1. Home
  2. Bachelor
  3. Bachelor of Information Technology (Hons) in Computer System Security

Bachelor of Information Technology (Hons) in Computer System Security

Program Learning Outcomes

Programme Overview

This programme is designed to prepare students for careers in Information Technology and Computer Security. It aims to develop professionals with strong leadership skills, in-depth knowledge, and technical competence in IT and cybersecurity.

Objective
  • Graduates who are knowledgeable, competent, and innovative in the field of computer security.
  • Individuals with effective leadership, teamwork, and communication skills—both verbal and non-verbal—to support their roles in the cybersecurity industry.
  • Professionals committed to lifelong learning and continuous improvement in the ever-evolving IT industry.
  • Ethical and socially responsible practitioners who uphold professionalism in their work.
  • Graduates capable of pursuing careers in cybersecurity, security research, and technopreneurship.
Programme Educational Objectives (PEOs)
  • PEO1: To produce graduates who are knowledgeable, competent and innovative which will contribute towards the requirement of IT and Security related industries.
  • PEO2: To produce graduates who have effective leadership and teamwork skills as well as verbal, non-verbal and interpersonal communication skills to support their roles in IT and security-related industries.
  • PEO3: To produce graduates who are committed to the importance of lifelong learning and continuous improvement in IT and Security related industries.
  • PEO4: To produce graduates who practise professionalism with ethics and social responsibility.
  • PEO5: To produce graduates who are capable of embarking on IT and Security and technopreneurial activities.
Programme Learning Outcomes (PLOs)
  • PLO1: Apply the knowledge of technology fundamental to broadly-defined procedures, processes, and methodologies in relating to Computer System Security study.
  • PLO2: Propose and employ current tools and techniques to resolve broadly-defined problems.
  • PLO3: Demonstrate deep investigative and significant thinking abilities to solve broadly-defined problems in Computer System Security study.
  • PLO4: Communicate effectively and flexibly in oral and written language for social, academic and professional purposes.
  • PLO5: Illustrate the understanding of corresponding issues related to the society and the subsequent responsibilities to the broadly-defined technology practices.
  • PLO6: Acknowledge the requirement of professional establishment and to employ independent continuing learning in specialist technology.
  • PLO7: Illustrate consciousness of management and technopreneurship routine in real perspective.
  • PLO8: Illustrate ethical awareness and professionalism.
  • PLO9: Illustrate leadership character, mentoring and work efficiently in diverse teams.

Programme

Semester 1 Credits Number
Rhetoric & the Public Sphere 4 ESTU 203
Communication & Everyday Life 2 ESTU 340
Critical & Rhetorical Methods 4 ESTU 657
Programme Overview

This programme is designed to prepare students for careers in Information Technology and Computer Security. It aims to develop professionals with strong leadership skills, in-depth knowledge, and technical competence in IT and cybersecurity.

Objective
  • Graduates who are knowledgeable, competent, and innovative in the field of computer security.
  • Individuals with effective leadership, teamwork, and communication skills—both verbal and non-verbal—to support their roles in the cybersecurity industry.
  • Professionals committed to lifelong learning and continuous improvement in the ever-evolving IT industry.
  • Ethical and socially responsible practitioners who uphold professionalism in their work.
  • Graduates capable of pursuing careers in cybersecurity, security research, and technopreneurship.
Programme Educational Objectives (PEOs)
  • PEO1: To produce graduates who are knowledgeable, competent and innovative which will contribute towards the requirement of IT and Security related industries.
  • PEO2: To produce graduates who have effective leadership and teamwork skills as well as verbal, non-verbal and interpersonal communication skills to support their roles in IT and security-related industries.
  • PEO3: To produce graduates who are committed to the importance of lifelong learning and continuous improvement in IT and Security related industries.
  • PEO4: To produce graduates who practise professionalism with ethics and social responsibility.
  • PEO5: To produce graduates who are capable of embarking on IT and Security and technopreneurial activities.
Programme Learning Outcomes (PLOs)
  • PLO1: Apply the knowledge of technology fundamental to broadly-defined procedures, processes, and methodologies in relating to Computer System Security study.
  • PLO2: Propose and employ current tools and techniques to resolve broadly-defined problems.
  • PLO3: Demonstrate deep investigative and significant thinking abilities to solve broadly-defined problems in Computer System Security study.
  • PLO4: Communicate effectively and flexibly in oral and written language for social, academic and professional purposes.
  • PLO5: Illustrate the understanding of corresponding issues related to the society and the subsequent responsibilities to the broadly-defined technology practices.
  • PLO6: Acknowledge the requirement of professional establishment and to employ independent continuing learning in specialist technology.
  • PLO7: Illustrate consciousness of management and technopreneurship routine in real perspective.
  • PLO8: Illustrate ethical awareness and professionalism.
  • PLO9: Illustrate leadership character, mentoring and work efficiently in diverse teams.
Programme Structure
Semester 1
  • Discrete Mathematics for IT
  • Principles of Computer Programming
  • Computer Organization
  • IT Security Essentials
  • Fundamental English
  • Falsafah dan Isu Semasa (L) or Bahasa Melayu Komunikasi 2 (I)
 
Semester 2
  • Object – Oriented Programming
  • Computer Network Technology and Services
  • Database Management Systems
  • Secure Software Design
  • Professional English 1
  • Penghayatan Etika dan Peradaban (L) or Falsafah dan Isu Semasa (I) or Penghayatan Etika dan Peradaban (I)
 
Semester 3
  • Cryptography and Steganography
  • Foreign Language 1
  • Co – Curriculum
 
Semester 4
  • Vulnerability Analysis
  • Operating System Security
  • Secure Software Development
  • Mobile and Ubiquitous Computing
  • Foreign Language 2
  • Kursus Integriti dan Anti-Rasuah 2
 
Semester 5
  • Network Security
  • Ethical Hacking
  • Ethics and Professionalism in Computing
  • Elective 1
  • Elective 2
 
Semester 6
  • Research Methodology
  • IT Project Management
  • Professional English 2
  • Elective 3
 
Semester 7
  • Information Security Compliance
  • Incident Response Management
  • Cyber Forensics
  • Final Year Project 1
  • Innovation Management or Isu-isu Kontemporari Muslim (L-M) or Culture and Lifestyle 2 (L-NM & I)
 
Semester 8
  • IOT Application Security
  • Technopreneurship
  • Final Year Project 2
  • Open Elective
 
Semester 9
  • Industrial Training
 
Elective Courses
  • Business Continuity Planning
  • Cloud Computing Security Essentials
  • Emerging Trend in Cybersecurity
  • Real Time and Embedded Systems
  • Principles of Artificial Intelligence
  • Selected Topics in Communication Systems
  • Introduction to Multimedia
  • Digital Graphic Design
  • Web Application Framework
  • Advanced Computer Science
  • Algorithm Complexity Analysis
  • Innovation Technology and Entrepreneurship
Career Information

Graduates of this programme can pursue careers in various cybersecurity and IT security roles, including:

  • Computer Security Analyst – Identifies and mitigates security threats to protect systems and data.
  • Computer Forensic Analyst – Investigates cybercrimes and analyzes digital evidence for legal proceedings.
  • Computer Security Officer – Develops and enforces security policies within organizations.
  • Security Architect – Designs and implements secure IT infrastructures.
  • Security Auditor – Assesses IT security policies and controls for compliance.
  • Incident Response Handler – Detects, responds to, and mitigates cybersecurity incidents.
  • Vulnerability Assessment Analyst – Identifies security weaknesses and recommends fixes.
  • Penetration Tester (Ethical Hacker) – Simulates cyberattacks to evaluate system security.
  • Cyber Threat Intelligence Analyst – Analyzes and predicts emerging cyber threats.
  • Security Operations Center (SOC) Analyst – Monitors and responds to security incidents in real-time.
  • Malware Analyst – Studies and neutralizes malicious software.
  • Risk and Compliance Analyst – Ensures adherence to security regulations and best practices.
  • Cloud Security Specialist – Protects cloud environments and sensitive data.
  • Cryptographer / Cryptanalyst – Develops and analyzes encryption technologies for secure communication.
  • IoT Security Specialist – Secures Internet of Things (IoT) devices and networks.
Entry Requirements Local Students:
  • Pass Diploma MQF level 4 with a minimum CGPA of 2.00 or equivalent; OR
  • Pass Advanced Diploma MQF level 5 with a minimum CGPA of 2.00 or equivalent; OR
  • Pass STPM or equivalent with a minimum Grade C (CGPA 2.00) in two (2) subjects; OR
  • Pass Matriculation/ Foundation with a minimum CGPA of 2.00 or equivalent; OR
  • Pass STAM (Grade Jayyid) or equivalent; OR
  • APEL A as prescribed by MQA; OR
  • Other recognised qualifications or equivalent.
International Students:
  • Minimum requirement IELTS 5.0 or Equivalent.
Click Here
Fee: Local Students:

RM 9,000.00 (Per Semester)
RM 54,000.00 (Total Tuition Fee)

International Students:

RM 11,733.00 (Per Semester)
RM 70,399.00 (Total Tuition Fee)


* Fees shown are the tuition fees only
** Fees shown are not inclusive of visa processing fee (international students)
*** Fees and charges are subject to Malaysian Sales and Service Tax (SST) at the prevailing rate of 6%. SST implementation.
**** Fees shown are correct at time of publication and subject to change without prior notice.
Semester 2 Credits Number
Relational Communication 4 ESTU 768
Public Relations Campaigns 4 ESTU 432
Rhetoric of Social Movements 2 ESTU 873

Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.

After you submit your application, an admissions representative will contact you and will help you to complete the process.

Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.