Bachelor of Information Technology (Hons) in Computer System Security
- UniKL MIIT
- (R3/0611/6/0087) (11/28) (MQA/FA14997)
Program Learning Outcomes
Programme Overview
This programme is designed to prepare students for careers in Information Technology and Computer Security. It aims to develop professionals with strong leadership skills, in-depth knowledge, and technical competence in IT and cybersecurity.
Objective
- Graduates who are knowledgeable, competent, and innovative in the field of computer security.
- Individuals with effective leadership, teamwork, and communication skills—both verbal and non-verbal—to support their roles in the cybersecurity industry.
- Professionals committed to lifelong learning and continuous improvement in the ever-evolving IT industry.
- Ethical and socially responsible practitioners who uphold professionalism in their work.
- Graduates capable of pursuing careers in cybersecurity, security research, and technopreneurship.
Programme Educational Objectives (PEOs)
- PEO1: To produce graduates who are knowledgeable, competent and innovative which will contribute towards the requirement of IT and Security related industries.
- PEO2: To produce graduates who have effective leadership and teamwork skills as well as verbal, non-verbal and interpersonal communication skills to support their roles in IT and security-related industries.
- PEO3: To produce graduates who are committed to the importance of lifelong learning and continuous improvement in IT and Security related industries.
- PEO4: To produce graduates who practise professionalism with ethics and social responsibility.
- PEO5: To produce graduates who are capable of embarking on IT and Security and technopreneurial activities.
Programme Learning Outcomes (PLOs)
- PLO1: Apply the knowledge of technology fundamental to broadly-defined procedures, processes, and methodologies in relating to Computer System Security study.
- PLO2: Propose and employ current tools and techniques to resolve broadly-defined problems.
- PLO3: Demonstrate deep investigative and significant thinking abilities to solve broadly-defined problems in Computer System Security study.
- PLO4: Communicate effectively and flexibly in oral and written language for social, academic and professional purposes.
- PLO5: Illustrate the understanding of corresponding issues related to the society and the subsequent responsibilities to the broadly-defined technology practices.
- PLO6: Acknowledge the requirement of professional establishment and to employ independent continuing learning in specialist technology.
- PLO7: Illustrate consciousness of management and technopreneurship routine in real perspective.
- PLO8: Illustrate ethical awareness and professionalism.
- PLO9: Illustrate leadership character, mentoring and work efficiently in diverse teams.
Programme
| Semester 1 | Credits | Number |
|---|---|---|
| Rhetoric & the Public Sphere | 4 | ESTU 203 |
| Communication & Everyday Life | 2 | ESTU 340 |
| Critical & Rhetorical Methods | 4 | ESTU 657 |
Programme Overview
This programme is designed to prepare students for careers in Information Technology and Computer Security. It aims to develop professionals with strong leadership skills, in-depth knowledge, and technical competence in IT and cybersecurity.
Objective
- Graduates who are knowledgeable, competent, and innovative in the field of computer security.
- Individuals with effective leadership, teamwork, and communication skills—both verbal and non-verbal—to support their roles in the cybersecurity industry.
- Professionals committed to lifelong learning and continuous improvement in the ever-evolving IT industry.
- Ethical and socially responsible practitioners who uphold professionalism in their work.
- Graduates capable of pursuing careers in cybersecurity, security research, and technopreneurship.
Programme Educational Objectives (PEOs)
- PEO1: To produce graduates who are knowledgeable, competent and innovative which will contribute towards the requirement of IT and Security related industries.
- PEO2: To produce graduates who have effective leadership and teamwork skills as well as verbal, non-verbal and interpersonal communication skills to support their roles in IT and security-related industries.
- PEO3: To produce graduates who are committed to the importance of lifelong learning and continuous improvement in IT and Security related industries.
- PEO4: To produce graduates who practise professionalism with ethics and social responsibility.
- PEO5: To produce graduates who are capable of embarking on IT and Security and technopreneurial activities.
Programme Learning Outcomes (PLOs)
- PLO1: Apply the knowledge of technology fundamental to broadly-defined procedures, processes, and methodologies in relating to Computer System Security study.
- PLO2: Propose and employ current tools and techniques to resolve broadly-defined problems.
- PLO3: Demonstrate deep investigative and significant thinking abilities to solve broadly-defined problems in Computer System Security study.
- PLO4: Communicate effectively and flexibly in oral and written language for social, academic and professional purposes.
- PLO5: Illustrate the understanding of corresponding issues related to the society and the subsequent responsibilities to the broadly-defined technology practices.
- PLO6: Acknowledge the requirement of professional establishment and to employ independent continuing learning in specialist technology.
- PLO7: Illustrate consciousness of management and technopreneurship routine in real perspective.
- PLO8: Illustrate ethical awareness and professionalism.
- PLO9: Illustrate leadership character, mentoring and work efficiently in diverse teams.
Programme Structure
Semester 1
- Discrete Mathematics for IT
- Principles of Computer Programming
- Computer Organization
- IT Security Essentials
- Fundamental English
- Falsafah dan Isu Semasa (L) or Bahasa Melayu Komunikasi 2 (I)
Semester 2
- Object – Oriented Programming
- Computer Network Technology and Services
- Database Management Systems
- Secure Software Design
- Professional English 1
- Penghayatan Etika dan Peradaban (L) or Falsafah dan Isu Semasa (I) or Penghayatan Etika dan Peradaban (I)
Semester 3
- Cryptography and Steganography
- Foreign Language 1
- Co – Curriculum
Semester 4
- Vulnerability Analysis
- Operating System Security
- Secure Software Development
- Mobile and Ubiquitous Computing
- Foreign Language 2
- Kursus Integriti dan Anti-Rasuah 2
Semester 5
- Network Security
- Ethical Hacking
- Ethics and Professionalism in Computing
- Elective 1
- Elective 2
Semester 6
- Research Methodology
- IT Project Management
- Professional English 2
- Elective 3
Semester 7
- Information Security Compliance
- Incident Response Management
- Cyber Forensics
- Final Year Project 1
- Innovation Management or Isu-isu Kontemporari Muslim (L-M) or Culture and Lifestyle 2 (L-NM & I)
Semester 8
- IOT Application Security
- Technopreneurship
- Final Year Project 2
- Open Elective
Semester 9
- Industrial Training
Elective Courses
- Business Continuity Planning
- Cloud Computing Security Essentials
- Emerging Trend in Cybersecurity
- Real Time and Embedded Systems
- Principles of Artificial Intelligence
- Selected Topics in Communication Systems
- Introduction to Multimedia
- Digital Graphic Design
- Web Application Framework
- Advanced Computer Science
- Algorithm Complexity Analysis
- Innovation Technology and Entrepreneurship
Career Information
Graduates of this programme can pursue careers in various cybersecurity and IT security roles, including:
- Computer Security Analyst – Identifies and mitigates security threats to protect systems and data.
- Computer Forensic Analyst – Investigates cybercrimes and analyzes digital evidence for legal proceedings.
- Computer Security Officer – Develops and enforces security policies within organizations.
- Security Architect – Designs and implements secure IT infrastructures.
- Security Auditor – Assesses IT security policies and controls for compliance.
- Incident Response Handler – Detects, responds to, and mitigates cybersecurity incidents.
- Vulnerability Assessment Analyst – Identifies security weaknesses and recommends fixes.
- Penetration Tester (Ethical Hacker) – Simulates cyberattacks to evaluate system security.
- Cyber Threat Intelligence Analyst – Analyzes and predicts emerging cyber threats.
- Security Operations Center (SOC) Analyst – Monitors and responds to security incidents in real-time.
- Malware Analyst – Studies and neutralizes malicious software.
- Risk and Compliance Analyst – Ensures adherence to security regulations and best practices.
- Cloud Security Specialist – Protects cloud environments and sensitive data.
- Cryptographer / Cryptanalyst – Develops and analyzes encryption technologies for secure communication.
- IoT Security Specialist – Secures Internet of Things (IoT) devices and networks.
- Pass Diploma MQF level 4 with a minimum CGPA of 2.00 or equivalent; OR
- Pass Advanced Diploma MQF level 5 with a minimum CGPA of 2.00 or equivalent; OR
- Pass STPM or equivalent with a minimum Grade C (CGPA 2.00) in two (2) subjects; OR
- Pass Matriculation/ Foundation with a minimum CGPA of 2.00 or equivalent; OR
- Pass STAM (Grade Jayyid) or equivalent; OR
- APEL A as prescribed by MQA; OR
- Other recognised qualifications or equivalent.
- Minimum requirement IELTS 5.0 or Equivalent.
Fee: Local Students:
RM 9,000.00 (Per Semester)
RM 54,000.00 (Total Tuition Fee)
RM 11,733.00 (Per Semester)
RM 70,399.00 (Total Tuition Fee)
* Fees shown are the tuition fees only
** Fees shown are not inclusive of visa processing fee (international students)
*** Fees and charges are subject to Malaysian Sales and Service Tax (SST) at the prevailing rate of 6%. SST implementation.
**** Fees shown are correct at time of publication and subject to change without prior notice.
| Semester 2 | Credits | Number |
|---|---|---|
| Relational Communication | 4 | ESTU 768 |
| Public Relations Campaigns | 4 | ESTU 432 |
| Rhetoric of Social Movements | 2 | ESTU 873 |
Contact us
UNIVERSITI KUALA LUMPUR
KAMPUS CAWANGAN BRITISH MALAYSIAN INSTITUTE (UniKL BMI)
Batu 8 Jalan Sungai Pusu, 53100 Gombak, Selangor.
How to Apply?
- You Apply
Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.
- We Connect
After you submit your application, an admissions representative will contact you and will help you to complete the process.
- You Get Ready
Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.