Bachelor of Science in Cyber Security and Digital Forensics
Duration: 4 Years
Start Date:
Cost: KES 105,000 per year
The Bachelor of Science in Cyber Security and Digital Forensics program is meticulously designed to equip learners with the knowledge, skills, and attitudes required to address the ever-evolving landscape of cyber threats. Its primary goal is to provide comprehensive protection to digital, computer, and online assets of organizations. The curriculum remains adaptable and responsive to emerging trends in cyber security and digital forensics, guided by a commitment to open learning and the removal of barriers that impede knowledge dissemination.
Cyber Security Career Projections:
Graduates of this program can pursue various rewarding careers, including but not limited to:
Kindly ask for a return call from our proficient OUK course consultants to have your inquiries addressed.
Upon successful completion of this program, learners will demonstrate the ability to:
Programme Learning Outcomes
By the end of this programme, the student will be able to:
Total credit hours and course units required for graduation
Total credit hours and course units required for graduation The programme shall be offered in 8 semesters. The minimum total courses for the programme are 48. The minimum total course credit hours required for graduation is 144 hours.
A candidate must satisfy the general University admission criteria for undergraduate programmes.
Credit Accumulation
Regulations on credit accumulation, including possible pathways, shall be in line with the provisions of Universities Regulations, Universities Standards and Guidelines, and general national trends.
Credit Transfer
A candidate may be allowed to transfer credits from part or all of the coursework requirements if the senate is satisfied that the candidate has completed and passed the prescribed courses(s) at the undergraduate level from accredited institutions and programs recognized by the senate. Any course considered for credit transfer must have been completed at an equivalent level and in an equivalent institution, with a minimum grade of 50%.
Guidelines For Transfer Of Credit/ Exemptions
A candidate may be exempted from degree level courses if the Senate is satisfied that the candidate has completed a similar course at the Diploma level from a recognized institution. The general rules governing credit transfers and exemptions will apply. In addition, the following rules apply:
Student Assessment at programme level
The course will be assessed through:
The projects will be assessed through e- portfolios. Students will present their work to an evaluation panel. All students’ work will be checked for plagiarism. The students should be logged in with the university provided login details in order to carry out any task.
Countinous Assessment
Tests/Tasks: 50%
Examination 50%
FIRST SEMESTER | SECOND SEMESTER |
Introduction to Computer Systems | Computer Networks |
Database systems | Computer Architecture |
Differential and Integral Calculus | Physics for Computing Systems and Digital Electronics |
Introduction to Programming | Psychology |
Digital Markets Architecture | Mathematics for cybersecurity and digital forensics |
Introduction to Cybersecurity and Digital Forensics | Discrete Mathematics |
IoT and Security | Assembly Language |
FIRST SEMESTER | SECOND SEMESTER |
Data Structures and Algorithms | Software Engineering |
Artificial Intelligence | Computer Forensics Investigations |
Operating Systems | Digital Forensics Tools and Techniques |
Probability and Statistics | Machine Learning |
Web and Services Programming | Human Factors in Cybersecurity and related case studies |
Philosophy | Programming Project (Equivalent to Two Courses) |
Object Oriented Programming |
FIRST SEMESTER | SECOND SEMESTER |
Computer Network Security | Cryptography |
Penetration Testing and Ethical Hacking | Malware Detection and Analysis |
Distributed Systems | Information Security and Risk Management |
Intrusion Detection and Prevention | Web Security and Privacy |
Systems Forensics | Distributed Databases |
Cloud Computing | Industrial Attachment Network Design Implementation and Management |
Database and Data Security |
FIRST SEMESTER | SECOND SEMESTER |
Information Systems Control and Audit | Security Analytics and Visualization |
Secure Software Development | Advanced Information Security Management |
Embedded Systems and Mobile OS Programming | Emerging Cybersecurity Technologies and Digital Forensics Bootcamps |
Cybersecurity Policy | Final Year Project |
Cybersecurity Law and Ethics | Elective 2 |
Elective 1 |