
Bachelor in
Bachelor of Information Technology (Hons) in Computer System Security Universiti Kuala Lumpur- UniKL

Introduction
IT and computing have evolved from time to time. Ever since the dawn of the internet, confidentiality, authenticity, and integrity of information had become an issue. Threats such as Hacking, Malicious Codes, and Application Vulnerability have changed how IT benefits the human race. This program is uniquely designed to fulfill the demand for the computer security professional in the job market where network security, information security management, secure software, secure software development, and cyber forensic areas apply in an organization that requires them.
Gallery
Admissions
Curriculum
Semester 1
Semester 2
Semester 3
Semester 4
| Semester 5
Semester 6
Semester 7
Semester 8
|
Program Outcome
- Apply skills and principles of lifelong learning in academic and career development.
- Communicate effectively with peers, clients, superiors, and society at large.
- Demonstrate teamwork, leadership, interpersonal and social skills.
- Utilize relevant techniques and demonstrate analytical and critical thinking skills in problem-solving.
- Demonstrate professionalism and social and ethical consideration in accordance with ethical and legal principles.
- Apply broad business and real-world perspectives daily and demonstrate entrepreneurial skills.
- Demonstrate knowledge of essential facts, concepts, principles, and theories relating to Computer System Security.
- Apply theoretical principles of Computer System Security in relevant areas.
- Design, implement and manage Computer System Security solutions and resources, and recognize the impact of technology on individuals, organizations, and society.
Career Opportunities
Upon completion of this degree program, students shall enter the information security job market as information security professionals, IT Security Officers, or a Security Analysts in defending and securing computer networks, developing secure software and application, developing a firm security and ICT policy, and capable of performing a digital forensic investigation.