content and the Future Skills report shows how it is embedded in working practices. It also encourages the development of diverse learning communities with computer science, cybersecurity and digital media students working in close proximity. This module will therefore introduce students to best practice in group working covering how to approach group work, how to understand yourself, how to deal with different types of people, and methods of selecting and managing groups.
Year 2
In the second year, students will study ethical hacking through practical activities (e.g. password cracking, port scanning, anonymous browsing, keyboard logging, screen capture, packet interception, social engineering and malware).
Core modules
30.00 credits
The highly technical Ethical Hacking module commences by introducing you to the fundamental steps and frameworks needed for the practical and ethical hacking exercises. In particular, the module introduces you to techniques and methods to identify vulnerabilities and potential threats in computer systems, networks, and applications using a variety of tools, such as Nessus, Burp Suite, Nmap and Metasploit Framework. You will be developing skills that help organisations to proactively identify and address security weaknesses before they can be exploited by malicious attackers.
Also, you will be introduced to the Android Security concept and practice the reverse engineering process using tools such as Apktool to analyse the code and understand how the application works. You will then be introduced to automation and scripting using the Python programming language for various ethical hacking activities, examples of which include: password cracking, port scanning, anonymous browsing, keyboard logging, screen capture, Windows log analysis and packet interception.
The module assessments provide an opportunity for students to work on real world problems and to develop the essential practical skills required of a cyber security professional.
30.00 credits
This module takes you on a journey from the underlying computer architecture through to modern computing approaches and methodologies. We developed this module to enhance your understanding of how modern computer systems are designed and used to meet the needs of today's computing environments.
We will cover topics such as operating system functionality, the principles and applications of parallel processing and the analysis of algorithm complexity. Furthermore, the module delves into containerisation and networking concepts, including physical network structures and associated addressing schemes. Finally, you will evaluate the capabilities and limitations of Artificial Intelligence, exploring Neural Networks and Large Language Models (LLMs).
30 credits
This module is designed to encourage you to look outwards to industry and employability, and make you more confident when facing the job market upon graduation. You will develop excellent group working skills, broaden your understanding of industry and its requirements, and enhance your project management skills.
It is always exciting to watch the groups collaborating as they produce their entrepreneurial projects for ÂÌñ»»ÆÞ's 'Bright Ideas' scheme; students involved in this have won awards, producing fascinating artefacts for their remaining term and exploring new and different areas within their course field.
The module is an opportunity to work with many different students, working in subject areas that are innovative and unusual. Very often, a student may discover something they did not know that they could achieve. This triggers new learning and an added confidence that was not previously there. Those are the times that the learning is strongest, and our pride in the student, the greatest.
Optional modules
30 credits
In this module you will learn to design and build full stack web applications. The first half of the module will be dedicated to relational databases which are crucial to any company or organisation, and form the back-end persistence layer of the vast majority of modern applications. You will learn the fundamental concepts and principles of database design before moving on to building the databases and writing queries to extract data from the database.
Once you have the foundation of database development, the module will move on to teaching you to develop and deploy web based applications that use an MVC design pattern. You will learn server- and client-side development, how to access the database/persistence layer, and techniques and technologies that span the whole stack. By the end of the module you will have gained the skills to build a complex, scalable and robust web application driven by a back-end database.
30 credits
With a strong emphasis on understanding the Internet protocols, the Networking Concepts module will develop your understanding of the basic principles of networking.
You will become familiar with current LAN and WAN technologies and their role in building domestic and corporate networks. This knowledge will underpin the skills required to design and simulate small company networks including identifying the physical components required and to design an appropriate IP addressing schemes for such network.
It will also underpin your understanding of how network services such as mobile apps and network-based games are implemented.
Optional professional placement year
Core modules
60 credits
This module is an essential course programme component for students on the sandwich route of an honours degree with professional placement. It is a key element in providing an extended period in industry gaining real world employability skills. Students are supported both before and through their placement by the Placement Team. Students that successfully complete their placement year will graduate with a four-year sandwich degree.
Year 3/4
In the final year, students will study encryption algorithms, public-key cryptography systems, network security techniques, security policies as well as live, network and mobile forensics in the context of a security operations centre. They will also complete an individual 'capstone' project. This project is a showcase opportunity in which students undertake a research and development project of their choice. They will develop a tangible and noteworthy artefact, that can be showcased during interviews for placements, internships or full-time roles. Examples topic themes include crypto currencies, mobile privacy, blockchain technologies, malware etc.
Core modules
30 credits
This is a core module in the Cyber Security and Computer Forensics field which explores the major challenges to computer security. It familiarises you with a range of cryptographic algorithms and protocols, firewall and access-control architectures and methods to assess and improve network and application security. This knowledge will allow you to implement and evaluate security controls and develop secure policies for corporate networks.
30 credits
In this module, students will learn cyber threat intelligence to design and deploy a Security Operations Centre (SOC). The first half of the module will be devoted to network inventory management and threat scanning, which are the very first steps to designing resilient IT systems.
You will also learn risk analysis and management to minimise the impact of cyberattacks. Moreover, operating system hardening techniques following the regulators, government and industry standards will be studied, analysed and implemented in real network scenarios.
Once you develop a basic skill in threat hunting, data analytics tools will be explored. You will use Splunk and ELK Stack to identify any unusual activities within the IT system boundary in real time. You will then develop skills in data backup plans in the most secure way. The incident response plan and recovery plan are very integral parts of cyber threat analysis. We will study recommendations by industries and National Cyber Security Centre (NCSC) UK and implement them in a simulated environment.
The ultimate aim of this module is to prepare students as SOC Analysts for small, medium to big tech companies.
30 credits
The goal of the module is to further develop skills in organisation, timekeeping, research literature, developing and critically analysing results as well as reporting work verbally and in a written format. The end result will be an artefact or artefacts which demonstrate creativity and technical competence as well as a technical report.
Optional modules
30 credits
This module focuses on enterprise networks; the internet protocols and services which will develop the understanding of how the TCP/IP internet protocol suite achieves the interconnection of geographically separate computers over networks of arbitrary topology and technology. This knowledge will underpin the design skills required to design such company networks including identifying the physical components required and designing appropriate IP addressing schemes. The module introduces wireless and high-speed networks and how these are used to deliver a variety of business applications.
On successful completion of the module, you will be able to:
- Explain the basic principles of internetworking, and describe the role of each protocol within the TCP/IP protocol stack.
- Identify the main hardware network components used to construct enterprise networks, and be able to design a network for a small enterprise.
- Demonstrate a thorough understanding of IPv4 and IPv6 addressing, sub-network addressing, and be able to design an IP addressing scheme for a domain.
- Demonstrate how internet application services (e.g. HTTP) available on any of today's advanced operating systems depend on and interact with other TCP/IP protocols, and explain the role of DNS and DHCP services in the configuration of network hosts.
- Demonstrate an awareness of the services available from the internet and network providers to support business and homes and be able to critically reflect on the legal, social, economic and ethical issues associated with the use broadband services.
30 credits
This module will expand your skill set and your awareness as software industry professional, using industry-relevant tools, know-how, as well as theoretical areas. Our focus is on real-world experience, and preparing you to become a skilled graduate, regardless of the job roles you are considering or the skills you want to expand on within the computing domain.
This will empower you to become better at whichever role you are aiming at; developer, analyst, designer, project manager and so on. This is not a code-centric module; the skills in this module are more concerned with efficiently working within a software development team and managing the code produced rather than necessarily writing code yourself.
You will explore the latest practices for making more dependable, reusable and scalable software systems, and how to configure, maintain and support such systems. We will also discuss topics on software architecture, and how to select the right architecture based on the system requirements. We will also cover popular industry practices like refactoring, software measurements, DevOps, Microservices, and software testing approaches, and even a bit of Quantum computing.
The workshop activities promote collaborative learning. Within the first teaching block you will explore a specific topic or tool every two weeks. In the second teaching block, you will work as a team, taking up a role as a manager, developer, analyst, designer, security expert or tester and work on a software development case study.
Most of the topics and tools you come across in the module are linked to skills advertised as essential or desirable by software industry employers. They are also closely linked to interview questions or assessment centre activities. Overall, the main focus of this module is to equip you to become a skilled and knowledgeable IT professional capable of facing challenges, while maintaining a holistic, practical perspective on the issues at hand.
30 credits
Entrepreneurship is a major driving force in creating economic growth and this module illustrates how to work in an entrepreneurial fashion. At the heart of entrepreneurship is innovation, which can come in many forms. Sometimes this can be an incremental but generally gives significant improvement to the customer. Alternatively it is a new breakthrough or transformational innovation. Incremental innovation is aimed at increasing the value of a product or service, to add more value and thereby creating new and superior value chains. Breakthrough innovation often creates new categories of product, or transforms the historical ways of doing things.
From this foundation, the module proceeds to explain how to develop a strategy, not only to satisfy the critical needs that organisations have, but also to explore the application and use of improved value chains using the concepts of corporate venturing (spin-out/intrapreneurship) and entrepreneurship (new venture creation).
However it is not simple to start a new company. Especially the tech branch is characterised by fast developments, shifts of focus and low barriers to entry, where holding back from bleeding edge is essential and is one of the important differentiating factors between Tech Entrepreneurship and other forms of entrepreneurship. This means that one can no longer count on 'good luck', and insight, understanding, knowledge and a systematic approach all have to be learnt.
This module will convey the concepts needed for roles in analysis, consultancy and management in technology environments, plus the necessary knowledge to work successfully in an innovative company, as well as providing a good background for new venture creation (Entrepreneurship) for those considering self-employment or founding new technology firms.
Placement case study
Who: Lillith Vanian-George, Cyber Security & Digital Forensics BSc (Hons)
Placement company: Ernst & Young
My name is Lillith and I am doing a placement year at EY in their Forensic Technology & Discovery Services department, based in London.
The truth is there are no average days, every day there is always something new to learn and a new problem to solve.
Your first question is probably, "What is FTDS?"
Forensic Technology is a type of digital forensic science which relates to legal evidence found in computers and digital storage media (ex, USB sticks, CDs, DVDs). What we do is examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analysing and presenting the data. This sounds like quite a mouthful, so let me get a bit more specific!
I work within eDiscovery (electronic discovery) which, in simple terms, means we assist our clients in managing litigation or government investigations which deal with the exchange of information in electronic/digital formats. My department provides a number of digital forensic solutions to solve problems like civil litigation investigations, criminal investigations, and internal investigations.
For me, this means I deal with lots of confidential client data every day. Emails, PowerPoints, word documents, PDFs, you name it. During my time at EY I have been exposed to many elements of eDiscovery, so my day to day has varied a great deal.
I've done a lot since I have been here. To give you an idea... I have created my own SQL scripts, I have interacted with clients (in person, by email and over the telephone), I have collected hard drives from clients then preserved the data, processed the data, then produced that data and given it back to the client. I have organised fundraisers at EY, participated in organising an event for 300 people, attended & organised recruitment events...the list goes on! As you can see, my year has been quite busy!
Of all the things I have done this year, I think I am most proud of the fact that I was able to write my own SQL query and implement it into a client facing platform. For those of you who are good at coding, this might not seem like much but I generally consider myself not able to code if my life depended on it (how I hate you Java and your evil semicolons)!
I started working on a new project in December, which is heavily bespoke due to the client's needs. It was often that the client asked for a unique function we had to manually code ourselves. My colleague (aware of my aversion to coding, I claim I was under duress!) asked me to create a simple SQL script to return some data into a spreadsheet. After giving me some guiding tips, I was left alone in the wild to create the script from scratch. After much head scratching and many inner joins later, I finally finished it. I was so proud when my colleague looked over the script and gave me the proverbial pat on the back. It feels so good knowing that something *I* did is being used by a high power client to pull a report every month.
I've still got a few months left but I have loved my placement year so far and don't want it to end. Don't get me wrong, you do have to work hard! But I have learned so much since I started and met some fantastic people here at EY who even from day one treated me like a friend, not just a colleague (or worse, an intern). I can't wait for tomorrow, and what new things await me!
Future Skills and career opportunities
Cyber security career opportunities are diverse and exist across many sectors. For example, our graduates go on to work in government, finance, entertainment, media, law and intelligence services.
Events and lectures
Embedded within the academic year are two Enrichment Activity Weeks. The first is in week 6 of Teaching Block 1 and the second in week 12 of Teaching Block 2, which include Careers and Employability events. These provide students with the opportunity to explore their CV and interview skills and look forward and plan for both industrial placement and their employment after university.
Our award-winning careers service offers a range of events, which include
- employers on campus to promote internship, placement and graduate opportunities
- profiling specific roles within industry
- exposing students to employers and building skills and knowledge
The current set of events include a part-time jobs fair, guest lectures, The Big Kingston Careers Fair, Enrichment Week activities, the Creative Conference, and the Work Abroad Fair.
In addition, a range of software development competitions and hackathon-type events are organised by the staff and various societies.
Future Skills
Embedded within the Cyber Security & Digital Forensics BSc (Hons) course and throughout the whole Kingston experience is our Future Skills programme. The Future Skills programme was developed to respond to the ever-evolving demands from modern day employment.
It will help you obtain the skills most valued by employers, such as problem-solving, digital competency, and adaptability, and learn how to apply these skills in different scenarios. You’ll also learn how to articulate to employers how being able to do so gives you the edge.
At ÂÌñ»»ÆÞ, we're not just keeping up with change, we're creating it
For more information on how Kingston prepares you for the future job market, visit our Future Skills page.

Teaching and assessment
Scheduled learning and teaching on this course includes timetabled activities including lectures, seminars and small group tutorials. It may also include placements, project work, workshops, workshops in computer labs, and laboratory workshops.
Outside the scheduled learning and teaching hours, you will learn independently through self-study which will involve reading articles and books, working on projects, undertaking research, preparing for and completing your work for assessments. Some independent study work may need to be completed on-campus, as you may need to access campus-based facilities such as studios and labs.
Our academic support team here at ÂÌñ»»ÆÞ provides help in a range of areas.
When you arrive, we'll introduce you to your personal tutor. This is the member of academic staff who will provide academic guidance, be a support throughout your time at Kingston and show you how to make the best use of all the help and resources that we offer at ÂÌñ»»ÆÞ.
A course is made up of modules, and each module is worth a number of credits. You must pass a given number of credits in order to achieve the award you registered on, for example 360 credits for a typical undergraduate course or 180 credits for a typical postgraduate course. The number of credits you need for your award is detailed in the programme specification which you can access from the link at the bottom of this page.
One credit equates to 10 hours of study. Therefore 120 credits across a year (typical for an undergraduate course) would equate to 1,200 notional hours. These hours are split into scheduled and guided. On this course, the percentage of that time that will be scheduled learning and teaching activities is shown below for each year of study. The remainder is made up of guided independent study.
- Year 1: 32% scheduled learning and teaching
- Year 2: 33% scheduled learning and teaching
- Year 3: 29% scheduled learning and teaching
The exact balance between scheduled learning and teaching and guided independent study will be informed by the modules you take.
Your course will primarily be delivered in person. It may include delivery of some activities online, either in real time or recorded.
Types of assessment
- Year 1: Coursework 55%; exams 45%
- Year 2: Coursework 60%; practical 20%; exams 20%
- Year 3: Coursework 70%; practical 13%; exams 17%
Please note: the above breakdowns are a guide calculated on core modules only. If your course includes optional modules, this breakdown may change to reflect the modules chosen.
We aim to provide feedback on assessments within 20 working days.
Your individualised timetable is normally available to students within 48 hours of enrolment. Whilst we make every effort to ensure timetables are as student-friendly as possible, scheduled learning and teaching can take place on any day of the week between 9am and 6pm. For undergraduate students, Wednesday afternoons are normally reserved for sports and cultural activities, but there may be occasions when this is not possible. Timetables for part-time students will depend on the modules selected.
To give you an indication of class sizes, this course normally enrols 85 students and lecture sizes are normally 85Â-290Â. However this can vary by module and academic year.
Fees and funding
Fee category | Fee |
---|---|
Home (UK students) | |
£9,535* | |
Foundation Year: | £9,535 |
International | |
Year 1 (2025/26): | £18,500 |
Year 2 (2026/27): | £19,200 |
Year 3 (2027/28): | £19,900 |
Year 4 (2028/29): | £20,700 |
The tuition fee you pay depends on whether you are assessed as a 'Home' (UK), 'Islands' or 'International' student. In 2025/26 the fees for this course are above.
For courses with Professional Placement, the fee for the placement year can be viewed in our Fees and Funding section. The placement fee published is for the relevant academic year stated in the table. This fee is subject to annual increases but will not increase by more than the fee caps as prescribed by the Office for Students or such other replacing body.
* For full-time programmes of a duration of more than one academic year, the published fee is an annual fee, payable each year, for the duration of the programme. Your annual tuition fees cover your first attempt at all of the modules necessary to complete that academic year. A re-study of any modules will incur additional charges calculated by the number of credits. Home tuition fees may be subject to annual increases but will not increase by more than the fee caps as prescribed by the Office for Students or such other replacing body. Full-time taught International fees are subject to an annual increase and are published in advance for the full duration of the programme.
Eligible UK students can apply to the Government for a tuition loan, which is paid direct to the University. This has a low interest-rate which is charged from the time the first part of the loan is paid to the University until you have repaid it.
Scholarships and bursaries
For students interested in studying this course at Kingston, there are several opportunities to seek funding support.

Additional course costs
Some courses may require additional costs beyond tuition fees. When planning your studies, you’ll want to consider tuition fees, living costs, and any extra costs that might relate to your area of study.
Your tuition fees include costs for teaching, assessment and university facilities. So your access to libraries, shared IT resources and various student support services are all covered. Accommodation and general living expenses are not covered by these fees.
Where applicable, additional expenses for your course may include:
Our libraries have an extensive collection of books and journals, as well as open-access computers and laptops available to rent. However, you may want to buy your own computer or personal copies of key textbooks. Textbooks may range from £50 to £250 per year. And a personal computer can range from £100 to £3,000 depending on your course requirements.
While most coursework is submitted online, some modules may require printed copies. You may want to allocate up to £100 per year for hard-copies of your coursework. It’s worth noting that 3D printing is never compulsory. So if you choose to use our 3D printers, you’ll need to pay for the material. This ranges from 3p per gram to 40p per gram.
ÂÌñ»»ÆÞ will pay for all compulsory field trips. Fees for optional trips can range from £30 to £350 per trip.
Your tuition fees don’t cover travel costs. To save on travel costs, you can use our free intersite bus service. This route links the campuses and halls of residence with local train stations - Surbiton, Kingston upon Thames, and Norbiton.
If you choose to do a placement year, travel costs will vary depending on your location. These costs could be up to £2,000.
Course changes and regulations
The information on this page reflects the currently intended course structure and module details. To improve your student experience and the quality of your degree, we may review and change the material information of this course. Find out more about course changes
for the course are published ahead of each academic year.
Regulations governing this course can be found on our website.
Key information
The scrolling banner below displays some key factual data about this course (including different course combinations or delivery modes of this course where relevant).