inner-banner

Bachelor of Cyber Security

Cyber Security

This course focuses on the key concepts and challenges in data protection and computer software security. You will examine both the high – and low – level practical aspects of computer security.

High – level aspects include cryptography theory, data access policy development and security program management. Low – level aspects include computer forensics, network intrusion detection and incident handling.

Graduates have the skills to identify and implement appropriate applications for specific scenarios, as well as an understanding of issues related to the protection of individual rights.

Awarding University

This recognized academic programme is awarded by SLIIT under the Faculty of Computing.

Ensures globally accepted academic standards, preparing students with practical skills aligned to current industry needs and expectations.

Why & What..?

WHY CHOOSE CYBER SECURITY
WHAT YOU WILL STUDY
WHAT ARE THE PROGRAM OUTCOMES

test

test

test

Programme Structure

Previous Curriculum

Semester 1
Code Module Credit
ISEC2001 Fundamental Concepts of Data Security 25
NPSC1003 Integrating Indigenous Science and STEM 25
ISAD1000 Introduction to Software Engineering 25
COMP1007 Programming Design and Implementation 25
Semester 2
Code Module Credit
COMP1002 Data Structures and Algorithms 25
COMP1000 Unix and C Programming 25
MATH1015 Linear Algebra 1 25
MATH1019 Linear Algebra and Statistics for Engineers 25
CMPE2002 Requirements Engineering 25
COMP1006 Foundations of Computer Science 25
ISEC1000 Cyber Security Concepts 25
Semester 1
Code Module Credit
MJRU-COMPS Computer Science Major (B Comp) 1
MJRU-CYBSE Cyber Security Major (B Comp) 1
MJRU-SFTEN Software Engineering Major (B Comp) 1

More about the program

Entry Requirements
Career Opportunities
Course Fee
Course Summery

testtest

test

test

This course focuses on the key concepts and challenges in data protection and computer software security. You will examine both the high – and low – level practical aspects of computer security.

High – level aspects include cryptography theory, data access policy development and security program management. Low – level aspects include computer forensics, network intrusion detection and incident handling.

Graduates have the skills to identify and implement appropriate applications for specific scenarios, as well as an understanding of issues related to the protection of individual rights.

We Work Hard To Prepare Every Student For Their Professional Life