We welcome applications from the United States of America
We've put together information and resources to guide your application journey as a student from the United States of America.
Overview
Top reasons to study with us
13
13th for Overall (Computer Science and Information Systems)
The Guardian University Guide (2025)
19
19th for Research Quality in Computer Science
The Complete University Guide (2026)
Brand new state-of-the-art facilities
Could you lead the future of cyber security? Digital technologies impact every part of our lives and cyber security experts are essential for addressing debates around AI, digital forensics, and hacking. As a cyber security student, you will tackle foundational, advanced, and emergent, cyber security topics such as security and penetration testing, cryptography, network security, resilient distributed systems, security of autonomous systems, secure AI, secure cyber-physical systems, and security metrics. Prepare to influence the systems that shape our world and take the next step towards an exciting career.
What to expect
Our four-year MSci Cyber Security (Industrial Experience) degree begins by building your understanding of the fundamental principles and skills in computer science and how they are applied. You will explore a set of key areas such as software development and digital systems. You will also begin to explore the social, ethical, and professional issues associated with cyber security.
Going into Year 2, you will be able to delve deeper into what intrigues you most and specialise your studies towards a specific career path. This includes exploring a range of topics such as cryptography, secure distributed systems, and networking. You will also develop your understanding of how attackers target systems through penetration testing and hacking. You will gain insight into the challenges encountered by a range of industries by facing real-world scenarios and considering their wider impact through lectures, workshops, and group projects.
In Year 3, you will draw on the expertise of the NCSC Academic Centre of Excellence in Cyber Security Research at Lancaster to explore more advanced topics. These include topics such as adversarial AI, the security challenges faced by large scale cyber-physical systems, and advancements in the approach to cyber investigations. Alongside this, you will undertake an individual cyber-focused project in collaboration with one of our academics, where you will further develop the skills and knowledge needed to thrive in your future career.
Master’s-level training
In Year 4, you will develop the skills and knowledge required to thrive in your future career, whether in industry or research. You will spend 10-15 weeks in industry, gaining valuable real-world experience. To complement this, you will study a range of modules, advancing your academic knowledge with a focus on independent and critical study.
Personal development
Throughout your degree, you will develop valuable transferrable skills such as analysis, problem-solving, and communication, which make you highly desirable to future employers. The practical skills you gain in programming, network design, risk management, and penetration testing prepare you for applications in the real world, and your insight into sustainable computing and AI will make you a unique candidate prepared to face the challenges of the future. You will also learn how to collaborate, research, and present your findings, developing solutions as part of a team and as a leader. With industrial experience added to your CV, you will be a standout graduate.
3 things our students want you to know:
We have a thriving community that engages in a range of extra-curricular societies and groups. They’re a great opportunity to meet new people and build your professional and technical skills. Current groups include LU Hack, the Lancaster University Ethical Hacking Group who practice safe (and legal!) hacking; FemTech, a group aimed at empowering non-male-identifying students in a male-dominated discipline; and the Computer Science Society, who facilitate talks and guest lectures to help you learn from and engage with experts within and beyond our staff
We tackle the important considerations of ethics and sustainability as we learn. It’s challenging but inspiring to think about the future of cyber security and its impact on our lives and society, and how we can drive that change
Our campus is a fantastic place to learn! We each have our favourite place to study: in the SkyLounge with amazing views, in our brand new high-end computer labs or in the Science and Technology Building's collaborative and creative labs
Professor Daniel Prince explains what students can expect from studying Cyber Security at Lancaster, how it prepares students for its real-world application, and the impact the discipline has on society.
Somewhere to get involved
Lancaster's computer students are spoilt for choice when it comes to the extra-curricular societies and groups that our School has to offer them.
LUHack
Founded in 2014, the Lancaster University Ethical Hacking Group (LUHack) is a group of individuals who meet weekly to learn and practise ethical hacking in a safe (and legal!) environment. Anyone can learn the basics of hacking in the first semester before moving onto advanced topics and regularly attending conferences and competing in Capture the Flag competitions.
Computer Science Society
The Computer Science Society works closely with the School to provide exciting opportunities for you to engage with alongside your degree. We facilitate talks from industry, guest lectures, career development opportunities and more! Join us and get involved in a range of projects, from the small and simple to the long-term and ambitious. You can even get funding for your own idea if you have one! All students benefit from our peer-led support sessions for your academic studies, ranging from workshops to lectures.
Women++@InfoLab
Women++@InfoLab supports marginalised groups of staff and students within the School Of Computing and Communications. There are opportunities to meet up, as well as networking lunches, talks from industry representatives and academics, and workshops. This year we hosted the annual British Computing Society Lovelace Colloquium, and many of our undergraduates had the opportunity to present posters.
Careers
Our graduates of our Cyber Security programmes are well-suited to a wide range of computing roles that require advanced-level knowledge. You will graduate having a firm understanding of the theoretical aspects of cyber security, alongside experience in applying your knowledge to a variety of security scenarios, which is essential for many of the more technical roles within the fields of cyber security and computer science.
Particular graduate destinations may include cyber security architect or analyst, roles within penetration testing and digital forensics, security operations centre analyst, and secure software or hardware development. Many of our students also elect to continue in higher education by studying for MSc or PhD qualifications. Lancaster is home to the Lancaster Security Institute, which specialises in delivering research that innovates and creatively challenges the way that individuals, organisations, and societies secure and protect themselves.
We provide careers advice and host a range of events throughout each academic year. These include our annual careers fair, attended by exhibitors who are interested in providing placements and vacancies to data science students and graduates. You can also speak face-to-face with employers such as Network Rail, Oracle, and Johnson and Johnson, in addition to a broad range of SMEs. Our graduates have gone on to work with major technology companies such as IBM, Google, BBC, and BAE, while others have chosen to take their software design, development, and management skills to SMEs, or have set up their own technology-centric businesses. Our School of Computing and Communications graduates also have excellent earning potential, with the median salary of £34,000 15 months after graduation (HESA Graduate Outcomes Survey 2024).
Lancaster University is dedicated to ensuring you not only gain a highly reputable degree, you also graduate with the relevant life and work based skills. We are unique in that every student is eligible to participate in The Lancaster Award which offers you the opportunity to complete key activities such as work experience, employability/career development, campus community and social development. Visit our Employability section for full details.
Supporting your future
At Lancaster, we're passionate about ensuring our graduates are prepared for the world beyond university - here are a few ways that we aim to support your future ambitions.
Placements
Our four-year MSci programme features a 10-week industry placement in its final year, which is fully arranged by us. Tell us your preferences and we'll match-make you with our network of industry partners. Past placements include Microsoft, Dolby Digital, GCHQ, as well as a range of UK-based businesses.
Guest speakers
Our degrees feature a wide range of invited guest speakers from industry, providing insight into how the technology industry works and giving our students an opportunity to meet and build relationships with key people.
Knowledge Transfer Team
Our Knowledge Transfer Team can help you develop your own business ideas and take the first steps to starting your own company. Our graduates have started a range of successful companies over the last 10 years, many of which now offer internships to our current students.
Internships
Our dedicated Business Engagement Team works with organisations across the technology sector, from large multi-national corporations to small local businesses. Our team can use their network to help you build contacts and arrange internships.
Entry requirements
These are the typical grades that you will need to study this course. This section will tell you whether you need qualifications in specific subjects, what our English language requirements are, and if there are any extra requirements such as attending an interview or submitting a portfolio.
Qualifications and typical requirements accordion
AAA. Though not an essential subject entry requirement, applicants with A level Computing, Computer Science or Mathematics will be considered for a lower offer.
45 Level 3 credits at Distinction
We accept the Advanced Skills Baccalaureate Wales in place of one A level, or equivalent qualification, as long as any subject requirements are met.
DDD
A level at grade A plus BTEC(s) at DD, or A levels at grade AA plus BTEC at D. Though not an essential subject entry requirement, applicants with A level Computing, Computer Science or Mathematics will be considered for a lower offer.
36 points overall with 16 points from the best 3 HL subjects. Though not an essential subject entry requirement, applicants with HL Mathematics or Computer Science will be considered for a lower offer.
We are happy to admit applicants on the basis of five Highers, but where we require a specific subject at A level, we will typically require an Advanced Higher in that subject. If you do not meet the grade requirement through Highers alone, we will consider a combination of Highers and Advanced Highers in separate subjects. Please contact the Admissions team for more information.
Distinction overall
Help from our Admissions team
If you are thinking of applying to Lancaster and you would like to ask us a question, complete our enquiry form and one of the team will get back to you.
Delivered in partnership with INTO Lancaster University, our one-year tailored foundation pathways are designed to improve your subject knowledge and English language skills to the level required by a range of Lancaster University degrees. Visit the INTO Lancaster University website for more details and a list of eligible degrees you can progress onto.
Contextual admissions
Contextual admissions could help you gain a place at university if you have faced additional challenges during your education which might have impacted your results. Visit our contextual admissions page to find out about how this works and whether you could be eligible.
Course structure
Lancaster University offers a range of programmes, some of which follow a structured study programme, and some which offer the chance for you to devise a more flexible programme to complement your main specialism.
Information contained on the website with respect to modules is correct at the time of publication, and the University will make every reasonable effort to offer modules as advertised. In some cases changes may be necessary and may result in some combinations being unavailable, for example as a result of student feedback, timetabling, Professional Statutory and Regulatory Bodies' (PSRB) requirements, staff changes and new research. Not all optional modules are available every year.
The creation of the microprocessor revolutionised global innovation and creativity. Without such hardware there would be no laptops, no smartphones, no tablets. Life changing technologies, from MRI scanners to the internet, would simply not exist.
This module introduces the field of digital systems, the engineering principles upon which all contemporary computer systems are based. You will study the elements that work together to form the architecture of digital computers, including computer processors, memory, data storage and input/output. You will also unearth the ways in which these are enabled by digital logic, where George Boole’s theory of a binary based algebra meets electronics. Discover how the software programs we write translate to, and interact with, such hardware. Finally, this module will explore the effects of multi-process operating systems, and how these interplay with the capabilities and architecture of modern computers to optimise performance and robustness.
Computing and data control many critical elements of modern society. It’s vital that there is a strong theoretical foundation to computer science.
We begin by examining the hard questions at the centre of computer science. You will cover the fundamentals in logic, sets, and mathematics of vectors, matrices and linear algebra and their practical applications in software, such as computer graphics. Algorithms, abstract data types, and analysis of algorithms is introduced to allow you to make reasonable decisions about the design of your programs. Finally, you will get the chance to investigate the principles of data science to select, process and analyse data, and examine the way programs and systems can be designed to efficiently support work with data, and question the limits of conclusions that can be drawn from such systems.
Software forms a central aspect of our lives. From the applications we run on our phones to satellites in space, all modern technology is enabled by software.
In this module, you will focus on Software Development, the processes and skills associated with designing and constructing computer programs. No matter your previous experience in computing, you will gain the contemporary knowledge, skills and techniques needed to develop high-quality computer software. This includes a thorough treatment of the principles of computer programming and how these principles can be applied using a range of contemporary and established languages such as C and Python. You will study the software engineering skills needed to ensure programs are correct, robust and maintainable, including techniques for problem analysis, design formulation, programming conventions, documentation, testing and test case design, debugging and version control.
Software development is a collaborative and creative process. You will investigate the processes, tools, techniques, and notations required to successfully engage in the development of commercial grade software.
Focusing on the key non-functional parameters of software reuse, scalability, maintainability and extensibility, you will explore the benefits brought by the rigour associated with object-oriented, strongly typed languages (such as Java). You will practice the concepts of composition, inheritance, polymorphism, interfaces, and traits and the commonly employed design patterns that they enable. You will also study the processes and notations associated with defining the relationships and behaviour of complex computer software systems. Practical activities will allow you to continue to refine the programming skills to create even more complex systems.
Optional
optional modules accordion
Computer science is a discipline that continues to innovate at a remarkable pace, changing nearly every aspect of modern life as it does so. We introduce you to a range of special topics that reflect the latest aspects of computing. Examples include physical computing, soft robotics, applications of AI, computer science innovation and tech entrepreneurship.
The exact topics explored changes year by year to ensure you cover ideas at the cutting-edge of contemporary computer science thinking. Guest speakers will help stimulate debate and topics will include lectures and lab sessions to provide a blend of theoretical and practical skills. At the end of the module, you will understand multiple emerging areas of computer science and understand how you can shape your degree to reflect the aspects that excite you most.
This module seeks to extend traditional development skills by covering core issues in computing operations. Developing expertise in this area is increasingly important as many software companies embrace the concept of DevOps, in which development and operations are brought together to ensure a unified approach to designing, developing, delivering and supporting complex software systems. You will gain an understanding of the key areas in computer operations, including systems administration, deployment and software evolution, while practical labs will be used to teach emerging DevOps tools.
Core
core modules accordion
You will execute a cyber security project from conception to completion, working to meet a client brief and applying the concepts and skills gained so far in a practical setting.
Working in a team, you will develop your skills in prototyping, project planning, management, design, user evaluation and testing strategies. Your group will be expected to deliver reports, code, and demonstrate a working system by the project’s conclusion.
Projects will either seek to build a system that may be used as a cyber security tool, for example a vulnerability scanner, or follow secure software design methodologies to build an application, such as a communication tool. Lectures will advise you on how to approach teamwork, project management, risks, and costings so that you have a sound base for managing collaborative projects, as well as continue to develop your cyber security awareness and techniques.
Human-computer interaction (HCI) is concerned with all aspects of designing, building, evaluating, and studying systems that involve human interaction.
From a computing perspective, the focus is on enabling interaction through user interfaces and on creating interactive systems that provide a positive user experience. The module introduces you to the foundations of HCI, where you delve into human behaviour, technologies for interaction and human-centred design. You will review human perception, cognition and action, and relate these to design principles and guidelines. As part of this, you will discuss different examples of user interfaces and key technologies such as pointing. You will then be introduced to the practical methods for designing and evaluating, including legal, social, ethical and professional considerations in relation to people and society, such as inclusive design practices, bias, and privacy.
Investigate the deeper concepts that underpin computer networking and operating systems. You will explore the role, operation, and design rationale of the IP protocol suite that enables the global internet. Taking a top-down approach, discover how protocols such as HTTP, DNS, and TCP/IP operate on a fundamental level, and the metrics and tools we use to evaluate the performance of computer networks.
Core operating system concepts will be built upon and expanded to develop an in-depth understanding of the components of an operating system such as the kernel, scheduling, access control, memory management and file systems. Using simulators, you will explore first-hand how data is efficiently and safely routed across the global internet. You will study the interface between networks and operating systems, and how the concept of virtualisation has transformed the way systems and networks make efficient use of hardware resources.
An introduction to two essential concepts in modern computing systems, cyber security and data engineering. We explore the building blocks of the Authentication, Authorisation and Accountability (AAA) framework, including access control models, security policies and mechanisms. You will review the main categories of existing cryptosystems to understand their security properties, discuss basic concepts of systems security, study the common approaches and tools that attackers use and gain first-hand experience tackling the weaknesses that can be present in real-world systems through guided work in a highly controlled, small-group practical lab.
You will gain a practical and theoretical background in the design, implementation and use of database management systems. This will incorporate the consideration of information quality and security, Entity-Relationship Models, the relational model and the data normalisation process, and alternative schema definitions, SQL, NoSQL and Object-Oriented data models, big data, as well as transaction processing and concurrency control.
Optional
optional modules accordion
Delve into the key principles of artificial intelligence (AI), touching on the core concepts and philosophy of AI and discussing its presence and ethical challenges in the modern world. Throughout, you will unearth the underlying principles of search spaces, knowledge representation and inference logic that form the core of rule-based systems, before learning the principles of machine learning, clustering, classification, linear regression and neural networks.
From this, you will have the grounding necessary to progress to modules in topics such as machine learning, computer vision, and NLP. You will also gain a deeper understanding of computational problem solving, exploring the very nature of computability, including non-deterministic polynomial (NP) complexity classes such as NP-hard, NP-complete and problems which cannot be solved. Be introduced to classical algorithmic approaches to problem solving including divide and conquer, recursion, and parallel approaches, exploring their relative merits for different classes of problem.
Computer architecture has now reached a critical juncture where we are witnessing a steep change in computer performance, not due to the increased performance of individual processors, but through the inclusion of many, sometimes even thousands, of processor cores in a single computer. This requires new ways of thinking about these concurrent systems, and operating systems in general. Dive into the theory and practical application of advanced operating systems (OS) and associated hardware concepts. Through a combination of lab exercises and lectures, you will investigate the ways that modern operating systems are optimised to extract the maximum performance and efficiency from 21st century computer hardware. As part of this, you will use contemporary software tools and techniques to create high performance applications that exploit multi-threaded instruction parallelism whilst avoiding race conditions, deadlock and livelock, and utilise GPUs to exploit data parallelism.
Extended reality (XR) refers to the interactive technologies that blend virtual and physical worlds into a hybrid environment or immersive experience. The technology is based on multi-modal platforms that integrate the use of wearable computing. In this module, you will explore different uses of extended reality within the Reality-Virtuality Continuum and identify the needs and means of augmenting human senses.
You will take an applied approach to the design, implementation, deployment, and evaluation of systems that are used to create an XR environment and deliver an immersive experience. To do this, you will study the latest trends in research, emerging technologies, and novel tools, with an analytical focus that assesses the socio-ethical impacts that may result from widespread usage of XR. A key topic will be the computer graphics technology that enables extended realities to exist visually, exploring the fundamental concepts related to visual content generation through relevant theory and practice using current game engines.
The internet and the world wide web have now invaded every aspect of our lives, from ecommerce and entertainment to logistics and social media. Increasingly, application software is no longer written for specific devices, but for internet web browsers. The internet has replaced operating systems as the de-facto platform for application development, making an already global phenomenon truly impactful.
This module explores the various approaches to the development of internet applications, investigating both the client and server-sides, and discussing the trade-off of performance, scalability, privacy and trust associated with these approaches. You will review the role of ‘cloud infrastructures’ (federated distributed computation) in the provision and management of internet applications. Through interactive lectures and practical sessions, you will study common frameworks for client-side application development and create and deploy an internet application from first principles.
Core
core modules accordion
Distributed systems are the foundation upon which modern large-scale infrastructures are built, such as Cloud and service-oriented architectures (also known as ‘as a service’). You’ll investigate the cryptographic techniques used to build such systems, and secure distributed systems themselves.
You’ll study the design approaches to constructing a secure distributed system, including the common vulnerabilities and attack surfaces associated with distributed systems, and the widely adopted design patterns used to mitigate them. To ensure the correctness of such systems, you will be introduced to formal verification techniques covering system specification and the verification of their correctness. This is imperative for systems that form the foundation of modern infrastructures or when we require security guarantees in mission-critical scenarios. Formal languages are used to define precise system specifications, and automated verification techniques verify their correctness. The languages enable the modelling of distributed systems and algorithms, and the verification of properties to prove their correctness.
Artificial Intelligence (AI) is being rapidly adopted in both research and industry, via technologies such as generative AI and large language models (LLM). They are being used for a range of applications by enhancing cyber security through the detection of anomalies, identifying threats, and monitoring abnormal activities. However, AI itself is susceptible to various attacks, such as prompt injection, data leakages, jailbreaking, bypassing guardrails, model backdoors, and more.
In this module, you will learn the fundamentals of AI for security and security for AI. This encompasses both how AI can be leveraged to augment and improve established cyber security techniques (from firewalls, risk analysis, to attack detection), as well as the emerging attacks against AI itself (data poisoning, extraction, membership inference). You’ll learn how AI is being used to revolutionise the established cyber security field, the emerging threats of adversarial attacks against ML models and data, and how to mitigate those attack.
Understand security threats to cyber physical systems (CPS), such as industrial control systems, Internet of Things and connected vehicles, as well as techniques to mitigate these threats. Compared to traditional computer systems, CPS have limited resources and are typically deployed into a physical environment. This impacts the implementation of security techniques, as due to the environment they are deployed in you must consider both digital and physical attacks.
This module introduces how to identify the appropriate security techniques to use for a CPS. You will come to understand how to write secure applications for CPS and which alternative mitigations are appropriate. You will also learn how the limitations of these systems impact the guarantee of security. In addition to this, you will examine the safety and privacy threats facing CPS and explore the interconnectivity between them and security.
You will undertake a substantial individual project on a cyber security topic, typically involving the principled design, implementation, and evaluation of a substantial piece of software, experimental study, or theoretical work. To assist in this, a cyber security academic will provide a large range of project ideas covering the breadth of our School’s expertise, which you will rank by level of interest before being allocated to a supervisor. You will also have the opportunity to write your own project idea and find a supervisor that would like to support you, and projects can be carried out in collaboration with an external partner, such as a company.
Throughout the project, you will be expected to attend regular one-to-one meetings with your supervisor, who will provide guidance and feedback as you explore your topic and complete previously agreed goals.
Optional
optional modules accordion
Computer networks have experienced an exponential growth in traffic and size since the early days of the internet. Packet network technologies underpin every aspect of our daily life. On this module, you will investigate how network technologies have evolved to cope with increasing demands, the architecture of devices, and protocols that facilitate end-to-end connectivity, while allowing control of connectivity properties like bandwidth and latency. You will explore cutting-edge research and industry perspectives regarding the challenges that face production network technologies, such as performance and security, and speculate on the future direction networking will take.
Practical sessions introduce network emulation and simulation technologies, where you will recreate realistic network testbeds. You will gain experience using open-source software frameworks to implement, configure and test common network functionalities, such as routing and firewalling.
Dive into alternative programming language paradigms, beyond imperative and object-oriented programming. Emphasis is placed on functional programming languages and their unique constraints and features, such as more expressive type systems, immutability, pure functions and side-effects, lambdas, higher order functions, currying, map/reduce and pattern matching. You will also explore why functional languages bring about increased reliability and scalability and how they are now experiencing a resurgence within the software industry. Through hands-on laboratory sessions, you will learn a functional programming language, such as Haskell, and see how functional programming concepts are being integrated in mainstream programming languages, such as Java, Python and JavaScript, to create versatile multi-paradigm programming environments.
Learn how to teach computer science as a discipline, including organising engaging activities that address the digital skills gap, and inspiring new computer scientists. Through practical sessions, you will build a foundational understanding of computing pedagogy, learning to recognise how learners study computer science and arrange teaching to respond to their needs. You’ll explore the instruments and methods for effective teaching practices, considering UK and global contexts, and the differences within primary, secondary, and higher education.
The importance of equality, diversity, and inclusion (EDI), ethics, safeguarding and integrity considerations in education will be highlighted throughout. You will also learn how to plan or conduct teaching or outreach activities in schools and support the development of digital capabilities of young people in Lancashire.
Computer vision is a branch of artificial intelligence which aims to build computer-based systems that can interpret and draw meaning from digital images. This module digs into the fundamentals of image formation, information relating to the human visual system, and image interpretation methodologies including convolution, edge detection and feature extraction, and comparison. You will tackle key problems in current research, including semantic segmentation, object detection and three-dimensional image interpretation. You will cover a range of approaches, from low-level image processing to convolutional neural networks. At the end of the module, you will be equipped to construct software components that implement contemporary image processing and computer vision algorithms and recognise issues within computer vision in order to develop and evaluate solutions.
Digital Health explores the utilisation of digital technologies in healthcare. These technologies have an ever-growing role to play in improving health systems and public health, as well as increasing and improving access to health services. Discover the practical applications, implications, and how to enable technologies of digital health. You will survey sensor technologies that permit remote and automated patient monitoring and study the technologies and processes that enable patient-driven healthcare. You will also investigate the structure of health data in electronic health records and methods for the evaluation of digital health solutions. Alongside these applied topics, you’ll also learn about data governance and the ethical issues surrounding digital health technologies, policy, and regulation.
Large scale distributed computing systems are now commonplace, implemented using ‘cloud infrastructures’ where computing and storage resources are pooled into data centres around the globe. In scientific terms, these are examples of distributed systems. Learn about the fundamental principles that underpin modern distributed systems, the abstractions on which they are based, and their characteristics. Emphasis is placed on the scalability and fault-tolerance of these systems, and you will dive into the commonly used frameworks for distributed systems, such as Google’s infrastructure, and highly distributed peer to peer approaches. Small group practical labs reinforce theory through hands-on experience of distributed systems development.
Understand the challenges associated with developing firmware for embedded systems, which is increasingly common in everyday appliances following a rise in cyber-physical systems, smart cities, and the Internet of Things. You will engage with relevant hardware and low-level programming as you study the architecture of microcontrollers (highly specialised, resource constrained computer processors that power embedded systems).
Building on this, you will then learn about the state-of-the-art software development processes that facilitate the writing of highly efficient code for such devices. You’ll become familiar with industry standard protocols and techniques for integrating peripherals with microcontrollers, and the low power wireless network communication technologies that enable their interconnection. The module will provide you with opportunities to work with a variety of embedded systems in practical sessions.
All programming languages are based on theoretical principles of formal language theory. In this module, you dive deep into formal languages representation and grammars, and how they relate to programming language compilers and interpreters. You will study formal language syntax and semantics, phrase structure grammars, and the Chomsky hierarchy. You will learn how to classify languages and explore the concepts of ambiguity in context-free grammar and its implications. In particular, you will learn about the compilation process including lexical analysis and syntactic analysis, recursive descent parsers and semantic analysis. Finally, you get to investigate the synthesis phase, where intermediate representations, target languages and structures lead to code generation.
Delve into machine learning, a fundamental concept in artificial intelligence that enables a computer to learn how to perform a task from data rather than traditional programming. In this module, you will study the key ideas and techniques behind machine learning and develop the practical skills needed to understand the implications and potential of machine learning in business and society. You will begin by looking at real-world problems, challenges, and fundamental techniques in current methodology. Building on this, you will cover a variety of approaches to machine learning, from decision trees to a wide range of deep neural networks, including multilayer perceptrons, convolutional neural networks, long short-term memory, autoencoder and generative adversarial networks.
Gain a broad understanding of Natural Language Processing (NLP), a branch of artificial intelligence where computational methods are used to analyse and understand human languages. Throughout the module, you will be exposed to the core concepts surrounding the NLP pipeline, covering methods and techniques for data collection, cleaning, tokenisation, and annotation using a hierarchy of linguistic levels (e.g. morphology, syntax, and semantics). You will experiment with and comparatively evaluate different methods and techniques, including rule-based, probabilistic, machine learning and deep learning approaches. You will also learn to apply and adapt NLP pipelines and tools to real-world text mining scenarios and problems, including examples such as health and finance. Key issues such as ethical data collection, bias in language models, and employing sustainable computing methods will also be touched upon throughout.
We introduce you to quantum computing's core principles and applications, contrasting its capabilities with classical systems. You will master Dirac notation and essential linear algebra, before examining quantum mechanics' four postulates, including qubits, gates, and circuit models. You will cover fundamental algorithms, including Deutsch's algorithm (implemented via Qiskit), Simon's problem, Bernstein-Vazirani, Grover's search (with BBBV Theorem analysis), and Shor's factorisation algorithm's impact on RSA cryptography.
Quantum cryptography components address post-quantum security and QKD protocols, while quantum information theory explores superdense coding, the no-cloning theorem and teleportation. The module concludes with emerging concepts like quantum money and the Elitzur-Vaidman bomb tester. Combining theoretical foundations with practical programming exercises, you will develop a critical understanding of both quantum computing's potential and current technological limitations, preparing you for advanced study or research in this rapidly evolving field.
Computing plays a pivotal role in addressing growing energy costs, greenhouse emissions, and the climate crisis. Whilst we can use computing and its associated digital technologies to shape a greener society (as well as create more energy-efficient software and hardware), there exist important trade-offs in respect to economic cost, engineering effort, and environmental impact. Explore key concepts associated with creating sustainable computing, spanning from how a processor uses electricity to how computers shape a greener economy and society. You will study the methods to create more energy-efficient code, energy-aware device mechanisms, as well as the benefits and drawbacks of computing and digital technology with respect to its impacts upon the environment and economy.
Core
core modules accordion
In your final year, you will undertake a substantial project that focuses on a particular specification, design, implementation and/or evaluation. Through this, you will tackle a real-world problem that aims to develop your existing knowledge, understanding and skills within your chosen discipline. The project is typically achieved in conjunction with your placement; however, it can be completed at the University.
Suggested topics will be provided by industry and vetted by our academics to ensure they offer the appropriate depth. If no suitable project with industry can be found, one will be provided by academic staff. You will have access to weekly meetings with an academic who will provide guidance and ensure the necessary level of academic rigour is maintained.
In the second semester of your final year, you will complete a 10-week placement. The University works with a range of organisations, from SMEs to large corporations and third-sector organisations, which you can be placed in.
During your placement, you will gain first-hand experience of working in a contemporary ICT-related environment, developing an understanding of professional practices and codes of conduct in industrial, commercial and professional settings. The organisation will set tasks that call upon the knowledge and experience gained throughout your degree, allowing you to apply it in a professional setting. Through an initial matching and application process, we ensure the biggest possible overlap between your interest and company requirements.
You will be assigned an academic supervisor who will guide and assist you during your placement. Placements will be assigned during the first semester.
Computer scientists often face problems for which there are no ready answers, therefore requiring future research. In this module, you will deepen your understanding of research methodology, the ‘classic’ empirical survey methods, case study, ethnography and experiment, and design and innovation as the context in which computer scientists apply research methods.
On a fundamental level, you will explore how empirical research involves sampling, data collection, study design and data analysis, and how each of these involves trade-offs that can limit the validity of results gained and conclusions drawn. On a practical level, you will engage in a collaborative innovation project through which you can practice the application of methods in design and evaluation of novel interactive solutions.
Optional
optional modules accordion
Computer networks have experienced an exponential growth in traffic and size since the early days of the internet. Packet network technologies underpin every aspect of our daily life. On this module, you will investigate how network technologies have evolved to cope with increasing demands, the architecture of devices, and protocols that facilitate end-to-end connectivity, while allowing control of connectivity properties like bandwidth and latency. You will explore cutting-edge research and industry perspectives regarding the challenges that face production network technologies, such as performance and security, and speculate on the future direction networking will take.
Practical sessions introduce network emulation and simulation technologies, where you will recreate realistic network testbeds. You will gain experience using open-source software frameworks to implement, configure and test common network functionalities, such as routing and firewalling.
Dive into alternative programming language paradigms, beyond imperative and object-oriented programming. Emphasis is placed on functional programming languages and their unique constraints and features, such as more expressive type systems, immutability, pure functions and side-effects, lambdas, higher order functions, currying, map/reduce, and pattern matching. You will also explore why functional languages bring about increased reliability and scalability and how they are now experiencing a resurgence within the software industry.
Through hands-on laboratory sessions, you will learn a functional programming language, such as Haskell, and see how functional programming concepts are being integrated in mainstream programming languages, such as Java, Python and JavaScript, to create versatile multi-paradigm programming environments.
Digital Health explores the utilisation of digital technologies in healthcare. These technologies have an ever-growing role to play in improving health systems and public health, as well as increasing and improving access to health services. Discover the practical applications, implications, and how to enable technologies of digital health. You will survey sensor technologies that permit remote and automated patient monitoring and study the technologies and processes that enable patient-driven healthcare. You will also investigate the structure of health data in electronic health records and methods for the evaluation of digital health solutions. Alongside these applied topics, you’ll also learn about data governance and the ethical issues surrounding digital health technologies, policy, and regulation.
Large scale distributed computing systems are now commonplace, implemented using ‘cloud infrastructures’ where computing and storage resources are pooled into data centres around the globe. In scientific terms, these are examples of distributed systems. Learn about the fundamental principles that underpin modern distributed systems, the abstractions on which they are based, and their characteristics. Emphasis is placed on the scalability and fault-tolerance of these systems, and you will dive into the commonly used frameworks for distributed systems, such as Google’s infrastructure, and highly distributed peer to peer approaches. Small group practical labs reinforce theory through hands-on experience of distributed systems development.
All programming languages are based on theoretical principles of formal language theory. In this module, you dive deep into formal languages representation and grammars, and how they relate to programming language compilers and interpreters. You will study formal language syntax and semantics, phrase structure grammars, and the Chomsky hierarchy. You will learn how to classify languages and explore the concepts of ambiguity in context-free grammar and its implications. In particular, you will learn about the compilation process including lexical analysis and syntactic analysis, recursive descent parsers and semantic analysis. Finally, you get to investigate the synthesis phase, where intermediate representations, target languages and structures lead to code generation.
Delve into machine learning, a fundamental concept in artificial intelligence that enables a computer to learn how to perform a task from data rather than traditional programming. In this module, you will study the key ideas and techniques behind machine learning and develop the practical skills needed to understand the implications and potential of machine learning in business and society. You will begin by looking at real-world problems, challenges, and fundamental techniques in current methodology. Building on this, you will cover a variety of approaches to machine learning, from decision trees to a wide range of deep neural networks, including multilayer perceptrons, convolutional neural networks, long short-term memory, autoencoder and generative adversarial networks.
Enhancing our curriculum
We continually review and enhance our curriculum to ensure we are delivering the best possible learning experience, and to make sure that the subject knowledge and transferable skills you develop will prepare you for your future. The University will make every reasonable effort to offer programmes and modules as advertised. In some cases, changes may be necessary and may result in new modules or some modules and combinations being unavailable, for example as a result of student feedback, timetabling, staff changes and new research.
Fees and funding
We set our fees on an annual basis and the 2026/27
entry fees have not yet been set.
There may be extra costs related to your course for items such as books, stationery, printing, photocopying, binding and general subsistence on trips and visits. Following graduation, you may need to pay a subscription to a professional body for some chosen careers.
Specific additional costs for studying at Lancaster are listed below.
College fees
Lancaster is proud to be one of only a handful of UK universities to have a collegiate system. Every student belongs to a college, and all students pay a small college membership fee which supports the running of college events and activities. Students on some distance-learning courses are not liable to pay a college fee.
For students starting in 2025, the fee is £40 for undergraduates and research students and £15 for students on one-year courses.
Computer equipment and internet access
To support your studies, you will also require access to a computer, along with reliable internet access. You will be able to access a range of software and services from a Windows, Mac, Chromebook or Linux device. For certain degree programmes, you may need a specific device, or we may provide you with a laptop and appropriate software - details of which will be available on relevant programme pages. A dedicated IT support helpdesk is available in the event of any problems.
The University provides limited financial support to assist students who do not have the required IT equipment or broadband support in place.
Study abroad courses
In addition to travel and accommodation costs, while you are studying abroad, you will need to have a passport and, depending on the country, there may be other costs such as travel documents (e.g. VISA or work permit) and any tests and vaccines that are required at the time of travel. Some countries may require proof of funds.
Placement and industry year courses
In addition to possible commuting costs during your placement, you may need to buy clothing that is suitable for your workplace and you may have accommodation costs. Depending on the employer and your job, you may have other costs such as copies of personal documents required by your employer for example.
The fee that you pay will depend on whether you are considered to be a home or international student. Read more about how we assign your fee status.
Home fees are subject to annual review, and may be liable to rise each year in line with UK government policy. International fees (including EU) are reviewed annually and are not fixed for the duration of your studies. Read more about fees in subsequent years.
We will charge tuition fees to Home undergraduate students on full-year study abroad/work placements in line with the maximum amounts permitted by the Department for Education. The current maximum levels are:
Students studying abroad for a year: 15% of the standard tuition fee
Students taking a work placement for a year: 20% of the standard tuition fee
International students on full-year study abroad/work placements will also be charged in line with the maximum amounts permitted by the Department for Education. The current maximum levels are:
Students studying abroad for a year: 15% of the standard international tuition fee during the Study Abroad year
Students taking a work placement for a year: 20% of the standard international tuition fee during the Placement year
Please note that the maximum levels chargeable in future years may be subject to changes in Government policy.
Scholarships and bursaries
Details of our scholarships and bursaries for students starting in 2026 are not yet available.
Throughout all of our SCC modules we aim for a 50:50 split of lectures to practical work every week, providing you with weekly experience at building systems in our labs or working through theoretical concepts in workshops. Our lab spaces were fully refurbished in 2019 and are designed with a bright a spacious theme.
Comfortable capacities
Each lab has a maximum capacity of 45 students, providing what we believe is a comfortable upper limit on lab-based teaching group sizes, and many of our labs are designed around pods or clusters of computers which help to facilitate group work and also generally foster a social atmosphere.
24/7 access
We have six lab spaces in total, each of which is available exclusively to our own students who have 24/7 access to the lab suite.
Remote in
All of our own lab machines run the Ubuntu operating system, and we also have a remote virtual machine access service allowing you to use our lab software from your own computer anywhere on the campus.
The information on this site relates primarily to 2026/2027 entry to the University and every effort has been taken to ensure the information is correct at the time of publication.
The University will use all reasonable effort to deliver the courses as described, but the University reserves the right to make changes to advertised courses. In exceptional circumstances that are beyond the University’s reasonable control (Force Majeure Events), we may need to amend the programmes and provision advertised. In this event, the University will take reasonable steps to minimise the disruption to your studies. If a course is withdrawn or if there are any fundamental changes to your course, we will give you reasonable notice and you will be entitled to request that you are considered for an alternative course or withdraw your application. You are advised to revisit our website for up-to-date course information before you submit your application.
More information on limits to the University’s liability can be found in our legal information.
Our Students’ Charter
We believe in the importance of a strong and productive partnership between our students and staff. In order to ensure your time at Lancaster is a positive experience we have worked with the Students’ Union to articulate this relationship and the standards to which the University and its students aspire. Find out more about our Charter and student policies.
Undergraduate open days 2025
Our summer and autumn open days will give you Lancaster University in a day. Visit campus and put yourself in the picture.
Take five minutes and we'll show you what our Top 10 UK university has to offer, from beautiful green campus to colleges, teaching and sports facilities.
Most first-year undergraduate students choose to live on campus, where you’ll find award-winning accommodation to suit different preferences and budgets.
Our historic city is student-friendly and home to a diverse and welcoming community. Beyond the city you'll find a stunning coastline and the world-famous English Lake District.