Bachelor of Cyber Security
Cyber Security
This course focuses on the key concepts and challenges in data protection and computer software security. You will examine both the high – and low – level practical aspects of computer security.
High – level aspects include cryptography theory, data access policy development and security program management. Low – level aspects include computer forensics, network intrusion detection and incident handling.
Graduates have the skills to identify and implement appropriate applications for specific scenarios, as well as an understanding of issues related to the protection of individual rights.
Duration
Schedule
Location
SLQF Level
Medium
Awarding University
This recognized academic programme is awarded by SLIIT under the Faculty of Computing.
Ensures globally accepted academic standards, preparing students with practical skills aligned to current industry needs and expectations.
Accreditation
Why & What..?
test
test
test
Programme Structure
-
First Year
-
Second Year
| Semester 1 | ||
|---|---|---|
| Code | Module | Credit |
| ISEC2001 | Fundamental Concepts of Data Security | 25 |
| NPSC1003 | Integrating Indigenous Science and STEM | 25 |
| ISAD1000 | Introduction to Software Engineering | 25 |
| COMP1007 | Programming Design and Implementation | 25 |
| Semester 2 | ||
|---|---|---|
| Code | Module | Credit |
| COMP1002 | Data Structures and Algorithms | 25 |
| COMP1000 | Unix and C Programming | 25 |
| MATH1015 | Linear Algebra 1 | 25 |
| MATH1019 | Linear Algebra and Statistics for Engineers | 25 |
| CMPE2002 | Requirements Engineering | 25 |
| COMP1006 | Foundations of Computer Science | 25 |
| ISEC1000 | Cyber Security Concepts | 25 |
| Semester 1 | ||
|---|---|---|
| Code | Module | Credit |
| MJRU-COMPS | Computer Science Major (B Comp) | 1 |
| MJRU-CYBSE | Cyber Security Major (B Comp) | 1 |
| MJRU-SFTEN | Software Engineering Major (B Comp) | 1 |
More about the program
testtest
test
test
This course focuses on the key concepts and challenges in data protection and computer software security. You will examine both the high – and low – level practical aspects of computer security.
High – level aspects include cryptography theory, data access policy development and security program management. Low – level aspects include computer forensics, network intrusion detection and incident handling.
Graduates have the skills to identify and implement appropriate applications for specific scenarios, as well as an understanding of issues related to the protection of individual rights.