Program Overview

Cybersecurity is a subset of computer science that has its own field of study. Cybersecurity entails defending computer systems, networks, and gadgets against digital attacks, theft, and destruction. The overall goal of the BS Cyber Security program BS(CYS) is to give students a foundational and advanced understanding of computing systems, as well as knowledge and expertise in the fields of information security, software security, system security, network security, organisational security, and societal security, including law, policy, and ethics. The ability to apply these security principles and practises to computer systems' hardware, software, and human components as well as to analyse, assess, and maintain operational systems in the face of cyber risks and threats will be developed in students.

The BS(CYS) degree program includes a combination of practical and theoretical coursework, as well as hands-on training in labs, semester projects and internships to gain practical experience in the field. Students in cybersecurity learn infrastructure security, cyberthreats, risk analysis and mitigation, and incident response. In addition to incident response and digital forensics, students will learn about aspects of penetration testing and reverse engineering in order to understand the perspective of cyber criminals and protect against them.

It is a four year program consisting of eight semesters. The maximum duration for completion of this degree is twelve semesters. The degree is awarded on completion of minimum 133 credit hours, including six credits for the project, with a passing CGPA of at least 2.0/4.0.s

Mission Statement

The mission of the BS(CYS) program is to provide high quality education in cyber security that prepares students for professional careers and lifelong learning in solving real-world cyber security problems. The program emphasis on information security, software security, system security, network security, organizational security, and societal security.

Program Educational Objectives (PEOs)

The following are the PEO’s for all computing programs being offered in the Department of Computer Science.

  1. PEO-1: Inculcate in-depth knowledge, analytical skills, and creativity in the computing domain.
  2. PEO-2: Attain the ability to adapt in evolving technological environments, assimilate new information with a strong focus on entrepreneurship.
  3. PEO-3: Instill moral and ethical values, along with the ability to communicate effectively with computing community.
  4. PEO-4: Train graduates to contribute towards knowledge economy and socio-economic growth of the country.

Student Outcomes (SOs)

The department of computer science at CUI ensures that the graduates are equipped with the right set of attributes that will make them desirable to potential employers. Problem Solving, Critical Thinking, Creativity, Communication, Teamwork, Adaptability, and Life-long Learning are all considered as crucial attributes for employability. These graduate attributes (GAs) are in line with student outcomes defined by Seoul Accord; therefore, the department of computer science at CUI has adapted SOs from Seoul Accord which is listed in Table below:

S.# Attributes (GA) Student Outcomes (SOs)
1 Knowledge for Solving Computing Problems Apply knowledge of computing fundamentals, knowledge of a computing specialization, and mathematics, science, and domain knowledge appropriate for the computing specialization to the abstraction and conceptualization of computing models from defined problems and requirements.
2 Problem Analysis Identify, formulate, research literature, and solve complex computing problems reaching substantiated conclusions using fundamental principles of mathematics, computing sciences, and relevant domain disciplines.
3 Design/Development of Solutions Design and evaluate solutions for complex computing problems, and design and evaluate systems, components, or processes that meet specified needs with appropriate consideration for public health and safety, cultural, societal, and environmental considerations.
4 Modern Tool Usage Create, select, adapt and apply appropriate techniques, resources, and modern computing tools to complex computing activities, with an understanding of the limitations.
5 Individual and Teamwork Function effectively as an individual and as a member or leader in diverse teams and in multi-disciplinary settings.
6 Communication Communicate effectively with the computing community and with society at large about complex computing activities by being able to comprehend and write effective reports, design documentation, make effective presentations, and give and understand clear instructions.
7 Computing Professionalism and Society Understand and assess societal, health, safety, legal, and cultural issues within local and global contexts, and the consequential responsibilities relevant to professional computing practice.
8 Ethics Understand and commit to professional ethics, responsibilities, and norms of professional computing practice.
9 Life-long Learning Recognize the need, and have the ability, to engage in independent learning for continual development as a computing professional.

Entry Requirements

Students are eligible for admission if they have Intermediate or equivalent (‘A’ Level) with minimum 50% marks from accredited institution and *NTS-NAT test score with minimum 50% marks.

* Detailed information can be obtained from http://www.nts.org.pk

Career Prospects

Strong analytical and logical skills, as well as a strong interest in computer security and problem-solving, are beneficial for a career in cybersecurity. With the increasing number of cyber threats and the need for more secure digital systems, the demand for cybersecurity professionals is growing rapidly. This means that those with the necessary skills and knowledge can choose from a wide range of employment opportunities. many of which offer competitive pay and superior benefits. BSCyS degree prepares graduates for various job roles in the cybersecurity field, such as Forensic technology analyst, cyber threat analyst, cyber intelligence analyst, Security Operation Center (SOC) analyst, risk advisory consultant, pentester, information security analyst, systems engineer, malware analyst, vulnerability researcher, threat hunter, cybercrime investigator, fraud investigator, cyber exploitation analyst, data recovery expert, cyber defense analyst, information technology security auditor, digital forensics response analyst.

Contact Details