BSc (Hons) in Cybersecurity and Networks
Validated by The Open University, UK
In the era of Internet-Of-Everything and Cyberwarfare, the BSc in Cybersecurity and Networks answers the challenges of the accelerated reliance of the society on IT infrastructures.
The program aspires to lead formal studies in cyberspace protection and resilient networking infrastructures design. Equipped with the knowledge and skillset to face the increased adoption of cyberspace data and information assurance architectures, our graduates will be able to pursue a career and/or research in this field of IT innovation.
What You Will Study
Supported by specially designed laboratory facilities, where networks can be analyzed and investigated, the program exposes students to emerging theories, tools and methodologies, and cultivates the necessary cognitive, practical and transferable skills. You will have the opportunity to:
- Understand how networks work and communicate.
- Plan, design, implement, secure and troubleshoot wireline and wireless networks.
- Simulate cyber-attacks to wireless and wireline networks.
- Use industry standard ethical hacking and penetration testing tools to assess system security.
- Design and develop secure software and applications.
- Apply digital forensic techniques to investigate cybersecurity incidents.
The program further lays the necessary emphasis on the development of the skills, which can lead to the acquisition of industry standard professional qualifications.
Career/Graduate Study Opportunities
The aim of the program is to prepare knowledgeable graduates, who appreciate legal, ethical and professional practices, and have comprehensive understanding of the industry needs for cybersecurity and network applications. Upon successful completion of the program, you will be able to pursue a career and/or graduate studies in the wider IT sector or on focused directions in the context of cybersecurity and networks, such as network engineering, cybersecurity architecture and policy, digital forensics and incident response, penetration testing, as well as, secure software development.