Skip to main content
University of Sunderland
Courses
Online MBA degrees
International MBA
MBA with Project Management
MBA with Healthcare Management
MBA with Supply Chain Management
MBA with Hospitality Management
Online Management Masters
MSc Management
MSc Management with Marketing
MSc Management with HR
MSc Management with Finance
Blended Nursing Degrees
BSC (HONS) ADULT NURSING (BLENDED) – NORTH OF ENGLAND
BSC (HONS) ADULT NURSING (BLENDED) – LONDON
Online Computer Science Masters
MSc Computer Science
MSc Computer Science with Data Science
MSc Computer Science with Cyber Security
Online Law Masters
LLM Master of Laws
LLM Commercial Law
LLM International Law
Online Nursing Degrees
BSc (Hons) Nursing Studies Top-Up
MSc Nursing Studies
On-campus
On-campus courses
Fees
About us
Articles
FAQs
Apply now
Start Application
Start dates
Admission requirements
Complete your application
Courses
Online MBA degrees
International MBA
MBA with Project Management
MBA with Healthcare Management
MBA with Supply Chain Management
MBA with Hospitality Management
Online Management Masters
MSc Management
MSc Management with Marketing
MSc Management with HR
MSc Management with Finance
Blended Nursing Degrees
BSC (HONS) ADULT NURSING (BLENDED) – NORTH OF ENGLAND
BSC (HONS) ADULT NURSING (BLENDED) – LONDON
Online Computer Science Masters
MSc Computer Science
MSc Computer Science with Data Science
MSc Computer Science with Cyber Security
Online Law Masters
LLM Master of Laws
LLM Commercial Law
LLM International Law
Online Nursing Degrees
BSc (Hons) Nursing Studies Top-Up
MSc Nursing Studies
On-campus
On-campus courses
Fees
About us
Articles
FAQs
Apply now
Start Application
Start dates
Admission requirements
Complete your application
Latest Articles
How to increase customer engagement through social media techniques
Enhancing your brand image: reputation and marketing strategies
What factors contribute to better brand performance?
The efficacy of different mobile computing security approaches
Risk management in security: protecting critical assets and resources
Patient safety during surgery: an explainer
Cybersecurity and mobile applications: how to stay safe and secure
Detecting and preventing mobile phone hacking
Vulnerabilities in wireless mobile data exchange
The rise of mobile malware
« Previous Entries
1
2
3
4
5
6
7
8
9
10
Next Entries »