In this practice-oriented Bachelor in Cyber Security study programme, available fully online, you will be trained as a threat hunter with leadership potential. You will acquire the latest knowledge in the field of Cyber Security and deal with the architecture, programming and maintenance of security systems.
In this BSc cyber security course, you will learn not just about incident response and digital forensics, but also aspects of penetration testing and reverse engineering in order to understand the perspective of cyber criminals and protect against them.
Module | Courses | Alternative Courses Links |
---|---|---|
Operating Systems, Computer Networks, and Distributed Systems | Operating Systems: Three Easy Pieces | Operating Systems and You: Becoming a Power User (Coursera) |
Introduction to Data Protection and IT Security | Cybersecurity Basics (edX) | Introduction to Cyber Security Specialization (Coursera) |
Mathematics: Analysis | Khan Academy - Calculus | Calculus 1A: Differentiation (edX) |
Introduction to Academic Work | Study Skills for Academic Success (Coursera) | Learning How to Learn (Coursera) |
Introduction to Programming with Python | Python for Everybody (Coursera) | Introduction to Python Programming (Udacity) |
Statistics - Probability and Descriptive Statistics | Introduction to Statistics (Udacity) | Statistics and Probability (Khan Academy) |
Recommended Books:
- "Operating Systems: Three Easy Pieces" by Remzi H. Arpaci-Dusseau and Andrea C. Arpaci-Dusseau
- "Python Crash Course" by Eric Matthes
- "Introduction to Probability and Statistics for Engineers and Scientists" by Sheldon M. Ross
Module | Courses | Alternative Courses Links |
---|---|---|
Object-Oriented Programming with Java | Java Programming and Software Engineering Fundamentals (Coursera) | Java Programming: Solving Problems with Software (Coursera) |
Mathematics: Linear Algebra | Khan Academy - Linear Algebra | Linear Algebra (MIT OpenCourseWare) |
Collaborative Work | Teamwork Skills (Coursera) | Collaborative Working in a Remote Team (FutureLearn) |
Introduction to Network Forensics | Network Forensics (Udemy) | Network Forensics (Cybrary) |
Requirements Engineering | Software Processes and Agile Practices (Coursera) | Requirements Engineering: Secure Software Specifications (Coursera) |
System Pentesting Basics | Penetration Testing and Ethical Hacking (Pluralsight) | Introduction to Penetration Testing (Cybrary) |
Recommended Books:
- "Effective Java" by Joshua Bloch
- "Linear Algebra and Its Applications" by David C. Lay
- "The Basics of Hacking and Penetration Testing" by Patrick Engebretson
Module | Courses | Alternative Courses Links |
---|---|---|
Intercultural and Ethical Decision-Making | Ethics, Technology and Engineering (edX) | Data Science Ethics (Coursera) |
Introduction to the Internet of Things | IoT Fundamentals: Networking Technologies and Cloud (Coursera) | Introduction to IoT (FutureLearn) |
Algorithms, Data Structures and Programming Languages | Data Structures and Algorithm Specialization (Coursera) | Algorithms Specialization (Coursera) |
Theoretical Computer Sciences and Mathematical Logic | Introduction to the Theory of Computation (edX) | Discrete Mathematics for Computer Science (Coursera) |
IT Project Management | Agile Project Management (Coursera) | Introduction to Project Management (edX) |
DevSecOps and Common Software Weaknesses | DevSecOps: Continuous Security for DevOps (Pluralsight) | DevSecOps - The DevOps Way of Security (Udemy) |
Recommended Books:
- "IoT Inc: How Your Company Can Use the Internet of Things to Win in the Outcome Economy" by Bruce Sinclair
- "Introduction to the Theory of Computation" by Michael Sipser
- "The DevOps Handbook" by Gene Kim, Jez Humble, Patrick Debois, and John Willis
Elective A Options:
Module | Courses | Alternative Courses Links |
---|---|---|
IT Security Consulting | IT Security Consulting (Coursera) | Information Security: Context and Introduction (Coursera) |
Social Engineering | Social Engineering Tactics (Pluralsight) | Social Engineering: The Art of Human Hacking (Udemy) |
Host Forensics | Advanced Host Forensics (Pluralsight) | Computer Forensics and Investigations (Udemy) |
DevSecOps | Advanced DevSecOps (Pluralsight) | DevSecOps Masterclass (Udemy) |
Security in Complex Networks | Network Security (Coursera) | Network Security Fundamentals (Pluralsight) |
Network Forensics | Network Forensics Advanced (Pluralsight) | Network Forensics (Udemy) |
Elective B Options:
Module | Courses | Alternative Courses Links |
---|---|---|
Business Intelligence | Business Intelligence Basics (Coursera) | Introduction to Business Intelligence (edX) |
Future Threats | Emerging Cyber Threats (Cybrary) | Future Threats (Pluralsight) |
Cloud Security | Cloud Security Fundamentals (Coursera) | Cloud Security Basics (edX) |
Pentesting | Advanced Pentesting (Udemy) | Pentesting and Ethical Hacking (Pluralsight) |
Industrial Systems Technology | Industrial Systems (Coursera) | Introduction to Industrial IoT (edX) |
Cyber Threat Intelligence | Cyber Threat Intelligence (Pluralsight) | Introduction to Cyber Threat Intelligence (Coursera) |
Mobile Threats | Mobile Security (Coursera) | Mobile Security and Hacking (Pluralsight) |
Elective C Options:
This curriculum provides a comprehensive and practical learning path for a Bachelor's degree in Cyber Security, including essential courses, recommended books, and alternative online courses to ensure flexibility and breadth in learning.