Search

14063 results for: ‘museum studies’

  • Julian Matthews

    The academic profile of Dr Julian Matthews, Associate Professor in Media and Communication at University of Leicester

  • Fabian Freund

    The academic profile of Dr Fabian Freund, Lecturer in Population Genomics at University of Leicester

  • Sarah Knight

    The academic profile of Professor Sarah Knight, Professor of Renaissance Literature at University of Leicester

  • Pharmacology and Medicines Prescribing Applied to Nursing Practice

    Module code: NU3012 In this module you will critically reflect on the legislative and regulatory frameworks that govern medicinal products in the UK, including national and local policies and guidelines.

  • International Migration in the Age of Securitisation

    Module code: PL3143 Global migration levels have grown considerably since the turn of the millennium, due to factors such as wars, unrest, economic concerns, increased free movement and lower travel costs.

  • Contemporary Conflict Analysis

    Module code: PL7599 This module provides an advanced and comprehensive engagement with contemporary conflict analysis.

  • Contemporary Conflict Analysis

    Module code: PL7599 This module provides an advanced and comprehensive engagement with contemporary conflict analysis.

  • International Migration in the Age of Securitisation

    Module code: PL3143 Global migration levels have grown considerably since the turn of the millennium, due to factors such as wars, unrest, economic concerns, increased free movement and lower travel costs.

  • Computer Science with Cyber Security BSc

    Advance your computing skills with specialist knowledge in cybersecurity attacks and defence systems, ethical hacking and data-driven AI systems – from foundational methods to secure software development.

  • Computer Science with Cyber Security BSc

    Advance your computing skills with specialist knowledge in cybersecurity attacks and defence systems, ethical hacking and data-driven AI systems – from foundational methods to secure software development.

Back to top
MENU