About The Program
Due to the rise in cyber threats and data breaches, organizations across various sectors are actively seeking skilled cybersecurity professionals to protect their valuable assets, confidential information, and ICT infrastructure. As cybersecurity is a global challenge; it is equally important for Pakistan to protect its digitals assets. Therefore, Cybersecurity is an excellent career opportunity for Pakistani students. Cybersecurity offers excellent career growth prospects with a specialized knowledge in the sub-fields such as network security, penetration testing, ethical hacking, incident response, risk management. With the increasing importance of protecting digital assets and the continuous development of new technologies and threats, the demand for cybersecurity professionals is expected to grow speedily. Skilled individuals in this field can enjoy long-term job prospects and competitive salaries.
Admission Requirements
- Higher Secondary School Certificate (F.Sc. Pre-Engineering or Pre-Medical) or Equivalent with Physics, Chemistry and Mathematics securing at least 50% marks in aggregate.
OR
Intermediate of Computer Science (ICS) or Equivalent with Physics, Computer Science and Mathematics securing at least 50% marks in aggregate. - CUST Admission Test or HEC Approved Test.
DEGREE REQUIREMENTS
Each candidate for the BS Cyber Security degree is required to complete successfully 140 credit hours (Cr. Hrs.) as per the following details:
| Area | Cr. Hrs. |
|---|---|
| a) General Education | 34 |
| b) Disciplinary or Major Courses | 82 |
| c) Interdisciplinary / Allied Courses | 15 |
| d) Field Experience / Internship | 03 |
| e) Capstone / Design Project | 06 |
| f) Community Service | 00 |
| Total | 140 |
General Education Courses (34 Cr. Hrs.)
| Course Title | Code | Cr. Hrs. |
|---|---|---|
| Functional English | CYG1113 | 3 |
| Expository Writing | CYG1123 | 3 |
| Islamic Studies/Ethics | CYG1012 | 2 |
| Ideology and Constitution of Pakistan | CYG1022 | 2 |
| Personal Grooming | CYG1212 | 2 |
| Sociology | CYG1412 | 2 |
| Applications of Information and Communication Technologies | CYG1612 | 2 |
| Applications of Information and Communication Technologies Lab | CYG1611 | 1 |
| Civics and Professional Ethics | CYG2812 | 2 |
| Calculus and Analytical Geometry | CYG1513 | 3 |
| Applied Physics | CYG1312 | 2 |
| Applied Physics Lab | CYG1311 | 1 |
| Entrepreneurship | CYG2712 | 2 |
| Probability and Statistics | CYG2523 | 3 |
| Fehm-ul-Quran I | CYG1021 | 1 |
| Fehm-ul-Quran II | CYG1031 | 1 |
| Pakistan Studies | CYG1032 | 2 |
Disciplinary Courses (82 Cr. Hrs.)
a) Computing Courses (43 Cr. Hrs.)
| Course Title | Code | Cr. Hrs. |
|---|---|---|
| Programming Fundamentals | CY1133 | 3 |
| Programming Fundamentals Lab | CY1131 | 1 |
| Object Oriented Programming | CY1123 | 3 |
| Object Oriented Programming Lab | CY1121 | 1 |
| Data Structures and Algorithms | CY2133 | 3 |
| Data Structures and Algorithms Lab | CY2131 | 1 |
| Digital Logic Design | CY2313 | 3 |
| Digital Logic Design Lab | CY2311 | 1 |
| Design and Analysis of Algorithms | CY4153 | 3 |
| Computer Organization and Assembly Language | CY2322 | 2 |
| Computer Organization and Assembly Language Lab | CY2321 | 1 |
| Computer Communications and Networks | CY3713 | 3 |
| Computer Communications and Networks Lab | CY3711 | 1 |
| Information Security | CY2212 | 2 |
| Information Security Lab | CY2211 | 1 |
| Database Systems | CY4513 | 3 |
| Database Systems Lab | CY4511 | 1 |
| Operating Systems | CY3413 | 3 |
| Operating Systems Lab | CY3411 | 1 |
| Artificial Intelligence | CY3632 | 2 |
| Artificial Intelligence Lab | CY3631 | 1 |
| Software Engineering | CY4523 | 3 |
b) Core Courses (18 Cr. Hrs.)
| Course Title | Code | Cr. Hrs. |
|---|---|---|
| Fundamentals of Cyber Security | CY2202 | 2 |
| Fundamentals of Cyber Security Lab | CY2201 | 1 |
| Network Security | CY3222 | 2 |
| Network Security Lab | CY3221 | 1 |
| Secure Software Design and Development | CY3232 | 2 |
| Secure Software Design and Development Lab | CY3231 | 1 |
| Information Assurance | CY3242 | 2 |
| Information Assurance Lab | CY3241 | 1 |
| Parallel and Distributed Computing | CY4542 | 2 |
| Parallel and Distributed Computing Lab | CY4541 | 1 |
| Digital Forensics | CY4252 | 2 |
| Digital Forensics Lab | CY4251 | 1 |
c) Depth Elective Courses (21 Cr. Hrs.)
| Course Title | Code | Cr. Hrs. |
|---|---|---|
| Malware Analysis | CY3643 | 3 |
| Penetration Testing | CY4622 | 2 |
| Penetration Testing Lab | CY4621 | 1 |
| Theory of Automata | CSCY3613 | 3 |
| Wireless and Mobile Security | CY4263 | 3 |
| Embedded Systems | CY4352 | 2 |
| Embedded Systems Lab | CY4351 | 1 |
| Vulnerability Assessment & Reverse Engineering | CY4652 | 2 |
| Vulnerability Assessment & Reverse Engineering Lab | CY4651 | 1 |
| Cyber Law & Cyber Crime (Cyber Warfare) | CY4663 | 3 |
*Depth Elective Courses
Students are required to take 21 Cr. Hrs. as depth elective courses. A list of technical elective courses is given below:
| Course Title | Code | Cr. Hrs. |
|---|---|---|
| Vulnerability Assessment & Reverse Engineering | CY4652 | 2 |
| Vulnerability Assessment & Reverse Engineering Lab | CY4651 | 1 |
| Hardware Security | CY4273 | 3 |
| Malware Analysis | CY3643 | 3 |
| Wireless and Mobile Security | CY4262 | 2 |
| Theory of Automata | CSCY3613 | 3 |
| HCI & Computer Graphics | CSCY3423 | 3 |
| Embedded Systems Security | CY4353 | 3 |
| Embedded Systems Security Lab | CY4351 | 1 |
| Penetration Testing | CY4622 | 2 |
| Penetration Testing Lab | CY4621 | 1 |
| Computer Architecture | CY4723 | 3 |
| Cyber Law & Cyber Crime (Cyber Warfare) | CY4663 | 3 |
| Control System Security | CY4283 | 3 |
Interdisciplinary / Allied Courses (IDC) - 15 Cr. Hrs.
Students are required to take 21 Cr. Hrs. as depth elective courses. A list of technical elective courses is given below:
| Course Title | Code | Cr. Hrs. |
|---|---|---|
| Multivariable Calculus | MTCY2043 | 3 |
| Discrete Structures | CY2053 | 3 |
| Linear Algebra | MTCY2033 | 3 |
| Technical and Business Writing | HMCY4033 | 3 |
| Business & Marketing | MKCY4233 | 3 |
Capstone / Design Project (06 Cr. Hrs.)
After the completion of 90 Cr. Hrs., the students are required to register for Design Project (Part-I) of 3 Cr. Hrs. in the 7th semester of their degree program. Design Project (Part-II) of 3 Cr. Hrs. can be taken in the next i.e. 8th semester provided Design Project (Part-I) is passed.
| Course Title | Code | Cr. Hrs. |
|---|---|---|
| Design Project (Part-I) | CY4912 | 02 |
| Design Project (Part-II) | CY4924 | 04 |
Field Experience /Internship (03 Cr. Hrs.)
Each student is required to complete 8 weeks industrial internship training usually after 6th semester or on the completion of 90 Cr. Hrs.
| Course Title | Code | Cr. Hrs. |
|---|---|---|
| Field Experience/Internship | CY4003 | 03 |
Community Service (VIS4000)
Each student is required to complete 65 hours community work, usually after 1st semester which would be a prerequisite for the award of degree. It will be assessed as satisfactory (S) / unsatisfactory (US). In case of unsatisfactory, it will be done from scratch.
CGPA Requirement
A student is required to earn a minimum 2.00/4.00 CGPA on the completion of his/her degree requirements.
Program Duration
This is a four year degree program comprising of 8 semesters. There will be a Fall and a Spring semester in each year. The summer semester will be utilized for internship or deficiency courses. The maximum duration to complete BS Cyber Security degree is 07 years.
Semester-I (15 Cr. Hrs.)
| Course Code | Course Title | Cr. Hrs. | |
| CYG | 1113 | Functional English | 3 |
| CYG | 1022 | Ideology and Constitution of Pakistan | 2 |
| CY | 1133 | Programming Fundamentals | 3 |
| CY | 1131 | Programming Fundamentals Lab | 1 |
| CYG | 1612 | Applications of Information and Communication Technologies | 2 |
| CYG | 1611 | Applications of Information and Communication Technologies Lab | 1 |
| CYG | 1312 | Applied Physics | 2 |
| CYG | 1311 | Applied Physics Lab | 1 |
Semester-II (18 Cr. Hrs)
| Course Code | Course Title | Cr. Hrs. | |
| CYG | 1123 | Expository Writing | 3 |
| CYG | 2812 | Civics and Professional Ethics | 2 |
| CYG | 1032 | Pakistan Studies | 2 |
| CY | 2053 | Discrete Structures | 3 |
| CY | 1123 | Object Oriented Programming | 3 |
| CY | 1121 | Object Oriented Programming Lab | 1 |
| CY | 2313 | Digital Logic Design | 3 |
| CY | 2311 | Digital Logic Design Lab | 1 |
Semester-III (18 Cr. Hrs)
| Course Code | Course Title | Cr. Hrs. | |
| CYG | 1513 | Calculus and Analytical Geometry | 3 |
| CYG | 1212 | Personal Grooming | 2 |
| CY | 2202 | Fundamentals of Cyber Security | 2 |
| CY | 2201 | Fundamentals of Cyber Security Lab | 1 |
| CY | 2133 | Data Structures and Algorithms | 3 |
| CY | 2131 | Data Structures and Algorithms Lab | 1 |
| CYG | 2523 | Probability and Statistics | 3 |
| CYG | 2712 | Entrepreneurship | 2 |
| CYG | 1021 | Fehm-ul-Quran I | 1 |
Semester-IV (18 Cr. Hrs)
| Course Code | Course Title | Cr. Hrs. | |
| MTCY | 2033 | Linear Algebra | 3 |
| CY | 3713 | Computer Communications and Networks | 3 |
| CY | 3711 | Computer Communications and Networks Lab | 1 |
| CYG | 1412 | Sociology | 2 |
| CYG | 1012 | Islamic Studies / Ethics | 2 |
| CY | 4153 | Design and Analysis of Algorithms | 3 |
| CY | 2212 | Information Security | 2 |
| CY | 2211 | Information Security Lab | 1 |
| CYG | 1031 | Fehm-e-Quran II | 1 |
Semester-V (17 Cr. Hrs)
| Course Code | Course Title | Cr. Hrs. | |
| CY | 3xx3 | Elective – I | 3 |
| CY | 3222 | Network Security | 2 |
| CY | 3221 | Network Security Lab | 1 |
| CY | 3413 | Operating Systems | 3 |
| CY | 3411 | Operating Systems Lab | 1 |
| CY | 4513 | Database Systems | 3 |
| CY | 4511 | Database Systems Lab | 1 |
| CY | 2322 | Computer Organization and Assembly Language | 2 |
| CY | 2321 | Computer Organization and Assembly Language Lab | 1 |
Semester-VI (18 Cr. Hrs)
| Course Code | Course Title | Cr. Hrs. | |
| MTCY | 2043 | Multivariable Calculus | 3 |
| CY | 3242 | Information Assurance | 2 |
| CY | 3241 | Information Assurance Lab | 1 |
| CY | 3232 | Secure Software Design and Development | 2 |
| CY | 3231 | Secure Software Design and Development Lab | 1 |
| CY | 4523 | Software Engineering | 3 |
| CY | 3xx3 | Elective – II | 3 |
| CY | 3632 | Artificial Intelligence | 2 |
| CY | 3631 | Artificial Intelligence Lab | 1 |
Semester-VII (17 Cr. Hrs)
| Course Code | Course Title | Cr. Hrs. | |
| HMCY | 4033 | Technical and Business Writing | 3 |
| CY | 4xx3 | Elective – III | 3 |
| CY | 4xx3 | Elective – IV | 3 |
| CY | 4252 | Digital Forensics | 2 |
| CY | 4251 | Digital Forensics Lab | 1 |
| MKCY | 4233 | Business & Marketing | 3 |
| CY | 4912 | Design Project (Part-I) | 2 |
Semester-VIII (16 Cr. Hrs)
| Course Code | Course Title | Cr. Hrs. | |
| CY | 4xx2 | Elective – V | 2 |
| CY | 4xx1 | Elective – V Lab | 1 |
| CY | 4xx3 | Elective – VI | 3 |
| CY | 4xx3 | Elective – VII | 3 |
| CY | 4542 | Parallel and Distributed Computing | 2 |
| CY | 4541 | Parallel and Distributed Computing Lab | 1 |
| CY | 4924 | Design Project (Part-II) | 4 |
The graduates of the BS Cyber Security will become the professionals who:
| Sr. # | Statement |
|---|---|
| PEO-1 | Demonstrate excellence in the profession through in-depth knowledge and requisite skills in the emerging fields of cyber and information security. |
| PEO-2 | Engage in continuous professional development and exhibit a quest for learning, innovation, and entrepreneurship. |
| PEO-3 | Show professional integrity and commitment to social and ethical responsibilities. |
At the time of graduation the graduates of BS Cyber Security program will possess the following attributes:
| Sr. # | Learning Objective | Statement |
|---|---|---|
| PLO-1 | Academic Education |
Equip graduates with a strong foundation in computing principles and in-depth knowledge of cyber and information security concepts to prepare them as cybersecurity professionals. |
| PLO-2 | Knowledge for Solving Computing Problems |
Apply knowledge of computing fundamentals, knowledge of cyber and information security, mathematics, science, and domain knowledge appropriate for the computing specialization to the abstraction and conceptualization of computing models that address cyber and information security problems and requirements. |
| PLO-3 | Problem Analysis |
Identify, formulate, research literature, and solve complex computing problems reaching substantiated conclusions using fundamental principles of mathematics, computing sciences, and cyber and information security. |
| PLO-4 | Design/Development of Solutions |
Design and evaluate solutions for complex computing problems, and design and evaluate cyber and information security systems, components, or processes that meet specified needs with appropriate consideration for public health and safety, cultural, societal, and environmental considerations. |
| PLO-5 | Modern Tool Usage |
Create, select, adapt, and apply appropriate techniques, resources, and modern computing tools to complex computing activities relating to cyber and information security, with an understanding of the limitations. |
| PLO-6 | Individual and Teamwork |
Function effectively as an individual and as a member or leader in diverse teams and multi-disciplinary settings, fostering effective collaboration to address complex cyber and information security challenges. |
| PLO-7 | Communication |
Communicate effectively with the computing community and with society about complex computing activities by being able to comprehend and write effective reports, design documentation, make effective presentations, and give and understand clear instructions. |
| PLO-8 | Computing Professionalism and Society |
Understand and assess societal, health, safety, legal, and cultural issues pertaining to cyber and information security within local and global contexts, and the consequential responsibilities relevant to professional computing practice. |
| PLO-9 | Ethics |
Understand and commit to professional ethics, responsibilities, and norms of professional computing practices involving cyber and information security measures. |
| PLO-10 | Lifelong Learning |
Recognize the ongoing need for lifelong learning in the ever-evolving field of cyber and information security and have the ability to engage in independent learning for continual development as a computing professional. |

