HND in Computing (Security)

Course Overview

If there was ever a time to enter the cyber security field, it is now with cyber threats and attacks increasing in both frequency and sophistication. Because of the growth of the Internet the demand for cyber security professionals is increasing rapidly. It is estimated that in 2021 there will be 3.5 million unfilled cyber security jobs worldwide. On this course you will learn how to protect computer operating systems, networks, and data from cyber attacks.

Course Requirements

GCSEs at grade C or above in maths and English language (or equivalent) and BTEC level 3 Extended Diploma at Merit Pass Pass or BTEC Diploma at Merit Merit (or equivalent).

Applications from mature students without formal qualifications will be welcomed, especially if you have the motivation to succeed. Normal minimum qualifications required for mature entrants (21 years and above) are a recognised Computing Access course or business experience in the computing industry using IT related skills and successful completion of an aptitude assessment in maths and English language.

Course Assessment

Evidence based against learning outcomes and assessment criteria. There are no formal examinations during this course.

Course Finance

Please contact the College for further information.

Course Includes

As a student at Trafford College you have access to:

Rack network servers, switches, routers, cables
HAck5 hardware including Wi-Fi pineapple, LAN turtle, USB rubber ducky, HackRF one
Ubertooth Bluetooth adapter
Raspberry Pi
Programmable Logic adapter
3D printer
Cross College facilities including free Wi-Fi
Library
Careers advice

Award

Level 5 HND in Computing (Security)

Course Potential Careers

Degree or employment into or within the IT sector. Learners may work towards membershipo of the British Computer Society.

Hours Per Week

2 days a week.

Programme Structure

Units of study may include but are not limited to:

Programming
Networking
Managing a Successful Computer Project (Pearson-set)
Database Design & Development
Professional Practice
Security
Computer Systems Achritecture
Data Analysis
Computing Research Project (Pearson-set)
Business Intelligence
Cryptography
Forensics
Information Security Management
Network Security