BSIT Specialization in Cyber Security & Social Computing

Empowering Minds Towards Technological Excellence

Program Aim

The Bachelor of Science in Cyber Security & Social Computing curriculum prepares students for offers the opportunity to gain cutting-edge cybersecurity knowledge and skills with a solid theoretical foundation as well as a good understanding of the social, ethical, legal, and policy aspects of cybersecurity. Students learn to design and develop trusted software systems by adopting best practices and techniques in software development, manage and protect valuable computing infrastructure and data assets in an enterprise environment, and develop next-generation cyber skills to confront emerging cyber threats. The evolution of information security into cybersecurity and its relationship to nations, organizations, society, and individuals. Exposure to multiple cybersecurity technologies, processes, and procedures; analyzing threats, vulnerabilities, and risks present; and developing appropriate strategies to mitigate potential cybersecurity issues. Applied lab to develop cyber security offensive attributes and learn how to prevent and/or mitigate threats. Today we interact with our friends and enemies, our team partners and romantic partners, and our organizations and societies, all through computational systems. How do we design these social computing systems to be effective? This course covers design patterns for social computing and crowdsourcing systems, and the foundational ideas that underpin them. Students will engage in the creation of new computationally mediated social environments.

Program Objective

The student who graduates with a major in Cyber Security & Social Computing will be able to:

  • Define computer forensics.
  • Identify the process in taking digital evidence.
  • Describe how to conduct an investigation using methods of memory, operating system, network, and email forensics.
  • Assess the different forensics tools.
  • Differentiate among different types of security attacks.
  • Describe the concept of ethical hacking. How to create content to go viral.
  • How to design for different groups.
  • How to implement effective crowdsourcing.
  • On the highest standards of computational journalism to ensure the integrity and ethical behavior of the smart systems.

Program Learning Outcomes

The program learning outcomes (PLOs) set out the academic learning, skills, and achievements that the student must reliably demonstrate before graduation.

Upon successful completion of the courses in the Cyber Security & Social Computing program, the graduating students shall:

  1. Use basic principles and technology of digital forensics, including acquisition, preservation, and recovery and investigation of the evidence stored in digital devices.
  2. Best practices of how organizations manage information risk through risk assessment practices and procedures will be conducted. Demonstrate critical thinking through effective integration of their marketing knowledge with other disciplines.
  3. Exposure to multiple cybersecurity technologies, processes, and procedures; analyzing threats, vulnerabilities, and risks present; and developing appropriate strategies to mitigate potential cybersecurity issues. Applied lab to develop cyber security offensive attributes and learn how to prevent and/or mitigate threats.
  4. Enable students to learn how to analyse harmful and malicious software in a safe way. Such analysis is the first step in a systematic approach to prevent or neutralize malware. The focus is on analysis of the advanced methods used in the manufacturing of so-called “cyber arms” and the practical countermeasures to detect and neutralize them.

Program Structure

Year Semester Block code Subjects Credits
Core Courses
Year 1 Semester 1 Block 1 LA2103 Communication Skills 4
Block 2 MG2102 Principles of Management 4
Block 3 IT2101 Fundamentals of Computers 4
Block 4 MA2101 Basic Mathematics 4
Semester 2 Block 5 IT2102 Computer Organization & Architecture 4
Block 6 MG2104 Introduction to Global Culture and Ethics 4
Block 7 IT2103 Problem Solving Using Computers and C Programming 4
Block 8 IT2104 Database Management Systems 4
Year 2 Semester 3 Block 9 IT2201 Introduction to Operating System 4
Block 10 IT2202 Introduction to Database & MYSQL 4
Block 11 IT2203 Installing, Configuring & Administration Windows Server 4
Block 12 IT2204 Introduction to Forensic Tools & Techniques 4
Semester 4 Block 13 IT2205 Introduction to Object-Oriented Programming & C++ 4
Block 14 IT2206 Installing & Configuring Wi-Fi Network 4
Block 15 IT2207 Understanding Client-Server Network 4
Block 16 IT2208 Internship 4
Year 3 Semester 5 Block 17 IT3101 Java Programming 4
Block 18 IT3102 Spread Sheet Modelling & Analysis 4
Specialization Courses
Semester 5 Block 19 CS3101 Introduction to Forensic Tools & Technique 4
Semester 6 Block 20 CS3102 Introduction to Security Technologies 4
Block 21 CS3103 Computer System Security 4
Block 22 MG2208 Research Methodology 4
Year 4 Semester 7 Block 23 CS3104 Malicious Software & Security Programming 4
Block 24 CS3105 Design of Online Communities 4
Block 25 CS3106 Computational Journalism 4
Semester 8 Block 26-28 IT3204 Project Work 20
Total Credits 120
BSc IT Cyber Security & Social Computing

Mr.Peter Nkhoma
Bachelor of Science in Information Technology

“My experience with Texila American University has been really great, it’s a wonderful experience and the lecturers are so friendly and interactive, they are always concerned about the studies of students. Texila American University has a standard education with very latest updated curriculums with concepts applicable to the current world. Latest technologies and wonderful libraries, it was always a wonderful feeling to be a student and to one day be called product of Texila American University.”

Apply Now

Please fill the form below, we will mail you the details of Tuition Fees and Scholarships of our BSC IT Cyber Security & Social Computing program.




FAQs

Menu
Share via
Copy link
Powered by Social Snap