Cyber security has become more critical than ever before. Join us and embark on a rewarding career in one of the fastest-growing and most essential areas of technology.
Cyber Security is essentially about protecting information and information systems. In this course, you will learn how to perform this protective role, explore various security technologies, and learn management processes and control systems. Additionally, the course aims to educate security professionals by combining fundamental concepts and principles to deal with new technologies and solutions. Students will gain a hands-on understanding of core issues related to the concepts, analysis, and implementation of modern IT security systems.
Graduates of our Cyber Security program are well-equipped to pursue diverse and rewarding career opportunities in the rapidly growing field of cyber security. Some potential roles for graduates include:
Information Security Analyst: Evaluate and implement security measures to protect computer networks and systems from cyber-attacks, monitor systems for security breaches, and investigate security incidents. Penetration Tester: Conduct vulnerability assessments and penetration testing to identify weaknesses in computer systems and networks, and provide recommendations to enhance their security.
Security Consultant: Advise organizations on how to improve their security posture, develop security policies and procedures, and ensure compliance with industry standards and regulations.
Cyber security Engineer: Design and implement security solutions to protect computer systems and networks from cyber threats, and develop strategies to mitigate risks.
In addition to these specific roles, graduates can also pursue careers in various industries, such as:
Healthcare: Develop and maintain security systems for electronic health records, medical devices, and telehealth systems.
Finance: Design and implement security solutions for financial institutions, protect sensitive financial data, and conduct security audits to ensure compliance.
Government: Work with government agencies to secure their networks and systems, protect sensitive information, and investigate cyber threats.
Technology: Help technology companies develop secure software, implement secure cloud solutions, and protect sensitive data.
Furthermore, this program also prepares graduates for entrepreneurship and innovation, enabling them to start their own cyber security companies or work in the startup industry. With a strong foundation in cyber security principles and hands-on experience, graduates of our Cyber Security program are poised to make a significant impact in the field of cyber security.
Program Learning Outcomes
|Year 1 – Freshmen|
Introduction to Computer and Applications
Introduction to Statistics
|Year 2 – Sophomore|
|Software Foundation for Cyber Security|
Information Security Policy
Principles of Programming I
Philosophy, Logic and Human Existence
French Language I
Information Security Engineering
Principles of Programming II
Introduction to Digital Forensics
System Analysis and Design
Entrepreneurship and Innovation
|Year 3 – Junior|
|Server Crime Investigation |
Fraud Detection & Prevention Techniques
Applied Cryptographic Techniques
Computer Ethics & Cyber Law
Principles of Operating System
Research Methods &
Technical Report Writing
Data Communication and Networking
Peace and Conflict Resolution
French Language II
|Year 4 – Senior|
Data and Network Security
Digital Forensic Analysis
Do you have more questions?
5 Adamu Abubakar Gwarzo Road
How to Apply?
Choose MAAUN as your First Choice on JAMB Portal.
Register on MAAUN Portal using your JAMB number.
Pay your admission fee.
Once verified, complete your application online.
Upload all the required documents and your passport size picture on the MAAUN Portal before submitting your application.
After you submit your application, an admissions representative will contact you and will help you to complete the process.
You’ll also be able to tract the progress of the application on the MAAUN portal
Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.