Course Details
- Course Name : Bachelor of Science in Cyber Security
- Category : Undergraduate
- Course Duration: 4 Years
- Department : Department of Computer Science
- Tuition/ Semester (Naira): N377,500.00
About the Programme
As humankind’s reliance on information technology grows—and with it, cyber threats is becoming a growing reality for businesses and organizations across all sectors. Therefore, the need for highly trained cybersecurity professionals is becoming more critical than ever before. The Bachelor of Science in Cyber Security (B.Sc CyS) degree program is designed to prepare students to obtain knowledge for careers in cybersecurity and assurance with a focus on hands-on experience and problem solving. Additionally, students will receive instruction in leadership and management in preparation for becoming managers and directors.
The B.Sc CyS programe combines computer science foundational coursework with both theoretical work and applied experiences that will ground students in the concepts, techniques, tactics, and procedures used to compromise and secure computer systems.
The objectives of the Bachelor of Science in Cyber Security degree program are to produce graduates who can:
- Develop and apply technical strategies, tools, and techniques to secure data and information for a customer or client.
- Adhere to a high standard of ethical behavior.
- Use research in both established venues and innovative applications to expand the body of knowledge in information assurance.
- Apply the principles of critical thinking to creatively and systematically solve the problems and meet the challenges of the ever-changing environments of cybersecurity.
- Mastery of the skills necessary to move into leadership roles in companies, agencies, divisions, or departments.
on successful completion of the programme, graduates will have the ability to:
- Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
- Apply concepts of best practices in cybersecurity management to enterprise processes.
- Evaluate the computer network and information security needs of an organization.
- Assess cybersecurity risk management policies to effectively protect an organization’s critical information and assets.
- Apply security control principles in the construction of cybersecurity solutions.
- Demonstrate the ability to securely administer a Windows and Linux system using security automation tools and techniques.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Unified Tertiary Matriculation Examination (UTME) Admission
- The entry requirements shall be at least credit level passes in five subjects including English Language, Mathematics, Physics to form the core subjects with credit in any other two relevant science subjects, at the West African Senior School Certificate (WASSCE) or its equivalent (NECO, NABTEC, SSCE, GCE), or its equivalent.
- In addition, an acceptable pass in the Unified Tertiary Matriculation Examination (UTME), with relevant subject combination is required for Admission into 100 Level.
Direct Entry Admission
- Candidates with two A level passes (graded A-E) at the GCE/IJMB Advanced Level in relevant subjects (Chemistry, Mathematics and Physics) may be admitted into 200-level. This is in addition to fulfilling the requirement of a minimum of credit level passes in five relevant subjects at SSCE or WASCE/GCE ‘O’ Level, or
- National Diploma in Computer Science with at least an Upper Credit from a recognised University or Polytechnic, or
- NCE in Computer Science/ Maths; Computer Science/Physics; Maths/Physics with at least Credit Pass in both.
Curriculum Structure
100 Level
Course Code | Course Title | Unit(s) | Status | LH | PH |
Semester 1 | |||||
COS 101 | Introduction to Computing Sciences | 3 | C | 30 | 45 |
GST 111 | Communication in English | 2 | C | 15 | 45 |
MTH 101 | Elementary Mathematics I | 2 | C | 30 | 0 |
NUM-COS 103 | Ethical and Social Issues in Information Systems | 2 | R | 30 | 0 |
NUM-IFT 103 | Fundamental of Computer Networking | 2 | R | 30 | 0 |
PHY 101 | General Physics I | 2 | C | 30 | 0 |
PHY 107 | General Practical Physics I | 1 | C | 0 | 45 |
STA 111 | Descriptive Statistics | 3 | C | 45 | 0 |
Sub-total | 17 | 0 | 210 | 135 | |
Semester 2 | |||||
COS 102 | Problem Solving | 3 | C | 30 | 45 |
GST 112 | Nigerian Peoples and Culture | 2 | C | 30 | 0 |
MTH 102 | Elementary Mathematics II | 2 | C | 30 | 0 |
NUM-COS 104 | Computer Applications and Systems | 2 | C | 30 | 0 |
NUM-GEN 102 | Community Engagement and Social Development | 3 | R | 15 | 90 |
PHY 102 | General Physics II | 2 | C | 30 | 0 |
PHY 108 | General Practical Physics II | 1 | C | 0 | 45 |
Sub-total | 15 | 165 | 180 | ||
Total | 32 | 375 | 315 |
200 Level
Course Code | Course Title | Unit(s) | Status | LH | PH |
Semester 3 | |||||
COS 201 | Computer Programming I | 3 | C | 30 | 45 |
CYB 201 | Introduction to Cybersecurity and Strategy | 2 | C | 30 | 0 |
CYB 203 | Cybercrime, Law and Countermeasures | 2 | C | 30 | 0 |
ENT 211 | Entrepreneurship and Innovation | 2 | C | 15 | 45 |
NUM-CYB 205 | Introduction to Linux Command Line | 3 | R | 30 | 45 |
NUM-CYB 207 | Introduction to Cryptography | 2 | R | 30 | 0 |
NUM-IFT 201 | Foundations of Computing | 2 | C | 30 | 0 |
SEN 201 | Introduction to Software Engineering | 2 | C | 30 | 0 |
Sub-total | 18 | 225 | 135 | ||
Semester 4 | |||||
COS 202 | Computer Programming II | 3 | C | 30 | 45 |
NUM-CYB 202 | Cryptography Theory | 3 | R | 30 | 45 |
NUM-CYB 204 | Computer Networks Security | 3 | R | 30 | 45 |
CYB 299 | SIWES I | 3 | C | 0 | 135 |
GST 212 | Philosophy, Logic and Human Existence | 2 | C | 30 | 0 |
INS 204 | Systems Analysis and Design | 3 | C | 30 | 45 |
Sub-total | 17 | 150 | 315 | ||
Total | 35 | 375 | 450 |
300 Level
Course Code | Course Title | Unit(s) | Status | LH | PH |
Semester 5 | |||||
CSC 309 | Artificial Intelligence | 2 | C | 15 | 45 |
CYB 301 | Cryptography Techniques, Algorithms and Applications | 2 | C | 15 | 45 |
CYB 303 | Cybersecurity Risks Analysis, Challenges and Mitigation | 2 | C | 30 | 0 |
CYB 305 | Digital Forensics and Investigation Methods | 2 | C | 15 | 45 |
NUM-CYB 313 | Cybersecurity Management and Incident Response | 2 | R | 15 | 45 |
NUM- CYB 309 | Cybersecurity Management and Leadership | 3 | R | 30 | 45 |
NUM-CYB 307 | Internet of Things (IoT) Security | 3 | R | 30 | 45 |
Sub-total | 16 | 150 | 270 | ||
Semester 6 | |||||
NUM-CYB 310 | Web Python Programming | 3 | R | 30 | 45 |
CYB 302 | Biometrics Security | 2 | C | 15 | 45 |
CYB 304 | Information and Big Data Security | 2 | C | 15 | 45 |
CYB 322 | Cybersecurity Innovation and Entrepreneurship | 2 | C | 15 | 45 |
CYB 399 | SIWES II | 3 | C | 0 | 135 |
ENT 312 | Venture Creation | 2 | C | 15 | 45 |
GST 312 | Peace and Conflict Resolution | 2 | C | 30 | 0 |
NUM-CYB 306 | Web Security and Penetration Testing | 3 | E | 30 | 45 |
Sub-total | 19 | 150 | 405 | ||
Total | 35 | 300 | 675 |
400 Level
Course Code | Course Title | Unit(s) | Status | LH | PH |
Semester 7 | |||||
CYB 409 | Research Methodology and Technical Report Writing | 3 | C | 45 | 0 |
CYB 401 | Systems Vulnerability Assessment and Testing | 2 | C | 15 | 45 |
CYB 403 | Cyber Threat Intelligence and Cyber Conflict | 2 | C | 30 | 0 |
CYB 405 | Ethical Hacking and Reverse Engineering | 2 | C | 15 | 45 |
CYB 497 | Final Year Project I | 3 | C | 0 | 135 |
NUM-CYB 407 | Cybersecurity Project Management Development | 3 | R | 30 | 45 |
Sub-total | 15 | 135 | 270 | ||
Semester 8 | |||||
CYB 402 | Steganography-Access Methods and Data Hiding | 2 | C | 15 | 45 |
CYB 404 | Cloud Computing Security | 2 | C | 30 | 0 |
CYB 406 | Deep and Dark Web Security | 2 | C | 15 | 45 |
CYB 498 | Final Year Project II | 3 | C | 0 | 135 |
NUM-CSC 408 | Operating System Security | 3 | E | 30 | 45 |
NUM-CYB 412 | Emerging Trends in Cyber Security | 3 | C | 45 | 0 |
Sub-total | 15 | 135 | 270 | ||
Total | 30 | 270 | 540 |