The University of Liverpool Online MSc in Big Data Analytics consists of seven core modules and one elective module.

Core modules cover a wide range of topics, including data mining, predictive analytics, data visualisation and warehousing, and professional issues in computing.

In addition, your professional portfolio of evidence will allow you to gather solutions-based artefacts to demonstrate your strategic mindset and showcase your growth and decision-making skills to employers.

The first module takes 10 weeks. Each subsequent module lasts eight weeks.

Students of this programme now have access to career services by joining the Global Career Advisor Network.

Core modules

View All

The Global Technology Environment (10 weeks)

To lay the foundation for successful study, and provide students with a comprehensive understanding of the key concepts associated with the computing environment.

Start your personal and professional journey with this on-boarding module for the MSc in Cyber Security programme, where you will be introduced to the online learning environment. The module provides a critical "state-of the-art" review of the domain of information technology (IT). It is designed to offer a wide-ranging understanding on topics such as software engineering, cyber security and big data analytics.

By completing the module, you will have a comprehensive global view of the current IT landscape in the context of both commercial and non-commercial enterprises. The module blends both theory and practice, so that a solid foundation is provided for future study.

Curriculum insights

  • Key concepts in the IT industry
  • Enterprise-oriented software and systems enterprise development
  • Data management and big data analytics
  • Cyber security and risk management
  • Current and emerging IT trends
  • Global characteristics of IT

Big Data (8 weeks)

To provide students with a comprehensive understanding of big data tools and techniques, related issues, and the different kinds of big data ecosystems that can be used to support advanced data analytics.

This module will consider big data management frameworks in general, but with a focus on the Hadoop open-source data storage and processing platform and its underpinning sub-systems. It also provides you with a critical awareness of how big data systems support data-driven decision making.

Curriculum insights

  • Key concepts and technologies in big data
  • Hadoop
  • Practical solutions to big data problems
  • Integration and deployment of big data

Data Mining (8 weeks)

To provide students with a detailed understanding of the concepts of data mining, including the processes involved and the tools and techniques commonly used.

During this module, you will be provided the opportunity to apply the tools and techniques of data mining to a variety of example data sets. This is intended to give you a critical insight into their operation, and an understanding of when and where such tools and techniques can best be applied.

You will also be given the chance, using the ‘R’ programming language, to implement several different kinds of data mining algorithms to gain a comprehensive understanding of their operation.

Curriculum insights

  • Extracting knowledge from data
  • Data pre-processing requirements
  • The data mining process
  • Tools and techniques of data mining
  • Data mining algorithms
  • Matching concepts to organisational requirements

Data Visualisation and Warehousing (8 weeks)

To introduce students to the concepts and challenges of creating data warehouses, and how data visualisation tools can be used to ‘tell a story’.

By taking this module, you will gain practical experience of how to create data warehouses using data from multiple sources. It will also introduce you to best practices in data visualisation and data storytelling, using state-of-the-art data visualisation technology.

The module is intended to help you understand the approaches and benefits of data warehousing, and how to quickly gain and communicate insights into the data stored in data warehouses using data visualisation techniques.

Curriculum insights

  • Data warehousing concepts and technologies
  • Creating a data warehouse
  • The importance of data visualisation
  • Creating data visualisations
  • Telling a ‘data story’

Professional Issues in Computing (8 weeks)

To offer students the opportunity to consider, understand and evaluate common non-technical issues faced by IT leaders.

To function effectively, professional IT practitioners need not only the appropriate technical knowledge, skills and experience, but also a broad understanding of the context in which they operate. IT professionals must understand the relationship between technological change, society and the law, and the powerful role that computers and computer professionals play in a technological society.

This module is designed to help you operate effectively in work and community situations and to be aware of your environment.

Curriculum insights

  • Professional and ethical issues arising from IT systems
  • Common legal and social challenges faced by IT professionals
  • Key management skills needed in IT

Predictive Analytics for Decision Making (8 weeks)

To provide students with an insight into how predictive analytics can be used to help organizations and their customers make better decisions.

Completing this module is designed to give you a comprehensive understanding of how results from predictive analytics can be used by organisations to grow their customer base and run operations more efficiently. This module is oriented towards practical applications of predictive analytics.

Curriculum insights

  • Key predictive analytics techniques
  • Business problems predictive analytics can solve
  • Predictive analytics in commercial environments
  • Applying predictive analytics tools

Cloud Computing (8 weeks)

To provide students with a comprehensive overview of advances in cloud computing and the possibilities it has unleashed.

Cloud computing is an important new paradigm in information technology that provides a basis for a new wave of technology developments. Cloud computing embodies advances in computing, networking, and storage technologies which individually and collectively include major hardware and software breakthroughs. These include computer virtualisation, distributed and replicated storage, and software-based networking.

Cloud computing motivates further technology advancement and changes how modern IT infrastructures are built and evolved. There is a growing demand for specialists with strong technical background and deep knowledge of cloud computing technologies.

Curriculum insights

  • Cloud architecture and foundations
  • Building cloud-based infrastructure, services and applications
  • Existing cloud architecture models
  • Cloud industry standardisation
  • Middleware platforms
  • Cloud provider platforms

Elective modules

View All

This programme allows you to choose 1 elective

Applied Cryptography (8 weeks)

To provide students with an insight into cryptographic algorithms and protocols.

By completing this module, you will acquire a critical understanding of how to use cryptographic algorithms and protocols to solve practical security problems (such as confidentiality, integrity and authenticity). The module also allows you to acquire a systematic understanding of open-source tools to build secure applications, and how best to apply such tools.

Curriculum insights

  • Symmetric key encryption algorithms
  • Hash function algorithms
  • Public key cryptography algorithms
  • Key agreement protocols
  • Current industrial standards for cryptography
  • Quantum computing techniques
  • Open-source cryptographic techniques

Security Engineering and Compliance (8 weeks)

To provide students with an in-depth understanding of information security concepts and models.

This module provides an insight into information security principles, security policy models/protocols, industry standards for security compliance, and risk assessment. You will acquire a critical understanding of how to use information security techniques to solve practical security problems.

You will also have the opportunity to gain skills for designing/implementing security infrastructure and writing security/incident response polices. Practical, extensive, hands-on project work is designed to ensure you are ready to apply in the workplace the knowledge gained in the module.

Curriculum insights

  • Threats to, vulnerabilities of, and attacks on IT systems
  • Security compliance and industry standards
  • Information security models
  • Protocols for solving security problems
  • Risk assessments
  • Security infrastructures
  • Security/incident response policies
  • Penetration testing

Understanding Organisations and Human Behaviour (8 weeks)

To enable students to assess the roles of individuals and teams within organisations so that they can become proficient leaders and managers.

This module is broadly designed to provide the necessary know-how to allow you to manage people operating in a technology-rich environment. As well as the traditional aspects of organisational behaviour, such as individual/team roles, human resource management and change management, you will examine the use of information technology to support managerial functions, including outsourcing, offshoring and other critical issues fundamental to the way contemporary organisations are run.

Curriculum insights

  • Assessing the roles and individuals and teams within organisations
  • Using IT to support managerial functions
  • People management in technology-rich environments
  • Managerial techniques that benefit organisations and employees

Technology Innovation and Change Management (8 weeks)

To enable students to build a theoretical and practical academic foundation relating to the techniques and challenges of technology innovation and change management.

This module aims to give you a comprehensive understanding of change models and the impact of change related to technology innovation, adoption and implementation. You will gain both the theoretical and practical knowledge required to be able to manage the design and use of technology to foster growth, innovation and change within organisations.

The module will also give you a comprehensive understanding of how innovation can act as a change enabler and the importance of building readiness for change within organisations.

Curriculum insights

  • Strategic IT implementations involving new resources and environments
  • Generating competitive advantages through innovation
  • Implementing and assessing innovation and change

Strategic Technology Management (8 weeks)

To provide comprehensive knowledge of the strategic importance of IT within organisations.

The module is designed to allow you to acquire a detailed understanding of how technology becomes an enabler for business. You will study how IT strategies support organisational goals, and how they help to create a sustained competitive advantage in business.

You will also develop your ability to evaluate IT strategies, and how best to deploy such strategies, in the context of systems or business applications within the IT industry.

Curriculum insights

  • The role of the chief information officer (CIO) in organisations
  • Aligning IT and business strategies
  • Assessing the maturity of IT systems
  • Detailed understanding of IT governance
  • Systems information system planning (SISP)

Cyber Crime Prevention and Protection (8 weeks)

To provide students with a deep understanding of the mechanisms and techniques that can be used to prevent, or at least mitigate, cybercrime.

This module considers the motivations for cybercrime, as well as providing a comprehensive understanding of the tools that can be used to prevent it – including the deployment of cybercrime prevention strategies.

You will have the opportunity to build an ‘ethical hacking’ environment with which you can experiment. In addition, the module aims to provide you with a hands-on knowledge of cybercrime prevention for application in the workplace.

Curriculum insights

  • Understanding the information security management landscape
  • The potential of cybercrime (through ethical hacking)
  • Tools and techniques for cybercrime prevention
  • Cybercrime prevention in commercial and non-commercial settings

Cyber Forensics (8 weeks)

To give students knowledge of the practice of extracting evidence from computers and digital storage media.

This module provides you with the knowledge that allows you to identify, extract, document, interpret and preserve computer media as digital evidence, as well the understanding of how to analyse the root cause of security breaches. It covers issues including crypto-literacy, data hiding and hostile code.

Curriculum insights

  • Identification and extraction of computer media
  • Documenting, interpreting and preserving computer media
  • Assessing, comparing and judging computer media

Security Risk Management (8 weeks)

To provide students with theoretical and practical knowledge of, and insight into the formal, systemic approaches to, cyber security risk management (CSRM).

Threats to information security are becoming more sophisticated. Laws and regulations impose strict CSRM requirements on all enterprises to prevent, or at least limit, the potential of cyber-attacks.

This module aims to provide the theoretical and practical knowledge to deliver a formal, systematic and in-depth approach to the application of the concepts, techniques, methods, approaches and processes of CSRM in a pragmatic manner and in the context of enterprises of all kinds.

Curriculum insights

  • Information security policy and management
  • Advanced security issues knowledge
  • Practical ability in security risk management

Information Technology Leadership (8 weeks)

To promote a broader understanding of leadership and a greater awareness of how leadership choices can impact organisations.

In this module, you will develop a comprehensive understanding of contemporary IT leadership models, as well as knowledge of the role of leadership in shaping IT organisations. You will acquire theoretical and practical knowledge of:

  • The nature of leadership styles and behaviours in management in terms of IT organisations.
  • Issues concerning change management.
  • Communicating a vision.
  • Effective management of technical teams executing IT projects.

Curriculum insights

  • Key concepts and theories of IT leadership
  • Systematic understanding of leadership and leadership styles
  • Collaboration and change management
  • Responsibilities and privileges of leadership
  • Moral and ethical dimensions of authority and power

Programming the Internet (8 weeks)


This module provides students with a critical understanding of markup languages and related advanced technologies. On completion of the module students will be able to design and create advanced website applications and will have the knowledge to undertake complex internet projects.

  • To provide students with sufficient knowledge and skills relating to core Internet technologies such as XHTML, JavaScript and PHP to enable them to create robust applications
  • To prepare students for potential careers as Web developers or for management roles that oversee Web development projects
  • To develop students' capacity to engage in team working

Learning Outcomes:

  • An ability to critically appraise and employ successfully Internet Programming tools, techniques and current standards.
  • An ability to critically assess the merits of alternative solutions to Web programming problems.
  • A critical understanding of the process required to construct www applications that access a back-end databases.
  • A full understanding of the process required to build scalable web database systems.
  • An ability to design and create an effective and maintainable Web site in accordance with established Web standards.
Key Texts:
Deitel, H.M., Deitel, P.J., Goldberg, A.B, Internet & World Wide Web How to Program, Prentice Hall, 4th edition, 2008, ISBN 0-13-175242-1

Designing and Managing Databases (8 weeks)


With database technology developing rapidly, this module analyses the ways in which data is stored, manipulated, queried (with an emphasis on relational databases) and backed up. While studying this module, you will also become acquainted with various paradigms and technologies (parallel as well as distributed) related to database design, implementation and maintenance.

  • To provide students with a critical understanding of the design and realisation of relational database systems
  • To provide students with an in depth understanding of the operation (storage, manipulation, querying) of relational databases
  • To provide students with an understanding of alternative database paradigm
  • (parallel, distributed, object-oriented)
  • Provide students with an understanding of the administration and maintenance of database systems

Learning Outcomes:

  • An in depth understanding of the design and implement relational databases systems.
  • An ability to use database design techniques such as Entity-Relation diagrams and "normal forms.
  • A critical understanding of client-server architectures.
  • A critical understanding of the operation of database query systems.
  • A critical understanding of database administration issues including security, integrity issues, and backup procedures.
  • An understanding of the operation of multi-user systems.
  • A critical understanding of alternative database system paradigms.
Key Texts:
Rob, Peter and Coronel, Carlos, (2008), Database Systems: Design, Implementation, and Management Eighth Edition, Boston, MA: Course Technology. ISBN-10: 1423902017; ISBN-13: 978-1423902010

Computer Communications and Networks (8 weeks)


As the development of computer communications accelerates with the exponential growth of the internet, this module examines the increasing range of hardware technology protocols and network applications. Students taking this module will study the principles of communication networks and protocol architectures so as to gain a critical insight into the current state of the art of computer communications and networks.

  • To provide a critical understanding of the theory and practice computer communications and networks
  • To provide students with the essential knowledge that they would require should they wish to take up a career in network administration/management

Learning Outcomes:

  • A critical understanding of the theory and practice of computer communications
  • A critical understanding of the protocols, services and utilities that permit Internet access
  • An understanding of the challenges and issues associated with multimedia networking and the mechanism that may be employed to address them
  • An understanding of the processes required to secure information travelling along communication links
  • An understanding of the primary duties of network administration/ management and the tools that may be employed to support these duties
Key Texts:
Kurose, James and Ross, Keith (2010), Computer Networking: A Top-Down Approach: 5/e, International Edition, Pearson, ISBN-10: 0131365487 ISBN-13: 978-01313654483

Software Engineering (8 weeks)


This module encompasses the theoretical foundation and practice of the three key phases of problem definition, software development and maintenance. It covers identification, definition, design, analysis, verification and management of basic requirements, coding, testing, evaluation and quality assurance. You will emerge from this module equipped to lead a programming project and deliver products on time and within budget.

This course provides the theoretical foundation concerning software approaches and provides exposure to the development, implementation and maintenance of the product. The primary goal is to introduce students to the discipline of Software Engineering.

Learning Outcomes:

  • A deep understanding of the elements of software systems
  • An understanding of the most important general approaches to the software production process
  • An ability to define and analyse the requirements for software systems and produce software designs
  • An understanding of the importance, and the process, of software verification and validation
  • An ability to critically evaluate approaches to software development
  • An understanding of the importance, and the operation, of software development teams

Key Texts:
Sommerville,I, Software Engineering (9th Edition), Addison Wesley, ISBN: 0-321-21026-3

Object-Oriented Programming in Java (8 weeks)


This module develops the essential problem solving, and consequent programming skills, required to generate well- structured object-oriented programs in Java. The module also explores important techniques (such as distributed systems and component technology) that have made object-oriented programming today’s predominant software development paradigm.

  • To allow students to develop practical experience in implementing software in the context of the Java object-oriented programming language
  • To allow students to acquire the skills needed to interpret customer requirements from a programmer's perspective
  • To provide students with an understanding of how to programme with a view to future software maintenance
  • To provide students with good understanding of the programming techniques involved in creating Graphical User Interfaces (GUIs)
  • To provide students with an understanding of more advanced features of programming such as multithreading

Learning Outcomes:

  • A critical understanding of the philosophical underpinning that supports the concept of object-oriented programming
  • A critical understanding of the role of data types (of all kinds) and programme constructs within the context of java programming
  • An understanding of the role of requirements and design specifications in the context of object-oriented programming
  • An ability to construct well-structured, syntactically correct program source code and associated documentation
  • An ability to create programs that feature Graphical User Interfaces (GUIs)
  • An understanding of advanced programming features such as multithreading
Key Texts:
No fixed texts

IT Project Management (8 weeks)


This module shows how technology project management can be applied in the evolution of a computer system from concept to implementation. Students will have the opportunity to master all areas of the subject, including organisation, work breakdown structure and scheduling, resources and project financing, project control and evaluation, management considerations, critical success factors and risk management.

  • To enable students to understand the roles, responsibilities, and management techniques of the technology project manager.
  • To provide students with an extensive understanding of how technology project management involves the planning, monitoring, and control of the people, process, and events that occur as a computer system evolves from preliminary concept to operational implementation.

Learning Outcomes:

  • A critical understanding of the role of the IT project manager within an organisation
  • A deep understanding of the concept of the IT project life cycles
  • A critical understanding of the process of IT project management and the tools and techniques that can be used to support this activity
  • An understanding of the mechanisms required to produce cost estimate of projects, including human and non-human resources, and project budgeting
  • An understanding of risk mitigation and monitoring plans
  • An ability to assess project plans for completeness and validity
Key Texts:
Information Technology Project Management (with Microsoft Project 2007 CD-ROM), Schwalbe, Kathy, 6th ed., Course Technology, 2010, ISBN: 978-0324-78692-7

Systems Analysis and Design Using an Object-Oriented Approach (8 weeks)


This module presents the modern object-oriented approach to modelling and designing software systems, packages and products. The module provides students with the knowledge technical skills required to produce effectively designs for software applications following the object- oriented approach, as well as the ability to critically analyse such designs.

  • To provide the skills and technical knowledge required to model software systems using the object-oriented approach
  • To provide students with the ability to build models of software systems using the object-oriented approach

Learning Outcomes:

  • A critical understanding of the theoretical concepts underpinning Object-Oriented (OO) analysis and design
  • A critical understanding of the use of the general-purpose Unified Modeling Language (UML) in the context of software system analysis and design
  • An understanding of the significance and practice of software requirements gathering
  • An understanding of the use OO models to communicate information about software systems
  • An ability to developed software models using an object-oriented
  • An ability to model a system's functionality using the concept of cases
Key Texts:
Bennett, S., McRobb, S. and Farmer, R. (2006). Object-Oriented Systems Analysis and Design using UML, 3rd edition, Maidenhead, Berkshire: McGraw-Hill Education.

Software Quality Assurance (8 weeks)


This module provides the techniques students need to design and implement software testing procedures, conduct software inspections and employ established release and maintenance QA procedures. The module also addresses key management aspects of the quality assurance process.

  • To provide students with a comprehensive understanding of concept software quality assurance
  • To enable students to understand the importance of producing quality software through the implementation of rigorous processes and procedures
  • To allow students to gain a comprehensive understanding of the infrastructure, management and organisational aspects of producing quality software
  • To provide students with knowledge of the application of quality metrics, standards and assessment techniques

Learning Outcomes:

  • A comprehensive understanding of the importance of producing quality software systems
  • A critical understanding of software validation and verification, and software quality assurance processes
  • An ability to draw up and implement quality assurance plans and procedures
  • An ability to evaluate the cost of quality assurance activities
  • An understanding of software quality commercial standards
Key Texts:
Galin, D, 2004, Software Quality Assurance: From Theory to Implementation, Addison-Wesley, ISBN-13: 979-0201709452

Social Computing (8 weeks)


The last decade has seen an exponential growth of the concept of social computing as exemplified by platforms such as Facebook, Twitter and LinkedIn. Social computing is a phenomenon that has great potential with respect to both commercial and non-commercial enterprises, especially with respect to marketing and public relations. The aims of this module are to provide students with both an in-depth understanding of the social computing phenomenon and of how the analysis of such social media can be beneficially undertaken. More specifically the module is directed at providing students with the know-how and capabilities to analyse social media while at the same time understanding the social computing context and the legal framework in which it resides.

  • Provide an introduction to social computing, issues related to social networking, and the technology necessary to provide an effective social computing networked environment
  • Gain sufficient knowledge to perform duties for a range of tasks related to services for social computing and networking as well as being an empowered member of global social networks
  • Prepare to make informed decisions and to take appropriate actions in response to the rapidly changing environment

Learning Outcomes:

  • Summarise the history of social computing and networking and critically review predictions for the future
  • Analyse social computing and networks using nodes and ties in a graphical representation
  • Deploy technologies to harvest, analyse and visualise social data
  • Identify the technology requirement for a business looking to add a social computing and networked methodology
  • Analyse and apply the use of social learning services for eLearning and Virtual workgroups
  • Analyse existing social computing and networked services and recognise their strengths and weaknesses
  • Develop recommendations for improvement of existing social network products or systems
  • Develop a professional and ethical approach for creating, maintaining and utilising new and existing social network services
  • Recognise the concerns relating to social networking and develop informed responses and strategies with respect to these issues
Key Texts:
Shelly, G. and Frydenberg, M. (2011) Web 2.0, Concepts and Application Cengage (ISBN-10: 1439048029; ISBN-13: 9781439048023) (available in Paperback, eBook, Rental or eChapter Editions)

Managing Organisational Resources (8 weeks)


This module is designed to provide students with a sound foundation (for the non-specialist) in accounting, finance and operations management. Student will gain a critical understanding of mathematical modelling, and learn how to use computer-aided quantitative tools for decision making. Students will also explore topics such as operations strategy, forecasting and materials, supply chain and project management.

  • To provide students with IT backgrounds with a sound foundation in accounting and finance for the non-specialist
  • To provide students with a concise understanding of the terminology of accounting and finance, so that they can communicate with specialists
  • To provide students with an appreciation of how accounting and finance can have significant benefits, in terms of improving business efficiency, competitiveness, and investment returns
  • To provide students with sufficient background to enable them to utilise what they have learned in business and commercial settings

Learning Outcomes:

  • A critical understanding of finance and accounting concepts
  • A critical understanding of financial management practices with respect to evaluating, financing, and managing IT projects
  • An ability to analyse company financial statements so as to evaluate the financial performance of companies, especially technology companies
  • An understanding of a variety of approaches and methods used in operations management, and the issues surrounding such approaches and methods
  • An understanding of a representative range of tools and techniques used in managerial accounting and management information systems
Key Texts:
Atrill, P., McLaney, E., 2011, Accounting and Finance for Non-Specialists, 7th ed., Prentice Hall, Harlow, England, ISBN: 0-273-74596-4 (Paperback).

Marketing Management (8 weeks)


In this module students will learn to apply marketing strategies in the context of various high-tech industries and products, where innovation, market uncertainty, abrupt technological shifts and short product lifecycles abound. Students will also study the use of technology in marketing and the marketing of technology-rich products and services, with a focus on international marketing, ethics, sourcing and marketing strategy. As students proceed they will develop a marketing plan.

  • To enable students to consider the roles, responsibilities and management techniques of managers who are involved in marketing activities with special emphasis on the uniqueness of marketing issues that involve technology

Learning Outcomes:

  • A critical understanding of pricing methods
  • An ability to assess the domestic and global marketing environments, formulate product strategies and recommend marketing strategies
  • An ability to plan market research activities including competitive analysis, market segmentation and analysis of consumer buying behaviour
Key Texts:
No fixed texts


Students refine their dissertation topic in conjunction with their Personal Dissertation Advisor, an academic supervisor who will provide support throughout the writing process.

Dissertation Project

The dissertation project module commences with a research methods training component during which students will be given instruction and guidance on the planning and organisation of their work. During the course of the research methods training students will also be expected to start formulating their project. The project itself, following on from the research methods training, will be individually supervised via online communication within the learning platform also used for all other online modules. There is an interim assessment point during the course of the project where students submit their project specification and design. At the end of the project students are expected to submit a dissertation describing their project.

  • To provide a systematic analysis of the nature and conduct of Information Technology and Computer Science research
  • To allow students to successfully develop a Final Project and Dissertation
  • To equip students with the ability to undertake independent research
  • To examine the foundations of research and associated legal and ethical issues
Learning Outcomes:
  • Conduct research in IT
  • Produce a dissertation in the accepted format
  • Conduct extensive literature searches
  • Appraise research papers
  • Critically analyse project results
  • Assess ethical issues in relation to IT projects
Key Texts:

Dawson, C.W. (2009) Projects in Computing and Information Systems: A Student's Guide, 2nd ed., Addison-Wesley, Harlow. ISBN: 978-0-273-72131-4

Please note that current scheduling may be subject to change and that we cannot guarantee that all modules will be offered in every calendar year.

This is your chance to set yourself apart from others.

Request Information

Join thousands of students from all over the world who have achieved the personal and professional success they were seeking.

Fill the form below and your personal Enrolment Advisor will call you to review your CV, Financial and Academic Qualifications

Some information is missing. Please make sure you have completed the form

By submitting this form, I provide my express written consent for the University of Liverpool’s online learning partner Laureate Online Education to contact me via email, text, telephone, and pre-recorded message regarding furthering my education. I understand that calls may be generated using automated technology. You may opt-out at any time. Please view our Privacy Policy or Contact Us for more details.

Let’s Go
The University of Liverpool rates first in the UK for combined world-leading or internationally excellent IT research.