fbpx

BSc (Hons)
Ethical Hacking and Cybersecurity

The specialist skills and knowledge to thoroughly test the security of computer systems, make them secure and investigate properly if they are compromised are not typically taught within a standard computer science course. In contrast, our course has been developed to provide a good practical and theoretical understanding of cybersecurity, hacking, digital forensics and the underlying computer science.

Modules

ST4056CEM Introduction to Web Development and Database System

Python, MySQL, Django, HTML, CSS, JavaScript

 

ST4059CEM Legal and Ethical Foundations in Cybersecurity

Cyber Law in Nepal, Internal Laws and Regulations

 

ST4060CEM Digital Forensics Fundamentals

Device, Network, Memory Forensics; Preparation of forensics investigation report

 

ST4061CEM Programming and Algorithms 1

Python, C/C++, Assembly X86, unit testing, version control

 

ST4062CEM Skills Development 1

Linux operation system (Kali Linux), System tools, Ethical Hacking tools.

 

ST4063CEM The Security Professional

Ethical framework for Hackers

 

ST4064CEM Foundations of Cybersecurity

Social engineering, vulnerability assessment and exploitation based on network and devices

 

ST4065CEM Computer Systems and Networks

LAN, WAN, Routing, Firewall, Network Security

 

STA103IAE Creative Thinking for Business

How to create a new business venture or solve a problem?

ST5062CEM Programming and Algorithms 2

Advanced data structures, compiler analysis, multi-threading, file I/O, device drivers

 

ST5063CEM Practical Pen-Testing

Penetration testing on networks and applications

 

ST5064CEM Networking

Networked applications, file systems, enterprise scale network security, VPN, Virtualisation and simulation

 

ST5065CEM Applied Forensics

Using forensics tools like SIFT or FTK, Mobile devices forensics, Legislation

 

ST5066CEM Skills Development 2

Intermediate Linux skills, Network traversal, Privilege Escalation

 

ST5067CEM Web Security

OWASP list, Proxy, two factor authentication, Cookies, Session Hacking

 

ST5068CEM Platforms and Operating Systems

Memory Management, Concurrency, Security mechanism of OS, Virtualisation and Isolation, Security as a service

 

ST5069CEM Cybersecurity Careers

Plan for self-learning and improvement, candidate screening and hiring

 

STA201IAE Be Your Own Boss

Business start-ups, ideation, market research, competitor analysis, financing

ST6047CEM Cybersecurity Project

Individual research project in ethical hacking and cybersecurity

 

ST6048CEM Exploit Development

Fuzzing applications, Memory corruption, Compiler defences, Stack and Head overflows, Anti-forensic techniques

 

ST6049CEM Managing Red Teams and Pen-testing

Security vulnerabilities and limitations of penetration testing techniques, Assessing network and application design for security

 

ST6050CEM Security Audit and Monitoring

Information system security auditing, internal audit, Intrusion detection systems and methods, Intrusion response

 

ST6051CEM Practical Cryptography

Cipher and algorithm types, Public/Private key encryption, Integrity, PKI, Digital certificates

 

ST6052CEM Reverse Engineering

Malware analysis, obfuscation and de-obfuscation of code, tools for reverse engineering

 

ST6053CEM Skills Development 3

Remote host audit, exploitation of vulnerable services, privilege escalation mechanisms

 

ST6054CEM Security Management

Security Control Assessment, Threat modelling, Third-party assessment and monitoring

 

STA309IAE Design Thinking and Innovation

Entrepreneurship and design thinking, applied scenario activities, creativity, business feasibility study

Why Coventry University?

An award-winning university, we are committed to providing our students with the best possible experience. We continue to invest in both our facilities and our innovative approach to education. Our students benefit from industry-relevant teaching, and resources and support designed to help them succeed. These range from our modern library and computing facilities to dedicated careers advice and our impressive Students’ Union activities.

Global Ready

An international outlook, with global opportunities

Employability

Career-ready graduates, with the skills to succeed

Teaching Excellence

Taught by lecturers who are experts in their field

Course essentials

A degree which offers you more, at no extra cost

Course Summary

On this course, students will have the opportunity to learn to identify and analyse the threats posed to modern information structures and develop the knowledge and skills to be able to advise a company on how to set up secure systems.

Fee Structure

Course Duration: 3 Years
Approved by Ministry of Education, Nepal Apply Now
Download Brouchure

Admission Eligibility:

Minimum 2.0 GPA in 10+2 level or 3.5 Credit in A level (Science/management/Humanities)

English requirement:

GETS English test (65 or above in all individual bands) Or IELTS 5.5.

We provide free preparation course for GETS English test.
Disclaimer
We regularly review our course content, to make it relevant and up-to-date for the benefit of our students. For these reasons, course modules may be updated, please contact us for the latest information