Bachelor of Information Technology (Cyber Security) (Honours)

by Universiti Geomatika Malaysia (UGM) Claim Listing

In today’s connected world, each organization gets benefits from advanced cyber defense programs. At an individual level, a cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data, or research documents.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Universiti Geomatika Malaysia (UGM) Logo

img Duration

3 Years

Course Details

In today’s connected world, each organization gets benefits from advanced cyber defense programs. At an individual level, a cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data, or research documents. 

  • Everyone depends on critical infrastructure such as hospitals, universities, institutions, power plants, and financial service companies. Securing these and other organizations is vital significant to keeping our society functioning. In an organization, the people, processes, and technology must all complement one another to generate a successful defense from cyber-attacks.
  • Bachelor Of Information Technology (Cyber Security) (Honours)  – Cyber Security or the Security of Information Technology (IT Security) are regarded as techniques which are used to protected computers, hardware, software, networks, programs and electronic data from unauthorized access or attacks which are aimed for exploitation, and also from disruption or misdirection of the services they offer. These cyber-attacks are often aimed to change, access, or destroy sensitive information; interrupting normal business processes or extorting money from users. Implementing efficient cyber security measures is particularly demanding today in that there are more devices than people, and attackers are becoming more innovative.
  • Based on three Principles of Cyber Security (Confidentiality, Integrity, and Availability) that are growing in significance because of increasing dependence on the Internet, computer systems, and wireless networks like Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions and the various tiny devices that comprise the Internet of things (IoT). Because of its complexity, both in respect of technology and politics, it is also one of the main challenges of the contemporary world.

First Year

  • Introduction to Computer Security
  • Discrete Mathematics
  • Proficiency Skills in English
  • Computer Organization & Architecture
  • Introduction to Multimedia
  • Programming Concepts
  • Networking
  • Human Computer Interaction
  • Information Systems
  • Web Programming
  • Operating Systems
  • Academic English

Second Year

  • Software Engineering
  • Object Oriented Programming
  • Database Systems
  • Artificial Intelligent
  • Information Security Management
  • English for Research Foundation
  • Computer Forensics & Investigation
  • Intrusion Detection Systems and Risk Management
  • Data Forensic Analysis
  • Data Analytics for Cyber Security
  • Industrial Training

Third Year

  • Research Methodology
  • Computer Forensics Technology
  • Web and Application Security
  • Cryptography & Internet Security
  • Computer Repairing And Maintenance
  • Project
  • Cyber Security and Oversight of Information Systems Security
  • Occupational Safety and Health (OSHA)
  • Computer and Intrusion Forensics
  • Cyber Laws and Ethics
  • Industrial Training

Employment opportunities are available as per the following:

  • Business Analyst
  • Consultant
  • Cryptographer
  • Information Security Auditor
  • IT Security Engineer
  • Law Enforcement
  • Project Manager
  • Cyber Security Analyst
  • Cyber Security System Developer/Programmer
  • Cyber Security System Manage
  • Kuala Lumpur Branch

    Lot 5-5-7, 5th Floor, Prima Peninsula, Jalan Setiawangsa 11, Kuala Lumpur

Check out more Bachelor of Cybersecurity courses in Malaysia

Universiti Tenaga Nasional (UNITEN) Logo

Bachelor of Computer Science (Cyber Security) (Honours)

Student who has completed sijil tinggi persekolahan malaysia (stpm), a-level, matriculation, foundation, diploma, uec, international baccalaureate diploma (ib), hnd(uk) diploma, same/wace/ausmat or other equivalent qualifications recognised by government of malaysia.

by Universiti Tenaga Nasional (UNITEN) [Claim Listing ]
  • Price
  • Start Date
  • Duration
Lincoln University College Logo

Bachelor of Computer Science (Hons) (Network Technology and Cybersecurity)

Graduates of this course will acquire the necessary skills required to manage a network and maintain its security. We also porovide laboratory facilities, for the study of key areas, such as, network operating systems,network manage-ment and network implementation.

by Lincoln University College [Claim Listing ]
Universiti Poly-tech Malaysia (UPTM) Logo

Bachelor of Information Technology (Honours) in Cyber Security (CT206)

The bachelor of information technology (honours) in cyber security program is designed to provide students with a comprehensive understanding of information security and cyber defence. Through a rigorous curriculum that blends theoretical knowledge with hands-on training, students will gain practic...

by Universiti Poly-tech Malaysia (UPTM) [Claim Listing ]
  • Price
  • Start Date
  • Duration
Unikop College Logo

Bachelor of Science (Hons) in Cybersecurity

This programme offered through collaboration between unikop college and abertay university, is designed to equip students with advanced knowledge and practical skills in cybersecurity. This programme prepares students to effectively design, manage, and implement cybersecurity strategies and technol...

by Unikop College [Claim Listing ]
First City University College Logo

Bachelor of Information Technology (Networking and Security) (Hons)

This programme equips students with a broad range of knowledge and technical skills in information technology, networking & cybersecurity. Students will study modules focusing on system analysis & design, computer architecture, cyber security, computer forensics, biometric technology, ethical hacki...

by First City University College [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy