As a Software Engineering student at DMU, you will develop the technical skills needed to design and build software that is used in everyday devices and systems across our homes, workplaces and communities.
More than 50 years of teaching experience, research expertise and industry practice will inform your learning.
You will gain knowledge of professional practice and social responsibility by learning about software development, database design, computer security and web technologies. The diverse range of modules you will study include Concurrent and Parallel Algorithms, Web Application Development, and Data Mining and Telematics.
Taking part in industry-focused scenarios, such as the second-year Agile Team Development module where students engage in a workplace simulation based on agile software development, will enhance your employability.
Software Engineering BSc is closely aligned with Computer Science BSc at DMU. This shared focus means you have the flexibility to transfer between courses depending on your interests and what you want to specialise in.
- This course is accredited by BCS, The Chartered Institute for IT, for the purposes of fully meeting the academic requirement for registration as a Chartered IT Professional.
- Tailor your learning to your career ambitions by choosing from a wide range of optional final-year modules, including: Functional Software Development, Data Mining, and Front-end Web Development.
- Join our thriving student societies to build on what you learn on the course and to develop your interests and skills outside of teaching time. They include the Games Society, Robotics Club and Google’s Developer Student Club.
- Benefit from an international experience with our DMU Global programme. Software Engineering students have networked at software companies in Berlin and met tech entrepreneurs in San Francisco.
- Prepare for a career in the thriving software industry. Our graduates have gone on to work for companies such as LHA ASRA Group, Lorien, MISCO, Oracle, Royal Bank of Scotland and Sainsbury’s.
- Computer Science and Informatics at DMU is ranked third among modern UK universities for the quality of its research in the latest Research Excellence Framework evaluation.
- Computer Programming I – This module introduces the skills required to develop a computer program to solve a given problem and does so from the perspective of designing trustworthy software with an emphasis on sound coding principles.
- Computer Programming II – Computer programming requires the analysis of a problem, the production of requirements, and their translation into a design that can be executed on a computer. The design phase in particular requires the identification and combination of appropriate programming abstractions. This module introduces the skills required to analyse a problem to produce a program specification, and to be able to test solutions to ensure they are trustworthy.
- Computer Ethics – The module introduces students to the ethical theories affecting cyber security, software engineering, computer science and digital forensics. It requires them to develop critical analytical skills in applying ethical theories to technological outcomes regarding cyber security, software engineering, computer science and digital forensics.
- Computer Law and Cyber Security – The module introduces students to the legal and professional context of cyber security, software engineering, computer science and digital forensics, it addresses legal framework, legal and professional responsibilities of the software engineer, systems manager, computer forensic and security practitioner. The module will address computer ethics, data protection law, UK and international law affecting cyber security, digital engineering, systems management and digital forensics
- Computer Systems – This module provides a foundation in computer architecture and operating systems with a specific emphasis on their security. Students will learn about computer hardware, software, operating systems, and demonstrate practical knowledge of these during lab sessions. Studying this module student will be able to relate the abstract concepts of logic and number systems to their concrete representation on real machines and identify the security risks in common configurations of computer operating systems and suggest appropriate mitigations. In the practical lab sessions students will also learn to develop shell scripts.
- Computer Networks – This module provides a foundation in modern computer networks with a specific emphasis on their security. Students studying this module will be able to explain how modern computer networks functions and be able to demonstrate a practical knowledge of computer networking. Students will be able to identify security risks in common configurations of computer networks and suggest appropriate mitigations.
- Mathematics for Computing – Mathematical structures are introduced that provide a basis for computer science. Specific topics include logic, set theory, probability and statistics.
- Database Design and Implementation – Structured data, held in relational databases, accessed via SQL, supports the information storage requirements of many companies, organisations, and on-line businesses. In this module the student will learn the fundamentals of how to design the structure of data within a relational database, how to interact with data within the database, and how to protect the data within the database.
Second year modules:
- Software and Security Management – This module introduces the business contexts within which IT projects are procured and developed. This includes the feasibility of computer system development viewed from economic, technical, social, legal, and ethical perspectives. The module covers risk factors and risk assessment during different phases of the lifecycle, and introduces students to the techniques used both to measure and to ensure software quality including processes covering the management and design of trustworthy software (BS PAS744 Software Trustworthiness).
- Object Oriented Design – This module focuses on Object-Oriented (OO) library development and enables students to design, implement, and test medium scale software systems using an object-oriented approach. The design notation used is the Unified Modelling Language (UML) and the implementation language is Java. It is essentially a programming module, with the emphasis on implementing OO designs and producing reusable libraries.
- Object Oriented Development – This module focuses on Object-Oriented (OO) application development using the extensive library packages provided by the Java Software Development Kit (SDK). Students enrolling on this module will have already been introduced to key principles of OO class design such as encapsulation and different associations including inheritance. This knowledge will be useful in helping to navigate and make use of a variety of domains within the standard edition API, e.g. Collections, Input/Output, and Graphical User Interfaces.
- Web Application Development – This module provides a firm technical foundation of how a web application can be developed that allows web users to interact with assets stored in databases.
Modern web applications typically make heavy use of server-side scripting . A server-side scripting language that has achieved prominence over recent years has been PHP. This pragmatic language is used to great effect by some web developers and with catastrophic naivety by others. Rudimentary web application penetration testing will introduced in order to emphasise the hostile attention that public facing web content will attract. It is assumed that students are already competent programmers, prior to starting this module.
- Agile Team Development – This module is an opportunity for students to engage in a constrained work-place simulation based on agile software development. Students working in teams of 3 to 5 will initially identify a system of sufficient size to be distributed equally among all members. Work allocation will be monitored under the guidance of their tutor/supervisor. For example each team member might take individual ownership of the development of 2-3 classes from initial inception to completion providing CRUD functionality. In the case of a large system this may mean that some aspects of the system are never built to completion.
- Data Structures and Algorithms – This module introduces a variety of data structures and algorithms for sequential execution. Classical data structures will be introduced (including stacks, queues, lists, trees, and hash tables) and algorithms for searching and sorting. The performance characteristics of these data structures and algorithms will be explained. Specific coding issues will also be considered such as modularity, genericity, equality, assignment, mutable and immutable objects.
- Concurrent and Parallel Algorithms – The module will introduce students to concurrent program design in the context of multi-core architectures and distributed applications. Where appropriate formal notation will be used for specification.
- Introduction to Research – The module provides the student with an understanding of the importance of researching, analysing, and interpreting existing literature and other documents in order to establish a solid context in which research and development questions can be developed and subsequently investigated. It develops the student’s research skills, and particularly skills related to identifying relevant literature from a variety of sources, critically analysing academic and non-academic texts, and justifying a set of research or development questions in a particular topic area. The module explores these research methods through the lens of ethics in technology, introducing students to key ethical issues in relation to information systems, such as privacy, autonomy, security, identity, and social impact.
Third year modules:
- Computing Project – The project provides students with the opportunity to carry out a significant piece of work involving critical analysis and reflection to provide an effective solution to a given technical and/or research-based problem. It enables students to apply and integrate previous material covered on the student’s course as well as to extend the work covered on the course through research and self-learning. Students will be expected to demonstrate appropriate and proactive project management, and written/verbal presentation skills throughout the period of the project. As well as analysing, designing, delivering and appraising a product of suitable quality, they will be expected to undertake, research, analyse, design, evaluate and report on some aspects of a subject explicitly allied to the project.
- Systems Building: Methods – This module covers an important aspect of Information Systems Development (ISD): the selection and evaluation of methodologies used in the Systems Development process.
- Rigorous Systems – This module introduces the role of formal systems in rigorous software development and develops base-level skills using a contemporary formal method. The module covers the essential theoretical material (rationale, syntax, semantics) and provides practical experience using an appropriate software development tool.
The module is based on the formal specification language ITL.
- Fuzzy Logic and Knowledge Based Systems
- Secure Web Application Development – This module assumes a sound understanding of PHP. This will have been gained through previous study or significant commercial experience of web development.
Many modern computer services are now accessed via the ubiquitous web-browser, and users have come to expect instant and secure access to information on a wide range of platforms. Underpinning these web systems is usually a web application, providing a channel to data stored in databases. However, increasingly the web-site has also become a point of entry for unauthorised access to stored data. This is often the result of poor web application design and/or implementation.
The module considers how a web application may be designed and implemented in such a way as to reduce the likelihood of unauthorised access to information. This also requires an understanding of the more common forms of browser-based attacks and the coding techniques that can be used to defend against these.
- Web Application Penetration Testing – Web Application Penetration Testing aims to unearth the vulnerable areas in web applications before the hackers do. Basing the testing upon a recognised methodology helps to ensure that the majority of well known vulnerabilities are discovered and mitigation implemented before potentially disastrous consequences occur.
- Multi-service Networks I
- Multi-service Networks II
- Functional Software Development
- Front-End Web Development
- Interaction Design
- Database Management and Programming
- Information Technology Services Practice
- Computer Ethics and Privacy
- Data Mining
- Big Data and Business Models
Teaching and assessments
During the course you will benefit from learning informed by research. Our leading research Centre for Computing and Social Responsibility provides the basis for the ethical computing content of the course, ensuring that your learning is at the cutting edge of recent developments.
Our Software Technology Research Laboratory provides material for the final year module on rigorous systems and has helped to develop the second year concurrent and distributed systems topics. The Cyber Security Centre (CSC) has developed computer security material for the course content that is relevant to practice.
In the first year, you will normally attend around 12-14 hours of timetabled taught sessions each week, split across a variety of lectures, small group activities and practical laboratory work.
There are a variety of assessment methods, typically including short tests, practical software development tasks, written work, and presentations. Your written and academic reading skills will be developed in the ethics and law topics and you will develop a portfolio that will give you experience of practical development.
In the second year, the emphasis moves towards more substantive practical assignments and you will practise modern software development techniques. Research and presentation skills are also important in the second year.
In the final year, the individual software development project forms a major part of the practical assessment.
Opportunities and careers
Recent graduates are now working as business intelligence analysts, international business analysts, software application developers and software engineers for companies including Lorien, Royal Bank of Scotland, LHA ASRA Group and MISCO.
Graduates are also well positioned to continue their academic careers by embarking on postgraduate study, in either research or taught areas, which offers the opportunity for further specialisation, and enhances their existing skills.”
This is our innovative international experience programme which aims to enrich your studies and expand your cultural horizons – helping you to become a global graduate, equipped to meet the needs of employers across the world.
Through #DMUglobal, we offer a wide range of opportunities including on-campus and UK activities, overseas study, internships, faculty-led field trips and volunteering, as well as Erasmus+ and international exchanges.
Our #DMUglobal High Flyers Award offers students a discount of up to £1,000 towards a #DMUglobal opportunity (terms and conditions apply).
Wiza studencka do Wielkiej Brytanii
Aby studiować w Wielkiej Brytanii potrzebujesz wizy studenckiej. Aby złożyć wniosek o taką wizę studencką musisz zdjać certyfikat językowy na poziomie B2.
Uważaj! Do celów wizowych musisz wybrać wyłącznie egzamin w wesji Secure English Language Test (SELT) UKVI .
Co to jest test SELT UK VI registration? Przeczytaj więcej o testach SELT UKVI >>