Dunster Business School

Auto-Update Event Message
Join us April 21-22 for our 2025 Lectures | Register Now

Bachelor in Cyber Security

About Bachelor in Cyber Security

The Bachelor in Cyber Security at Dunster Business School is an undergraduate program designed to prepare students for dynamic careers in the field of cybersecurity. The program combines foundational knowledge, advanced technical skills, and real-world applications. It is tailored to meet the growing demand for cybersecurity professionals globally. Get exposure to analytics tools & techniques. Access to opportunities with leading companies. 

Level

Graduation

Duration

864 Hours

Delivery Mode

Online

Key Highlights

  1. Comprehensive Curriculum: The modules Cover topics such as network security, ethical hacking, digital forensics, and cloud security.

  2. Hands-on Learning: Practical assignments, projects, and simulations using industry-standard tools.

  3. Expert Faculty: Guidance from professionals with extensive experience in cybersecurity.
  4. Capstone Project: A final-year project addressing real-world cybersecurity challenges.
  5. Internship Opportunities: Collaborations with leading organizations for industry exposure.

  6. Global Accreditation: Recognized internationally for academic excellence.

Program Outcomes

  1. Master the principles of cybersecurity and risk management.

  2. Develop your skills in securing networks, systems, and applications.

  3. Understand the legal, ethical, and social implications of cybersecurity.
  4. Gain expertise in emerging technologies like AI-driven security and blockchain.

  5. Be prepared for certifications such as CISSP, CEH, and CompTIA Security+.

  6. Demonstrate critical thinking and problem-solving skills in cybersecurity contexts.

Career Path

Industries hiring cybersecurity professionals include IT, finance, healthcare, government, and e-commerce. Here are some potential career opportunities:

  • -Cybersecurity Specialist
  • – Digital Forensics Analyst
  • – Information Security Consultant
  • – Network Security Administrator
  • – Incident Response Coordinator
  • – Security Software Developer

Curriculum

The curriculum for the Bachelor in Cyber Security is structured to provide a holistic understanding of cybersecurity. The modules include risk management, ethical hacking, and network security. Participants will engage in hands-on projects, simulations, and case studies to apply their knowledge.

In this module the candidate will learn about Security Essentials, the need of Cyber Security, CIA Triad, Vulnerability, Thread, and Risk, Risk Governance and Management, Security Architecture, Governance and Auditing, Computer Security and Design.

    • The need for Cyber Security
    • CIA Triad
    • Vulnerability, Threat, and Risk
    • Risk Governance & Risk Management
    • Security Architecture
    • Security Governance
    • Security Auditing
    • Compliance
    • Computer Security Architecture & Design
    • Quiz Module 1

In this module the candidate will learn about Background of Cryptography, Symmetric Cryptography, Data Encryption, Triple DES, The Advanced Encryption Standard and International Data Encryption Algorithm. Other topics such as what is Blowfish, RC4, RC5, RC6, Asymmetric Cryptography, The Diffie- Hellman Algorithm, RSA, ECC, Cryptographic Hash Functions, Digital certificates and its life cycle will also be explained.

    • Background of Cryptography
    • Symmetric Cryptography
    • Data Encryption Standard (DES)
    • Triple-DES
    • The Advanced Encryption Standard (AES)
    • International Data Encryption Algorithm (IDEA)
    • Blowfish
    • RC4
    • RC5
  • RC6
  • Asymmetric Cryptography
  • The Diffie-Hellman Algorithm
  • RSA
  • Elliptic Curve Cryptosystems (ECC)
  • Cryptographic Hash Functions
  • Attacks against Encrypted Data
  • Digital Certificates and its Format (X.509, X.500)
  • Certificate Authority, Certificate Repository, Certificate Revocation lists
  • Digital Certificate life cycle (Initialize, Issue, Cancel)
  • Quiz Module 2

In this module the candidate will learn about Network and Layered Architecture, Transmission Control Protocol, Hybrid TCP/IPModel, Application, Layer Protocols, Transport Layer Protocols, Network and Internet Protocols, Link layer and Resolution Protocols.

    • Network Architecture, Protocols and Technologies:
    • Layered Architecture, Open Systems Interconnect (OSI) Model
    • Transmission Control Protocol / Internet Protocol (TCP/IP)
    • Hybrid TCP/IP Model
    • Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
    • Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
    • Network/Internet layer protocols:
    • Internet Protocol (IP) v4, IPv6, IPsec protocols
    • Link-layer protocols: Address
    • Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN
    • Quiz Module 3
  • SSDLC (Secure Software Development Life Cycle)
  • Quiz Module 4
  • Data Security
  • Data Security Controls
  • Host/ Endpoint Security Controls
  • Quiz Module 5
  • Authorization
  • Authentication
  • Access Control
  • Privilege levels
  • Identity & Access Management Process and activities (Role-Based, Single Sign-on)
  • Quiz Module 6
  • Cloud Computing Architectural Framework
  • Concerns & Best Practices
  • Governance and Enterprise Risk Management
  • Legal Issues: Contracts and Electronic Discovery
  • Compliance and Audit Management
  • Information Management and Data Security
  • Interoperability and Portability
  • Traditional Security, Business Continuity, and Disaster Recovery
  • Data Centre Operations
  • Incident Response
  • Application Security
  • Encryption and Key Management
  • Identity, Entitlement, and Access Management
  • Virtualization
  • Security as a Service
  • Quiz Module 7
  • Phase 1 —Reconnaissance: Adversary identifies and selects a Target
  • Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network
  • Phase 3 —Deliver: Adversary delivers the payload to the target system
  • Phase 4 —Exploit: Adversary code is executed on the target system
  • Phase 5 —Install: Adversary installs remote access software that provides a persistent presence within the targeted environment or system
  • Phase 6 —Command and Control: Adversary employs remote access mechanisms to establish a command and control channel with the compromised device
  • Phase 7 —Act on Objectives: Adversary pursues intended objectives e.g., data exfiltration, lateral movement to other targets
  • Quiz Module 8
  • Key Security Business Processes
  • Corp. & Security Governance
  • IT Strategy management
  • Portfolio/Program/Project management
  • Change management
  • Supplier (third party) management
  • Problem management
  • Knowledge management
  • Info-sec management
  • BCP
  • IT Operations management
  • Overview of top 20 security controls
  • Quiz Module 9
  • Business Communication
  • Preparation for the Interview
  • Presentation Skills
  • Resume Writing

Shape Your Tomorrow ,Today

Fill out the Admission Enquiry Form below if you have any queries regarding the admission procedure.

Certification

Reviews

"The Bachelor in Cyber Security program provided me with the technical expertise and confidence to excel in my role. The faculty's support and the hands-on learning experiences were invaluable. The projects helped in reinforcing the knowledge."
Rahel Nguyen
Network Security Engineer
"The Bachelor in Cyber Security program provided me with the technical expertise and confidence to excel in my role as an Information Security Consultant. The faculty's support and the hands-on learning experiences were invaluable."
Rajeev Kumar
Information Security Consultant
"This program prepared me for the challenges of the cybersecurity field. The internships and global exposure along with the networking opportunities were instrumental in shaping my career."
Mathew Thomas
Cybersecurity Specialist

Frequently Asked Questions

Do I need prior knowledge of IT or coding?

No prior knowledge is required. The program includes foundational courses to build essential skills.

Yes, a Diploma in Cyber Security is available online at Dunster Business School.

Yes, the curriculum aligns with certifications like CompTIA Security+, CEH, and CISSP.

Dunster Business School offers career services, including resume workshops, mock interviews, and job placement assistance.

The learning materials are provided to students through the LMS. Learners are provided with self-learning, quiz banks, assessments and projects.

Open chat
Hello
Can we help you?