BS Cyber Security

About The Program

Due to the rise in cyber threats and data breaches, organizations across various sectors are actively seeking skilled cybersecurity professionals to protect their valuable assets, confidential information, and ICT infrastructure. As cybersecurity is a global challenge; it is equally important for Pakistan to protect its digitals assets. Therefore, Cybersecurity is an excellent career opportunity for Pakistani students. Cybersecurity offers excellent career growth prospects with a specialized knowledge in the sub-fields such as network security, penetration testing, ethical hacking, incident response, risk management. With the increasing importance of protecting digital assets and the continuous development of new technologies and threats, the demand for cybersecurity professionals is expected to grow speedily. Skilled individuals in this field can enjoy long-term job prospects and competitive salaries.

Admission Requirements

  • Higher Secondary School Certificate (F.Sc. Pre-Engineering or Pre-Medical) or Equivalent with Physics, Chemistry and Mathematics securing at least 50% marks in aggregate.
    OR
    Intermediate of Computer Science (ICS) or Equivalent with Physics, Computer Science and Mathematics securing at least 50% marks in aggregate.
  • CUST Admission Test or HEC Approved Test.

DEGREE REQUIREMENTS

Each candidate for the BS Cyber Security degree is required to complete successfully 140 credit hours (Cr. Hrs.) as per the following details:

Area Cr. Hrs.
a) General Education 34
b) Disciplinary or Major Courses 82
c) Interdisciplinary / Allied Courses 15
d) Field Experience / Internship 03
e) Capstone / Design Project 06
f) Community Service 00
Total 140

General Education Courses (34 Cr. Hrs.)

Course Title Code Cr. Hrs.
Functional English CYG1113 3
Expository Writing CYG1123 3
Islamic Studies/Ethics CYG1012 2
Ideology and Constitution of Pakistan CYG1022 2
Personal Grooming CYG1212 2
Sociology CYG1412 2
Applications of Information and Communication Technologies CYG1612 2
Applications of Information and Communication Technologies Lab CYG1611 1
Civics and Professional Ethics CYG2812 2
Calculus and Analytical Geometry CYG1513 3
Applied Physics CYG1312 2
Applied Physics Lab CYG1311 1
Entrepreneurship CYG2712 2
Probability and Statistics CYG2523 3
Fehm-ul-Quran I CYG1021 1
Fehm-ul-Quran II CYG1031 1
Pakistan Studies CYG1032 2

Disciplinary Courses (82 Cr. Hrs.)

a) Computing Courses (43 Cr. Hrs.)

Course Title Code Cr. Hrs.
Programming Fundamentals CY1133 3
Programming Fundamentals Lab CY1131 1
Object Oriented Programming CY1123 3
Object Oriented Programming Lab CY1121 1
Data Structures and Algorithms CY2133 3
Data Structures and Algorithms Lab CY2131 1
Digital Logic Design CY2313 3
Digital Logic Design Lab CY2311 1
Design and Analysis of Algorithms CY4153 3
Computer Organization and Assembly Language CY2322 2
Computer Organization and Assembly Language Lab CY2321 1
Computer Communications and Networks CY3713 3
Computer Communications and Networks Lab CY3711 1
Information Security CY2212 2
Information Security Lab CY2211 1
Database Systems CY4513 3
Database Systems Lab CY4511 1
Operating Systems CY3413 3
Operating Systems Lab CY3411 1
Artificial Intelligence CY3632 2
Artificial Intelligence Lab CY3631 1
Software Engineering CY4523 3

b) Core Courses (18 Cr. Hrs.)

Course Title Code Cr. Hrs.
Fundamentals of Cyber Security CY2202 2
Fundamentals of Cyber Security Lab CY2201 1
Network Security CY3222 2
Network Security Lab CY3221 1
Secure Software Design and Development CY3232 2
Secure Software Design and Development Lab CY3231 1
Information Assurance CY3242 2
Information Assurance Lab CY3241 1
Parallel and Distributed Computing CY4542 2
Parallel and Distributed Computing Lab CY4541 1
Digital Forensics CY4252 2
Digital Forensics Lab CY4251 1

c) Depth Elective Courses (21 Cr. Hrs.)

Course Title Code Cr. Hrs.
Malware Analysis CY3643 3
Penetration Testing CY4622 2
Penetration Testing Lab CY4621 1
Theory of Automata CSCY3613 3
Wireless and Mobile Security CY4263 3
Embedded Systems CY4352 2
Embedded Systems Lab CY4351 1
Vulnerability Assessment & Reverse Engineering CY4652 2
Vulnerability Assessment & Reverse Engineering Lab CY4651 1
Cyber Law & Cyber Crime (Cyber Warfare) CY4663 3

*Depth Elective Courses

Students are required to take 21 Cr. Hrs. as depth elective courses. A list of technical elective courses is given below:

Course Title Code Cr. Hrs.
Vulnerability Assessment & Reverse Engineering CY4652 2
Vulnerability Assessment & Reverse Engineering Lab CY4651 1
Hardware Security CY4273 3
Malware Analysis CY3643 3
Wireless and Mobile Security CY4262 2
Theory of Automata CSCY3613 3
HCI & Computer Graphics CSCY3423 3
Embedded Systems Security CY4353 3
Embedded Systems Security Lab CY4351 1
Penetration Testing CY4622 2
Penetration Testing Lab CY4621 1
Computer Architecture CY4723 3
Cyber Law & Cyber Crime (Cyber Warfare) CY4663 3
Control System Security CY4283 3

Interdisciplinary / Allied Courses (IDC) - 15 Cr. Hrs.

Students are required to take 21 Cr. Hrs. as depth elective courses. A list of technical elective courses is given below:

Course Title Code Cr. Hrs.
Multivariable Calculus MTCY2043 3
Discrete Structures CY2053 3
Linear Algebra MTCY2033 3
Technical and Business Writing HMCY4033 3
Business & Marketing MKCY4233 3

Capstone / Design Project (06 Cr. Hrs.)

After the completion of 90 Cr. Hrs., the students are required to register for Design Project (Part-I) of 3 Cr. Hrs. in the 7th semester of their degree program. Design Project (Part-II) of 3 Cr. Hrs. can be taken in the next i.e. 8th semester provided Design Project (Part-I) is passed.

Course Title Code Cr. Hrs.
Design Project (Part-I) CY4912 02
Design Project (Part-II) CY4924 04

Field Experience /Internship (03 Cr. Hrs.)

Each student is required to complete 8 weeks industrial internship training usually after 6th semester or on the completion of 90 Cr. Hrs.

Course Title Code Cr. Hrs.
Field Experience/Internship CY4003 03

Community Service (VIS4000)

Each student is required to complete 65 hours community work, usually after 1st semester which would be a prerequisite for the award of degree. It will be assessed as satisfactory (S) / unsatisfactory (US). In case of unsatisfactory, it will be done from scratch.

CGPA Requirement

A student is required to earn a minimum 2.00/4.00 CGPA on the completion of his/her degree requirements.

Program Duration

This is a four year degree program comprising of 8 semesters. There will be a Fall and a Spring semester in each year. The summer semester will be utilized for internship or deficiency courses. The maximum duration to complete BS Cyber Security degree is 07 years.

Semester-I (15 Cr. Hrs.)

Course Code Course Title Cr. Hrs.
CYG 1113 Functional English 3
CYG 1022 Ideology and Constitution of Pakistan 2
CY 1133 Programming Fundamentals 3
CY 1131 Programming Fundamentals Lab 1
CYG 1612 Applications of Information and Communication Technologies 2
CYG 1611 Applications of Information and Communication Technologies Lab 1
CYG 1312 Applied Physics 2
CYG 1311 Applied Physics Lab 1

Semester-II (18 Cr. Hrs)

Course Code Course Title Cr. Hrs.
CYG 1123 Expository Writing 3
CYG 2812 Civics and Professional Ethics 2
CYG 1032 Pakistan Studies 2
CY 2053 Discrete Structures 3
CY 1123 Object Oriented Programming 3
CY 1121 Object Oriented Programming Lab 1
CY 2313 Digital Logic Design 3
CY 2311 Digital Logic Design Lab 1

Semester-III (18 Cr. Hrs)

Course Code Course Title Cr. Hrs.
CYG 1513 Calculus and Analytical Geometry 3
CYG 1212 Personal Grooming 2
CY 2202 Fundamentals of Cyber Security 2
CY 2201 Fundamentals of Cyber Security Lab 1
CY 2133 Data Structures and Algorithms 3
CY 2131 Data Structures and Algorithms Lab 1
CYG 2523 Probability and Statistics 3
CYG 2712 Entrepreneurship 2
CYG 1021 Fehm-ul-Quran I 1

Semester-IV (18 Cr. Hrs)

Course Code Course Title Cr. Hrs.
MTCY 2033 Linear Algebra 3
CY 3713 Computer Communications and Networks 3
CY 3711 Computer Communications and Networks Lab 1
CYG 1412 Sociology 2
CYG 1012 Islamic Studies / Ethics 2
CY 4153 Design and Analysis of Algorithms 3
CY 2212 Information Security 2
CY 2211 Information Security Lab 1
CYG 1031 Fehm-e-Quran II 1

Semester-V (17 Cr. Hrs)

Course Code Course Title Cr. Hrs.
CY 3xx3 Elective – I 3
CY 3222 Network Security 2
CY 3221 Network Security Lab 1
CY 3413 Operating Systems 3
CY 3411 Operating Systems Lab 1
CY 4513 Database Systems 3
CY 4511 Database Systems Lab 1
CY 2322 Computer Organization and Assembly Language 2
CY 2321 Computer Organization and Assembly Language Lab 1

Semester-VI (18 Cr. Hrs)

Course Code Course Title Cr. Hrs.
MTCY 2043 Multivariable Calculus 3
CY 3242 Information Assurance 2
CY 3241 Information Assurance Lab 1
CY 3232 Secure Software Design and Development 2
CY 3231 Secure Software Design and Development Lab 1
CY 4523 Software Engineering 3
CY 3xx3 Elective – II 3
CY 3632 Artificial Intelligence 2
CY 3631 Artificial Intelligence Lab 1

Semester-VII (17 Cr. Hrs)

Course Code Course Title Cr. Hrs.
HMCY 4033 Technical and Business Writing 3
CY 4xx3 Elective – III 3
CY 4xx3 Elective – IV 3
CY 4252 Digital Forensics 2
CY 4251 Digital Forensics Lab 1
MKCY 4233 Business & Marketing 3
CY 4912 Design Project (Part-I) 2

Semester-VIII (16 Cr. Hrs)

Course Code Course Title Cr. Hrs.
CY 4xx2 Elective – V 2
CY 4xx1 Elective – V Lab 1
CY 4xx3 Elective – VI 3
CY 4xx3 Elective – VII 3
CY 4542 Parallel and Distributed Computing 2
CY 4541 Parallel and Distributed Computing Lab 1
CY 4924 Design Project (Part-II) 4

The graduates of the BS Cyber Security will become the professionals who:

Sr. # Statement
PEO-1 Demonstrate excellence in the profession through in-depth knowledge and requisite skills in the emerging fields of cyber and information security.
PEO-2 Engage in continuous professional development and exhibit a quest for learning, innovation, and entrepreneurship.
PEO-3 Show professional integrity and commitment to social and ethical responsibilities.

At the time of graduation the graduates of BS Cyber Security program will possess the following attributes:

Sr. # Learning Objective Statement
PLO-1 Academic Education

Equip graduates with a strong foundation in computing principles and in-depth knowledge of cyber and information security concepts to prepare them as cybersecurity professionals.

PLO-2 Knowledge for Solving Computing Problems

Apply knowledge of computing fundamentals, knowledge of cyber and information security, mathematics, science, and domain knowledge appropriate for the computing specialization to the abstraction and conceptualization of computing models that address cyber and information security problems and requirements.

PLO-3 Problem Analysis

Identify, formulate, research literature, and solve complex computing problems reaching substantiated conclusions using fundamental principles of mathematics, computing sciences, and cyber and information security.

PLO-4 Design/Development of Solutions

Design and evaluate solutions for complex computing problems, and design and evaluate cyber and information security systems, components, or processes that meet specified needs with appropriate consideration for public health and safety, cultural, societal, and environmental considerations.

PLO-5 Modern Tool Usage

Create, select, adapt, and apply appropriate techniques, resources, and modern computing tools to complex computing activities relating to cyber and information security, with an understanding of the limitations.

PLO-6 Individual and Teamwork

Function effectively as an individual and as a member or leader in diverse teams and multi-disciplinary settings, fostering effective collaboration to address complex cyber and information security challenges.

PLO-7 Communication

Communicate effectively with the computing community and with society about complex computing activities by being able to comprehend and write effective reports, design documentation, make effective presentations, and give and understand clear instructions.

PLO-8 Computing Professionalism and Society

Understand and assess societal, health, safety, legal, and cultural issues pertaining to cyber and information security within local and global contexts, and the consequential responsibilities relevant to professional computing practice.

PLO-9 Ethics

Understand and commit to professional ethics, responsibilities, and norms of professional computing practices involving cyber and information security measures.

PLO-10 Lifelong Learning

Recognize the ongoing need for lifelong learning in the ever-evolving field of cyber and information security and have the ability to engage in independent learning for continual development as a computing professional.