Course Overview
In our rapidly digitizing world, cybersecurity has become one of the most critical fields in technology. Our BSc Cybersecurity program provides you with comprehensive knowledge and hands-on experience in protecting digital assets, networks, and systems from evolving threats.
Core Learning Areas
Network Security
Learn to secure networks against intrusions, implement firewalls, and monitor network traffic for threats.
Digital Forensics
Master the techniques for investigating cybercrimes and recovering digital evidence.
Secure Software Engineering
Develop skills in writing secure code and identifying vulnerabilities in applications.
Ethical Hacking
Learn penetration testing and vulnerability assessment techniques to identify security weaknesses.
Industry Certifications
Students have the opportunity to pursue industry-recognized certifications including:
- CompTIA Security+
- Certified Ethical Hacker (CEH)
- CISSP Associate
- GCIH (GIAC Certified Incident Handler)
Detailed Curriculum
Year 1: Foundations
Semester 1
- Introduction to Cybersecurity
- Computer Systems and Networks
- Programming Fundamentals
- Mathematics for Computer Science
Semester 2
- Operating Systems Security
- Database Systems
- Web Technologies
- Cryptography Basics
Year 2: Core Security
Semester 3
- Network Security
- Risk Assessment and Management
- Security Policies and Procedures
- Applied Cryptography
Semester 4
- Digital Forensics
- Incident Response
- Malware Analysis
- Security Testing
Year 3: Advanced Topics
Semester 5
- Ethical Hacking and Penetration Testing
- Cloud Security
- Mobile Security
- Security Architecture
Semester 6
- Advanced Digital Forensics
- Security Analytics
- Legal and Ethical Issues
- Research Methods
Year 4: Specialization & Application
Semester 7
- Industry Internship
- Emerging Threats and Technologies
- Security Management
Semester 8
- Capstone Project
- Professional Development
- Thesis Defense
Career Outcomes
Our graduates are highly sought after in the cybersecurity industry. Recent graduates have found positions as:
Security Analyst
Monitor and analyze security threats, implement protective measures.
Penetration Tester
Conduct authorized attacks on systems to identify vulnerabilities.
Digital Forensics Investigator
Investigate cybercrimes and recover digital evidence for legal proceedings.
Security Consultant
Advise organizations on security best practices and risk mitigation.
Incident Response Specialist
Lead response efforts during security breaches and cyber attacks.
Cybersecurity Architect
Design and implement comprehensive security solutions for organizations.