Universiti Kuala Lumpur- UniKL
Bachelor of Information Technology (Hons) in Computer System Security
Kuala Lumpur, Malaysia
DURATION
3 up to 8 Years
LANGUAGES
English
PACE
Full time, Part time
APPLICATION DEADLINE
Request application deadline
EARLIEST START DATE
Jan 2025
TUITION FEES
MYR 8,800 / per semester *
STUDY FORMAT
On-Campus
* international students | local students: RM6750
Introduction
Designed to prepare students for careers in the field of Information Technology and Computer Security. To produce professionals with leadership skills who are knowledgeable and competent in IT and Computer Security.
This program is designed to produce:
- Students who are knowledgeable, competent, and innovative in the computer security industry;
- Students with effective leadership and teamwork skills as well as verbal, non-verbal, and interpersonal communication skills to support their role in the computer security industry;
- Students who are committed to the importance of lifelong learning and continuous improvement in the IT industry;
- Students who practice professionalism with ethics and social responsibility; and
- Students who are capable of embarking on security and technopreneurial activities.
Gallery
Admissions
Curriculum
Semester 1
- Discrete Mathematics for IT
- Fundamental English
- Professional English 1
- Principles of Computer Programming
- Co-Curriculum
- Philosophy and Current Issues (L)
- Malay Communication 2 (I)
- Appreciation of Ethics and Civilization (L)
- Philosophy and Current Issues (I) OR Appreciation of Ethics and Civilization (I)
Semester 2
- Professional English 2
- Object Oriented Programming
- Network Fundamentals
- Database Management Systems
- IT Security
- Computer Organization
Semester 3
- Network Routing and Switching
- Software Vulnerabilities and Exploitation
- Data Hiding and Encryption
- Operating System Administration
- Contemporary Muslim issues in Malaysia (LM)
- Culture and Lifestyle in Malaysia (L – NM & I)
Semester 4
- Network Security
- Secure Software Development
- Operating System Security
- IT Project Management
- Industrial Revolution Technology
- Elective 1
Semester 5
- Final Year Project 1
- Cyber Forensics
- Innovation Management
- Foreign Language 1
- Mobile Ubiquitous Computing
- Elective 2
- Elective 3
Semester 6
- Final Year Project 2
- Technopreneurship
- Incident Handling and Response
- Information Security Management Systems
- Elective 4
- Foreign Language 2
Semester 7
- Industrial Training
Elective
- Business Continuity Planning
- Network Operating System
- Real-Time and Embedded Systems
- Principles of Artificial Intelligence
- Selected Topics in Communication Systems
- Introduction to Multimedia
- Digital Graphic Design
Program Outcome
Program Educational Objectives (PEOs)
- PEO1: UniKL graduates who are knowledgeable, competent, and innovative which will contribute towards the requirement of computer security industries
- PEO2: UniKL graduates who are effective leaders with teamwork skills as well as verbal and non-verbal interpersonal skills to support their roles in computer security industries
- PEO3: UniKL graduates who are committed to the importance of lifelong learning and continuous improvement in computer security industries
- PEO4: UniKL graduates who are professional, ethical, and socially responsible
- PEO5: UniKL graduates who are capable of embarking on business and technopreneurs activities
Program Learning Outcomes (PLOs)
- PLO1: Apply skills and principles of lifelong learning in academic and career development
- PLO2: Communicate effectively with peers, clients, superiors, and society at large
- PLO3: Demonstrate teamwork, leadership, interpersonal and social skills
- PLO4: Utilize relevant techniques and demonstrate analytical and critical thinking skills in problem-solving
- PLO5: Demonstrate professionalism and social and ethical consideration in accordance with ethical and legal principles
- PLO6: Apply broad business and real-world perspectives daily and demonstrate entrepreneurial skills
- PLO7: Demonstrate knowledge of essential facts, concepts, principles, and theories relating to Computer System Security
- PLO8: Apply theoretical principles of Computer System Security in relevant areas
- PLO9: Design, implement, and manage Computer System Security solutions and resources, and recognize the impact of technology on individuals, organizations, and society.
Career Opportunities
- Computer Security Analyst
- Computer Forensic Analyst
- Computer Security Officer
- Security Architect
- Security Auditor
- Incident Response / Handler
- Vulnerability Assessment Analyst
Program delivery
Duration
- Full Time: 3.5 Years
- Part-Time: 8 Years