Bachelor of Information Technology (Cyber Security) (Honours)

by Universiti Geomatika Malaysia (UGM) Claim Listing

In today’s connected world, each organization gets benefits from advanced cyber defense programs. At an individual level, a cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data, or research documents.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Universiti Geomatika Malaysia (UGM) Logo

img Duration

3 Years

Course Details

In today’s connected world, each organization gets benefits from advanced cyber defense programs. At an individual level, a cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data, or research documents. 

  • Everyone depends on critical infrastructure such as hospitals, universities, institutions, power plants, and financial service companies. Securing these and other organizations is vital significant to keeping our society functioning. In an organization, the people, processes, and technology must all complement one another to generate a successful defense from cyber-attacks.
  • Bachelor Of Information Technology (Cyber Security) (Honours)  – Cyber Security or the Security of Information Technology (IT Security) are regarded as techniques which are used to protected computers, hardware, software, networks, programs and electronic data from unauthorized access or attacks which are aimed for exploitation, and also from disruption or misdirection of the services they offer. These cyber-attacks are often aimed to change, access, or destroy sensitive information; interrupting normal business processes or extorting money from users. Implementing efficient cyber security measures is particularly demanding today in that there are more devices than people, and attackers are becoming more innovative.
  • Based on three Principles of Cyber Security (Confidentiality, Integrity, and Availability) that are growing in significance because of increasing dependence on the Internet, computer systems, and wireless networks like Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions and the various tiny devices that comprise the Internet of things (IoT). Because of its complexity, both in respect of technology and politics, it is also one of the main challenges of the contemporary world.

First Year

  • Introduction to Computer Security
  • Discrete Mathematics
  • Proficiency Skills in English
  • Computer Organization & Architecture
  • Introduction to Multimedia
  • Programming Concepts
  • Networking
  • Human Computer Interaction
  • Information Systems
  • Web Programming
  • Operating Systems
  • Academic English

Second Year

  • Software Engineering
  • Object Oriented Programming
  • Database Systems
  • Artificial Intelligent
  • Information Security Management
  • English for Research Foundation
  • Computer Forensics & Investigation
  • Intrusion Detection Systems and Risk Management
  • Data Forensic Analysis
  • Data Analytics for Cyber Security
  • Industrial Training

Third Year

  • Research Methodology
  • Computer Forensics Technology
  • Web and Application Security
  • Cryptography & Internet Security
  • Computer Repairing And Maintenance
  • Project
  • Cyber Security and Oversight of Information Systems Security
  • Occupational Safety and Health (OSHA)
  • Computer and Intrusion Forensics
  • Cyber Laws and Ethics
  • Industrial Training

Employment opportunities are available as per the following:

  • Business Analyst
  • Consultant
  • Cryptographer
  • Information Security Auditor
  • IT Security Engineer
  • Law Enforcement
  • Project Manager
  • Cyber Security Analyst
  • Cyber Security System Developer/Programmer
  • Cyber Security System Manage
  • Kuala Lumpur Branch

    Lot 5-5-7, 5th Floor, Prima Peninsula, Jalan Setiawangsa 11, Kuala Lumpur

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy