Program Description

This course focuses on the practical and theoretical dimensions of cyber security across a
range of fundamental areas, such as network security and vulnerability assessment,
information security policy and governance, digital forensics, and ethical hacking. Students
will gain a solid grounding in conventional computer and network security concepts and skills.
In addition, the course is designed to meet the changing landscape of secure computing,
which involves not only computers, but also network enabled devices such as smartphones,
tablet devices, and Internet of Things (IoT).

Skills you will learn






Program Highlights

Degree Awarded
_________________________
Bachelor of Science in Cyber Security
Commencement of Session
_________________________
January 2023 (then 4 times a year; Oct, Jan, Apr or Jul)
Study Model
_________________________
Online Studies / E-learning
Approval
_________________________
To be approved by the Ministry of Education and Research, Estonia.
Duration
_________________________
36 Months
Credits
_________________________
180 ECTS/EAP ( European Credit Transfer and Accumulation System)
Program Learning Outcomes







Program Curriculum

Provides basic knowledge and skills required for understanding
and managing IT and/or cyber security specific subjects.
and managing IT and/or cyber security specific subjects.
Contains courses focused on IT essentials and important components of IT – networks, programming, databases, web applications, etc.
contains courses focused on cyber security details, IT systems administration and development (with security-special properties), penetration testing, malware, reverse engineering, forensics and cryptography and also a corresponding internship.
Student can freely choose any courses offered by the institute without any restrictions.
classical thesis (formulation of a practical problem with
corresponding analysis and solution) related to cyber security or to an area, where cyber security plays an important role.
corresponding analysis and solution) related to cyber security or to an area, where cyber security plays an important role.
Mandatory Core Courses













Elective Courses (Any 7)
















Program Structure

Semester 1 | ||||
---|---|---|---|---|
S. N. | Course | Course Name | EAP | Hours/Week |
1 | UCSC0107 | Introduction to Informatics and Computers | 5 | 4 |
2 | UCSC0102 | Professional Science Essentials | 5 | 4 |
3 | UCSC0109 | Fundamentals of Networking | 5 | 4 |
4 | UCSC0104 | Introduction to Programming with Python | 5 | 4 |
5 | UCSC0108 | Mathematics for Computing | 5 | 4 |
6 | UCSC0106 | Statistics – Probability and Descriptive Statistics | 5 | 4 |
Total For The Semester | 30 | 24 |
Semester 2 | ||||
---|---|---|---|---|
S. N. | Course | Course Name | EAP | Hours/Week |
1 | UCSC0201 | Object Oriented and Functional Programming with Python | 5 | 4 |
2 | UCSC0207 | Algorithms and Data Structures | 5 | 4 |
3 | UCSC0208 | Systems Analysis | 5 | 4 |
4 | UCSC0209 | Web Technologies | 5 | 4 |
5 | UCSC0210 | Windows administration | 5 | 4 |
6 | UCSC0206 | Introduction to Data Protection and Cyber Security | 5 | 4 |
Total For The Semester | 30 | 24 |
Semester 3 | ||||
---|---|---|---|---|
S. N. | Course | Course Name | EAP | Hours/Week |
1 | UCSC0301 | Database Modeling and Database Systems | 5 | 4 |
2 | UCSC0304 | Machine Learning – Supervised Learning | 5 | 4 |
3 | UCSC0305 | Machine Learning – Unsupervised Learning and Feature Engineering | 5 | 4 |
4 | UCSC0307 | Linux Administration | 5 | 4 |
5 | UCSC0308 | IT Security Management | 5 | 4 |
6 | UCSC0309 | Web Application Security | 5 | 4 |
Total For The Semester | 30 | 24 |
Semester 4 | ||||
---|---|---|---|---|
S. N. | Course | Course Name | EAP | Hours/Week |
1 | UCSC0407 | Network Security Fundamentals | 5 | 4 |
2 | UCSC0408 | Project Methods and Professionalism | 5 | 4 |
3 | UCSC0409 | Software Reverse Engineering | 5 | 4 |
4 | UCSC0410 | Computer Forensics | 5 | 4 |
5 | UCSC0411 | Crytography | 5 | 4 |
6 | UCSC0412 | IoT and OT Security | 5 | 4 |
Total For The Semester | 30 | 24 |
Semester 5 | ||||
---|---|---|---|---|
S. N. | Course | Course Name | EAP | Hours/Week |
1 | UCSC0506 | Ethical Hacking and Defence | 5 | 4 |
2 | UCSC0507 | Enterprise Security and Governance | 5 | 4 |
3 | UCSC0508 | Cyber Security Incident Detection and Response | 5 | 4 |
4 | UCSC0509 | Logging and Monitoring | 5 | 4 |
5 | UCSC0510 | Secure Programming | 10 | 8 |
Total For The Semester | 30 | 24 |
Semester 6 | ||||
---|---|---|---|---|
S. N. | Course | Course Name | EAP | Hours/Week |
1 | UCSC0604 | Advanced Routing and Switching | 10 | 4 |
2 | UCSC0605 | Advanced Networking | 10 | 4 |
3 | UCSC0603 | Bachelor Thesis | 10 | 16 |
Total For The Semester | 30 | 24 |