fbpx

MS (Cyber Security)

MS (Cyber Security)

The MS (Cyber Security) program is of 2-years duration offered in the evening. It requires 33 credit hours, including 4 core courses (4 x 3 Credits) and 5 elective courses (5 x 3 Credits). To earn MS (Cyber Security) degree, the student has to complete a thesis (2 x 3 Credits). The maximum time limit to complete the MS (Cyber Security) degree is 4 years.

Why study Cyber security?

The world is adapting innovative IT solutions such as mobile technology, online banking and electronic government services into everyday use. However, with so many e-solutions and such extensive use of the Internet, attention needs to be turned to the security issue. Cyber systems require innovative and secure IT solutions for everyday use. Therefore, the demand for skilled security professionals is arising to protect against cyber-attacks. Offered through the Department of Computer Science, MS (Cyber security) is designed to respond to the fast-growing demand for technical cyber security experts nationally and internationally. It provides the necessary foundations for the design and development of systems that need to be secure. The major focus will be given to the design of secure systems that exhibit confidentiality, integrity, and availability. The program will provide students with core skills in wide aspects of the security of information systems. Program Objectives The cyber security program is planned to satisfy the increasing security intensive needs of private and public sector organizations. In this program, students will equip with the various skills and techniques which are important for securing IT networks and systems. Students having a strong background in Mathematics, Computer Science, Engineering or equivalent are the potential candidates for the Master of Science Cyber Security program. Upon successful completion of the degree program, students will be able to use the latest tools and techniques of cyber security. After graduating from this program, students may have a potential career in various disciplines such as the telecommunications sector, software industry, intelligence agencies, e-businesses, e-government, banking, financial technologies, health care, and insurance. The goal of the program is to enable students to apply scientific and technological development in building a secure information society. The aim is to make technology-driven solutions to secure cyberspace. Moreover, to allow students to have hands-on digital forensics experience, this deals with the investigation and recovery of information found in digital devices to identify computer-based crime. The area is becoming critical for both data security and law enforcement. MS in Cyber Security offers strong expertise for a career in securing and managing the cyber society.

Key objectives of the proposed program are as follow:

• Recognize and evaluate security requirements and issues in organizations using IT systems. • Assess cyber security risk management policies to protect an organization’s critical information and assets adequately. • Measure the performance of security systems within an enterprise-level information system to maintain and update an enterprise-level information security system. • Implement continuous network monitoring and provide real-time security solutions.

Eligibility:
  • 16 years of education in a related field with minimum 60%/ marks or CGPA 2.00.
  • GAT General/ HAT relevant with min. 50% score
  • The candidate with 16 years of education in following domains are eligible to apply: Information Technology, Computer Science, Software Engineering, Computer Engineering or Electrical Engineering.

Research: SZABIST strongly encourages the publication of research findings of Independent Studies, Thesis and Dissertation in research journals & conferences. SZABIST also publishes its own research journal, the Journal of Independent Studies & Research (www.szabist.edu.pk/jisr-c) and holds two National Research Conferences a year.

Course Curriculum

MS (Cyber Security) COURSE PLAN (ROADMAP)

FIRST YEAR

1st SEMESTER

Sr. No Course Code Course Title Cr. Hr Course Type
1 CCS xxxx Applied Cryptography 3  Core
2 CCS xxxx Network Security 3  Core
3 CCS xxxx Information Security 3  Core

 

2nd SEMESTER

 

Sr. No Course Code Course Title Cr. Hr Course Type
1 CCS xxxx Digital Forensics 3  Core
2 CCS xxxx Elective-I 3 Elective
3 CCS xxxx Elective-II 3 Elective

 

SECOND YEAR

3rd SEMESTER

Sr. No Course Code Course Title Cr. Hr Course Type
1 CCS xxxx Elective-III 3 Elective
2 CCS xxxx Elective-IV 3 Elective
3 CCS xxxx Thesis(Part-1) 3 Elective

 

4td SEMESTER

 

Sr. No Course Code Course Title Cr. Hr Course Type
1 CCS xxxx Elective-V 3 Elective
2 CCS xxxx Thesis(Part-2) 3 Elective

 

Course type Min. Number of Courses Min. Number of Cr. Hr
Core Courses 4 x 3   12
Electives 5 x 3   15
Thesis 2 x 3   06
Total     33

 

Total No. of Courses in the Program: 09
Total Credit Hours of the Program: 33
Minimum Credit Hours Required: 33
Core Courses (4×3=12) Credit Hours Pre-requisite (s)
CCS xxx Network Security 3
CCS xxx Information Technology 3
CCS xxx Digital Forensics 3
CCS xxx Applied Cryptography 3

 

MS Thesis (6 Credits) Credit Hours Pre-requisite (s)
CCS xxx MS Thesis (Mandatory) 3
Deficiency Courses
Programming Fundamentals (Core Programming Course)
Data Structures & Algorithms OR Design & Analysis of Algorithms
 Computer Networks
Elective Courses (5×3=15) Credit Hours Pre-requisite (s)
CCS xxx Network Penetration Testing and Countermeasures 3
CCS xxx Security in Mobile and Wireless Networks 3
CCS xxx Ethical Hacking 3
CCS xxx Malware Detection and Analysis 3
CCS xxx Block chain and Crypto Assets 3
CCS xxx Intrusion detection and firewalls 3
CCS xxx Reverse Engineering and Malware Analysis 3
CCS xxx Security and Privacy for the Smart Grid 3
CCS xxx Machine Learning for Cyber Security 3
CCS xxx Security Modelling and Analysis of Mobile Agent Systems 3
CCS xxx Security in Ad Hoc Sensor Networks 3
CCS xxx Security in Cloud Environment 3
CCS xxx Advanced Topic in Cyber Security – I 3
CCS xxx Advanced Topic in Cyber Security – II 3