Recent developments in computing, network technologies, internet, and cloud technologies have generated the need for reliability and secure exchange of digital information that are vital to most human activities such as banking, medicine, infrastructure management and elections. As the use of information technology expands, so are the potential consequences of cyber-attacks, and the need for a skilled workforce to prevent and defend against them.
However, the pool of available talent to build and certify applications designed to withstand attacks, diagnose and prevent security intrusions is inadequate to meet the growing needs all over the world. Government agencies, business organisations, industries and military are
scrambling to find qualified professionals to safeguard their systems, businesses and
infrastructures. The focus of this programme is to equip students with sufficient knowledge, and skills to minimise and prevent cybersecurity threats and incidents.
Students are also equipped with demonstrable abilities to gather, analyse, and present evidence of any cybersecurity bridges in organisation in a professional way. The graduates of this programme will understand the impact of cybercrime on business and the public and be able to identify and implement specific security practices, features and techniques to enhance the security of computers, computer
based systems and cyberspace.
The philosophy of the programme is to build capacity and develop human capital in the field of cybersecurity, to safeguard business transactions, corporate assets, critical infrastructure and all cyber operations in cyberspace, nationally and globally.
The objectives of the programme are to:
Cybersecurity skills are hard skills that are required in all jobs. The employability skills are grouped into soft and hard skills along with technical and implementation skills. Graduates of Cybersecurity will have:
Cybersecurity students will be required to have the following 21st century skills:
The uniqueness of the cybersecurity programme is the introduction of big data analytics, cyber threat intelligence and cyber conflict, deep and dark web security, cyber threat hunting, 56monitors and controllers, artificial intelligence cyber defence application and surveillance in cyber defence operations.
4 Year Degree Programme
In addition to appropriate UTME-Score, a candidate must possess five Senior Secondary Certificate (SSC)-credits passes including English Language, Mathematics, Physics and any other relevant Science subjects in not more than two sittings.
3 Year Degree Programme:
Direct Entry
A minimum of a credit at the University/National Diploma or NCE with other five Senior Secondary Certificate (SSC) credit passes in relevant Science subjects three of which must be in English Language, Mathematics, Physics.
Minimum duration
The minimum duration of the Cybersecurity degree programme is four academic sessions for UTME students, however, it is three academic sessions for candidates admitted to the 200 Level.
To be eligible for the award of the Bachelor degree in Cybersecurity, a student must have:
Course Code | Course Title | Units | Status | LH | PH |
---|---|---|---|---|---|
GST 111 | Communication in English |
2 | C | 15 | 45 |
GST 112 | Nigerian Peoples and Culture |
2 | C | 30 | 0 |
MTH 101 | Elementary Mathematics I |
2 | C | 30 | 0 |
MTH 102 | Elementary Mathematics II |
2 | C | 30 | 0 |
PHY 101 | General Physics I |
2 | C | 30 | 0 |
PHY 102 | General Physics II |
2 | C | 30 | 0 |
PHY 107 | General Practical Physics I |
1 | C | 0 | 45 |
PHY 108 | General Practical Physics II |
1 | C | 0 | 45 |
STA 111 | Descriptive Statistics |
3 | C | 45 | 0 |
COS 101 | Introduction to Computing Sciences |
3 | C | 30 | 45 |
COS 102 | Problem Solving |
3 | C | 30 | 45 |
TOTAL | 23 |
Course Code | Course Title | Units | Status | LH | PH |
---|---|---|---|---|---|
GST 212 | Philosophy, Logic and Human Existence | 2 | C | 30 | 0 |
ENT 211 | Entrepreneurship and Innovation | 2 | C | 15 | 45 |
COS 201 | Computer Programming I | 3 | C | 30 | 45 |
COS 202 | Computer Programming II | 3 | C | 30 | 45 |
CYB 201 | Introduction to Cybersecurity and Strategy | 2 | C | 30 | 0 |
CYB 203 | Cybercrime, Law and Countermeasures | 2 | C | 30 | 0 |
CYB 299 | SIWES I | 3 | C | 0 | 135 |
INS 204 | Systems Analysis and Design | 3 | C | 30 | 45 |
SEN 201 | Introduction to Software Engineering | 2 | C | 30 | 0 |
TOTAL | 22 |
NOTE: ***SIWES I and II will take place during long vacations of 200 Level and 300 Level.
Course Code | Course Title | Units | Status | LH | PH |
---|---|---|---|---|---|
GST 312 | Peace and Conflict Resolution | 2 | C | 30 | 0 |
ENT 312 | Venture Creation | 2 | C | 15 | 45 |
CYB 301 | Cryptography Techniques, Algorithms and Applications | 2 | C | 15 | 45 |
CYB 302 | Biometrics Security | 2 | C | 15 | 45 |
CYB 303 | Cybersecurity Risks Analysis, Challenges and Mitigation | 2 | C | 30 | 0 |
CYB 304 | Information and Big Data Security | 2 | C | 15 | 45 |
CYB 305 | Digital Forensics and Investigation Methods | 2 | C | 15 | 45 |
CYB 322 | Cybersecurity Innovation and New Technologies | 2 | C | 15 | 45 |
CYB 399 | SIWES II | 3 | C | 0 | 135 |
CSC 309 | Artificial Intelligence | 2 | C | 15 | 45 |
TOTAL | 21 |
Course Code | Course Title | Units | Status | LH | PH |
---|---|---|---|---|---|
COS 409 | Research Methodology and Technical Report Writing | 3 | C | 45 | 0 |
CYB 401 | Systems Vulnerability Assessment and Testing | 2 | C | 15 | 45 |
CYB 402 | Steganography-Access Methods and Data Hiding | 2 | C | 15 | 45 |
CYB 403 | Cyber Threat Intelligence and Cyber Conflict | 2 | C | 30 | 0 |
CYB 404 | Cloud Computing Security | 2 | C | 30 | 0 |
CYB 405 | Ethical Hacking and Reverse Engineering | 2 | C | 15 | 45 |
CYB 406 | Deep and Dark Web Security | 2 | C | 15 | 45 |
CYB 497 | Final Year Project I | 3 | C | 0 | 135 |
CYB 498 | Final Year Project II | 3 | C | 0 | 135 |
TOTAL | 21 |