0% found this document useful (0 votes)
11 views

BSc-in-Network-Security-and-Computer-Forensics

The Bachelor of Science in Network Security and Computer Forensics at Botho University prepares students for various IT roles including Computer Forensic Analysts and Security Analysts. The curriculum includes core and elective modules, with a recommended full-time study path of four years. Admission requires completion of secondary schooling with specific subject passes, and the programs are accredited by BQA.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

BSc-in-Network-Security-and-Computer-Forensics

The Bachelor of Science in Network Security and Computer Forensics at Botho University prepares students for various IT roles including Computer Forensic Analysts and Security Analysts. The curriculum includes core and elective modules, with a recommended full-time study path of four years. Admission requires completion of secondary schooling with specific subject passes, and the programs are accredited by BQA.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

FACULTY OF ENGINEERING AND TECHNOLOGY

(Continued)

C6-CE2-20 : Computer and its


Bachelor of Science in Essentials 2 (10)
Network Security and C6-EOL-20 : Essentials of Linux (10)
C6-CFO-23 : Computer Forensics (10)
Computer Forensics C6-IPC-11 : Introduction to
Programming Using C++ (20)
C6-CFL-23 : (Computer Forensics Lab
The Bachelor of Science in Network (10)
Security and Computer Forensics is C6-RSW-20 : Routing and switching
targeted at those wishing to enter the (10)
Information Technology (IT) sector as C6-RSL-20 : Routing and Switching
Computer Forensic Analysts, Vulnerability Lab (10)
Security Research Engineers, Digital C7-SCS-23 : Scripting for Cyber
Forensic Examiners, Malware Media Security (20)
Forensic Analysts, Forensic Auditors, C6-PCS-23 : Principles of Cyber
Network Security Specialists, Computer Security (10)
Crime Investigators or Security Analysts, C6-OSF-23 : Operating System
among other things. Forensics (10)
C6-NSE-20 : Network Security (10)
Programme details: C6-WMS-23 : Wireless and Mobile
The curriculum consists of essential core Security (10)
modules and elective modules that are C7-IDS-23 : Information and Data
optional. Specific modules may require Security (10)
prerequisites, requiring students to C7-EHK-13 : Ethical Hacking (20)
successfully complete another module or C7-SDN-20 : Software Defined
set of modules before registering. Network Engineering (10)
Additionally, certain modules may be C7-FIT-23 : Forensics Investigation
designated as co-requisite, meaning Techniques (10)
they must be taken concurrently. The C7-CGT-23 : Cryptographic
credit load of each module is indicated by Techniques (10)
the number in parentheses at the end. C7-RMS-20 : Research Methods for
Each credit is equivalent to approximately STEM (10)
10 hours of combined guided, in-class, C7-MAN-13 : Malware Analysis (20)
and independent learning. Hence, a C7-AEH-23 : Advanced Ethical
module with 10 credits generally involves Hacking (10)
around 100 hours of study. C7-MFO-20 : Mobile Forensics (10)
C8-CCI-23 : Cyber Crime
Core modules: Investigation (10)
C5-CE1-20: Computer and its C7-RP1-20 : Research Project 1:
Essential 1 (10) Proposal Writing (10)
C5-PLD-20: Programming Logic and C7-CYL-23 : Cyber Law (10)
Design (10) B8-ENI-20 : Entrepreneurship and
C5-MAT-20 : Mathematics (10) Innovation (20)
C5-OSH-11: Operating Systems and C8-RP2-20 : Research Project 2:
Hardware (20) Dissertation (20)
C6-PIE-20 : Professional Issues and C7-PPC-20 : Professional Practice in
Ethics (10) Computing (40)
C6-NEF-20 : Networking
Fundamentals (20) Elective Modules:
C6-DBC-20 : Database Concepts (10)
D6-AWS-20 : Academic Writing for C7-IOT-23 : Internet of Things (10)
STEM (10)

*The programmes offered in this document are accredited by BQA and offered at
Botho University at the time of print. Please refer to your offer letter from the admissions
30 Botho University 2024/25 Prospectus
department for any changes in programme name or duration that may occur due to regulatory
requirements.
FACULTY OF ENGINEERING
AND TECHNOLOGY
(Continued)

C7-CCS-20 : Cloud Computing and


Security (10) 3) Diploma or equivalent qualification in a
C7-SDE-20 : Security by Design (10)
C8-MAS-20 : Media and Storage (10) related field.
C8-MEF-23 : Media Forensics (10)
C8-ISG-23 : Information Security 4) Applicants that do not meet the above
Management and Governance (10) criteria but possess relevant industry
Recommended full-time study path - 4 experience will be considered through
Years. recognition of prior learning (RPL).

Semester 1
C5-CE1-20, C5-PLD-20, C5-MAT-20,
C5-OSH-11, C6-PIE-20
Semester 2
C6-NEF-20, C6-DBC-20, D6-AWS-20,
C6-CE2-20, C6-EOL-20
Semester 3
C6-CFO-23, C6-IPC-11, C6-CFL-23,
C6-RSW-20, C6-RSL-20
Semester 4
C7-SCS-23, C6-PCS-23, C6-OSF-23,
C6-NSE-20, C6-WMS-23
Semester 5
C7-IDS-23, C7-EHK-13, C7-SDN-20,
C7-FIT-23, C7-CGT-23
Semester 6
C7-RMS-20, C7-MAN-13, C7-AEH-23,
C7-MFO-20, (Choose one from C7-
IOT-23, C7-CCS-20, C7-SDE-20)
Semester 7
C8-CCI-23, C7-RP1-20, C7-CYL-23,
B8-ENI-20, (Choose one from C8-
MAS-20, C8-MEF-23, C8-ISG-23)
Semester 8
C8-RP2-20, C7-PPC-20

Admissions Criteria
1) Applicants are expected to have
successfully completed secondary
schooling. The typical entry requirement
is BGCSE or IGCSE (in Botswana), LGCSE
(in Lesotho) or other equivalent
secondary school qualification.

2) BGCSE/equivalent with minimum


Pass (D) in 5 subjects including English
and Mathematics.
*The programmes offered in this document are accredited by BQA and offered at
Botho University at the time of print. Please refer to your offer letter from the admissions
department for any changes in programme name or duration that may occur due to regulatory Botho University 2024/25 Prospectus 31
requirements.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy