B.Sc Cybersecurity (4 years)

B.Sc Cybersecurity (4 years)

September

NEXT ENTRY

4 Years

DURATION

₦711,000

FEES PER SESSION

Available

FINANCIAL AID

Entry Requirements

UTME Entry Requirements

  • Credit level passes in 5 subjects including English, Mathematics, Physics and any other two relevant science subjects in the SSCE/GCE/NECO or its equivalent.
  • Acquire the UTME cut off mark

Direct Entry Requirements

  • Credit level passes in 5 subjects including English, Mathematics, Physics and any other two relevant science subjects in the SSCE/GCE/NECO or its equivalent.

  • GCE Advance level /IJMB / JUPEB / NABTEB / NCE / ND /NID certificate in two core subjects from a recognized institution.
Financial Support

Students enrolled on the BSc Cybersecurity have  the following funding options:

  • Scholarships
  • Flexible Payment Plans

Contact Us

Phone number 07046151702 / 07031534545
Entry Requirements

UTME Entry Requirements

  • Credit level passes in 5 subjects including English, Mathematics, Physics and any other two relevant science subjects in the SSCE/GCE/NECO or its equivalent.
  • Acquire the UTME cut off mark

Direct Entry Requirements

  • Credit level passes in 5 subjects including English, Mathematics, Physics and any other two relevant science subjects in the SSCE/GCE/NECO or its equivalent.

  • GCE Advance level /IJMB / JUPEB / NABTEB / NCE / ND /NID certificate in two core subjects from a recognized institution.
Financial Support

Students enrolled on the BSc Cybersecurity have  the following funding options:

  • Scholarships
  • Flexible Payment Plans
Learning Outcomes
  • Assess and apply Cyber Security principles, tools and methods to defend information systems against cyber threats.
  • Protect an organization’s critical information infrastructure by applying Cyber Security design best practices and technologies to prevent and mitigate cyber-attacks and
    vulnerabilities.
  • Design, implement and administer networks securely by integrating network defence technologies, monitoring tools and measures.
  • Apply security best practices to install, configure, and manage modern operating systems.
  • Implement fundamental security principles and techniques in developing secure programs.
  • Apply database security models and best practices in the design and development of database management systems.
  • Analyse and navigate policy, legal, ethical and compliance aspects of Cyber Security.
  • Develop Cyber Security plans, programs, and risk management processes to protect an

organization’s systems and data.

Contact Us

Phone number 07046151702 / 07031534545