Bachelor of Science in Cyber Security (BSc)

Speak to an Advisor

Course Overview

Course Level


Course Duration

36 Months (full-time), 48 Months (part-time i) and 72 Months (part-time ii)


Full Time or Part Time

Learning Style

Remote • Face To Face

Cyber security is an area of expertise in great demand. This study programme will help you become a specialist trained to prevent and protect against cyberattacks in all areas of IT.

In this practice-oriented Bachelor in Cyber Security programme, you will be trained as a threat hunter with leadership potential. You will acquire the latest knowledge in the field of cyber security and deal with the architecture, programming and maintenance of security systems. In addition to incident response and digital forensics, you will learn about aspects of penetration testing and reverse engineering in order to understand the perspective of cyber criminals and protect against them.

During your studies, you will acquire key expertise. For example in:

  • Network Forensics;
  • Requirements Engineering;
  • System Pentesting;
  • DevSecOps and Common Software Weaknesses;
  • Cryptography;
  • IT Law;
  • Artificial Intelligence;
  • Software Forensics.

Specialisation Options in Semester 5 & 6:

In Semester 5 and 6, you'll select three specialisations.

  • I.T Security Consulting - Learn how to evaluate and grade existing IT infrastructure, and how to develop unique protection protocols for the design of new IT networks.
  • Social Engineering - In this module, you’ll be introduced to social engineering for IT networks. Get acquainted with big data fusion and machine learning implementations, and how they can help you curb internal security threats.
  • Host Forensics - Learn how to use malware analysis methods in real-life situations. Understand how to read Sandbox log files, and recognise any potential risks they indicate for your system.
  • DEVSECOPS - Focus on the unique challenges of protecting business software development. DevSecOps professionals stand at the intersection between cyber security teams and DevOps teams. In this specialisation, you’ll explore the world of agile software development and ‘no frills software engineering’, the potential risks that stem from it, and how best to plan a defence against them. Building on that, you’ll develop your skills in DevOps threat assessment.
  • Security in Complex Networks - How do IT architects manage IT infrastructure? How do they design the appropriate organizational IT security approach? This specialisation offers the answers to these questions. Experiment with practical IT architecture management tasks, based on models and expert protocols, and build your own IT security frame for digital networks. 
  • Network Forensics - This module will give you the tools you need for understanding and working with log files.
  • Future Threats - As part of the Future Threats specialisation, examine how to generate sophisticated threat models. Gain insights about the advantages and disadvantages of different threat modelling schools of thought, and familiarise yourself with how each one of them can be discussed and applied. If you’re considering a career as an ethical hacker, then this specialisation gives you a chance to test your skills: you’ll have to think like a potential attacker, in order to predict which potential threats a system needs to plan for.  
  • Cloud Security - Stand at the cutting edge of business technology, and gain theoretical and practical knowledge of how to defend cloud-based data. Learn how to set up cloud software systems in a security optimised frame, and work on an IaC (infrastructure as code) project of your own.
  • Smart Factory - Tackle the unique engineering challenges that an autonomously operated and decentralized production facility offers. Come up with possible IT security solutions for these challenges, and gain an edge in the production management career field.

Career Prospects

Expertise in the field of cyber security is in high demand across all industries, as almost all businesses now operate based on technology.

  • IT Security Consultant
  • Pentester
  • System/Network Administrator

Learning Style

This programme is available with a full-time (36 month) or part-time (48 or 72 month) commitment. This programme is taught remotely.

Get in touch with our course advisors, let's find the right course for you! 

Course Details

Find out what you need to join the course, how it works and how it can take your career to the next level.

  • Entry Requirements

    A Levels / General Secondary School Diploma.

    Get in touch with our course advisors for further information - let's help you find the right course for your goals!

Speak to an Advisor

An advisor will be in touch personally to assist you with the course or suggest better alternatives for your goals.

Get in Touch

Tell Us a Little Bit About You

Complete this form and a course advisor will be in touch to assist you personally

Something went wrong, Please try again!
Speak to an Advisor