This degree aims to provide you with a deep, practical understanding of the latest security technologies, applications, and issues, ensuring you know how to put in place strong Information security and management that can cope with the vast and ever-evolving proliferation of malware and targeted cyber-attacks. The course is uniquely designed to blend a wide spectrum of state-of-the-art domains around information and network security; it will equip you with the academic and industry skills to excel in your career.
This BSc (Hons) degree will provide you with a programme of learning designed to meet your career ambitions focusing on the following educational aims: Develop your critical understanding of the cybersecurity theories, methodologies and techniques used by Information cybersecurity consultants Be able to understand and analyse multistage cyber-attacks and provide proper controls in place to mitigate their risks and impact in a holistic approach to improve cyber defence capabilities Understand information governance, risk, and compliance frameworks, standards and their implications to an Information security management system To be exposed to a wide range of pedagogical approaches to increase critical synthesis skills required to produce innovative solutions in both tactical and operational security. To gain in-depth understanding in technical aspects around network defence and offence with strong system administration elements embedded in the learning process Exhibit the ability to design, develop, test, and debug secure software using industry based software development life cycle methodologies Enhance logical thinking and be able to demonstrate a “security mind set” in both autonomous and collaborative tasks around network and systems’ defense.
One Year Top – Up. Program delivery depends on preference of the majority of the students therefore it could be Weekdays or Weekends.
Higher Diploma Entry Requirements
Minimum of one pass in three main subjects at the G.C.E (A/L) Local or London Examination obtained in one at the same sitting in any stream.
TOP-UP Entry Requirements
This course opens up a range of roles including information security specialists, network security officers/administrators/engineers, penetration testers, mobile security testers, cybersecurity operations centre specialists, incident responder network administrators/engineers and systems administrators/engineers.