Search
-
Sparta and the Greek World
https://le.ac.uk/modules/2026/ah3015
Module code: AH3015 Tutor: Dan Stewart Sparta was one of the greatest – and most perplexing – societies of the ancient world.
-
Cultural Mediation and Leadership: Your Languages in Practice
https://le.ac.uk/modules/2026/ml2015
.
-
Cultural Mediation and Leadership: Your Languages in Practice
https://le.ac.uk/modules/2025/ml2015
.
-
Advanced Field Course
https://le.ac.uk/modules/2024/gl4105
Module code: GL4105 This is the culmination of your field studies. We visit a region of outstanding geological interest and explore its geological evolution. Recent trips have been to the Alps and to Sicily and the department varies the area from time to time.
-
Research support
https://le.ac.uk/library/research-support
Discover how The University of Leicester Library supports your research needs by providing access to tailored services and helpful guidance.
-
Specialised Foundation Programme – SFP projects
https://le.ac.uk/clinical-academic-training/sfp/projects
A research placement project is part of your Academic Foundation Programme. Browse the projects available and the staff members and their research interests to find your perfect project.
-
Foundations of Cybersecurity
https://le.ac.uk/modules/2025/co7099
Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...
-
R for Data Science
https://le.ac.uk/modules/2025/gy4472
Module code: GY4472 In this module you will focus on the programming language R as an effective tool for data science.
-
Sparta and the Greek World
https://le.ac.uk/modules/2025/ah3015
Module code: AH3015 Tutor: Dan Stewart Sparta was one of the greatest – and most perplexing – societies of the ancient world.
-
Foundations of Cybersecurity
https://le.ac.uk/modules/2026/co7099
Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...