Skip to main content
Course CSC 482 | Modelling and Simulation | 400 Level | 2nd Semester
Course Structure Basic Definitions and Uses, Simulation Process, Some basic statistic Distributions Theory, Model and Simulation. Queues; Basic components, Kendal notation, Queuing rules, Little's Law. Queuing networks. Special/types of queues. Stochastic Processes; Discrete state and continuous state processes, Markov processes, Birth-Death Processes, Poisson Processes. Random Numbers: types of Random Number Exercises.
Course CYB 401 | Database Management and Control Systems | 400 Level | 1st Semester
Course Structure Introduction: Security issues faced by enterprises, installing a typical database product, Security architecture. Operating system security principles, Administration of users, Profiles. Password policies privileges and roles, Database application security models, Database auditing models, Application data auditing, Practices of database auditing.
Course CYB 403 | Systems Vulnerability Assessment and Testing | 400 Level | 1st Semester
Course Structure Software design: software architecture, design patterns, object-oriented analysis & design, Design for re-use. Using APIs: API programming class browsers and related tools, component- based computing. Software tools and environment: requirements analysis and design modelling; Tools: testing tools, tool integration mech.
Course CYB 405 | Cloud Computing Security | 400 Level | 1st Semester
Course Structure Introduction to cloud computing, cloud computing vendors cloud Computing threats, Cloud Reference Model. Introduction to data centres: servers, data storage, networking, and virtualisation. Data centre networking, Introduction to server virtualization software: VMware VSphere. Virtual machine management: configuration, placement and resource allocation. Power efficiency in virtual data centres. Fault tolerance in virtual data centres., The Cloud Cube Model and Security for Cloud Computing. Security in the Cloud, Cloud Threats, Threat Mitigation. Cloud and Security Risks Real World Issues with Cloud Computing, Cloud Security Alliance, National Institute of Standards and Technology, Information Assurance Framework, Cloud Audit, Cloud Management Audit/Assurance Program, Cloud Business Continuity Planning.
Course CYB 407 | Information Disaster Recovery | 400 Level | 1st Semester
Course Structure Disaster Recovery Philosophy, Principles and Planning, Contingency Plan Components, Agency Response Procedures and Continuity of Operations, Planning Processes, Continuity and Recovery Function, Steps of Disaster Recovery Planning, Role of IT and Network Management in Disaster Recovery, Developing the Disaster Recovery, Executive Support, DRP Leadership, Cross Department Subcommittee, Department Level Teams, Relationship between IT and Network Staff with Departments, Planning Team Skill Inventory, DRP Team Training, DRP Awareness Campaign. Standards and Regulatory Bodies, Assessing Organizational Risk, Documenting Business Processes, Business Process Inventory, Identifying Threats and Vulnerabilities. Measuring and Quantifying Threats, Risk Reports, Prioritizing systems and Functions for Recovery. Classifying Systems, Determination of Backup Requirements.
Course CYB 409 | VoIP and Multimedia Security | 400 Level | 1st Semester
Course Structure Introduction to multimedia traffic security, General knowledge and techniques for streaming data traffic, such as VoIP and multimedia. The security challenges unique to such traffic will be covered in detail. including disruption of service, theft of service, and violation of confidentiality. Relevant data encryption and authentication techniques will also be covered in detail.
Course CYB 410 | Ethical Hacking and Reverse Engineering | 400 Level | 2nd Semester
Course Structure Explores techniques and technologies for understanding the operation of malicious software and attacks. Discusses and explores techniques for detection, identification and prevention. Presents reverse engineering of code and network exploits as a method for understanding and development of countermeasures.
Course CYB 412 | Fault Tolerant Computing | 400 Level | 2nd Semester
Course Structure Introduction and overview of fault tolerant schemes; fault and error modelling; test generation and fault simulation; concepts in fault-tolerance; reliability/availability modelling: system level diagnosis low level fault-tolerance - coding techniques (basic principles. parity bit codes, hamming codes, error detection and retransmission codes, burst error correction codes, Reed-Solomon codes, etc.): high-level fault tolerant techniques in systems: rollback, check pointing, reconfiguration: software fault-tolerance; fault tolerant routing: integrated hardware/software fault-tolerance redundancy, spares and repairs-apportionment, system versus component redundancy, parallel redundancy, RAID system reliability, N-modular redundancy; software reliability and recovery techniques, network system reliability, reliability optimisation.
Course CYB 413 | Enterprise Security & Information Assurance | 400 Level | 1st Semester
Course Structure This course addresses the security of e-business and cyber environments from an end-to-end perspective. including data centre security and access security. The information security phases of inspection. protection, detection, reaction, and reflection are emphasized. Topics also include: server and application security, virtual local area networks (VLANs), secure access and financial transaction techniques, and backup and disaster recovery techniques.
Course CYB 414 | Cryptography: Algorithms and Applications | 400 Level | 2nd Semester
Course Structure Overview Cryptography, Mathematical Background, Symmetric and Introduction to Cryptosystems, Stream Ciphers, Block Ciphers, Feistel Ciphers, Multiple Encryption, DES/AES, Hash Functions, Data Integrity, Authentication, MAC, Asymmetric Cryptosystems, Number Theory Background, Algorithmic Number Theory, Probabilistic Primality Testing, True Primality, Testing, Factoring Integers, KdA, security of RSA Encryption, Security of RSA Key Generation. Discrete Logarithm Cryptographic Schemes, Diffie-Hellman, ElGamal, Key Establishment, identification Protocols, Digital Signatures, Public Key Management, ECC, Quantum Cryptography, Visual Cryptography, Lattice Cryptography.
Course CYB 415 | Security Strategies for Web Application & Social Networks | 400 Level | 1st Semester
Course Structure The course will Analyse the impact of the Internet and Web applications on the business world, the evolution of social media and social networking, Compare and contrast Web-based risks, common Web site attacks, weaknesses, and security best practices, Explain the value and importance of vulnerability and security assessments for Web applications, Describe the attributes and qualities of secure coding practices, the role and importance of audit and compliance to Web application security, the role and importance of quality assurance testing for Web applications, Evaluate next generation challenges in securing Web applications and data and Construct a comprehensive lifecycle approach to Web application security.
Course CYB 416 | Cyber Law | 400 Level | 2nd Semester
Course Structure This course provides an overview of the legal doctrines and principles that apply to the operation and development of computer technology and the Internet. Topics include: issues related to Jurisdiction. constitutional issues of free speech, property rights, e-business, and current developments in legislation and case law.
Course CYB 417 | Forensic Analysis | 400 Level | 1st Semester
Course Structure Analysis of network and host data. Review of network traffic logs (pcap (packet capture), flow records) and profiles and their types, identification of attack signatures and fingerprints, study of various trace back methods, application of data mining techniques, and the extraction of information (e.g., from malware. including botnet traffic) acquired through the use of network analysis tools and techniques, recovering evidence left behind, and technologies that can be used to assist in the analysis of obtained data or in obtaining more data. Methodologies for recovering data from persistent storage and memory.
Course CYB 418 | Information Security Risk Analysis and Management | 400 Level | 2nd Semester
Course Structure Principles of applied information security management, Governance and security policy, threat and vulnerability management, incident management, risk assessment and risk management frameworks, information leakage, crisis management and business continuity, legal and compliance, security awareness and security implementation considerations. ISO 27000 series and the Plan-Do-Check-Act model, assessment of threats and vulnerabilities, incident response, forensics and investigations, dealing with classified/sensitive data, legal and regulatory drivers and issues, certification, common criteria, security awareness, education and training, and practical considerations when implementing the frameworks to address current and future threats.
Course CYB 419 | Threats, Exploits & Countermeasures | 400 Level | 1st Semester
Course Structure This course addresses the design and implementation of secure applications. Concentration is in writing software programs that make it difficult for intruders to exploit security holes. The course emphasises writing secure distributed programs in Java. The security ramifications of class. Field and method visibility are emphasised.
Course CYB 420 | Information Security Model | 400 Level | 2nd Semester
Course Structure Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data that, if used improperly, can harm the data subjects. As a result, concern about the ownership, control, privacy, and accuracy of these data has become a top priority. This course focuses on both the technical challenges of handling sensitive data and the policy and legal issues facing data subjects, data.
Course CYB 421 | Application Security | 400 Level | 1st Semester
Course Structure Survey of emerging and leading technologies in the cybersecurity field. The aim is to research. A survey of and evaluation of emerging technologies and determine secure implementation strategies for best-fit business solutions. Topics include evolutionary technology development and adoption in organisations.
Course CYB 422 | Privacy in a Networked World | 400 Level | 2nd Semester
Course Structure Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data that, if used improperly, can harm the data subjects. As a result, concern about the ownership, control, privacy, and accuracy of these data has become a top priority. This course focuses on both the technical challenges of handling sensitive data and the policy and legal issues facing data subjects, data.
Course CYB 499 | Final Year Student's Project | 400 Level | 1st Semester
Course Structure An independent or group investigation of appropriate software, hardware, communication and networks or information technology related problems in cyber security carried out under the supervision of a member of academic staff. Before registering, the student must submit a written proposal to the supervisor to review. The proposal should give a brief outline of the project, estimated schedule of completion, and computer resources needed. A formal written report is essential and an oral presentation may also be required.