Admission for the September 2024 academic session is ongoing. Apply Now!

School of Computing

BSc. Cybersecurity

This programme is designed to prepare individuals for careers in the field of cybersecurity, which focuses on protecting computer systems, networks, and data from unauthorised access, attacks, and threats.

ADMISSION OPTIONS

ADMISSION OPTIONS

Tuition Per Session

$590

Tuition Per Semester

$315

Introduction to Cybersecurity

Start your bachelor’s degree in Cybersecurity

Our Bachelor’s in Cybersecurity programme is crafted to equip you with the knowledge and skills necessary for a successful career in the field. With a strong emphasis on theoretical foundations and practical applications, this programme prepares you to tackle the complex challenges of cybersecurity in today’s digital landscape. In this course, you will learn cybersecurity fundamentals, network security, cryptography, and data protection.

As a graduate, you will be well-prepared to pursue diverse professional pathways in cyber security, safeguarding digital systems and data from emerging threats, and ensuring the integrity and confidentiality of information.

Our faculty members are knowledgeable, accomplished, and experienced in their fields. They bring a wealth of knowledge and real-world insights into the classroom. Their diverse backgrounds, ranging from industry leaders to seasoned academics, enrich the learning experience by providing practical perspectives and cutting-edge research. By learning from these esteemed faculty members, you will be inspired to think critically, develop innovative solutions, and excel in the ever-evolving landscape of cybersecurity.

Why you should apply;

Applications for September 2024 admission is ongoing.

Apply before 30th September 2024, to secure your place. Discount applies for full year’s payment.

Programme Summary

Study Level

BSc. Cybersecurity

Study Duration

8 Semesters

Mode of study

Blended Learning

Tuition per session

$590

Tuition per semester

$315

Curriculum

Programme Outline

Our curriculum is designed to provide students with the skills and knowledge they need to succeed in a variety of careers in the tech industry. The programme covers a wide range of topics, including programming, data structures, algorithms, operating systems, and artificial intelligence.

The faculty is available to students through forums, email, and phone calls. Students also have access to a variety of resources, including a state-of-the-art e-library, virtual computer labs, a career center, and a variety of student organisations.

1st Semester Units
Communication in English I 2
At the end of this course, students should be able to:
  • Identify possible sound patterns in English;
  • List notable Language skills, classify word formation processes;
  • Construct simple and fairly complex sentences in English;
  • Apply logical and critical reasoning skills for meaningful presentations;
  • Demonstrate an appreciable level of the art of public speaking and listening; and
  • Write simple and technical reports.
Elementary Mathematics I – Algebra and Trigonometry 2
At the end of this course, students should be able to:
  • Understand the basic definitions of Set, Subset, Union, Intersection, Complements, and use of Venn diagrams;
  • Solve quadratic equations;
  • Solve trigonometric functions;
  • Understand various types of numbers; and
  • Solve some problems using the Binomial theorem.
General Physics I – Mechanics 2
At the end of this course, students should be able to:
  • Identify and deduce the physical quantities and their units;
  • Differentiate between vectors and scalars;
  • Describe and evaluate the motion of systems on the basis of the fundamental laws of mechanics;
  • Apply Newton’s laws to describe and solve simple problems of motion;
  • Evaluate work, energy, velocity, momentum, acceleration, and torque of moving or rotating objects;
  • Explain and apply the principles of conservation of energy, linear and angular momentum;
  • Describe the laws governing motion under gravity;
  • Explain motion under gravity, and quantitatively determine the behavior of objects moving under gravity.
General Practical Physics I 1
At the end of this course, students should be able to:
  • Conduct measurements of some physical quantities;
  • Make observations of events, collect and tabulate data;
  • Identify and evaluate some common experimental errors;
  • Plot and analyze graphs; and
  • Draw conclusions from numerical and graphical analysis of data.
Use of Library, Study Skills and ICT 2
At the end of this course, students should be able to:
  • Understand the significance of Information and Communication Technology (ICT) and its application to libraries and Information Services;
  • Acquire essential ICT skills for information professionals, understand data communication and internet resources in electronic storage systems, and explore web technology resources;
  • Learn the impact of ICT on modern libraries, along with ethical considerations and challenges related to applying ICT in library settings, particularly in the context of Nigerian libraries.
Descriptive Statistics 3
At the end of this course, students should be able to:
  • Explain the basic concepts of descriptive statistics.
  • Present data in graphs and charts.
  • Differentiate between measures of location, dispersion and partition.
  • Describe the basic concepts of Skewness and Kurtosis as well as their utility function in a given data set.
  • Differentiate rates from ratios and how they are used.
  • Compute the different types of index numbers from a given data set and interpret the output.
  • Understand and apply frequency distributions to organize and summarize data, create and interpret various types of charts and graphs to visualize data effectively, compute and interpret measures of central tendency to identify the center of a distribution, calculate and interpret measures of dispersion to understand the spread of data points, compare and contrast different approaches to probability, calculate and interpret conditional probabilities to make informed decisions based on given conditions, identify and work with probability distributions in the discrete case, including Bernoulli, Binomial, Uniform, Poisson, Geometric, and Hypergeometric distributions, analyze continuous probability distributions, such as Uniform, Normal, and Exponential distributions.
Introduction to Computing Sciences 3
At the end of this course, students should be able to:
  • Explain basic components of computers and other computing devices;
  • Describe the various applications of computers;
  • Explain information processing and its roles in the society;
  • Describe the Internet, its various applications and its impact;
  • Explain the different areas of the computing discipline and its specializations; and
  • Demonstrate practical skills on using computers and the internet.
Environmental and Sustainability (Elective) 2
At the end of this course, students should be able to:
  • Grasp environmental studies’ fundamental principles, human-environment relationships, and the impact of human activities on nature.
  • Examine energy resource usage and its environmental consequences, and investigate chemicals and waste effects on ecosystems and health.
Contemporary Health Issues (Elective) 2
At the end of this course, students should be able to:
  • Outline contemporary health issues and broadly classify them.
  • Discuss some basic concepts related to clinical medicine, disease prevention/management, and population health.
  • Explain the aetiology, prevention, and management of key non-communicable diseases.
  • Discuss the epidemiology, personal and public health consequences of selected infectious diseases.
  • Discuss the personal and social determinants of health.
  • Explain the place of disease prevention and health promotion in personal and population health.
  • Explain the connection between contemporary health issues and sustainable development goals.
  • Relate contemporary health issues to global health challenges.
2nd Semester Units
Introduction to Problem Solving 3
At the end of this course, students should be able to:
  • Explain problem-solving processes.
  • Demonstrate problem-solving skills.
  • Describe the concept of algorithms development and properties of algorithms.
  • Discuss the solution techniques of solving problems.
  • Solve computer problems using algorithms, flowcharts, pseudocode; etc.
  • Solve problems using programming languages like C, PYTHON, etc.
Nigerian People and Culture 2
At the end of this course, students should be able to:
  • Analyze the historical foundation of Nigerian culture and arts in pre-colonial times.
  • List and identify the major linguistic groups in Nigeria.
  • Explain the gradual evolution of Nigeria as a political unit.
  • Analyze the concepts of trade, economic, and self-reliance status of the Nigerian people towards national development.
  • Enumerate the challenges of the Nigerian State towards nation-building.
  • Analyze the role of the Judiciary in upholding people’s fundamental rights.
  • Identify acceptable norms and values of the major ethnic groups in Nigeria.
  • List and suggest possible solutions to identifiable Nigerian environmental, moral, and value problems.
Elementary Mathematics II – Calculus 2
At the end of this course, students should be able to:
  • Differentiate and explain rules in calculus.
  • Analyze real-variable functions and graphs.
  • Grasp limits and continuity.
  • Understand derivatives as the rate of change limits and gain proficiency in integration techniques and definite integrals for solving area and volume problems.
General Physics II – Electricity & Magnetism 2
At the end of this course, students should be able to:
  • Describe and determine the magnetic field for steady and moving charges.
  • Determine the magnetic properties of simple current distributions using Biot-Savart and Ampere’s law.
  • Describe electromagnetic induction and related concepts and make calculations using Faraday and Lenz’s laws.
  • Explain the basic physical of Maxwell’s equations in integral form and evaluate DC circuits to determine the electrical parameters and the characteristics of AC voltages and currents in resistors, capacitors, and inductors.
General Practical Physics II 1
At the end of this course, students should be able to:
  • Conduct experiments on the measurements of some physical quantities.
  • Make observations of events.
  • Collect and tabulate data.
  • Identify and evaluate some common experimental errors.
  • Plot and analyze graphs and finally draw conclusions from numerical and graphical analysis of data.
Communication in English II 2
At the end of this course, students should be able to:
  • Have a deepened understanding of communication skills both in spoken and written English.
  • Demonstrate an appreciable level of proficiency in the arts of public speaking, listening, and effective communication.
Introduction to Web Technologies 3
At the end of this course, students should be able to:
  • Plan, design, and develop effective web pages with a focus on the practical application of the technologies used in web development.
  • Use tools like HTML5, Cascading Style Sheet (CSS) and Javascript.
  • Host a website on a selected web server.
  • Develop web content development skills.

1st SemesterUnits
Entrepreneurship and Innovation2

At the end of this course, students should be able to:

  • Explain the concepts, characteristics, and theories of entrepreneurship, intrapreneurship, opportunity seeking, new value creation, and risk-taking.
  • Analyze the importance of micro and small businesses in wealth creation, employment, and financial independence.
  • Engage in entrepreneurial thinking.
  • Identify key elements in innovation and describe the stages in enterprise formation, partnership, and networking, including business planning.
  • State the basic principles of e-commerce.
Computer Programming I3

At the end of this course, students should be able to:

  • Identify different programming paradigms and their approaches to programming.
  • Write programs in C using basic data types and strings.
  • Design and implement programming problems using selection.
  • Design and implement programming problems using loops and use & implement classes as data abstractions in an object-oriented approach.
  • Implement simple exception handling in programs, develop programs with input/output from text files and design and implement programming problems involving arrays.
Discrete Structures2

At the end of this course, students should be able to:

  • Convert logical statements from informal language to propositional and predicate logic expressions.
  • Describe the strengths and limitations of propositional and predicate logic and outline the basic structure of each proof technique to be described.
  • Apply each of the proof techniques correctly in the construction of a sound argument, apply the pigeonhole principle in the context of a formal proof and compute permutations and combinations of a set, and interpret the meaning in the context of the particular application.
  • Map real-world applications to appropriate counting formalisms subject to constraints on the seating arrangement and solve a variety of basic recurrence relations.
Linear Algebra I2

At the end of this course, students should be able to:

  • Understand vector spaces, linear transformations, matrices, determinants, eigenvalues, and eigenvectors.
  • Apply these concepts to solve mathematical problems.
Introduction to Software Engineering2

At the end of this course, students should be able to:

  • Describe the concept of the software life cycle.
  • Explain the phases of requirements analysis.
  • Design, development, testing, and maintenance in a typical software life cycle.
  • Differentiate amongst the various software development models.
  • Utilize Unified Modeling Language for object-oriented analysis and design.
  • Describe different design architectures.
  • Explain the various tasks involved in software project management.
  • Describe the basic legal issues related to Software Engineering.
Introduction to Cybersecurity and Strategy2

At the end of this course, students should be able to:

  • Exhibit the ability to articulate cybersecurity concepts, methods, terminologies, and elements.
  • List and explain common cyber-attacks, threats, challenges, and solutions.
  • Apply techniques for identifying, detecting, and defending against cybersecurity threats, safeguarding information assets, and assessing the impact of cybersecurity on various institutions and applications.
  • Recognize the methods and motives of cybersecurity incident perpetrators, the countermeasures employed by organizations and agencies, and the ethical obligations of security professionals.
  • Evaluate cybersecurity and national security strategies and define evolving cybersecurity requirements and strategies to mitigate significant risks.
Cybercrime, Law and Countermeasures2

At the end of this course, students should be able to:

  • Discuss various cybercrimes, including computer crimes, internet fraud, e-commerce issues, and threats to national infrastructure.
  • Give insights into global policies, legal matters, investigative techniques, and enforcement implications related to cybercrime.
  • Analyze the cyber law of Nigeria and other countries, understanding the associated penalties.
  • Describe the application of cyber law at both international and national levels, offering examples from different continents by comparing Nigeria’s cyber law framework and countermeasures to other nations.
  • Identify challenges and opportunities in the enforcement of cyber law within the country.
SIWES I3

At the end of this training, students should be able to:

  • Evaluate their understanding of cybersecurity concepts, their practical application, preventive measures, and the protection of the cyber environment.
  • Articulate the functioning of a typical cybersecurity unit/department within an organization, detailing the various assignments performed and the skills acquired during the SIWES period (Students Industrial Work Experience Scheme).
  • Produce a comprehensive report summarizing the knowledge gained and the experiences encountered throughout the training, demonstrating their proficiency in the field of cybersecurity.

2nd SemesterUnits
Philosophy, Logic and Human Existence2

At the end of this course, students should be able to:

  • Provide a survey of the main branches of Philosophy, Symbolic Logic, and Special symbols in symbolic Logic-conjunction, negation, affirmation, disjunction, equivalent and conditional statements law of thought.
  • Understand the method of deduction using rules of inference and bi-conditionals qualification theory; Types of discourse, Nature of arguments, Validity and soundness; Techniques for evaluating arguments, and Distinction between inductive and deductive inferences.
Computer Programming II3

At the end of this course, students should be able to:

  • Develop solutions for a range of problems using object-oriented programming in C++.
  • Use modules/packages/namespaces for program organization.
  • Use API in writing applications.
  • Apply divide and conquer strategy to searching and sorting problems using iterative and/or recursive solutions and explain the concept of exceptions in programming and how to handle exceptions in programs.
  • Write simple multithreaded applications and design and implement simple GUI applications.
Computer Architecture and Organisation2

At the end of this course, students should be able to:

  • Explain different instruction formats, such as addresses per instruction and variable length vs. fixed length formats.
  • Describe the organization of the classical von Neumann machine and its major functional units.
  • Explain how subroutine calls are handled at the assembly level.
  • Describe the basic concepts of interrupts and I/O operations.
  • Write simple assembly language program segments.
  • Show how fundamental high-level programming constructs are implemented at the machine-language level.
  • Compare alternative implementations of data paths.
  • Discuss the concept of control points and the generation of control signals using hardwired or micro-programmed implementations.
Systems Analysis Design3

At the end of this course, students should be able to:

  • Describe system requirements gathering techniques.
  • Describe data modeling technique (entity relationship modeling).
  • Describe process modeling technique (data flow diagram).
  • Describe system architectural design, process, and database design.
  • Describe user interface design.
Linear Algebra II2

At the end of this course, students should be able to:

  • Master linear algebra concepts, including solving linear equations, change of basis, eigenvectors, eigenvalues, Caley-Hamilton theorem, symmetric matrices, positive definite matrices, and orthogonal diagonalization.
  • Confidently use similar matrices, linear transformations, singular value decomposition, and orthogonal projections.
  • Apply orthonormal bases and the Gram-Schmidt process effectively, making them adept at handling various mathematical problems and real-world applications.
Computer Networks3

At the end of this course, students should be able to:

  • Have gained a comprehensive understanding of computer networks, with a specific focus on Internet architecture and protocols.
  • Explain layered network architectures, addressing, naming, forwarding, routing, communication reliability, and the client-server model.
  • Exhibit practical experience through programming exercises involving reduced versions of real Internet protocols, complementing the theoretical foundations learned.
  • Design, analyze, and troubleshoot computer networks.
  • Implement and optimize various Internet protocols.
  • Navigate complex network environments, ensuring effective communication and data transfer, making them competent network professionals.

1st SemesterUnits
Data Structures3

At the end of this course, students should be able to:

  • Demonstrate a comprehensive understanding of fundamental programming concepts and data structures in C++ such as primitive types, arrays, records, strings, and string processing.
  • Have a solid grasp of data representation in memory and effectively allocate memory on the stack and heap.
  • Implement and apply various data structures including queues and trees, utilizing appropriate implementation strategies.
  • Manage run-time storage effectively through pointers and references, and adeptly work with linked structures.
  • Gain practical experience in writing C++ functions and implementing algorithms for arrays, records, string processing, queues, trees, pointers, and linked structures.
Artificial Intelligence2

At the end of this course, students should be able to:

  • Explain AI fundamentals, concepts, goals, types, techniques, branches, applications, AI technology and tools.
  • Discuss intelligent agents, their performance, examples, faculties, environment and architectures, and determine the characteristics of a given problem that an intelligent system must solve.
  • Describe the Turing test and the “Chinese Room” thought experiment, and differentiate between optimal reasoning/behaviour and human-like reasoning/behaviour.
  • Analyze heuristics and trade-offs among completeness, optimality, time complexity, and space complexity.
  • Practice Natural Language Processing, translate natural language sentences into predicate logic statements, convert logic statements into clause form, and apply resolution to logic statements for query answers.
  • Analyze programming languages for AI and expert systems technology, and apply them in application domains of AI.
Cryptography Techniques, Algorithms and Applications2

At the end of this course, students should be able to:

  • Define various cryptography means, simple and complex cryptosystems, and differentiate between symmetric and asymmetric cryptography.
  • Exhibit practical experience in cryptanalysis, utilizing protocols, hashing, digital signatures, and certificates.
  • Examine certificate authorities, policies, and procedures for proper cryptography usage in secure systems.
  • Identify and understand public-key cryptography, discrete algorithms, and cryptographic mathematical concepts, including hash functions, data integrity, authentication, algorithmic number theory, primality testing, and true primality testing.
  • Discuss factoring integers, RSA encryption, RSA key generation security, and discrete logarithm cryptographic schemes.
Cybersecurity Risks Analysis, Challenges and Mitigation2

At the end of this course, students should be able to:

  • Describe cybersecurity risks, preventive measures, and challenges, while proposing strategies for the future.
  • Apply decision and risk analysis techniques to mitigate cybersecurity vulnerabilities and devise effective assessments for risk mitigation in the cloud.
  • Discuss the implications of information technology on national development, cyber-attacks, and the safety of information, considering economic and geopolitical factors affecting African countries.
  • Review information security principles and applied management, including governance, security policy, threat and vulnerability management, crisis response, and legal considerations.
  • Explore ISO 27000 series, incident response, forensics, and dealing with classified data and regulatory drivers.
Digital Forensics and Investigation Methods2

At the end of this course, students should be able to:

  • Build a foundational understanding of digital forensics and digital evidence, with an awareness of the challenges involved.
  • Evaluate the cyber trail and its complexities.
  • Review the development of investigative tools and the language of computer crime investigation.
  • Explore techniques and tools used in computer forensics investigations and apply best practices in securing, processing, acquiring, examining, and reporting digital evidence using contemporary technologies and methodologies.
System and Network Administration (Elective)2

At the end of this course, students should be able to:

  • Demonstrate in-depth knowledge of system administration, focusing on fundamental architecture shared across various systems.
  • Radicalize on UNIX/LINUX, requiring a working knowledge of Linux for optimal understanding.
  • Demonstrate skills, methodologies, and competencies necessary to effectively manage computer systems within an organizational infrastructure, including hardware, software, and user administration.
  • Showcase expertise in user, device, and file system administration, computer and network security, system monitoring, administrative support tools, and network, server, and client administration.
  • Proficiently handle diverse system administration tasks in real-world scenarios.
Cyber Security in Business and Industries (Elective)2

At the end of this course, students should be able to:

  • Apply and integrate cybersecurity principles, frameworks, standards, and best practices into business management, governance and policy development processes.
  • Give insights into organising, managing and governing enterprise IT cybersecurity within business settings, as well as implementing risk management practices.
  • Design and implement industry-wide cybersecurity initiatives and programmes.
  • Effectively navigate the intersection of cybersecurity and business, ensuring the protection of information assets, adherence to regulations and the development of robust cybersecurity strategies aligned with organisational goals.
SIWES II3

At the end of this training, students should be able to:

  • Articulate and describe the diverse assignments undertaken and the skills acquired throughout the training period.
  • Prepare and submit a comprehensive report documenting the knowledge gained and the experiences encountered during the exercise.
  • Showcase valuable hands-on experience in real-world settings, enhancing their practical skills, and preparing them for their future professional endeavors.

2nd SemesterUnits
Peace and Conflict Resolution2

At the end of this course, students should be able to:

  • Analyze the concepts of peace, conflict, and security.
  • List major forms, types, and root causes of conflict and violence.
  • Differentiate between conflict and terrorism.
  • Enumerate security and peacebuilding strategies.
  • Describe roles of international organizations, media, and traditional institutions in peacebuilding.
Venture Creation2

At the end of this course, students should be able to:

  • Identify business opportunities in Nigeria through environmental scanning and market research, considering social, climate, and technological factors.
  • Understand entrepreneurial finance options like venture capital, equity finance, microfinance, and small business investment organizations.
  • Grasp principles of marketing, customer acquisition and retention, as well as e-commerce models (B2B, C2C, B2C), learning from successful e-commerce companies.
  • Acquire skills in small business management, family business dynamics, negotiation, and modern business communication methods.
  • Demonstrate ability to generate business ideas and explore emerging technologies for market solutions and digital business strategies.
Operating Systems3

At the end of this course, students should be able to:

  • Recognize operating system types and structures.
  • Describe OS support for processes and threads.
  • Recognize CPU scheduling, synchronization, and deadlock.
  • Resolve OS issues related to synchronization and failure for distributed systems.
  • Explain OS support for virtual memory, disk scheduling, I/O, and file systems.
  • Identify security and protection issues in computer systems.
  • Use C and Unix commands, examine behavior and performance of Linux, and develop various system programs under Linux related to process synchronization, shared memory, mailboxes, file systems, etc.
Biometrics Security2

At the end of this course, students should be able to:

  • Discuss and apply various biometric algorithms and data analysis techniques, including digital image/signal processing.
  • Display proficiency in automated biometric identification for hands, fingers, palms, heads, face, voice, eyes, and other biometrics.
  • Develop methods for obtaining and matching biometric data, enabling them to practice biometric authentication, enrollment, and matching performance assessment, including setting thresholds, calculating error rates, and graph analysis.
  • Showcase skills in handling storage, quality, upgrades, security, and integrity of biometric data elements.
  • Discuss privacy issues, security strength, recognition rates, and applications of biometrics, passwords, and smart cards, as well as explore future trends.
Information and Big Data Security2

At the end of this course, students should be able to:

  • Possess a comprehensive understanding of the foundations of big data, encompassing computing technology and statistics.
  • Explore technical challenges and statistical assumptions underpinning relationship understanding in diverse applied fields, focusing on fraud detection and communication monitoring.
  • Critically engage with social implications of increased knowledge, surveillance, and behavioral prediction enabled by big data, addressing ethical tradeoffs.
  • Master principles and practices of utilizing big data to enhance computing system security.
  • Apply these principles through real-world examples, utilizing novel datasets to provide practical insights into big data applications.
Software Defined Networking and Content Delivery Networks (Elective)2

At the end of this course, students should be able to:

  • Gain comprehensive knowledge about software-defined networking (SDN) and its transformative impact on communication network management, maintenance, and security.
  • Understand fundamentals of content delivery networks (CDN), exploring infrastructure facilitating rapid delivery of static web content, rich digital media, and various data to global audience.
  • Be well-equipped to navigate and implement cutting-edge technologies in SDN and CDN, optimizing network performance, enhancing data delivery, and contributing to efficient, secure operation of modern communication networks.
Network Perimeter Security (Elective)2

At the end of this course, students should be able to:

  • Understand perimeter security in cybersecurity, focusing on safeguarding company’s network boundaries against hackers, intruders, and unauthorized individuals.
  • Know various defense mechanisms, such as surveillance detection, pattern analysis, threat recognition, and implementing effective response strategies.
  • Design and implement network perimeter security measures, ensuring protection of sensitive data and resources within organization.
  • Proactively address cybersecurity threats and contribute to creating secure, resilient network infrastructures.
Cybersecurity Innovation and New Technologies2

At the end of this course, students should be able to:

  • Understand significant role entrepreneurship plays in driving transformative social and economic changes within cyber-driven society.
  • Know how innovative applications of novel technologies in cybersecurity contribute to companies’ success and protection.
  • Have insights into various business models, identifying entrepreneurial opportunities through data analytics.
  • Describe business plans and startup process, evaluate business feasibility, and strategize marketing approaches.
  • Engage in discussions about business ethics and legal considerations, developing well-rounded understanding of intricate interplay between entrepreneurship, innovation, and cyber-driven business environments.
1st Semester Units
Research Methodology and Technical Report Writing 3
At the end of this course, students should be able to:
  • Distinguish qualitative and quantitative research methodologies and their applications;
  • Identify and define a research problem in a given area;
  • Identify different methods of data collection and select the methods appropriate to a given situation;
  • Design and conduct simple research including analysis and interpretation of research results;
  • Document research problem, methodology all the way to research report writing;
  • Defend the written research report; and
  • Familiarize themselves with ethical issues in the conduct of research.
Systems Vulnerability Assessment and Testing 2
Upon completing this course, students will:
  • Gain a comprehensive introduction to vulnerability assessment and penetration testing methodologies, along with proficiency in using software tools for these mechanisms.
  • Develop a thorough understanding of key concepts and topics in vulnerability assessment and penetration testing, including the vulnerability assessment process, host and network scanning techniques, principles of penetration testing, and various techniques for network security, software security, web security, and mobile security.
  • Apply these methodologies and tools to assess and test the security of various systems, preparing them for practical applications in identifying and addressing vulnerabilities in cybersecurity environments.
Project Management 2
At the end of this course, students should be able to:
  • Acquire comprehensive knowledge and understanding of project management, including planning, scheduling, and resource utilization.
  • Efficiently manage project resources, make procurement decisions, and effectively monitor and execute projects with excellent communication and time management skills.
  • Successfully lead and oversee projects, ensuring their timely and successful completion.
  • Handle project complexities, adapt to changing circumstances, and make informed decisions to achieve project goals.
  • Be prepared for real-world project management scenarios, enabling them to excel in managing and delivering successful projects.
Final Year Project I 3
At the end of this course, students should be able to:
  • Develop the essential skills to embark on a research-oriented project in Cyber Security.
  • Identify researchable project topics and conduct a comprehensive literature review relevant to the identified problem statement, demonstrating proper acknowledgement and referencing of information sources.
  • Conceptualize and design a well-structured research methodology to address the identified problem, determining appropriate data analysis tools aligned with research objectives.
  • Write a coherent and compelling proposal for the research project, showcasing their ability to present their ideas effectively in both written and oral formats.
  • Prepare for the subsequent phases of their final year project, equipping them to undertake rigorous and meaningful research in Cyber Security.
Cyber Threat Intelligence and Cyber Conflict 2
At the end of this course, students should be able to:
  • Possess the expertise to effectively detect, respond to, and combat organized cybercrimes and cyberwar activities, recognizing the limitations of preventing every attack in the current cyber security landscape.
  • Analyze successful and unsuccessful advanced persistent threats and malware campaigns, equipping them to combat cyber terrorism and terrorist tactics on a global scale.
  • Gain in-depth knowledge of cyber threat intelligence and cyber tactical threat intelligence, enabling them to evaluate the role and skills of a cyber threat intelligence analyst.
  • Identify the evolution of counterterrorism and cyber conflict, providing them with a comprehensive understanding of the dynamic and constantly evolving nature of these domains.
Ethical Hacking and Reverse Engineering 2
At the end of this course, students should be able to:
  • Gain a comprehensive understanding of Ethical Hacking and Reverse Engineering methodologies and techniques, catering to the growing interest in internet security and personal safety.
  • Be proficient in ethical hacking techniques, learning how to safeguard their security from potential threats.
  • Acquire the essential skills for reverse engineering, enabling them to gain valuable insights into engineering devices and systems.
  • Develop hands-on experience in both areas, enhancing their ability to apply these techniques effectively.
  • Be equipped with practical knowledge and expertise in Ethical Hacking and Reverse Engineering, empowering them to address cybersecurity challenges and engineering complexities in real-world scenarios.
Information Security and Data Management 2
At the end of this course, students should be able to:
  • Possess the knowledge and skills required to address information security, interoperability, and data management concerns in modern technological contexts.
  • Learn how to implement best practices and standards for information security and data management, ensuring appropriate privacy measures and effective communication between agencies.
  • Be equipped to resolve vulnerabilities and improve security skills within organizations’ business operations, technological assets, and management.
  • Be able to proactively address information security challenges and promote effective data management, safeguarding sensitive information and enhancing overall organizational efficiency and privacy protection.
2nd Semester Units
Ethics and Legal Issues in Cyber Security 3
At the end of this course, students should be able to:
  • Gain a comprehensive understanding of state laws and regulations concerning ethics in cybersecurity, along with the ability to identify and explain relevant codes of ethics in the field.
  • Explore and analyze social and ethical issues in various Cyber Security domains, reviewing real-life ethical cases to develop ethical resolutions and policies.
  • Comprehend the consequences of disregarding and non-compliance with ethical provisions.
  • Develop a sound methodology to effectively resolve ethical conflicts and crises, equipping them to navigate complex ethical dilemmas with professionalism and integrity.
  • Uphold ethical standards and promote ethical practices in the dynamic field of Cyber Security.
Machine Learning 3
At the end of this course, students should be able to:
  • Have a comprehensive understanding of machine learning as a subfield of artificial intelligence, with a focus on algorithms enabling computers to learn and adapt from empirical data.
  • Be proficient in the theoretical foundations of machine learning and various concrete algorithms, including decision tree learning, artificial neural networks, Bayesian learning, and support vector machines.
  • Develop programming skills and the ability to apply machine learning algorithms to real-world data sets, enabling them to analyze and interpret data effectively.
  • Implement machine learning techniques in practical applications, harnessing the power of algorithms to extract valuable insights from data.
Deep and Dark Web Security 2
At the end of this course, students should be able to:
  • Gain a thorough understanding of the deep and dark web, a hidden aspect representing over 90% of internet content.
  • Learn how activists, hacktivists, nation-states, researchers, and those seeking anonymity utilize this domain.
  • Acquire the skills to navigate the dark corners of the web, exposing them to unique perspectives on security, safety, reliability, and privacy.
  • Have the essential knowledge for Cybersecurity professionals, enabling them to detect threats, protect themselves from malicious activity, and leverage the dark web for anonymity and privacy protection.
  • Be prepared to operate effectively in the cybersecurity landscape, equipped with the expertise to confront the challenges and opportunities presented by the deep and dark web.
Final Year Project II 3
At the end of this course, students should be able to:
  • Showcase their proficiency in generic transferable and technical skills in Cyber Security, including effective communication and teamwork.
  • Demonstrate their abilities by producing a comprehensive technical report in their chosen project area, addressing real-world cybersecurity challenges.
  • Defend their written project report, showcasing their understanding and application of research methodologies.
  • Gain valuable insights into carrying out full-fledged research, appreciating the complexities and nuances involved in cybersecurity projects.
  • Be prepared to excel in professional settings, equipped with essential skills and knowledge in cybersecurity research and practice.
Steganography: Access Methods and Data Hiding 2
At the end of this course, students should be able to:
  • Understand steganography, a valuable technique employed in today’s security-conscious environment to hide sensitive information and stay ahead of hackers and data thieves.
  • Explore the concept of steganography, learning about the various techniques it entails and its practical applications in modern cybersecurity efforts.
  • Develop proficiency in implementing encryption methods that enable communication through concealed information.
  • Leverage steganography effectively, enhancing their ability to protect sensitive data and communication channels from unauthorized access.
  • Be better equipped to contribute to robust cybersecurity measures in real-world scenarios.
Cloud Computing Security 2
At the end of this course, students should be able to:
  • Acquire comprehensive knowledge and understanding of the cloud landscape, including architectural principles, techniques, design patterns, and real-world best practices for both cloud service providers and consumers.
  • Grasp the essentials of delivering secure cloud-based services, encompassing cloud security architecture, guiding security design principles, industry standards, applied technologies, and regulatory compliance requirements.
  • Be equipped to design, implement, deliver, and manage secure cloud-based services, ensuring data protection and maintaining the integrity of cloud environments.
  • Be prepared to navigate the complexities of cloud security, enabling them to contribute effectively to the development and management of secure and resilient cloud infrastructures in various industry settings.

Admission Requirements

100 Level Entry Requirements for BSc. in Cybersecurity

Here’s what you need to study for a bachelor’s programme at Miva Open University

A copy of your O’Level result

The result must include a minimum of five credits in the following subjects in not more than two sittings:

Please note that submission of Joint Admissions and Matriculation Board (JAMB) results is not mandatory at this stage. However, upon admission to the university, the provided results will be thoroughly verified for authenticity and compliance with the stated criteria, including JAMB Regularisation.

Direct Entry Admission Requirements for BSc. in Cybersecurity

Here’s what you need to study for a bachelor’s programme at Miva Open University

Direct Entry Candidates must meet ‘O’ Level requirements for the programme:

Careers

Potential roles for BSc. Cybersecurity degree holders​

Career Options

The field of Cybersecurity is constantly evolving, so new and exciting career opportunities are always emerging. If you obtain a bachelor’s degree in Cybersecurity, these are possible careers for you:

Tuition

Payment Plans

Miva Open University offers a flexible payment plan for its degree programmes. You may choose to pay the year’s fee or per semester.

Tuition Per Session

Pay Per Session. No hidden charges. No additional costs.

$590

Tuition Per Semester

Pay Per Semester. No hidden charges. No additional costs.

$315