HND in Digital Technologies 
- Cyber Security - 
If you're looking to pursue a career in digital technology, HND will help you develop a range of key skills essential for entry into this exciting and ever-evolving sector. You'll also develop transferable skills such as communication, teamwork, research and analysis which are highly valued in higher education and the workplace. 

Course overview

The HND in Digital Technologies for England (Cyber Security) course is aimed at students who want to continue their education through applied learning. Pearson BTEC Higher Nationals provide an intensive study of the digital computing sector and are designed for students who wish to pursue a career in the field.

After completing this course, students can continue their studies to degree level or pursue careers such as:
- Business analyst
- Digital Technologist
- IT Support technician
- Data analyst
- Software developer
- Network technician
- Software tester
- Risk analyst
- Data analytics consultant
- Database administrator
- Web developer
- IT developer

CURRICULUM

Year 1

 •Professional Practice in the Digital Economy (15 credits)
• Innovation and Digital Transformation (15 credits)
•⁠ ⁠Programming (15 credits)
•⁠ ⁠Big Data and Visualisation (15 credits)
•⁠ ⁠Security (15 credits)
•⁠ ⁠Networking (15 credits)
•⁠ ⁠Networking in the Cloud (15 credits)
•⁠ ⁠Cyber Security (15 credits)

Year 2

 - Business Intelligence (15 credits)
 - Internet of Things (15 credits)
 - Emerging Technologies (15 credits)
 - Applied Security in the Cloud (15 credits)
 - Applied Cryptography in the Cloud (15 credits)
 - Information Security Management in the Cloud (15 credits)
 - Work Based Learning in the Digital Economy (15 credits)
 - Digital Sustainability (15 credits)

ASSESSMENT

There are no formal examinations required for this course. Assessments are undertaken in various ways:
Presentations
Writing assignments
Analysing case studies
In-class tests
Work-based projects
Software development
Completing a portfolio of evidence
Writing reports
You will be required to work in your own time to complete research, homework tasks or group work.
Self-study is vital to your success on this course and lecturers will give you guidance on how best to approach this throughout the study period.

Entry Requirements

Education
Level 3 qualification or equivalent
An Access to Higher Education Certificate
English Proficiency
CEFR B2
Students who are non-native English speakers or who have not studied Level 3 in United Kingdom are expected to hold an accepted English language B2 (CEFR)
Interview
All applicants must pass an Academic Interview
Certification
The final certificate is issued by Pearson Education.
Work Experience
Exceptional entry route: 2 years relevant work experience
Applications From Students 21+
We welcome applications from students 21+ who do not match the standard entry requirements but who can demonstrate willingness and commitment to studying this subject at University level, and, who can evidence academic, professional or vocational experience in a related field.
Process
Application - Supporting Documents - Panel Interview - Final Decision

Fees & Funding

Funding your study
You can apply for help with your fees from the government by visiting gov.uk/studentfinance. This could take the form of a Tuition Fee Loan, Maintenance Loan or Maintenance Grant.

A Tuition Fee Loan will cover the cost of your up-front fees, and will be paid to your university or College. The Loan must be repaid once you finished your course and are earning £26,575 a year or more. Both full and part-time learners can apply.

If you are eligible, you can apply for a Maintenance Loan too. The loan is paid directly into your bank account at the start of term. This loan has to be repaid after you leave your course and when your earnings are more than £26,575. For more information please visit gov.uk/studentfinance.

Maintenance Grants are paid into your bank account at the start of term. You don’t have to pay it back, but any funds you get will reduce the amount of Maintenance Loan you are eligible for.

New students must prove they have been living in the UK for five years before their course start date in order to get living cost support from Student Finance England.

Fees 
6000£

Over 40 Careers in Cybersecurity and Digital Technology

Careers Available After HND Digital Technology - Cyber Security

Entry-Level Careers:

Cybersecurity Analyst
Monitors and analyzes network traffic to identify and mitigate security threats.
Network Security Technician
Manages and maintains the security of an organization's network infrastructure.
IT Support Specialist
Provides technical support and troubleshooting assistance for hardware and software issues.
Penetration Tester (Junior)
Conducts authorized simulated attacks on computer systems to identify security vulnerabilities.
Information Security Assistant
Assists in the implementation and maintenance of security policies and procedures.
Security Operations Center (SOC) Analyst
Monitors security systems, analyzes potential threats, and responds to security incidents.
Digital Forensics Technician
Assists in the investigation of cybercrimes by recovering and analyzing data from digital devices.
Compliance Analyst
Ensures that an organization adheres to industry regulations and standards related to cybersecurity.
Incident Responder (Junior)
Assists in handling and mitigating security breaches and cyber-attacks within an organization.
Systems Support Analyst
Provides support for system users, ensuring secure and efficient system operations.
Technical Support Specialist
Offers technical assistance to users, focusing on cybersecurity issues and system protection.
IT Risk Analyst
Evaluates IT systems to identify and mitigate potential risks and vulnerabilities.

Careers Available After Top-Up to Level 6 (BSc in Digital Technology/Cyber Security)
Advanced Careers:

Cybersecurity Manager
Leads a team of cybersecurity professionals and manages an organization’s overall security strategy.
Information Security Officer
Develops and enforces policies and procedures to protect an organization's information assets.
IT Auditor
Reviews and assesses an organization's IT systems, applications, and processes to ensure compliance and security.
Chief Information Security Officer (CISO)
Oversees the information security program and aligns security initiatives with business objectives.
Senior Penetration Tester
Conducts in-depth security assessments and penetration tests to identify and mitigate vulnerabilities.
Security Architect
Designs and oversees the implementation of complex security systems and infrastructure.
Cyber Threat Intelligence Analyst
Analyzes cyber threats and develops strategies to protect against potential attacks.
Digital Forensics Investigator
Leads investigations into cybercrimes, including data recovery and analysis of digital evidence.
Network Security Engineer
Develops and maintains network security solutions to protect against cyber threats.
Compliance Manager
Ensures that an organization complies with all relevant laws, regulations, and standards related to cybersecurity.
Security Consultant (Senior)
Provides high-level security consulting services to a variety of clients, often in specialized areas such as cloud security or application security.
Researcher/Academic in Cyber Security
Conducts advanced research in cybersecurity, potentially working in academia or for private research institutions.
Product Manager - Cybersecurity
Manages the development and lifecycle of cybersecurity products and solutions.
Project Manager - IT Security
Oversees cybersecurity projects, ensuring they are completed on time and within budget.

Security Policy Analyst
Develops and analyzes security policies to ensure they meet organizational and regulatory requirements.
Business Continuity Manager
Develops and manages strategies to ensure the continuity of business operations during and after security incidents.
Application Security Engineer
Ensures that software applications are designed and implemented with strong security measures.
Cloud Security Specialist
Focuses on securing cloud-based systems and data.
Identity and Access Management (IAM) Analyst
Manages user identities and access permissions within an organization.
Data Protection Officer
Ensures compliance with data protection regulations and manages data privacy strategies.
Ethical Hacker
Conducts penetration testing and security assessments to find and fix security vulnerabilities.
Security Awareness Trainer
Educates employees about cybersecurity best practices and threat prevention.
Malware Analyst
Analyzes malicious software to understand and mitigate its effects.
Vulnerability Analyst
Identifies and assesses vulnerabilities in IT systems and software.
Information Security Consultant
Provides strategic advice on securing information systems and infrastructure.
SCADA Security Specialist
Secures industrial control systems and critical infrastructure.
Mobile Security Specialist
Focuses on protecting mobile devices and applications from cyber threats.
Penetration Testing Team Lead
Manages a team of penetration testers and oversees security testing projects.
Cybersecurity Sales Engineer
Supports the sales of cybersecurity products by providing technical expertise.
Security Software Developer
Develops software applications with a focus on security features and functionalities.

Cross-Functional Careers:
Security Analyst
Reviews and analyzes security systems and measures, providing strategic recommendations.
Incident Response Manager
Manages and coordinates the response to cybersecurity incidents, ensuring effective resolution.
Forensic Computer Analyst
Examines digital evidence in criminal investigations and legal cases.
Technical Account Manager
Manages client relationships, ensuring their cybersecurity needs are met.
Industrial Control Systems (ICS) Security Specialist
Secures and monitors systems controlling industrial processes.
Cryptographer
Develops algorithms and encryption systems to protect data.
Telecommunications Security Specialist
Secures communication networks and ensures the integrity of transmitted data.
Security Operations Manager
Oversees the daily operations of a security operations center (SOC).
DevSecOps Engineer
Integrates security practices into the software development lifecycle.
Privacy Consultant
Advises organizations on data privacy laws and best practices for data protection.

 CONTACT 
Opening hours:
Monday – Friday | 10am – 5pm
Saturday – 10am – 3pm

Address: 148a Ashburnham Road, Luton UK
Email: alin@eduforyou.co.uk
Tel: 07585972106

  USEFUL LINKS

   About Us

EDUFORYOU LTD 2022  - All Rights Reserved