Cyber Security is a professional field that covers the fundamental concepts underlying the construction of secure systems that includes Information, Hardware and Software and Networks.
Upon completion of this specialisation, students should be able to defend and/or secure computer-based systems from vulnerabilities and malicious attacks. This would help students to expand their job prospects as a Security Auditor, Security Manager, Security Solutions Specialist, Security Consultant, Security Architect, Information Security Officer, Incident Responder, Security Administrator, Penetration Tester, Vulnerability Assessor and more.
This module focuses on security, trust, policy including security life cycle; layering & distribution of security mechanisms. Students will investigate threats to networks, protection mechanisms focusing on encryption, authentication protocols, digital signatures for message integrity, secure Internet Protocols, security and mobility issues and security application programming interfaces.
This module looks into computer intrusion detection areas such as: identifying and exposing security weaknesses in an organisation and selecting the proper countermeasures, understand how hacking tools can be used to test and improve security, protect against and prevent intrusions.
This module will provide students with the knowledge and experience needed to develop secure software. Students should be able to audit source codes for security vulnerabilities, identify vulnerabilities in open and closed source third-party applications and develop proof-of-concept exploits. This module will also cover theoretical and fundamental principles of cryptography and general system security.
This module introduces students to law relating to case studies in Malaysia, and selected countries of the world; and the challenges in applying existing legislation to forensic computing. Students will also explore computer crime investigation and incident response, and forms of digital evidence.
Mobile and wireless devices today have outnumbered computers worldwide. Since mobile devices, such as smart phones, provide convenient anytime anywhere access to the Internet and the ability to make phone calls, run apps centered on our lives, they have become enticing targets for cyber criminals. This module is designed to address this growing threat to mobile and wireless devices, networks and services delivered over the mobile infrastructure.
Information Security Analyst
Information security analysts create systems to protect information networks and websites from cyberattacks and other security breaches. Their responsibilities also include researching trends in data security to anticipate problems and install systems to prevent issues before they occur. Security analysts also need strong problem-solving skills to investigate breaches, determine the causes and modify or repair security systems.
Software developers create software programs that allow users to perform specific tasks on various devices, such as computers or mobile devices. Software developers must have the technical creativity required to solve problems uniquely. They need to be fluent in computer languages that are used to write the code for programs.
Data analysis is a fast-growing field and skilled analysts are in high demand across all sectors. You will find many opportunities but you will still need to stand out and demonstrate excellent skills in order to succeed in a career as a data analyst. Data analysts identify areas to increase efficiency and automation of processes, mine and analyse large datasets, draw valid inferences and present them successfully to management using a reporting tool. Data analysts who are also skilled at finding and communicating insights can progress to leadership roles.
Applications developers translate software requirements into workable programming code and maintain and develop programs for use in business.
This specialisation is offered as an option as part of the Bachelor of Computer Science (Hons). Click below to learn more about the programme.