Search
-
Introduction to Writing Creatively: Part 1
https://le.ac.uk/modules/2025/en1025
Module code: EN1025 This year-long, two-part module provides a practical introduction to a variety of creative writing practices.
-
Introduction to Writing Creatively: Part 2
https://le.ac.uk/modules/2025/en1035
Module code: EN1035 This year-long, two-part module provides a practical introduction to a variety of creative writing practices.
-
Introduction to Writing Creatively: Part 2
https://le.ac.uk/modules/2026/en1035
Module code: EN1035 This year-long, two-part module provides a practical introduction to a variety of creative writing practices.
-
Introduction to Writing Creatively: Part 1
https://le.ac.uk/modules/2026/en1025
Module code: EN1025 This year-long, two-part module provides a practical introduction to a variety of creative writing practices.
-
Introduction to Writing Creatively: Part 2
https://le.ac.uk/modules/2027/en1035
Module code: EN1035 This year-long, two-part module provides a practical introduction to a variety of creative writing practices.
-
Introduction to Writing Creatively: Part 1
https://le.ac.uk/modules/2027/en1025
Module code: EN1025 This year-long, two-part module provides a practical introduction to a variety of creative writing practices.
-
Cultural Mediation and Leadership: Your Languages in Practice
https://le.ac.uk/modules/2025/ml2015
.
-
Foundations of Cybersecurity
https://le.ac.uk/modules/2025/co7099
Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...
-
Information Visualisation
https://le.ac.uk/modules/2025/gy3421
Module code: GY3421 This module focuses on information visualisation as an effective approach to both analyse and communicate quantitative and qualitative information.
-
Foundations of Cybersecurity
https://le.ac.uk/modules/2026/co7099
Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...