Bachelor of Cyber Security (BCS)
Programme Background and Rationale
Cyber security is one of today’s most critical emerging disciplines in the field of computing. It involves technology, people, information, and processes to enable assured operations in the context of adversaries. It is crucial to Information Systems (ISS) due to the need to protect information and devices housing essential data and to plan safeguards and backup plans against potential attacks.
Globally, individuals within and outside the organization are most likely to pose a threat. It is critical to have the right safeguards in place and to keep staff alert through cyber security experts, whether it is cyber criminals attacking the organization maliciously with phishing emails, malware, ransom ware, or social engineering attacks – or it is employees “accidentally” deleting crucial data.
East Africa has one of the fastest-growing economies in the region, and the world. This has increased the digital infrastructure in the region, with the integration of fibre-optic cable, stronger satellite connections and faster broadband. The ICT sector has balooned as well as the number of people using the internet. This has unintentionally paved the way for cybercrime to prey on the opportunities presented in the internet market.
In Somaliland, government agencies, Internet Service Providers (ISP), ICT Solutions companies, Telecom operators, Small and Medium-Sized Enterprises (SMEs), critical infrastructure providers, academia, and citizens including Child Online Protection (COP) need help to solve the most critical cyber security issues. The Somaliland government needs to build its own internal capacity to be able to protect the national assets (data) and keep its integrity, and foster a culture of security, including cyber security for its citizens’ national security. In this new interconnected world, cyber security is a global challenge, security of everyone is intertwined. As Somaliland builds its own electronic government and digital ecosystems, there is opportunity to adopt approaches that are secure by design. This will increase trust in government platforms to deliver public services digitally to all corners of the country. It will also help boost investor confidence and create an environment conducive to developing homegrown talent, which, in turn, will be key to unlocking Somaliland’s potential to become a regional leader in the digital sector.
Bachelor of Cyber Security programme focuses on developing graduates with strong digital defenses to keep organizations and clients’ data safe, monitor potential threats, perform routine security checks, develop software to identify and destroy malicious viruses, and advise organizations on best practices to keep data safe. The programme focuses on the assessment, evaluation and communication of key aspects of Information Systems/Information Technology as enablers of modern organisations, protection of corporate data, and customers’ personal information, in order to stay profitable and trustworthy. Therefore through this programme, Amoud University and the faculty of computing and informatics intends to produce highly skilled and relevant Cyber Security graduates, who are well endowed with the theories, skills and competencies in Data Security, Software Security, Component Security, Connection Security, System Security, Human Security, Organizational Security, Societal Security. This is in line with Amoud University’s vision and mission in that it is anchored on investing in information technology with a view to nurturing innovators.
This programme has been developed in consonance with Competencies for Undergraduate Cyber security Curricula, ACM/IEEE-CS The Joint Task Force on Cyber security education, December 2017 (Web link: https://dl.acm.org/citation.cfm?id=3184594).
Programme Objectives
General Objective
The general objective of this programme is to produce students who can assess, evaluate and communicate key security aspects of IT/IS as enablers of modern organizations and provide a risk-free and secure environment in which data, networks, and devices can be protected from cyber attacks to remain profitable and trustworthy.
Specific Objectives
By the end of the programme, students should possess the following characteristics:-
- Ability to implement confidentiality in organizations to prevent unauthorized disclosure of information through encryption, access control, authentication, authorization and physical security.
- Capacity to provide integrity for guaranteeing that data is real, correct, and protected against unauthorized user modification and assured integrity through backups, checksums and codes for data correction.
- Competence to ensure availability of information and data, and capacity to access and modify them in a timely manner through physical protection and computational redundancy.
Programme Duration
The programme run on a semester basis consisting of four semesters each lasting 17 weeks, or part-time basis as appropriately structured by the Faculty of Computing and Infromatics and department of Cyber Security, and approved by Senate.
Programme Modalities
The programme shall be conducted by course work, examinations and project, based on credit units. The last two weeks of each semester of each academic year shall normally be used for end-of-semester examinations. Further,
- A student shall take foundation/general courses in English, mathematics, science, Arabic, Islamic studies during the first one year in the freshmen. The freshman year also acts as a gateway to full admission into the bachelor of Cyber Security programme.
- By the end of junior year, a student shall be required to attend at least 300 hours of internship in a real work environment.
- A student shall come up with a well-written project in an area of Cyber Security during the senior year of study.
Curriculum Plan
The programme shall run on a semester basis consisting of eight (8) semesters each lasting 17 weeks in a period of four (4) academic years, whether on full time, part-time, sandwich, or online or other modes as structured by the Faculty of Computing and Informatics, and department of Cyber Security, and approved by Senate.
Freshman semester I |
|
|
|
|
|
| ||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
FRM 6111 | Introduction to reading | 45 | 0 | 0 | 0 | 45 | 3 | |
FRM 6112 | Introduction to writing | 45 | 0 | 0 | 0 | 45 | 3 | |
FRM 6113 | Introduction to biology | 30 | 0 | 45 | 0 | 75 | 3 | |
FRM 6114 | Arabic language | 45 | 0 | 0 | 0 | 45 | 3 | |
FRM 6115 | Pre-calculus | 45 | 0 | 0 | 0 | 45 | 3 | |
Total |
| 210 | 0 | 45 | 0 | 255 | 15 | |
Freshman semester II |
|
|
|
|
|
| ||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
FRM 6121 | English academic writing | 45 | 0 | 0 | 0 | 45 | 3 | |
FRM 6122 | Islamic studies | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6121 | Probability and statistics | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6122 | Fundamentals of information technology | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6123 | Introduction to physics | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6124 | Fundamentals of computer networks | 45 | 0 | 0 | 0 | 45 | 3 | |
Total |
| 270 | 0 | 0 | 0 | 270 | 18 | |
Sophomore semester I |
|
|
|
|
|
| ||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
BCS 6211 | Computer applications and maintenance | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6212 | Database management systems I (SQL server) | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6213 | Introduction to software engineering | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6214 | Foundations of cyber security (Security plus +) | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6215 | Network design and implementation | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6216 | Web design (HTML/CSS) | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6217 | Introduction to Python programming for cyber security | 30 | 0 | 45 | 0 | 75 | 3 | |
Total |
| 240 | 0 | 225 | 0 | 465 | 21 | |
Sophomore semester II |
|
|
|
|
|
| ||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
BCS 6221 | Numerical analysis | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6222 | Routing and switching (CCNA) | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6223 | Reverse engineering | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6224 | Cyber security ethics, law and policy | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6225 | Database management systems II (Oracle and PL/SQL) | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6226 | Secure software development | 30 | 0 | 45 | 0 | 75 | 3 | |
Total |
| 195 | 0 | 225 | 0 | 420 | 18 | |
Junior semester I |
|
|
|
|
|
| ||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
BCS 6311 | Cyber security risk management | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6312 | Cyber security project management | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6313 | Cryptography | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6314 | Microsoft windows server | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6315 | Mobile and wireless security | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6316 | Linux OS | 30 | 0 | 45 | 0 | 75 | 3 | |
Total | 210 | 0 | 180 | 0 | 390 | 18 | ||
|
|
|
|
|
|
|
| |
Junior semester II |
|
|
|
|
|
| ||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
BCS 6321 | Foundations of information security (CISM) | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6322 | Digital forensics | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6323 | Data centre infrastructure planning | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6324 | Cloud computing | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6325 | Ethical hacking | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6326 | Penetration testing and vulnerability analysis | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6327 | Research methods in cyber security | 45 | 0 | 0 | 0 | 45 | 3 | |
Total |
| 240 | 0 | 225 | 0 | 465 | 21 | |
|
|
|
|
|
|
|
| |
Junior semester III | ||||||||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
BCS 6331 | Industrial attachment and report | 0 | 0 | 0 | 300 | 300 | 5 | |
Total |
| 0 | 0 | 0 | 300 | 300 | 5 | |
Senior semester I |
|
|
|
|
|
| ||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
BCS 6411 | Virtualization and cloud computing security | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6412 | Advanced information security (CISSP) | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6413 | Advanced python scripting | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6414 | Entrepreneurship skills for cyber security | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6415 | Incidence report and malware analysis | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6416 | Cyber security individual project I (Proposal) | 15 | 30 | 0 | 0 | 45 | 2 | |
Total | 210 | 30 | 135 | 0 | 360 | 17 | ||
Senior semester II |
|
|
|
|
|
| ||
Course Code | Course Title | LH | TH | PH | FH | CH | CU | |
BCS 6421 | Disaster recovery planning | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6422 | Data mining and data warehousing | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6423 | Trends in information systems | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6424 | Information systems testing, quality assurance and security | 45 | 0 | 0 | 0 | 45 | 3 | |
BCS 6425 | Big data and machine learning | 30 | 0 | 45 | 0 | 75 | 3 | |
BCS 6426 | Cyber security individual project II (Implementation and support) | 30 | 30 | 0 | 0 | 45 | 3 | |
Total |
| 225 | 30 | 90 | 0 | 330 | 18 | |
Grand Total |
| 1800 | 60 | 1125 | 300 | 3255 | 151 |
General Regulations
General University regulations and guidelines for undergraduate programmes shall apply with regard to application, registration, teaching, learning, examinations, research and graduation. A student is required to sign a memorandum of understanding during the registration process on pre-scribed forms.
Admission Requirements
This bachelor of Cyber Security programme is best suited to students with interest in becoming future system penetration testers, security engineers, architects or even Chief Information Security Officers (CISOs) who sit on company boards of directors. To qualify for admission into the degree of bachelor of cyber security, an applicant shall:
- Hold a Somaliland GCSE of at least Grade “C”, or its equivalent from a recognized examination body.
- Successfully complete a one-year freshman programme at Amoud University, and attain a GPA of at least 2.00.
- Meet other conditions as spelt out by the Faculty of Computing and Informatics and the department of cyber security, with approval of Senate.
Enrolment Types
There shall be three (3) categories of enrolments as follows:
- Full-Time Day face-to-face enrolled students who shall attend classes between 7.30 am 4.30 pm from Saturday to Thursday.
- Full-Time Evening face-to-face enrolled students who shall attend classes between 4.00 pm and 10.00 pm from Saturday to Thursday.
- Sandwich, part-time, and other modes enrolled students who shall attend classes during specific periods as specified by the Faculty of Computing and Informatics and department of Cyber Security, and approved by Senate.
Staff, Facilities and Equipment
The faculty of computing and informatics, and the department of Cyber Security have adequate resources to offer this programme. The faculty has three (3) functional and well equipped computer laboratories fitted with over-head digital projectors and work stations. There is free WiFi 24/7 on campus internet connections in all computer laboratories and surrounding areas hosted by two local internet service providers, with a total of 20Mbps download and 20Mbps upload internet speeds. The main university library has an array of information materials for further reading, and several electronic books and reference materials are also available through Amoud University Google classroom suite. The faculty has a well balanced team of highly competent local and non-local staff, trained locally and abroad. The teaching staff that are available to help students as needs arise. The programme is allocated sufficient time and with efficient management, the faculty ensures that students complete their courses on time.
Funding
The programme of Bachelor of Cyber Security is sustained largely by funds from tuition fees and other relevant levies. The student must show proof of ability to pay tuition fees on time before being enrolled into the programme. There are no special funding arrangements for the students enrolled in the programme of bachelor of cyber security. However, if and when, additional funds are available, they shall be dispensed according to the university financial policies.
Target Groups
The target group for the Cyber Security programme includes but is not limited to:
- Students who have successfully completed Somaliland General Secondary School Certificate (SGCSE) or its equivalent from a recognized examination body and who wish to pursue a career in cyber security.
- People already working in the field of Cyber Security or related fields but would like to add new skills set to their professional work and attain formal advanced certification in Cyber Security.
- Other persons with insight in Cyber Security who would like to pursue the challenges of Cyber Security at the undergraduate degree level.
Expected Programme Outcomes
The graduates of the Cyber Security programme should be persons who are:
- Application security engineers and cyber security experts in private and public organizations who able are to analyze complex computing problems and apply principles of computing and other relevant disciplines to provide solutions.
- Security architects who design, implement, and evaluate computing-based solutions to meet given sets of computing requirements.
- Information security officers and consultants who recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.