



You are eligible if you meet our stipulated entry requirements.
Enter the course name to discover your desired programme.




You are eligible if you meet our stipulated entry requirements.
Cyber security breaches cause significant personal and organisational damage and pose a clear and present risk to business profitability and resilience. Forbes, the business magazine, estimates that the annual cost of cyber-crime might reach (or surpass) $2Trillion by 2019. At a ground-level, Cyber security breaches are causing business insolvencies and posing challenges to employee safety and wellbeing.
In this unit the learner will be introduced to a variety of threats and risks emanating from cyberspace. The unit will look at various methods of attack and will use case studies to analyse various threat vectors, including Malware, Botnets and Trojans.
The "Leadership for Strategic Managers" module prepares managers and leaders to make informed decisions and lead their teams effectively in the rapidly changing and highly competitive business world. Through a comprehensive understanding of strategic management and leadership principles, learners will critically examine internal and external factors that influence an organisation's strategy and develop practical skills that can be applied in various situations and contexts. The module emphasizes the role of leadership in formulating and implementing strategy for robust organisational growth. It covers theoretical and empirical approaches to strategy to prepare learners for the dynamic and complex world of commerce.
Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical. Database security is a specialist topic within the broader realms of computer security, information security and risk management.
In this unit the learner will explore security risks to database systems and mitigation techniques. Understanding the function of computer programming is essential to understanding the dark arts of ‘Black Hat Hackers.’ Learners will examine (as a rolling case study) Python as a popular contemporary programming language. The symbiotic link between developments in computer programming and vulnerabilities to hacking will be examined and explored.
The aim of this course is to develop learners’ research skills to include understanding different research approaches, formulation of research proposals, planning research activity, analysing and interpreting data, and the relationship between research and evidence-based practice.
This course will equip learners with knowledge of the general foundations of criminal liability and with understanding of the major types of offences and their constituent elements. The unit aims to enable learners to determine whether specific offences have been committed and whether any defences may be applicable. Learner will explore the aims and nature of criminal law and its function as a protector of the State.
This course delves into the multifaceted ethical dilemmas faced by modern organisations in the realms of business and sustainability. Through an exploration of key philosophical principles, students will learn to conduct a rigorous analysis of ethical theory and its practical applications. The course aims to enhance students' understanding of ethical language and reasoning, empowering them to apply a subjective ethical perspective to their own organisational practices. Additionally, the course offers a range of frameworks to assess and integrate sustainability considerations into organisational decision-making processes.








