Overview
Recent developments in computing, network technologies, internet, and cloud technologies have generated the need for reliability and secure exchange of digital information that are vital to most human activities such as banking, medicine, infrastructure management and elections. As the use of information technology expands, so are the potential consequences of cyber-attacks, and the need for a skilled workforce to prevent and defend against them.
However, the pool of available talent to build and certify applications designed to withstand attacks, diagnose and prevent security intrusions is inadequate to meet the growing needs all over the world. Government agencies, business organisations, industries and military are
scrambling to find qualified professionals to safeguard their systems, businesses and
infrastructures. The focus of this programme is to equip students with sufficient knowledge, and skills to minimise and prevent cybersecurity threats and incidents.
Students are also equipped with demonstrable abilities to gather, analyse, and present evidence of any cybersecurity bridges in organisation in a professional way. The graduates of this programme will understand the impact of cybercrime on business and the public and be able to identify and implement specific security practices, features and techniques to enhance the security of computers, computer
based systems and cyberspace.
Philosophy
The philosophy of the programme is to build capacity and develop human capital in the field of cybersecurity, to safeguard business transactions, corporate assets, critical infrastructure and all cyber operations in cyberspace, nationally and globally.
Objectives
The objectives are to:
21st Century Skills
Cybersecurity students will be required to have the following 21st century skills:
100 Level
Course Code | Course Title | Units | Status | LH | PH |
---|---|---|---|---|---|
GST 111 | Communication in English | 2 | C | 15 | 45 |
GST 112 | Nigerian Peoples and Culture | 2 | C | 30 | 0 |
MTH 101 | Elementary Mathematics I | 2 | C | 30 | 0 |
MTH 102 | Elementary Mathematics II | 2 | C | 30 | 0 |
PHY 101 | General Physics I | 2 | C | 30 | 0 |
PHY 102 | General Physics II | 2 | C | 30 | 0 |
PHY 107 | General Practical Physics I | 1 | C | 0 | 45 |
PHY 108 | General Practical Physics II | 1 | C | 0 | 45 |
STA 111 | Descriptive Statistics | 3 | C | 45 | 0 |
COS 101 | Introduction to Computing Sciences | 3 | C | 30 | 45 |
COS 102 | Problem Solving | 3 | C | 30 | 45 |
TOTAL | 23 |
200 Level
Course Code | Course Title | Units | Status | LH | PH |
---|---|---|---|---|---|
GST 212 | Philosophy, Logic and Human Existence | 2 | C | 30 | 0 |
ENT 211 | Entrepreneurship and Innovation | 2 | C | 15 | 45 |
COS 201 | Computer Programming I | 3 | C | 30 | 45 |
COS 202 | Computer Programming II | 3 | C | 30 | 45 |
CYB 201 | Introduction to Cybersecurity and Strategy | 2 | C | 30 | 0 |
CYB 203 | Cybercrime, Law and Countermeasures | 2 | C | 30 | 0 |
CYB 299 | SIWES I | 3 | C | 0 | 135 |
INS 204 | Systems Analysis and Design | 3 | C | 30 | 45 |
SEN 201 | Introduction to Software Engineering | 2 | C | 30 | 0 |
TOTAL | 22 |
NOTE: ***SIWES I and II will take place during long vacations of 200 Level and 300 Level.
300 Level
Course Code | Course Title | Units | Status | LH | PH |
---|---|---|---|---|---|
GST 312 | Peace and Conflict Resolution | 2 | C | 30 | 0 |
ENT 312 | Venture Creation | 2 | C | 15 | 45 |
CYB 301 | Cryptography Techniques, Algorithms and Applications | 2 | C | 15 | 45 |
CYB 302 | Biometrics Security | 2 | C | 15 | 45 |
CYB 303 | Cybersecurity Risks Analysis, Challenges and Mitigation | 2 | C | 30 | 0 |
CYB 304 | Information and Big Data Security | 2 | C | 15 | 45 |
CYB 305 | Digital Forensics and Investigation Methods | 2 | C | 15 | 45 |
CYB 322 | Cybersecurity Innovation and New Technologies | 2 | C | 15 | 45 |
CYB 399 | SIWES II | 3 | C | 0 | 135 |
CSC 309 | Artificial Intelligence | 2 | C | 15 | 45 |
TOTAL | 21 |
400 Level
Course Code | Course Title | Units | Status | LH | PH |
---|---|---|---|---|---|
COS 409 | Research Methodology and Technical Report Writing | 3 | C | 45 | 0 |
CYB 401 | Systems Vulnerability Assessment and Testing | 2 | C | 15 | 45 |
CYB 402 | Steganography-Access Methods and Data Hiding | 2 | C | 15 | 45 |
CYB 403 | Cyber Threat Intelligence and Cyber Conflict | 2 | C | 30 | 0 |
CYB 404 | Cloud Computing Security | 2 | C | 30 | 0 |
CYB 405 | Ethical Hacking and Reverse Engineering | 2 | C | 15 | 45 |
CYB 406 | Deep and Dark Web Security | 2 | C | 15 | 45 |
CYB 497 | Final Year Project I | 3 | C | 0 | 135 |
CYB 498 | Final Year Project II | 3 | C | 0 | 135 |
TOTAL | 21 |