The Bachelor of Science in Cyber Security & Social Computing curriculum prepares students for offers the opportunity to gain cutting-edge cybersecurity knowledge and skills with a solid theoretical foundation as well as a good understanding of the social, ethical, legal, and policy aspects of cybersecurity. Students learn to design and develop trusted software systems by adopting best practices and techniques in software development, manage and protect valuable computing infrastructure and data assets in an enterprise environment, and develop next-generation cyber skills to confront emerging cyber threats. The evolution of information security into cybersecurity and its relationship to nations, organizations, society, and individuals. Exposure to multiple cybersecurity technologies, processes, and procedures; analyzing threats, vulnerabilities, and risks present; and developing appropriate strategies to mitigate potential cybersecurity issues. Applied lab to develop cyber security offensive attributes and learn how to prevent and/or mitigate threats. Today we interact with our friends and enemies, our team partners and romantic partners, and our organizations and societies, all through computational systems. How do we design these social computing systems to be effective? This course covers design patterns for social computing and crowdsourcing systems, and the foundational ideas that underpin them. Students will engage in the creation of new computationally mediated social environments.
The student who graduates with a major in Cyber Security & Social Computing will be able to:
- Define computer forensics.
- Identify the process in taking digital evidence.
- Describe how to conduct an investigation using methods of memory, operating system, network, and email forensics.
- Assess the different forensics tools.
- Differentiate among different types of security attacks.
- Describe the concept of ethical hacking. How to create content to go viral.
- How to design for different groups.
- How to implement effective crowdsourcing.
- On the highest standards of computational journalism to ensure the integrity and ethical behavior of the smart systems.
Program Learning Outcomes
The program learning outcomes (PLOs) set out the academic learning, skills, and achievements that the student must reliably demonstrate before graduation.
Upon successful completion of the courses in the Cyber Security & Social Computing program, the graduating students shall:
- Use basic principles and technology of digital forensics, including acquisition, preservation, and recovery and investigation of the evidence stored in digital devices.
- Best practices of how organizations manage information risk through risk assessment practices and procedures will be conducted. Demonstrate critical thinking through effective integration of their marketing knowledge with other disciplines.
- Exposure to multiple cybersecurity technologies, processes, and procedures; analyzing threats, vulnerabilities, and risks present; and developing appropriate strategies to mitigate potential cybersecurity issues. Applied lab to develop cyber security offensive attributes and learn how to prevent and/or mitigate threats.
- Enable students to learn how to analyse harmful and malicious software in a safe way. Such analysis is the first step in a systematic approach to prevent or neutralize malware. The focus is on analysis of the advanced methods used in the manufacturing of so-called “cyber arms” and the practical countermeasures to detect and neutralize them.
|Year 1||Semester 1||Block 1||LA2103||Communication Skills||4|
|Block 2||MG2102||Principles of Management||4|
|Block 3||IT2101||Fundamentals of Computers||4|
|Block 4||MA2101||Basic Mathematics||4|
|Semester 2||Block 5||IT2102||Computer Organization & Architecture||4|
|Block 6||MG2104||Introduction to Global Culture and Ethics||4|
|Block 7||IT2103||Problem Solving Using Computers and C Programming||4|
|Block 8||IT2104||Database Management Systems||4|
|Year 2||Semester 3||Block 9||IT2201||Introduction to Operating System||4|
|Block 10||IT2202||Introduction to Database & MYSQL||4|
|Block 11||IT2203||Installing, Configuring & Administration Windows Server||4|
|Block 12||IT2204||Introduction to Forensic Tools & Techniques||4|
|Semester 4||Block 13||IT2205||Introduction to Object-Oriented Programming & C++||4|
|Block 14||IT2206||Installing & Configuring Wi-Fi Network||4|
|Block 15||IT2207||Understanding Client-Server Network||4|
|Year 3||Semester 5||Block 17||IT3101||Java Programming||4|
|Block 18||IT3102||Spread Sheet Modelling & Analysis||4|
|Semester 5||Block 19||CS3101||Introduction to Forensic Tools & Technique||4|
|Semester 6||Block 20||CS3102||Introduction to Security Technologies||4|
|Block 21||CS3103||Computer System Security||4|
|Block 22||MG2208||Research Methodology||4|
|Year 4||Semester 7||Block 23||CS3104||Malicious Software & Security Programming||4|
|Block 24||CS3105||Design of Online Communities||4|
|Block 25||CS3106||Computational Journalism||4|
|Semester 8||Block 26-28||IT3204||Project Work||20|
Bachelor of Science in Information Technology
“My experience with Texila American University has been really great, it’s a wonderful experience and the lecturers are so friendly and interactive, they are always concerned about the studies of students. Texila American University has a standard education with very latest updated curriculums with concepts applicable to the current world. Latest technologies and wonderful libraries, it was always a wonderful feeling to be a student and to one day be called product of Texila American University.”
Please fill the form below, we will mail you the details of Tuition Fees and Scholarships of our Business Administration Degree program.