Introduction to BS (Cyber Security) Program
Program Overview
Our Bachelor of Science in Cyber Security program focuses on equipping students with fundamental knowledge and skills needed to protect virtual and real-life entities from cyber threats and to construct robust software to harden the security posture of any cyber system.
Curriculum Highlights
Our curriculum is carefully designed to cover a wide range of Cyber Security topics, ensuring that students acquire the necessary skills and knowledge to excel in the field. Here are some key areas of study:
Programming Fundamentals
Students will learn core programming concepts and languages, enabling them to write clean, efficient, and reliable code. They will develop problem-solving skills and gain hands-on experience through programming assignments and projects.
Cyber Security
This course provides students an introduction to common cyber security threats, vulnerabilities, and risks related to web applications, networks, software and mobile applications. The course provides basic concepts and terminology used in the information and cyber security fields. Moreover, it will also enable students to differentiate between the various forms of malware and how they affect computers and networks.
Digital Forensics
This course is an introduction to computer forensics and investigation. It provides an understanding of how to conduct investigations to correctly gather, analyze and present digital evidence to different audiences. It also outlines the tools to locate and analyze digital evidence on a variety of devices, how to keep up to date with changing technologies, and laws and regulations in digital forensics.
Information Assurance
This course covers the understand the role and interaction of policies, laws, procedures, management issues, and technical issues in protecting information resources.
Vulnerability Assessment & Reverse Engineering
The course aims to develop core competencies in the field of vulnerability assessment covering software, networks and Web applications. It also covers reverse engineering techniques to analyze software, exploit targets, and defend against security threats like malware and viruses.
Secure Software Design and Development
The aim of the course is to develop core competencies in the fields of Secure Software Concepts, Secure Software Requirements, Secure Software Design, Secure Software Implementation/Coding, and Secure Software Testing. The course details the software security activities that need to be incorporated throughout the software development lifecycle.
The educational objectives for the Cyber Security describe the core qualities and characteristics we seek to instill in our graduates and have them carry into their very diverse future careers and activities. The Program Objectives are listed below:
PEO 1: Entered in the Cyber Security, sciences, technologies or related fields in prominent organizations or working as a technopreneur.
PEO 2: Become medium level experts able to creatively apply their expertise of science, and technology to the best of society and industry.
PEO 3: Earned a reputation as a professional, sensitive to the environmental, social, safety and economic context and possess a strong commitment to ethical practices.
PEO 4: Attained a leadership position and be acknowledged as a valuable team member able to skilled workforce embodied with the spirit of discovery.
PEO 5: Continued their professional development and physical well-being.
Program outcomes are the narrower statements that describe what students are expected to know and be able to do by the time of graduation. These relate to the knowledge, skills and attitude that the students acquire while progressing through the program. PLO’s of Under Graduate program are as under:
PLO 1 : Academic Education
Completion of an accredited program of study designed to prepare graduates as computing professionals.
PLO 2 : Knowledge for Solving Computing Problems
Apply knowledge of computing fundamentals, knowledge of a computing specialization, and mathematics, science, and domain knowledge appropriate for the computing specialization to the abstraction and conceptualization of computing models from defined problems and requirements.
PLO 3 : Problem Analysis
Identify, formulate, research literature, and solve complex computing problems reaching substantiated conclusions using fundamental principles of mathematics, computing sciences, and relevant domain disciplines.
PLO 4 : Design / Development of Solutions
Design and evaluate solutions for complex computing problems, and design and evaluate systems, components, or processes that meet specified needs with appropriate consideration for public health and safety, cultural, societal, and environmental considerations.
PLO 5 : Modern Tool Usage
Create, select, adapt and apply appropriate techniques, resources, and modern computing tools to complex computing activities, with an understanding of the limitations.
PLO 6 : Individual and Teamwork
Function effectively as an individual and as a member or leader in diverse teams and in multi-disciplinary settings.
PLO 7 : Communication
Communicate effectively with the computing community and with society at large about complex computing activities by being able to comprehend and write effective reports, design documentation, make effective presentations, and give and understand clear instructions.
PLO 8 : Computing Professionalism and Society
Understand and assess societal, health, safety, legal, and cultural issues within local and global contexts, and the consequential responsibilities relevant to professional computing practice.
PLO 9 : Ethics
Understand and commit to professional ethics, responsibilities, and norms of professional computing practice.
PLO 10 : Life-long Learning
Recognize the need, and have the ability, to engage in independent learning for continual development as a computing professional.
S No | Course Code | Course Title | Credit Hrs | ||
Semester 1 | Theory | Lab | Total | ||
1 | CS111 | Programming Fundamentals | 3 | 0 | 3 |
2 | CS111(L) | Programming Fundamentals Lab | 0 | 1 | 1 |
3 | GE161 | Application of Information & Communication Technologies | 2 | 0 | 2 |
4 | GE161(L) | Application of Information & Communication Technologies Lab | 0 | 1 | 1 |
5 | GE163 | Discrete Structures | 3 | 0 | 3 |
6 | GE164 | Calculus and Analytic Geometry | 3 | 0 | 3 |
7 | GE162 | Functional English | 3 | 0 | 3 |
Total Credit Hrs | 14 | 2 | 16 | ||
Semester 2 | Theory | Lab | Total | ||
8 | CS112 | Object Oriented Programming | 3 | 0 | 3 |
9 | CS112(L) | Object Oriented Programming Lab | 0 | 1 | 1 |
10 | CS113 | Database Systems | 3 | 0 | 3 |
11 | CS113(L) | Database Systems Lab | 0 | 1 | 1 |
12 | CS114 | Digital Logic Design | 2 | 0 | 2 |
13 | CS114(L) | Digital Logic Design Lab | 0 | 1 | 1 |
14 | MT141 | Multivariable Calculus | 3 | 0 | 3 |
15 | MT142 | Linear Algebra | 3 | 0 | 3 |
Total Credit Hrs | 14 | 3 | 17 | ||
Semester 3 | Theory | Lab | Total | ||
16 | CS211 | Data Structures | 3 | 0 | 3 |
17 | CS211(L) | Data Structures Lab | 0 | 1 | 1 |
18 | CS212 | Information Security | 2 | 0 | 2 |
19 | CS212(L) | Information Security Lab | 0 | 1 | 1 |
20 | CS213 | Artificial Intelligence | 2 | 0 | 2 |
21 | CS213(L) | Artificial Intelligence Lab | 0 | 1 | 1 |
22 | CS214 | Computer Networks | 2 | 0 | 2 |
23 | CS214(L) | Computer Networks Lab | 0 | 1 | 1 |
24 | CS215 | Software Engineering | 3 | 0 | 3 |
25 | MT241 | Probability & Statistics | 3 | 0 | 3 |
Total Credit Hrs | 15 | 4 | 19 | ||
Semester 4 | Theory | Lab | Total | ||
26 | CS216 | Computer Organization & Assembly Language | 2 | 0 | 2 |
27 | CS216(L) | Computer Organization & Assembly Language Lab | 0 | 1 | 1 |
28 | CY221 | Cyber Security | 2 | 0 | 2 |
29 | CY221(L) | Cyber Security Lab | 0 | 1 | 1 |
30 | CY222 | Information Assurance | 2 | 0 | 2 |
31 | CY222(L) | Information Assurance Lab | 0 | 1 | 1 |
32 | GE263 | Applied Physics | 2 | 0 | 2 |
33 | GE263(L) | Applied Physics Lab | 0 | 1 | 1 |
34 | GE261 | Expository Writing | 3 | 0 | 3 |
35 | GE262 | Islamic Studies | 2 | 0 | 2 |
Total Credit Hrs | 13 | 4 | 17 | ||
Semester 5 | Theory | Lab | Total | ||
36 | CS311 | Operating Systems | 2 | 0 | 2 |
37 | CS311(L) | Operating Systems Lab | 0 | 1 | 1 |
38 | CY321 | Network Security | 2 | 0 | 2 |
39 | CY321(L) | Network Security Lab | 0 | 1 | 1 |
40 | CY322 | Secure Software Design and Development | 2 | 0 | 2 |
41 | CY322(L) | Secure Software Design and Development Lab | 0 | 1 | 1 |
42 | CYxxx | Elective-I | 2 | 0 | 2 |
43 | CYxxx | Elective-I Lab | 0 | 1 | 1 |
44 | CYxxx | Elective-II | 2 | 0 | 2 |
45 | CYxxx | Elective-II Lab | 0 | 1 | 1 |
46 | GE361 | Introduction to Management | 2 | 0 | 2 |
Total Credit Hrs | 12 | 5 | 17 | ||
Semester 6 | Theory | Lab | Total | ||
47 | CY323 | Digital Forensics | 2 | 0 | 2 |
48 | CY323(L) | Digital Forensics Lab | 0 | 1 | 1 |
49 | CS324 | Parallel & Distributed Computing | 2 | 0 | 2 |
50 | CS324(L) | Parallel & Distributed Computing Lab | 0 | 1 | 1 |
51 | CYxxx | Elective-III | 2 | 0 | 2 |
52 | CYxxx | Elective-III Lab | 0 | 1 | 1 |
53 | CYxxx | Elective-IV | 2 | 0 | 2 |
54 | CYxxx | Elective-IV Lab | 0 | 1 | 1 |
55 | CYxxx | Elective-V | 2 | 0 | 2 |
56 | CYxxx | Elective-V Lab | 0 | 1 | 1 |
57 | CYxxx | Elective-VI | 2 | 0 | 2 |
58 | CYxxx | Elective-VI Lab | 0 | 1 | 1 |
Total Credit Hrs | 12 | 6 | 18 | ||
Semester 7 | Theory | Lab | Total | ||
59 | CS412 | Final Year Project – I | 2 | 0 | 2 |
60 | CS411 | Analysis of Algorithms | 3 | 0 | 3 |
61 | CYxxx | Elective-VII | 2 | 0 | 2 |
62 | CYxxx | Elective-VII Lab | 0 | 1 | 1 |
63 | SS451 | Introduction to Marketing | 3 | 0 | 3 |
64 | EN441 | Technical & Business Writing | 3 | 0 | 3 |
65 | GE461 | Entrepreneurship | 2 | 0 | 2 |
Total Credit Hrs | 15 | 1 | 16 | ||
Semester 8 | Theory | Lab | Total | ||
66 | CS413 | Final Year Project – II | 4 | 0 | 4 |
67 | GE462 | Ideology and Constitution of Pakistan | 2 | 0 | 2 |
68 | GE463 | Professional Practices | 2 | 0 | 2 |
69 | GE464 | Civics and Community Engagement | 2 | 0 | 2 |
Total Credit Hrs | 10 | 0 | 10 | ||