Bachelor in Cyber Security
Welcome!
- 4 Years / On Campus & Online
- Intakes: Jan, Apr, Jun, Oct
Overview
At Caplora International College, you can study the degree either online or on campus. With a degree in Cyber Security, you will trained to deal with the architecture, programming and maintenance of security systems. You will also gain knowledge in incident response, digital forensics, penetration testing and reverse engineering– to understand the perspective of cyber criminals, and be in a position to protect the firm against them.
Program Learning Outcomes
Career Opportunities
At Caplora International College, you can study the degree either online or on campus. With a degree in Cyber Security, you’ll help firms better navigate through the ever evolving technological trends. You will be familiar with the complexity of security measures and be aware of industry specific topics. You’ll gain sufficient knowledge to create security concepts and carry out relevant tests, and to defend against cyber attacks using software and system architecture.
The student can use the skills acquired to start his own project as an entrepreneur; work in the IT department or system architecture team; in forensics, auditing or as a cyber incident responder.
Programme
With a degree in Bachelors in Cyber Security, the graduate is empowered to perform in diverse fields.
Knowledge acquired in the Cyber Security program is instrumental in helping the IT Security Consultant defend valuable data and create systems to prevent attacks of customer data. He also develops robust security strategies, strengthen companies’ resilience to cyber threats and tests existing defense strategies with the aim of strengthening and offering solutions.
Knowledge acquired in the Cyber Security program is instrumental for the Ethical Hacker/Pentester in honing their hacking skills to prevent attacks, and in seeking out breaches in firms’ security protocols.
Knowledge acquired in the Cyber Security program is instrumental for the System/Network/Firewall Administrator in strengthening the security protocols throughout entire networks by coordinating and managing network and security projects. He also works to optimize IT infrastructure solutions.
Semester 1 | Credits | Number |
---|---|---|
Operating Systems, Computer Networks, and Distributed Systems | 5 | CY.S 101 |
Introduction to Data Protection and IT Security | 5 | CY.S 102 |
Mathematics: Analysis | 5 | CY.S 103 |
Introduction to Academic Work | 5 | CY.S 104 |
Introduction to Programming with Python | 5 | CY.S 105 |
Statistics – Probability and Descriptive Statistics | 5 | CY.S 106 |
Semester 2 | Credits | Number |
---|---|---|
Object-Oriented Programming with Java | 5 | CY.S 107 |
Mathematics: Linear Algebra | 5 | CY.S 108 |
Collaborative Work | 5 | CY.S 109 |
Introduction to Network Forensics | 5 | CY.S 110 |
Requirements Engineering | 5 | CY.S 111 |
System Pentesting Basics | 5 | CY.S 112 |
Semester 3 | Credits | Number |
---|---|---|
Intercultural and Ethical Decision-Making | 5 | CY.S 201 |
Introduction to the Internet of Things | 5 | CY.S 202 |
Algorithms, Data Structures and Programming Languages | 5 | CY.S 203 |
Theoretical Computer Sciences and Mathematical Logic | 5 | CY.S 204 |
IT Project Management | 5 | CY.S 205 |
DevSecOps and Common Software Weaknesses | 5 | CY.S 206 |
Semester 4 | Credits | Number |
---|---|---|
IT Service Management | 5 | CY.S 207 |
Cryptography | 5 | CY.S 208 |
IT Law | 5 | CY.S 209 |
Host and Software Forensics | 5 | CY.S 210 |
Artificial Intelligence | 5 | CY.S 211 |
Information Security Standards | 5 | CY.S 212 |
Semester 5 | Credits | Number |
---|---|---|
Seminar: Current Topics in Computer Science | 5 | CY.S 301 |
Advanced Data Analysis | 5 | CY.S 302 |
Project: Data Analysis | 5 | CY.S 303 |
Cloud Computing | 5 | CY.S 304 |
Elective A | 10 |
Semester 6 | Credits | Number |
---|---|---|
Elective B | 10 | |
Elective C | 10 | |
Bachelor Thesis & Colloquium | 10 | |
Total for the entire period of study | 180 |
Elective A | Credits | Number |
---|---|---|
IT Security Consulting | 10 | |
Social Engineering | 10 | |
Host Forensics | 10 | |
DevSecOps | 10 | |
Security in Complex Networks | 10 | |
Network Forensics | 10 |
Electives B | Credits | Number |
---|---|---|
Business Intelligence | 10 | |
Future Threats | 10 | |
Cloud Security | 10 | |
Pentesting | 10 | |
Industrial Systems Technology | 10 | |
Cyber Threat Intelligence | 10 | |
Mobile Threats | 10 |
Elective C | Credits | Number |
---|---|---|
IT Security Consulting | 10 | |
Social Engineering | 10 | |
Host Forensics | 10 | |
DevSecOps | 10 | |
Security in Complex Networks | 10 | |
Network Forensics | 10 | |
Business Intelligence | 10 | |
Future Threats | 10 | |
Cloud Security | 10 | |
Pentesting | 10 | |
Industrial Systems Technology | 10 | |
Cyber Threat Intelligence | 10 | |
Mobile Threats | 10 | |
Supply Chain Management | 10 | |
Smart Factory | 10 | |
Data Structures and Java Class Library | 10 | |
Mobile Software Engineering | 10 | |
Studium Generale | 10 |
How to Apply?
- You Apply
Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.
- We Connect
After you submit your application, an admissions representative will contact you and will help you to complete the process.
- You Get Ready
Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.