BSc (Hons) in Cyber Security – Asia Pacific University

Length of Study

3 years

Course Fees

Rm 78,300 + £570 (Estimated)

Location

Technology Park (TPM), Bukit Jalil, Kuala Lumpur

This programme is specifically designed to provide:

Cyber Security is an important and growing area of work for computing professionals. Any organisation that has a computer network or uses the Internet has a potential security risk and will need people with specialised skills to help protect their systems and data. You may also find yourself working for a specialist consultancy firm that provides such a service to smaller organisations. Computer systems store, process and communicate a wide variety of data. Much of this data is private and improper access to it can result in significant costs to an organisation or the person that owns the data. Securing computer systems against malicious attack or even against inadvertent damage is vital to any computer system.

This programme gives you the knowledge and skills to enable you to prevent attacks and inadvertent damage to computer systems. The first year provides a general grounding in computing skills and introduces you to the fundamental aspects of computer security. You will gain technical skills in both computer networks and computer systems that you will build on in later years. In the following years, you will develop technical skills in network security, and hacking attacks and defences as well as in biometrics and biometric based security systems. In the final year, cryptography and malicious software are covered in some detail. Practical work in the specialist modules and the final year project will involve the development of appropriate security software. As part of studying network security you will cover the CISCO networking syllabus for Cisco Certified Network Associate (CCNA) Routing and Switching and then the follow on CCNA Security syllabus. You will have an opportunity to take the industry-standard ECCouncil Ethical Hacker Certification. We have placement students in a variety of organisations, including GCHQ, Police High Tech Crime Units, Cyber Security and Digital Forensic businesses.

Admission required

We welcome applications from people with a wide variety of qualifications, skills and experience. Applications are individually assessed. However typically you will have:

  • Route 1:  Entry to Year 1 Degree
    • Successful completion of STPM with 2 full passes or equivalent with minimum CGPA of 2.0 and completion of SPM or equivalent with credit in Mathematics; or
    • Successful completion of A-Level with at least a pass in 2 subjects and successful completion of O-Level or equivalent with credit in Mathematics; or
    • Recognised Matriculation or foundation with CGPA 2.0 and credit in Mathematics at SPM Level; or
    • A qualification that SU accepts as equivalent to the above.

All students must demonstrate that they have met the equivalent of IELTS 6 either through formal English language assessment or through success in prior study at “A” level or equivalent in English.

  • Route 2: Direct Entry to Year 2 Degree
    • Successful completion of the relevant APIIT Diploma, or
    • Successful completion of study in another recognised institution with academic credits equivalent to level 4 of an honours degree in relevant subjects

 

Degree Course Structure:

Topic you will be studied:

Level 1

  • Algorithms & Data Structures in C
  • Hardware & Software Systems & Graphics
  • Introduction to Forensic Tools & Techniques
  • Introduction to Networking with LANs & WANs
  • Introduction to Security Technologies
  • Introduction to Software Development
  • Mathematics & Statistics for Computing
  • Systems and Database Analysis

Level 2

  • Computer Systems Low Level Techniques
  • Hardware & Software Systems & Networks
  • Ethical Hacking
  • Biometrics 1
  • LAN Switching and WAN Networks
  • Professional & Enterprise Development
  • Router Security Technologies
  • System Programming & Computer Control

Level 3

  • Computer Systems Security
  • Malicious Software and Security Programming
  • Image Processing
  • Group Case Study
  • Biometrics 2
  • Project: Artefact Realisation, Testing & Evaluation
  • Project: Planning, Management, Communication & Appraisal
  • Project: Research, Analysis & Artefact Design

In addition to the above, all students are also required to successfully complete four (4) General Studies modules as stipulated by the Malaysian Qualifications Agency, as well as fulfill credit requirements for Co-Curricular Activities

Teaching and Learning

Different people learn in different ways and therefore the programme utilises a range of different teaching methods and situations – lectures, problem-based tutorials, practical laboratory sessions, group-based activities, project work, virtual learning environments, seminars, workshops (skills-based) etc. – that best deliver the specific learning outcomes of the modules. In all classes emphasis is placed on active, experiential learning usually based around a case study, or specific crime/event based scenarios. Students will be actively challenged during tutorials to explain or defend a particular viewpoint/finding/analysis, as the students may in the future be expected to defend their expert witness testimony within a legal environment. The use of industry standard packages, such as Encase and Forensic Tool Kit (FTK), .XRY and Biometric hardware and software will be used with real life case studies to provide good exposure to students. With a dedicated and self-contained laboratory, with its own private internal network and containing some of the latest equipment and software, students will be able to practice and develop their practical and troubleshooting skills as required.

Learning approaches are chosen to be compatible to the method of delivery and can include: case studies, investigations, seminars, resource based learning and independent reading. A wide range of teaching, learning and assessment approaches are used and are seen as beneficial in exposing the student to diverse approaches.

The emphasis is on developing students as confident, independent learners. Students are encouraged to access a variety of materials, journals, text books, e-journals etc., as part of their independent learning. This independent learning is directed, with lecturers providing general reading lists to prepare for or follow-up classes, specific assignment reading as well as a range of formative tasks and activities. All this directed study supports and builds upon the knowledge and skills learnt in class to provide a fuller understanding of the subject.

Teaching Methods Include

Modules are normally presented through a mixture of lecture, tutorial and/or practical contact hours, these will vary depending upon the learning outcomes of the specific module, for example, more theoretical modules such as Information Systems Organisation and Management will have more lectures than tutorials. Thus it can be seen that the aim is to utilise whichever teaching and learning strategies are most appropriate to facilitate the development of the requisite knowledge, skills and abilities within the students. Each student is a partner in the learning experience, and is expected to take responsibility for his/her study. As a result the Faculty sees the role of lecturer as a learning facilitator. A resource based approach to facilitating student learning is enhanced by the availability of on-line learning facilities such as VLEs or websites. Students are encouraged to undertake independent learning to extend the material presented. The value of self-gained knowledge and understanding is emphasised, both as an essential skill/practice for life (lifelong learning) and as an expectation on computing professionals (continuing professional development). Students are given regular feedback throughout modules and are encouraged to reflect critically in order to understand their own strengths and weaknesses.

Assessment

The Cyber Security award employs an innovative range of formative and summative assessments. Typically, formative assessment is used as an aide to check students’ understanding of a specific subject or topic. The method of assessment is chosen to meet the academic content and outcomes the module is to assess. These will include individual coursework assignments, group-work assignments, presentations, demonstrations, written reports, end-of-module examinations, and oral viva.

This is to: ensure that learning outcomes are tested in the most appropriate way; reflect the sorts of materials graduates will be asked to prepare in future careers; and recognise that students have different abilities. Although the practical and skills based are the nature of the Cyber Security award, coursework, formal examinations and class-tests are also used to assess knowledge-based modules across all three levels.

All information is correct at the time of publication, but is subject to change in the interest of continuing improvement.

Leave a Reply

Your email address will not be published. Required fields are marked *