Cyber Security

Defend, Detect, Prevail: Your Journey to Cybersecurity Mastery

The Cyber Security Post Graduate Program equips students with advanced expertise in cybersecurity. Covering essential topics, it blends theory with hands-on applications, emphasizing practical skills in risk analysis, cybercrime investigation, and security implementation. Graduates emerge ready to address evolving cyber threats with a deep understanding of legal frameworks and risk management strategies.

Enroll Now

Get this course along with top recommendations for popular subjects and tech skills.

Share this course

The Cyber Security Post Graduate Program offers a comprehensive and specialized curriculum aimed at providing students with advanced expertise in the dynamic and critical field of cybersecurity. Covering a spectrum of essential topics, the program integrates theoretical foundations with practical applications, ensuring that graduates are well-equipped to navigate and mitigate the evolving challenges within the cyber landscape.

Beginning with an introduction to the intricacies of cyber criminology and the causation of cybercrime, the program progressively delves into cryptography, network security, cyber laws and policies, digital forensics, social media management, cyber risk management, and threat analysis. Emphasis is placed on hands-on experiences, enabling students to develop practical skills in cybercrime investigation, risk analysis, and the implementation of security measures.

The program culminates in a capstone project/internship, providing students with a unique opportunity to apply their acquired knowledge and skills in real-world scenarios. Graduates emerge from the program with a comprehensive understanding of cyber threats, risk management strategies, and the legal frameworks governing cybersecurity, positioning them as adept professionals ready to contribute to the ever-evolving realm of cyber defense.

Course Objectives

What You'll Learn

The program provides a comprehensive understanding of cyber threats, risk management, digital forensics, and legal aspects related to cybersecurity. Students will gain hands-on experience through a capstone project/internship, applying their knowledge in real-world scenarios. Graduates will be equipped to combat cyber threats, secure networks, and contribute to the evolving field of cybersecurity.

Tools Covered

Learning Path

Semester 01 - 20 Credits

Credits : 4

Course Overview and Context:

This course is designed to provide students with knowledge of cybercrime and theoretical approaches to studying cybercrime. It examines the causes of crime in cyberspace and the major challenges of fighting cybercrime. The course also covers patterns of cyber violence and strategies to combat cyber victimization.

Course Outcomes:

  • Understand forms of cybercrime and their impact on society
  • Develop their knowledge about the causation of cybercrime
  • Better understand the strategies and policies in relation to fighting cybercrime
  • Have basic knowledge of Internet technologies and how they can influence the workplace.
Credits : 4

Course Overview and Context:

This course covers cryptography, cryptanalysis, and data protection, emphasizing past attacks to prevent future ones. It provides hands-on experience with technology tools, foundational knowledge, and risk management principles. Students learn to secure data on both hardware and software platforms, ensuring privacy and investigating system flaws.

Course Outcomes:

  • To gain basic knowledge on cryptography, crypto-analysis, and data security required to work with any IT system
  • To gain hands-on experiences for securing a system from different types of cyber-attacks
  • To attain risk analysis and ability to manage risks in an IT system
  • To obtain knowledge about the importance of privacy and its practices in real life
  • To obtain knowledge about intrusion detection and prevention systems
  • To understand ISO/IEC 27001 guidelines.
Credits : 4

Course Overview and Context:

This course covers communication and network security, addressing policies and practices to prevent unauthorized access. Students gain knowledge of wired and wireless networks, devices, vulnerabilities, and protocols. By the end, they attain professional-level expertise in network security concepts, technologies, and tools, regardless of prior background.

Course Outcomes:

  • Recognize key factors motivating the necessity for network security.
  • Identify and categorize specific instances of attacks
  • Define the terms vulnerability, threat, and attack.
  • Recognize physical points of vulnerability in basic networks.
  • Compare and contrast symmetric and asymmetric encryption systems, assessing their vulnerability to attacks, and elucidate the characteristics of hybrid systems.
Credits : 4

Course Overview and Context:

This course covers the introduction to cyber-related laws, education on cyber policies and strategies, understanding the application and investigation of acts, comprehension of digital crime investigation processes, and knowledge on the philosophy of cyber strategies.

Course Outcomes:

  • To have comprehensive knowledge of cyber-related laws
  • To internalize the cyber policies and strategies
  • To have a better understanding of the application, investigation, and punishments under the acts
  • To be able to apply strategy according to the philosophy
Credits : 4

Course Overview and Context:

The course will cover various aspects of cybercrime investigation as well as forensic digital evidence and evidence management. Both theoretical orientation and technical know-how in relation to cybercrime investigation will be explored.

Course Outcomes:

  • Enhance students’ comprehension of cybercrime investigation and digital forensics.
  • Enable practical application of knowledge in conducting digital investigations.
  • Improve cybercrime investigation capabilities for private entities, law enforcement agencies, regulators, and relevant stakeholders.

Semester 02 - 20 Credits

Credits : 4

Course Overview and Context:

This course delves into the dynamics of social media and networks, covering their functionality, digital privacy protection, intrusion prevention, and legal aspects. Participants gain insights into recognizing privacy issues, determining account ownership, understanding online privacy laws, and navigating potential dangers associated with social media sharing.

Course Outcomes:

  • What social media and social networks are, how they work, how to make the best use of social media and social networks
  • How to protect the right to digital privacy, how to recognize and prevent an intrusion or invasion of privacy, what’s considered a reasonable expectation of privacy, how to determine who lawfully owns a social media account and what types of information others can prevent you from sharing online
  • What is considered reckless misconduct on social media, use social media without violating laws, use social media without infringing on intellectual property rights
  • Social media policy for business, corporate social media policy examples
Credits : 4

Course Overview and Context:

This course covers cyber security risk management principles, processes, and techniques. Emphasis is placed on identifying, assessing, and treating risk, with practical examples and tools for implementation. It explores the detailed process of mitigating data-related risks and supports information security strategies to reduce risk and uphold organizational missions. The course also addresses measures to prevent cybercrime.

Course Outcomes:

  • Develop an understanding of what cyber risk is and how it can be managed.
  • How to create a cyber-risk management framework within your organization.
  • How to identify, assess and articulate risk as well as identifying options for treatment and determining which is the most appropriate.
  • How to perform detailed analysis of risk and develop risk treatment plans.
  • How to apply risk management concepts in practice including developing a risk register, governance models, risk bowties and reporting.
Credits : 4

Course Overview and Context:

This course delves into cyber-terrorism and information security threats, covering definitions, attack methods, and effective countermeasures from a Cyber Security Practitioner’s perspective. It provides a balance of theoretical understanding and technical know-how in the realm of Cyber Terrorism and Threat Management.

Course Outcomes:

  • Gain comprehensive understanding of underlying reasons and forms of Cyber Terrorism.
  • Acquire insights into the intricacies of Threat Management
  • Develop the ability to identify specific types of cyber attacks
  • Learn to implement preventive or remedial measures as necessary.
  • Enhance knowledge to effectively reduce vulnerability in IT infrastructure.
  • Mitigate cyber-attack threats to individuals and organizations.
Credits : 4

Course Overview and Context:

Cyberspace, integral to daily life, also presents challenges with the rise of cybercrime. This course focuses on economic and financial crimes in the context of advanced technologies, addressing motives like greed and illicit monetary gain. Special attention is given to Bangladesh and other developed countries.

Course Outcomes:

  • Understand, analyze and evaluate the financial cybercrime and its management from different perspectives.
  • Identify the different types of financial cybercrime and threats in the context of Bangladesh.
  • Identify the contemporary issues relating to financial cybercrime with management policies and strategies
Credits : 4

Course Overview and Context:

The capstone project/internship is the final assignment, providing hands-on experience in all aspects of cybersecurity. It allows students to apply their PGD course knowledge in various institutions and organizations, both public and private, for a full semester.

Course Outcomes:

  • Identifying various threat actors and their motivations in cyberspace.
  • Analyzing how information system security components, policies, practices, networks, and human factors defend against cyber threats.
  • Analyzing and synthesizing theoretical and practical constructs within the field of cyber operations.
  • Critically reviewing and evaluating the application of selected theories to practical, real-world situations.

Career Opportunities

In Affiliation with

CodersTrust College Code: 6634

Training 3M+ Learners and Professionals in 15+ Countries

Build Your Future!

Enroll in Postgraduate Diploma Courses Offered by National University in Affiliation with CodersTrust Bangladesh
CodersTrust Logo

Innovating to Transform High-Potential Youth into Skilled Digital Workforce Worldwide

CONTACT

40 Wall Street, Suite 2004

New York 10005, USA

House# 82, Road# 19/A, Block# E

Banani, Dhaka-1213

Bangladesh

SUBSCRIBE

    Unsubscribe anytime

    Copyright © 2023 CodersTrust | All Rights Reserved

    Call Us to Enroll

    For Further Queries Email Us at

    Get Quick Answers