Programme Description / Penerangan Program
The program is aimed at professionals working in the field of cybersecurity and digital forensic, who wish to further their education, gain a higher academic qualification and enhance their career prospects. The program offers an education based on key concept and advanced principles required to analyse, design, develop and secure organizational systems and understand current and future technologies. At the end of the program students are expected to develop professional attitudes and technical skills necessary to progress in the rapidly evolving field of cybersecurity and digital forensics.
Entry Requirement/ Syarat Kemasukan
A Bachelor's Degree with a minimum of CGPA 2.75 or its equivalent;
OR
Bachelor Degree qualification or equivalent with a minimum CGPA of 2.50 and does not meet CGPA 2.75 acceptable subject to stringent internal appraisal process;
OR
Bachelor Degree qualification with CGPA less than 2.50 or its equivalent, can be accepted, with a minimum of five (5) years working experience in the relevant field;
OR
Has certificate of Accreditation of Prior Experiential Learning (APEL) for entry into graduate program.
Note:
Candidate with qualification other than Computing field can be accepted with the condition of taking prerequisite module as an early preparation for their graduate studies.
Further information, please contact:
Dr Fakariah Hani Hj Mohd Ali
Koordinator Program CS709
Tel: 03-55211105
Course Detail / Perincian Kursus
Semester 1, Year 1
Problem Solving Formalism for Information Technology, Special Topic in Cybersecurity and Digital Forensics, Enterprise Security Architecture, Advanced Digital Forensics, Cryptography and Security Mechanisms
Semester 2, Year 1
Malware Reverse Engineering, Forensic Data Analysis, Internet and Network Forensics, Research Methods in Computing, Elective I
Semester 3, Year 2
Computing Project, Cybersecurity and Risk Management, Elective II.
Electives
Legal Aspect in Information Security and Digital Forensics, Advanced Network Security, Mobile device and Cellular Network Forensics, Incident Response and Handling, Information Hiding