Bachelor of Information Technology (Cyber Security) (Honours)

by Universiti Geomatika Malaysia (UGM) Claim Listing

In today’s connected world, each organization gets benefits from advanced cyber defense programs. At an individual level, a cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data, or research documents.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Universiti Geomatika Malaysia (UGM) Logo

img Duration

3 Years

Course Details

In today’s connected world, each organization gets benefits from advanced cyber defense programs. At an individual level, a cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data, or research documents. 

  • Everyone depends on critical infrastructure such as hospitals, universities, institutions, power plants, and financial service companies. Securing these and other organizations is vital significant to keeping our society functioning. In an organization, the people, processes, and technology must all complement one another to generate a successful defense from cyber-attacks.
  • Bachelor Of Information Technology (Cyber Security) (Honours)  – Cyber Security or the Security of Information Technology (IT Security) are regarded as techniques which are used to protected computers, hardware, software, networks, programs and electronic data from unauthorized access or attacks which are aimed for exploitation, and also from disruption or misdirection of the services they offer. These cyber-attacks are often aimed to change, access, or destroy sensitive information; interrupting normal business processes or extorting money from users. Implementing efficient cyber security measures is particularly demanding today in that there are more devices than people, and attackers are becoming more innovative.
  • Based on three Principles of Cyber Security (Confidentiality, Integrity, and Availability) that are growing in significance because of increasing dependence on the Internet, computer systems, and wireless networks like Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions and the various tiny devices that comprise the Internet of things (IoT). Because of its complexity, both in respect of technology and politics, it is also one of the main challenges of the contemporary world.

First Year

  • Introduction to Computer Security
  • Discrete Mathematics
  • Proficiency Skills in English
  • Computer Organization & Architecture
  • Introduction to Multimedia
  • Programming Concepts
  • Networking
  • Human Computer Interaction
  • Information Systems
  • Web Programming
  • Operating Systems
  • Academic English

Second Year

  • Software Engineering
  • Object Oriented Programming
  • Database Systems
  • Artificial Intelligent
  • Information Security Management
  • English for Research Foundation
  • Computer Forensics & Investigation
  • Intrusion Detection Systems and Risk Management
  • Data Forensic Analysis
  • Data Analytics for Cyber Security
  • Industrial Training

Third Year

  • Research Methodology
  • Computer Forensics Technology
  • Web and Application Security
  • Cryptography & Internet Security
  • Computer Repairing And Maintenance
  • Project
  • Cyber Security and Oversight of Information Systems Security
  • Occupational Safety and Health (OSHA)
  • Computer and Intrusion Forensics
  • Cyber Laws and Ethics
  • Industrial Training

Employment opportunities are available as per the following:

  • Business Analyst
  • Consultant
  • Cryptographer
  • Information Security Auditor
  • IT Security Engineer
  • Law Enforcement
  • Project Manager
  • Cyber Security Analyst
  • Cyber Security System Developer/Programmer
  • Cyber Security System Manage
  • Kuala Lumpur Branch

    Lot 5-5-7, 5th Floor, Prima Peninsula, Jalan Setiawangsa 11, Kuala Lumpur

Check out more Bachelor of Cybersecurity courses in Malaysia

UCSI College Logo

Bachelor of Information Technology in Cyber Security and Forensics (Murdoch University)

Increasingly, government and corporate organisations need to identify information security risks and interdependencies between business functions. Escalating security threats to organisations' information assets and increasing needs for organisations to comply with governance of information managem...

by UCSI College [Claim Listing ]
  • Price
  • Start Date
  • Duration
Universiti Tun Hussein Onn Malaysia (UTHM) Logo

Bachelor of Computer Science (Information Security) with Honours

Overall, the bachelor of computer science (information security) with honours programme provides students with the chance to participate in real-world, hands-on learning activities, such as internships and industry projects, ensuring that graduates are well-rounded and have the knowledge and skills

by Universiti Tun Hussein Onn Malaysia (UTHM) [Claim Listing ]
  • Price
  • Start Date
  • Duration
Kolej Poly-Tech Mara (KPTM) Logo

Bachelor of Information Technology (Hons) in Cyber Security

In bachelor of information technology (honours) in cyber security, students will learn the basics of information security, security infrastructure design and implementation, computer forensics, risk assessments and securities security impacts in business operations.

by Kolej Poly-Tech Mara (KPTM) [Claim Listing ]
UCSI University Logo

Bachelor of Computer Science in Cyber Security With Honours

A bachelor of computer science in cyber security is an undergraduate degree programme designed to equip students with the knowledge and skills needed to defend against cyber threats and safeguard digital systems. This comprehensive programme focuses on preparing students to become skilled professio...

by UCSI University [Claim Listing ]
  • Price
  • Start Date
  • Duration
Peninsula College Logo

BSc (Hons) In Computer Science (Cyber Security)

The demand for cyber security within every organization across the world is ever increasing. This course explores the biggest threats to our data from hackers, malicious coders and social engineers to crackers, viruses, trojans, worms, botnets, zombies, phishing and pharming.

by Peninsula College [Claim Listing ]
  • Price
  • Start Date
  • Duration

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy