Bachelor of Computer Science in Cyber Security With Honours

by UCSI University Claim Listing

A bachelor of computer science in cyber security is an undergraduate degree programme designed to equip students with the knowledge and skills needed to defend against cyber threats and safeguard digital systems. This comprehensive programme focuses on preparing students to become skilled profession

RM88860

Contact the Institutes

Fill this form

Advertisement

UCSI University Logo

img Duration

3 Years

Course Details

A bachelor of computer science in cyber security is an undergraduate degree programme designed to equip students with the knowledge and skills needed to defend against cyber threats and safeguard digital systems. This comprehensive programme focuses on preparing students to become skilled professionals in the field of cybersecurity and covers a wide range of topics related to securing digital systems, networks and data from cyber threats. 

This includes Computer Security, Network Security, Information Systems Risk and Security and Computer Forensics. Students learn to work with cybersecurity tools, design intelligent algorithms and understand the ethical and legal implications of cybersecurity practices. Additionally, the programme covers Software Security, E-Commerce Security and Cryptography. Upon completion of the Bachelor of Cyber Security, graduates are well-prepared to protect organisations and individuals from the ever-evolving landscape of cyber threats.

Notes:

  • Students are required to pass the Reinforcement Mathematics before being allowed to take related core courses. The candidate can sit for any subjects that did not indicate Mathematics as a prerequisite.
  • Reinforcement Mathematics can contribute to the overall graduating credit.
  • Students from Matriculation / Foundation or its equivalent can be exempted from taking the Reinforcement Mathematics, provided that the Mathematics offered at that programme level is equivalent / more than the Additional Mathematics offered at an SPM level.

Year 1

  • Introduction to Programming
  • Discrete Mathematics
  • Computer Organisation and Architecture
  • Computer Security
  • Object-oriented Programming
  • Mathematics for Cyber Security
  • Introduction to Internet Technologies
  • Cloud Computing
  • Cooperative Placement 1

Elective Course (Choose 1)

  • Database Management Systems

Year 2

  • Data Structures and Algorithms
  • Introduction to Human Computer Interaction
  • Operating Systems
  • Security Management
  • Operating Systems
  • Introduction to Cryptography
  • Software Security
  • System Analysis and Design
  • Networking
  • Research Methods in Computing
  • Cooperative Placement 2

Elective Course (Choose 2)

  • Database Design
  • Business System Development Tools
  • Mobile Commerce
  • Software Project Management

Year 3

  • Information Systems Risk and Security
  • Project Formulation
  • Application Layer Programming
  • Network Security
  • Project Design and Implementation
  • Network Security Design
  • Intelligent Systems
  • Computer Forensic
  • E-Commerce Security
  • Co-Operative Placement 3

Elective Course (Choose 1)

  • Programming for Computer Science
  • Web Programming
  • Fuzzy System and Evolutionary Computing

Career Opportunities

  • Cybersecurity Analyst
  • Cybersecurity Engineer
  • Cryptography engineer
  • Ethical Hacker
  • Computer Forensics Analyst
  • Penetration Tester
  • Information Security Consultant
  • Information security Analyst
  • Malware Analyst
  • Chief Information Security Officer (CISO)
  • Security Operations Center (SOC) Analyst
  • Security Architect
  • Security systems administrator
  • Taman Connaught Branch

    1, Jalan Menara Gading, UCSI Heights, Cheras 56000, Taman Connaught, Kuala Lumpur

Check out more Bachelor of Cybersecurity courses in Malaysia

UCSI College Logo

Bachelor of Information Technology in Cyber Security and Forensics (Murdoch University)

Increasingly, government and corporate organisations need to identify information security risks and interdependencies between business functions. Escalating security threats to organisations' information assets and increasing needs for organisations to comply with governance of information managem...

by UCSI College [Claim Listing ]
  • Price
  • Start Date
  • Duration
Faculty of Chemical and Process Engineering Technology Logo

Bachelor of Computer Science (Cyber Security) With Honours

The curriculum of this program is based on the 3u1i concept, designed so that students can master the knowledge and skills required by the industry while students are in university.

by Faculty of Chemical and Process Engineering Technology [Claim Listing ]
Universiti Teknologi Malaysia Logo

Bachelor of Computer Science (Computer Networks & Security) With Honours

The bachelor of computer science (computer networks & security) with honours is offered on a full-time basis. The full-time programme is offered only at the utm main campus in johor bahru and is based on a 2-semester per academic session.

by Universiti Teknologi Malaysia [Claim Listing ]
Universiti Geomatika Malaysia (UGM) Logo

Bachelor of Information Technology (Cyber Security) (Honours)

In today’s connected world, each organization gets benefits from advanced cyber defense programs. At an individual level, a cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data, or research documents.

by Universiti Geomatika Malaysia (UGM) [Claim Listing ]
Universiti Tun Hussein Onn Malaysia (UTHM) Logo

Bachelor of Computer Science (Information Security) with Honours

Overall, the bachelor of computer science (information security) with honours programme provides students with the chance to participate in real-world, hands-on learning activities, such as internships and industry projects, ensuring that graduates are well-rounded and have the knowledge and skills

by Universiti Tun Hussein Onn Malaysia (UTHM) [Claim Listing ]
  • Price
  • Start Date
  • Duration

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy