רҵ¿â
µçÄÔÓÎÏ·¿ª·¢ÈÙÓþÀíѧѧʿ
BSc (Hons) Computer Games Development
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º3Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»úȡ֤ѧÈÙÓþÀíѧѧʿ
BSc (Hons) Computer Forensics
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º3Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»ú°²È«ÈÙÓþÀíѧѧʿ
BSc (Hons) Computer Security
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º3Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»ú¿ÆÑ§ÈÙÓþÀíѧѧʿ
BSc (Hons) Computer Science
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º3Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
Ó¦ÓüÆËã»úÈÙÓþÀíѧѧʿ
BSc (Hons) Applied Computing
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º3Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
Ó¦ÓüÆËã»ú£¨±¾Ë¶Á¬¶Á£©¼ÆËã»ú˶ʿ
MComp Applied Computing
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º3Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»ú°²È«£¨±¾Ë¶Á¬¶Á£©ÈÙÓþ¼ÆËã»ú˶ʿ
MComp (Hons) Computer Security
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º4Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»ú¿ÆÑ§£¨ÕûºÏÔ¤¿Æ£©ÈÙÓþÀíѧѧʿ
BSc (Hons) Computer Science (Including Foundation Year)
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º4Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»úȡ֤ѧ£¨ÕûºÏÔ¤¿Æ£©ÈÙÓþÀíѧѧʿ
BSc (Hons) Computer Forensics (Including Foundation Year)
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º4Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»ú¿ÆÑ§£¨±¾Ë¶Á¬¶Á£©ÈÙÓþ¼ÆËã»ú˶ʿ
MComp (Hons) Computer Science
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º4Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»ú°²È«£¨ÕûºÏÔ¤¿Æ£©ÈÙÓþÀíѧѧʿ
BSc (Hons) Computer Security (Including Foundation Year)
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º4Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»úȡ֤ѧ£¨±¾Ë¶Á¬¶Á£©ÈÙÓþ¼ÆËã»ú˶ʿ
MComp (Hons) Computer Forensics
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£º±¾¿Æ
- Ñ§ÖÆ£º4Äê
- ѧ·Ñ£º13500Ó¢°÷
- ÉêÇëÄѶȣº
ÓÎÏ·ÆóÒµÎÄѧ˶ʿ
MA Games Enterprise
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£ºË¶Ê¿
- Ñ§ÖÆ£º1Äê
- ѧ·Ñ£º14100Ó¢°÷
- ÉêÇëÄѶȣº
¶¯»ÎÄѧ˶ʿ
MA Animation
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£ºË¶Ê¿
- Ñ§ÖÆ£º1Äê
- ѧ·Ñ£º14100Ó¢°÷
- ÉêÇëÄѶȣº
ÓÎÏ·ÆóÒµÎÄѧ˶ʿ
MA Games Enterprise
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£ºË¶Ê¿
- Ñ§ÖÆ£º1Äê
- ѧ·Ñ£º14100Ó¢°÷
- ÉêÇëÄѶȣº
Êý¾Ý¿ÆÑ§Àíѧ˶ʿ
MSc Data Science
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£ºË¶Ê¿
- Ñ§ÖÆ£º1Äê
- ѧ·Ñ£º14300Ó¢°÷
- ÉêÇëÄѶȣº
ÍøÂ簲ȫÀíѧ˶ʿ
MSc Cyber Security
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£ºË¶Ê¿
- Ñ§ÖÆ£º1Äê
- ѧ·Ñ£º14300Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»úϵͳ°²È«Àíѧ˶ʿ
MSc Computer Systems Security
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£ºË¶Ê¿
- Ñ§ÖÆ£º1Äê
- ѧ·Ñ£º14300Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»ú¿ÆÑ§Àíѧ˶ʿ
MSc Computer Science
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£ºË¶Ê¿
- Ñ§ÖÆ£º1Äê
- ѧ·Ñ£º14300Ó¢°÷
- ÉêÇëÄѶȣº
¼ÆËã»ú¼°ÐÅϢϵͳÀíѧ˶ʿ
MSc Computing and Information Systems
- ѧУ£ºÄÏÍþ¶ûÊ¿´óѧ
- רҵ·½Ïò£ºÀí¹¤¿Æ -- µçÄÔ¿ÆÑ§ºÍÐÅÏ¢¼¼Êõ
- ѧÀú£ºË¶Ê¿
- Ñ§ÖÆ£º1Äê
- ѧ·Ñ£º14300Ó¢°÷
- ÉêÇëÄѶȣº