Bachelor in Cyber Security

Welcome!

Overview

At Caplora International College, you can study the degree either online or on campus. With a degree in Cyber Security, you will trained to deal with the architecture, programming and maintenance of security systems. You will also gain knowledge in incident response, digital forensics, penetration testing and reverse engineering– to understand the perspective of cyber criminals, and be in a position to protect the firm against them.

Program Learning Outcomes

Career Opportunities

At Caplora International College, you can study the degree either online or on campus. With a degree in Cyber Security, you’ll help firms better navigate through the ever evolving technological trends. You will be familiar with the complexity of security measures and be aware of industry specific topics. You’ll gain sufficient knowledge to create security concepts and carry out relevant tests, and to defend against cyber attacks using software and system architecture.

The student can use the skills acquired to start his own project as an entrepreneur; work in the IT department or system architecture team; in forensics, auditing or as a cyber incident responder.

Programme

With a degree in Bachelors in Cyber Security, the graduate is empowered to perform in diverse fields.

Knowledge acquired in the Cyber Security program is instrumental in helping the IT Security Consultant defend valuable data and create systems to prevent attacks of customer data. He also develops robust security strategies, strengthen companies’ resilience to cyber threats and tests existing defense strategies with the aim of strengthening and offering solutions.

Knowledge acquired in the Cyber Security program is instrumental for the Ethical Hacker/Pentester in honing their hacking skills to prevent attacks, and in seeking out breaches in firms’ security protocols.

Knowledge acquired in the Cyber Security program is instrumental for the System/Network/Firewall Administrator in  strengthening the security protocols throughout entire networks by coordinating and managing network and security projects. He also works to optimize IT infrastructure solutions.

Semester 1CreditsNumber
Operating Systems, Computer Networks, and Distributed Systems5CY.S 101
Introduction to Data Protection and IT Security5CY.S 102
Mathematics: Analysis5CY.S 103
Introduction to Academic Work5CY.S 104
Introduction to Programming with Python5CY.S 105
Statistics – Probability and Descriptive Statistics5CY.S 106
Semester 2CreditsNumber
Object-Oriented Programming with Java5CY.S 107
Mathematics: Linear Algebra5CY.S 108
Collaborative Work5CY.S 109
Introduction to Network Forensics5CY.S 110
Requirements Engineering5CY.S 111
System Pentesting Basics5CY.S 112
Semester 3CreditsNumber
Intercultural and Ethical Decision-Making5CY.S 201
Introduction to the Internet of Things5CY.S 202
Algorithms, Data Structures and Programming Languages5CY.S 203
Theoretical Computer Sciences and Mathematical Logic5CY.S 204
IT Project Management5CY.S 205
DevSecOps and Common Software Weaknesses5CY.S 206
Semester 4CreditsNumber
IT Service Management5CY.S 207
Cryptography5CY.S 208
IT Law5CY.S 209
Host and Software Forensics5CY.S 210
Artificial Intelligence5CY.S 211
Information Security Standards5CY.S 212
Semester 5CreditsNumber
Seminar: Current Topics in Computer Science5CY.S 301
Advanced Data Analysis5CY.S 302
Project: Data Analysis5CY.S 303
Cloud Computing5CY.S 304
Elective A10 
Semester 6CreditsNumber
Elective B10 
Elective C10 
Bachelor Thesis & Colloquium10 
Total for the entire period of study180 
Elective ACreditsNumber
IT Security Consulting10 
Social Engineering10 
Host Forensics10 
DevSecOps10 
Security in Complex Networks10 
Network Forensics10 
Electives BCreditsNumber
Business Intelligence10 
Future Threats10 
Cloud Security10 
Pentesting10 
Industrial Systems Technology10 
Cyber Threat Intelligence10 
Mobile Threats10 
Elective CCreditsNumber
IT Security Consulting10 
Social Engineering10 
Host Forensics10 
DevSecOps10 
Security in Complex Networks10 
Network Forensics10 
Business Intelligence10 
Future Threats10 
Cloud Security10 
Pentesting10 
Industrial Systems Technology10 
Cyber Threat Intelligence10 
Mobile Threats10 
Supply Chain Management10 
Smart Factory10 
Data Structures and Java Class Library10 
Mobile Software Engineering10 
Studium Generale10 

Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.

After you submit your application, an admissions representative will contact you and will help you to complete the process.

Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.

FORM

Are you ready to take the next step toward your future career?