Program Aim
The Bachelor of Science in Cyber Security & Social Computing curriculum prepares students for offers the opportunity to gain cutting-edge cybersecurity knowledge and skills with a solid theoretical foundation as well as a good understanding of the social, ethical, legal, and policy aspects of cybersecurity. Students learn to design and develop trusted software systems by adopting best practices and techniques in software development, manage and protect valuable computing infrastructure and data assets in an enterprise environment, and develop next-generation cyber skills to confront emerging cyber threats. The evolution of information security into cybersecurity and its relationship to nations, organizations, society, and individuals. Exposure to multiple cybersecurity technologies, processes, and procedures; analyzing threats, vulnerabilities, and risks present; and developing appropriate strategies to mitigate potential cybersecurity issues. Applied lab to develop cyber security offensive attributes and learn how to prevent and/or mitigate threats. Today we interact with our friends and enemies, our team partners and romantic partners, and our organizations and societies, all through computational systems. How do we design these social computing systems to be effective? This course covers design patterns for social computing and crowdsourcing systems, and the foundational ideas that underpin them. Students will engage in the creation of new computationally mediated social environments.
Program Objective
The student who graduates with a major in Cyber Security & Social Computing will be able to:
- Define computer forensics.
- Identify the process in taking digital evidence.
- Describe how to conduct an investigation using methods of memory, operating system, network, and email forensics.
- Assess the different forensics tools.
- Differentiate among different types of security attacks.
- Describe the concept of ethical hacking. How to create content to go viral.
- How to design for different groups.
- How to implement effective crowdsourcing.
- On the highest standards of computational journalism to ensure the integrity and ethical behavior of the smart systems.
Program Learning Outcomes
The program learning outcomes (PLOs) set out the academic learning, skills, and achievements that the student must reliably demonstrate before graduation.
Upon successful completion of the courses in the Cyber Security & Social Computing program, the graduating students shall:
- Use basic principles and technology of digital forensics, including acquisition, preservation, and recovery and investigation of the evidence stored in digital devices.
- Best practices of how organizations manage information risk through risk assessment practices and procedures will be conducted. Demonstrate critical thinking through effective integration of their marketing knowledge with other disciplines.
- Exposure to multiple cybersecurity technologies, processes, and procedures; analyzing threats, vulnerabilities, and risks present; and developing appropriate strategies to mitigate potential cybersecurity issues. Applied lab to develop cyber security offensive attributes and learn how to prevent and/or mitigate threats.
- Enable students to learn how to analyse harmful and malicious software in a safe way. Such analysis is the first step in a systematic approach to prevent or neutralize malware. The focus is on analysis of the advanced methods used in the manufacturing of so-called “cyber arms” and the practical countermeasures to detect and neutralize them.
Program Structure
Year | Semester | Block | code | Subjects | Credits |
Core Courses | |||||
Year 1 | Semester 1 | Block 1 | LA2103 | Communication Skills | 4 |
Block 2 | MG2102 | Principles of Management | 4 | ||
Block 3 | IT2101 | Fundamentals of Computers | 4 | ||
Block 4 | MA2101 | Basic Mathematics | 4 | ||
Semester 2 | Block 5 | IT2102 | Computer Organization & Architecture | 4 | |
Block 6 | MG2104 | Introduction to Global Culture and Ethics | 4 | ||
Block 7 | IT2103 | Problem Solving Using Computers and C Programming | 4 | ||
Block 8 | IT2104 | Database Management Systems | 4 | ||
Year 2 | Semester 3 | Block 9 | IT2201 | Introduction to Operating System | 4 |
Block 10 | IT2202 | Introduction to Database & MYSQL | 4 | ||
Block 11 | IT2203 | Installing, Configuring & Administration Windows Server | 4 | ||
Block 12 | IT2204 | Introduction to Forensic Tools & Techniques | 4 | ||
Semester 4 | Block 13 | IT2205 | Introduction to Object-Oriented Programming & C++ | 4 | |
Block 14 | IT2206 | Installing & Configuring Wi-Fi Network | 4 | ||
Block 15 | IT2207 | Understanding Client-Server Network | 4 | ||
Block 16 | IT2208 | Internship | 4 | ||
Year 3 | Semester 5 | Block 17 | IT3101 | Java Programming | 4 |
Block 18 | IT3102 | Spread Sheet Modelling & Analysis | 4 | ||
Specialization Courses | |||||
Semester 5 | Block 19 | CS3101 | Introduction to Forensic Tools & Technique | 4 | |
Semester 6 | Block 20 | CS3102 | Introduction to Security Technologies | 4 | |
Block 21 | CS3103 | Computer System Security | 4 | ||
Block 22 | MG2208 | Research Methodology | 4 | ||
Year 4 | Semester 7 | Block 23 | CS3104 | Malicious Software & Security Programming | 4 |
Block 24 | CS3105 | Design of Online Communities | 4 | ||
Block 25 | CS3106 | Computational Journalism | 4 | ||
Semester 8 | Block 26-28 | IT3204 | Project Work | 20 | |
Total Credits | 120 |
Mr.Peter Nkhoma
Bachelor of Science in Information Technology
“My experience with Texila American University has been really great, it’s a wonderful experience and the lecturers are so friendly and interactive, they are always concerned about the studies of students. Texila American University has a standard education with very latest updated curriculums with concepts applicable to the current world. Latest technologies and wonderful libraries, it was always a wonderful feeling to be a student and to one day be called product of Texila American University.”
Apply Now
Please fill the form below, we will mail you the details of Tuition Fees and Scholarships of our BSC IT Cyber Security & Social Computing program.
FAQs
The Bachelor of Science in Information Technology – Cyber Security and Social Computing program at TAU Guyana is an undergraduate degree program designed to equip students with the knowledge and skills necessary to protect computer systems, networks, and data from cyber threats while also exploring the impact of computing on social interactions.
Admission requirements typically include a high school diploma or equivalent, academic transcripts, letters of recommendation, a statement of purpose, and sometimes standardized test scores like the SAT or ACT. Proficiency in computer science, cybersecurity, or related subjects is also beneficial.
Graduates can pursue various career paths in cybersecurity, social computing, information security analysis, digital forensics, risk assessment, security consulting, incident response, security policy development, and cybersecurity management roles in industries such as IT, government agencies, finance, healthcare, and telecommunications.
The better degree depends on individual interests and career goals. Information Technology offers a broad foundation in IT systems, while Cybersecurity focuses specifically on protecting digital assets from cyber threats. Both fields offer rewarding career opportunities with high demand, so choosing the one aligned with your interests and strengths is crucial.
The purpose of social computing is to facilitate social interactions, collaboration, and information sharing through digital platforms, enabling individuals and groups to connect, communicate, and collaborate in virtual spaces.
Yes, cybersecurity often requires coding skills, particularly for tasks like developing security protocols, analyzing malware, and implementing security measures to protect networks and systems from cyber threats. Understanding programming languages like Python, Java, or C++ is beneficial for cybersecurity professionals.