- +8801787659323
- contact@coderstrust.global
আপনার গ্লোবাল ক্যারিয়ার প্রসপেক্ট ও আয় বাড়িয়ে নিন মাত্র ১ সপ্তাহেগ্রামীণফোন একাডেমিতে কোডার্সট্রাস্টের প্রফেশনাল সার্টিফিকেট কোর্সগুলো করে, সম্পূর্ণ বিনামূল্যে।
আপনার গ্লোবাল ক্যারিয়ার প্রসপেক্ট ও আয় বাড়িয়ে নিন মাত্র ১ সপ্তাহেগ্রামীণফোন একাডেমিতে কোডার্সট্রাস্টের প্রফেশনাল সার্টিফিকেট কোর্সগুলো করে, সম্পূর্ণ বিনামূল্যে।
- +8801787659323
- contact@coderstrust.global
Home > Courses > NU Postgraduate Diploma > Cybersecurity
Cyber Security
Defend, Detect, Prevail: Your Journey to Cybersecurity Mastery!
The Cyber Security Post Graduate Program equips students with advanced expertise in cybersecurity. Covering essential topics, it blends theory with hands-on applications, emphasizing practical skills in risk analysis, cybercrime investigation, and security implementation. Graduates emerge ready to address evolving cyber threats with a deep understanding of legal frameworks and risk management strategies.
Enroll Now
Acquire a skill and become job-ready with professional certifications
- 40 Credit Hours
- 12 Months
- 10 Subjects
- Instructor-Led
- On-Campus
Share this course
- Cutting-Edge Expertise
- Hands-On Mastery
- Career Catalyst
- Develop skills for real career growth
- Learn from experts active in their field
- Learn by working on real-world problems
- Structured guidance ensuring continuous learning
The Cyber Security Post Graduate Program offers a comprehensive and specialized curriculum aimed at providing students with advanced expertise in the dynamic and critical field of cybersecurity. Covering a spectrum of essential topics, the program integrates theoretical foundations with practical applications, ensuring that graduates are well-equipped to navigate and mitigate the evolving challenges within the cyber landscape.
Beginning with an introduction to the intricacies of cyber criminology and the causation of cybercrime, the program progressively delves into cryptography, network security, cyber laws and policies, digital forensics, social media management, cyber risk management, and threat analysis. Emphasis is placed on hands-on experiences, enabling students to develop practical skills in cybercrime investigation, risk analysis, and the implementation of security measures.
The program culminates in a capstone project/internship, providing students with a unique opportunity to apply their acquired knowledge and skills in real-world scenarios. Graduates emerge from the program with a comprehensive understanding of cyber threats, risk management strategies, and the legal frameworks governing cybersecurity, positioning them as adept professionals ready to contribute to the ever-evolving realm of cyber defense.
Beginning with an introduction to the intricacies of cyber criminology and the causation of cybercrime, the program progressively delves into cryptography, network security, cyber laws and policies, digital forensics, social media management, cyber risk management, and threat analysis. Emphasis is placed on hands-on experiences, enabling students to develop practical skills in cybercrime investigation, risk analysis, and the implementation of security measures.
The program culminates in a capstone project/internship, providing students with a unique opportunity to apply their acquired knowledge and skills in real-world scenarios. Graduates emerge from the program with a comprehensive understanding of cyber threats, risk management strategies, and the legal frameworks governing cybersecurity, positioning them as adept professionals ready to contribute to the ever-evolving realm of cyber defense.
Course Objective
- Understand cybercrime forms, causes, and societal impact
- Gain basic knowledge in cryptography, cryptanalysis, and data protection
- Master wired and wireless network security concepts and tools
- Comprehend cyber-related laws, policies, and investigation techniques
- Acquire skills in cybercrime investigation, evidence collection, and management
- Learn to navigate social media risks and protect digital privacy
- Develop expertise in identifying, assessing, and managing cyber risk
- Understand cyber terrorism forms, threat management, and prevention strategies
What you'll learn
The program provides a comprehensive understanding of cyber threats, risk management, digital forensics, and legal aspects related to cybersecurity. Students will gain hands-on experience through a capstone project/internship, applying their knowledge in real-world scenarios. Graduates will be equipped to combat cyber threats, secure networks, and contribute to the evolving field of cybersecurity.
- Advanced knowledge of cybercrime, cryptography, and data security
- Skills in network and communication security
- Understanding of cyber laws, policies, and strategies
- Expertise in cybercrime investigation and digital forensics
- Proficiency in social media management and digital privacy
- Risk management principles and strategies
- In-depth knowledge of cyber terrorism and threat management
- Analysis and evaluation of financial cybercrime
- Application of cybersecurity knowledge through a capstone project/internship
Learning Path
Semester 01 - 20 Credits
Credits : 4
Course Overview and Context:
This course is designed to provide students with knowledge of cybercrime and theoretical approaches to studying cybercrime. It examines the causes of crime in cyberspace and the major challenges of fighting cybercrime. The course also covers patterns of cyber violence and strategies to combat cyber victimization.
Course Outcomes:
Course Overview and Context:
This course is designed to provide students with knowledge of cybercrime and theoretical approaches to studying cybercrime. It examines the causes of crime in cyberspace and the major challenges of fighting cybercrime. The course also covers patterns of cyber violence and strategies to combat cyber victimization.
Course Outcomes:
- Understand forms of cybercrime and their impact on society
- Develop their knowledge about the causation of cybercrime
- Better understand the strategies and policies in relation to fighting cybercrime
- Have basic knowledge of Internet technologies and how they can influence the workplace.
Credits : 4
Course Overview and Context:
This course covers cryptography, cryptanalysis, and data protection, emphasizing past attacks to prevent future ones. It provides hands-on experience with technology tools, foundational knowledge, and risk management principles. Students learn to secure data on both hardware and software platforms, ensuring privacy and investigating system flaws.
Course Outcomes:
Course Overview and Context:
This course covers cryptography, cryptanalysis, and data protection, emphasizing past attacks to prevent future ones. It provides hands-on experience with technology tools, foundational knowledge, and risk management principles. Students learn to secure data on both hardware and software platforms, ensuring privacy and investigating system flaws.
Course Outcomes:
- To gain basic knowledge on cryptography, crypto-analysis, and data security required to work with any IT system
- To gain hands-on experiences for securing a system from different types of cyber-attacks
- To attain risk analysis and ability to manage risks in an IT system
- To obtain knowledge about the importance of privacy and its practices in real life
- To obtain knowledge about intrusion detection and prevention systems
- To understand ISO/IEC 27001 guidelines.
Credits : 4
Course Overview and Context:
This course covers communication and network security, addressing policies and practices to prevent unauthorized access. Students gain knowledge of wired and wireless networks, devices, vulnerabilities, and protocols. By the end, they attain professional-level expertise in network security concepts, technologies, and tools, regardless of prior background.
Course Outcomes:
Course Overview and Context:
This course covers communication and network security, addressing policies and practices to prevent unauthorized access. Students gain knowledge of wired and wireless networks, devices, vulnerabilities, and protocols. By the end, they attain professional-level expertise in network security concepts, technologies, and tools, regardless of prior background.
Course Outcomes:
- Recognize key factors motivating the necessity for network security.
- Identify and categorize specific instances of attacks
- Define the terms vulnerability, threat, and attack.
- Recognize physical points of vulnerability in basic networks.
- Compare and contrast symmetric and asymmetric encryption systems, assessing their vulnerability to attacks, and elucidate the characteristics of hybrid systems.
Credits : 4
Course Overview and Context:
This course covers the introduction to cyber-related laws, education on cyber policies and strategies, understanding the application and investigation of acts, comprehension of digital crime investigation processes, and knowledge on the philosophy of cyber strategies.
Course Outcomes:
Course Overview and Context:
This course covers the introduction to cyber-related laws, education on cyber policies and strategies, understanding the application and investigation of acts, comprehension of digital crime investigation processes, and knowledge on the philosophy of cyber strategies.
Course Outcomes:
- To have comprehensive knowledge of cyber-related laws
- To internalize the cyber policies and strategies
- To have a better understanding of the application, investigation, and punishments under the acts
- To be able to apply strategy according to the philosophy
Credits : 4
Course Overview and Context:
The course will cover various aspects of cybercrime investigation as well as forensic digital evidence and evidence management. Both theoretical orientation and technical know-how in relation to cybercrime investigation will be explored.
Course Outcomes:
Course Overview and Context:
The course will cover various aspects of cybercrime investigation as well as forensic digital evidence and evidence management. Both theoretical orientation and technical know-how in relation to cybercrime investigation will be explored.
Course Outcomes:
- Enhance students’ comprehension of cybercrime investigation and digital forensics.
- Enable practical application of knowledge in conducting digital investigations.
- Improve cybercrime investigation capabilities for private entities, law enforcement agencies, regulators, and relevant stakeholders.
Semester 02 - 20 Credits
Credits : 4
Course Overview and Context:
This course delves into the dynamics of social media and networks, covering their functionality, digital privacy protection, intrusion prevention, and legal aspects. Participants gain insights into recognizing privacy issues, determining account ownership, understanding online privacy laws, and navigating potential dangers associated with social media sharing.
Course Outcomes:
Course Overview and Context:
This course delves into the dynamics of social media and networks, covering their functionality, digital privacy protection, intrusion prevention, and legal aspects. Participants gain insights into recognizing privacy issues, determining account ownership, understanding online privacy laws, and navigating potential dangers associated with social media sharing.
Course Outcomes:
- What social media and social networks are, how they work, how to make the best use of social media and social networks
- How to protect the right to digital privacy, how to recognize and prevent an intrusion or invasion of privacy, what’s considered a reasonable expectation of privacy, how to determine who lawfully owns a social media account and what types of information others can prevent you from sharing online
- What is considered reckless misconduct on social media, use social media without violating laws, use social media without infringing on intellectual property rights
- Social media policy for business, corporate social media policy examples
Credits : 4
Course Overview and Context:
This course covers cyber security risk management principles, processes, and techniques. Emphasis is placed on identifying, assessing, and treating risk, with practical examples and tools for implementation. It explores the detailed process of mitigating data-related risks and supports information security strategies to reduce risk and uphold organizational missions. The course also addresses measures to prevent cybercrime.
Course Outcomes:
Course Overview and Context:
This course covers cyber security risk management principles, processes, and techniques. Emphasis is placed on identifying, assessing, and treating risk, with practical examples and tools for implementation. It explores the detailed process of mitigating data-related risks and supports information security strategies to reduce risk and uphold organizational missions. The course also addresses measures to prevent cybercrime.
Course Outcomes:
- Develop an understanding of what cyber risk is and how it can be managed.
- How to create a cyber-risk management framework within your organization.
- How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.
- How to perform detailed analysis of risk and develop risk treatment plans.
- How to apply risk management concepts in practice including developing a risk register, governance models, risk bowties and reporting.
Credits : 4
Course Overview and Context:
This course delves into cyber-terrorism and information security threats, covering definitions, attack methods, and effective countermeasures from a Cyber Security Practitioner’s perspective. It provides a balance of theoretical understanding and technical know-how in the realm of Cyber Terrorism and Threat Management.
Course Outcomes:
Course Overview and Context:
This course delves into cyber-terrorism and information security threats, covering definitions, attack methods, and effective countermeasures from a Cyber Security Practitioner’s perspective. It provides a balance of theoretical understanding and technical know-how in the realm of Cyber Terrorism and Threat Management.
Course Outcomes:
- Gain comprehensive understanding of underlying reasons and forms of Cyber Terrorism.
- Acquire insights into the intricacies of Threat Management
- Develop the ability to identify specific types of cyber attacks
- Learn to implement preventive or remedial measures as necessary.
- Enhance knowledge to effectively reduce vulnerability in IT infrastructure.
- Mitigate cyber-attack threats to individuals and organizations.
Credits : 4
Course Overview and Context:
Cyberspace, integral to daily life, also presents challenges with the rise of cybercrime. This course focuses on economic and financial crimes in the context of advanced technologies, addressing motives like greed and illicit monetary gain. Special attention is given to Bangladesh and other developed countries.
Course Outcomes:
Course Overview and Context:
Cyberspace, integral to daily life, also presents challenges with the rise of cybercrime. This course focuses on economic and financial crimes in the context of advanced technologies, addressing motives like greed and illicit monetary gain. Special attention is given to Bangladesh and other developed countries.
Course Outcomes:
- Understand, analyze and evaluate the financial cybercrime and its management from different perspectives.
- Identify the different types of financial cybercrime and threats in the context of Bangladesh.
- Identify the contemporary issues relating to financial cybercrime with management policies and strategies
Credits : 4
Course Overview and Context:
The capstone project/internship is the final assignment, providing hands-on experience in all aspects of cybersecurity. It allows students to apply their PGD course knowledge in various institutions and organizations, both public and private, for a full semester.
Course Outcomes:
Course Overview and Context:
The capstone project/internship is the final assignment, providing hands-on experience in all aspects of cybersecurity. It allows students to apply their PGD course knowledge in various institutions and organizations, both public and private, for a full semester.
Course Outcomes:
- Identifying various threat actors and their motivations in cyberspace.
- Analyzing how information system security components, policies, practices, networks, and human factors defend against cyber threats.
- Analyzing and synthesizing theoretical and practical constructs within the field of cyber operations.
- Critically reviewing and evaluating the application of selected theories to practical, real-world situations.
Career Opportunity
- Cybersecurity Analyst
- Digital Forensics Investigator
- Network Security Specialist
- Cybersecurity Consultant
- Security Compliance Analyst
- Incident Responder
- Risk Analyst
- Security Policy Analyst
- Cybersecurity Educator/Trainer
- Threat Intelligence Analyst
IN AFFILIATION WITH


CodersTrust College Code: 6634
Training 1.5M+ Learners and Professionals in 15+ Countries


Build Your Future!
Enroll in Postgraduate Diploma Courses Offered by National University in Affiliation with CodersTrust Bangladesh
Frequently Asked Questions
No, a computer science background is not mandatory. The program is designed to accommodate students from diverse educational backgrounds interested in cybersecurity.
The program integrates practical experiences in cybercrime investigation, risk analysis, and security implementation. Students also undertake a capstone project or internship for real-world application.
As of now, the program is designed as a full-time, on-campus experience. Online or part-time options may be explored in the future.
Yes, the program often collaborates with industry partners, providing students with exposure to the latest industry trends, challenges, and networking opportunities.
The program offers career guidance, networking opportunities, and connections with industry professionals. Additionally, the capstone project and internship provide valuable practical experience.


Innovating to Transform High-Potential Youth into Skilled Digital Workforce Worldwide
MENU
CONTACT
40 Wall Street, Suite 2004
New York 10005, USA
House# 82, Road# 19/A, Block# E
Banani, Dhaka-1213
Bangladesh
SUBSCRIBE
Unsubscribe anytime
We Accept












Copyright © 2023 – 2025 CodersTrust | All Rights Reserved