The BS Cyber Security program offers comprehensive training in network security, ethical hacking, and risk management, preparing graduates for critical roles in safeguarding information systems.
To prepare skilled professionals equipped with the knowledge and tools to protect digital infrastructure and combat cyber threats effectively.
No eligibility criteria available.
44
135
4 Years
8
Title of the Course | Cr. Hrs |
---|---|
Islamic Studies / Comparative Study of Religions | 2 |
Arts and Humanities / History of Art & Culture | 2 |
Natural Sciences / Environmental Science | 3 |
Ideology and Constitution of Pakistan | 2 |
Programming Fundamentals | 4 |
Discrete Structure | 3 |
TOTAL | 16 |
Title of the Course | Cr. Hrs |
---|---|
Civic Education & Citizenship | 2 |
Applications of ICT | 3 |
Functional English | 3 |
Social Psychology | 2 |
Calculus & Analytical Geometry | 3 |
Object Oriented Programming | 4 |
TOTAL | 17 |
Title of the Course | Cr. Hrs |
---|---|
Introduction to Philosophy | 3 |
Communication & Presentation Skills | 3 |
Database Systems | 4 |
Data Structures & Algorithms | 4 |
Compiler Construction | 3 |
TOTAL | 17 |
Title of the Course | Cr. Hrs |
---|---|
Critical Thinking | 3 |
Entrepreneurship | 2 |
Information Security | 3 |
Introduction to Cyber Security | 3 |
Cyber Law & Cyber Crime (Cyber Warfare) | 3 |
Minor 2 | 3 |
TOTAL | 17 |
Title of the Course | Cr. Hrs |
---|---|
Artificial Intelligence | 4 |
Digital Logic Design | 4 |
Computer Networks | 4 |
Computer Organization & Assembly Language | 4 |
TOTAL | 16 |
Title of the Course | Cr. Hrs |
---|---|
Minor 3 | 3 |
Operating Systems | 4 |
Digital Forensics | 3 |
Information Assurance | 3 |
Analysis of Algorithms | 3 |
Human Computer Interaction | 3 |
TOTAL | 19 |
Title of the Course | Cr. Hrs |
---|---|
Theory of Automata | 3 |
Secure Software Design and Development | 3 |
Vulnerability Assessment & Reverse Engineering | 3 |
Network Security | 3 |
Minor 4 | 3 |
Final Year Project-I | 3 |
TOTAL | 18 |
Title of the Course | Cr. Hrs |
---|---|
Wireless and Mobile Security | 3 |
Software Engineering | 3 |
Malware Analysis | 3 |
Cryptography | 3 |
Final Year Project-II | 3 |
TOTAL | 15 |