Colleges offering BSc (Hons) Ethical Hacking and Cybersecurity under Coventry University, UK
A standard computer science course does not typically teach the specialist skills and knowledge to thoroughly test the security of computer systems, make them secure, and properly investigate if they are compromised. In contrast, our course has been developed to provide a good practical and theoretical understanding of cybersecurity, hacking, digital forensics, and the underlying computer science.
This course offers a balanced blend of practical experience and theoretical understanding in cybersecurity, ethical hacking, digital forensics, and core computer science principles. Our standardized labs enhance the learning process, providing students a realistic environment to develop their skills.
Graduates of this course are well-prepared to pursue careers as cybersecurity analysts, penetration testers, forensic analysts, security consultants, or security researchers. With their comprehensive education and practical training, they are equipped to make meaningful contributions to the ever-evolving field of cybersecurity and address the challenges of today's digital landscape.
On successful completion, the student should be able to:
- Demonstrate knowledge and understanding of the underlying technology, design methods, and programming languages required to practice in the domain of cybersecurity and the cultural, commercial, ethical, and professional issues connected with Ethical Hacking. Digital Forensics and Ethical Hacking and professional practice within them; emergent technologies.
- Apply appropriate design and problem-solving techniques to computing, ethical hacking, cybersecurity, and digital forensics requirements or issues.
- Conduct an in-depth investigation and make recommendations relating to developing and implementing a product in a domain appropriate to Ethical Hacking and Network Security.
- Use design, production, and programming tools relevant to cybersecurity in exploit development and associated areas.
- Apply usability human-computer interaction (HCI) design techniques in the context of a product relevant to cybersecurity.
Salient Features
Fee Structure
Particular | 1st Year (NPR) | 2nd Year (NPR) | 3rd Year (NPR) |
---|---|---|---|
Admission Fee | 40,000/- | ||
Annual Fee | 35,000/- | 35,000/- | 35,000/- |
CCA Fee | 20,000 | 20,000/- | 20,000/- |
Semester 1 Fee | 1,07,000/- | 1,07,000/- | 1,07,000/- |
Semester 2 Fee | 1,07,000/- | 1,07,000/- | 1,07,000/- |
University Registration Fee | (GBP 1060) ~1,80,200/- | (GBP 800) ~1,36,000/- | (GBP 800) ~1,36,000/- |
Total | 4,89,200/- | 4,05,000/- | 4,05,000/- |
Grand Total (NPR) | 12,99,200/- |
Eligibility
The candidates seeking admission in BSc (Hons) Ethical Hacking and Cybersecurity of Coventry University must have completed 10+2 or equivalent from a recognized board.
Curricular Structure
Year One
Semester I
- Introduction to Programming
- Teaches C and Python to provide the basics of any programming languages: operators, conditional statements, loops, functions, data structures, exception, and file handling to make students familiar with IDEs (Codeblock, Pychars, Vs Code) and Version Control systems to make students able to create systems like Brute Forcing tool, password generator/ manager, key loggers..etc..
- The Ethics and Legal Framework of Cyber Security
- Introduces students to the legal and ethical landscape in which cyber security and, more generally, computer science sit. Through discussion, case studies, and debate, learners will examine the impact of technology on society, the opportunities and dangers of connected systems and data collection, and issues around international legislation.
- Foundation of Computer Science
- Introduces Fundamental knowledge of Linux, Linux Kernel, Linux Distribution, Virtualization and system, management, and automation strategies for the operating system.
Tools Used: Oracle Virtual Box, VMWARE Workstation, UBUNTU, Kali Linux, CentOS.
- Introduces Fundamental knowledge of Linux, Linux Kernel, Linux Distribution, Virtualization and system, management, and automation strategies for the operating system.
Semester II
- Cybersecurity Fundamentals
- Information about the current cybersecurity landscape, various types of threats, and the different roles within cybersecurity. An overview of cybersecurity goals, the CIA triad, and how the principles of CIA are implemented. Understanding why online security is complex, along with the critical thinking skills and various Linux commands necessary to operate the system effectively. Scheduling tasks for automation and writing bash scripts to streamline processes. Exploring different wireless cracking scenarios. An introduction to basic types of encryption and their applications. The concept of digital signatures and their usage. Simple techniques for observing how data can be intercepted over the air. Techniques for gathering Open-Source Intelligence.
The tools used are Wireshark, Nmap, Macchanger, Open SSL, Air-package, Crontab, Vim, Virtual Box, VMware, Nikto, Maltego, etc.
- Information about the current cybersecurity landscape, various types of threats, and the different roles within cybersecurity. An overview of cybersecurity goals, the CIA triad, and how the principles of CIA are implemented. Understanding why online security is complex, along with the critical thinking skills and various Linux commands necessary to operate the system effectively. Scheduling tasks for automation and writing bash scripts to streamline processes. Exploring different wireless cracking scenarios. An introduction to basic types of encryption and their applications. The concept of digital signatures and their usage. Simple techniques for observing how data can be intercepted over the air. Techniques for gathering Open-Source Intelligence.
- Networking and Computer Architecture
- Introduces networking fundamentals, from standards and protocols to typical hardware and architectures for computer networks. Students will gain a basic understanding of networking concepts, focusing on IP addressing, subnetting, and routing protocols such as EIGRP, OSPF, and STP. Additionally, students will receive hands-on experience related to network security and security devices like firewalls, including software and hardware. Application layer protocols like HTTP, HTTPS, SSH, and Telnet will also be discussed in the Computer System.
Tools used: Physical Hardware like router, switches, cabling, Cisco Packet Tracer
- Introduces networking fundamentals, from standards and protocols to typical hardware and architectures for computer networks. Students will gain a basic understanding of networking concepts, focusing on IP addressing, subnetting, and routing protocols such as EIGRP, OSPF, and STP. Additionally, students will receive hands-on experience related to network security and security devices like firewalls, including software and hardware. Application layer protocols like HTTP, HTTPS, SSH, and Telnet will also be discussed in the Computer System.
- Information Security Management
-
Helps students understand how management and leadership affect teams and organizations broadly and specifically in terms of cyber security. Describes and demonstrates the concepts of threat, vulnerability, and risk.
Tools used: Nmap
-
Year Two
Semester III
- The Internet and Web Technologies
- Introduces web technologies, database systems, relational databases, software architecture, web application security architecture, secure web programming, and cloud-based data storage.
Tools Used: HTML, CSS, JavaScript, PHP or Python, MySQL Server, git, unit testing, etc.
- Introduces web technologies, database systems, relational databases, software architecture, web application security architecture, secure web programming, and cloud-based data storage.
- Digital Forensics
-
Recover, analyze, and preserve computer and related materials so that they help the investigation and can be presented as evidence in a court of law. This includes recovering deleted files and partitions from digital media.
Tools Used: IFTK imager, Volatility, Wireshark, Autopsy/the Sleuth Kit, Bulk Extractor, etc.
-
- Programming and Operating Systems
- Understand the concept of an Operating System (OS), its type, function, and structure. This module also covers the services provided by the OS, such as memory allocation methods, virtual memory, paging and demand paging, process synchronization, various scheduling algorithms, semaphores, mutual exclusion, etc. Students will also learn about the concept of deadlock and its recovery mechanism as well as bootloader and OS Kernel. Students will also get hands-on labs on the various concepts of OS, which will be done in Linux OS.
Tools Used: system call, pointers, Linux OS, GCC C.
- Understand the concept of an Operating System (OS), its type, function, and structure. This module also covers the services provided by the OS, such as memory allocation methods, virtual memory, paging and demand paging, process synchronization, various scheduling algorithms, semaphores, mutual exclusion, etc. Students will also learn about the concept of deadlock and its recovery mechanism as well as bootloader and OS Kernel. Students will also get hands-on labs on the various concepts of OS, which will be done in Linux OS.
Semester IV
- Security Operations
- Understand the security concepts, methods, and principles. Understand key IT Governance that relates to information security and how it influences an organization's security policy.
Tools used: IDS, IPS (snort), Packet Sniffers, SolarWinds
- Understand the security concepts, methods, and principles. Understand key IT Governance that relates to information security and how it influences an organization's security policy.
- Foundations of Networking
- An in-depth understanding of networks and security issues related to today's internetworking technologies, including protocols such as Static, RIP, EIGRP, OSPF, BGP, STP, NAT, ACL, LAN, WAN, and MAN.
Tools used - Cisco Packet Tracer, GNS3, EVE-NG, Hands-on Real CISCO Devices Router Switch, Firewall, Server, Access Server
- An in-depth understanding of networks and security issues related to today's internetworking technologies, including protocols such as Static, RIP, EIGRP, OSPF, BGP, STP, NAT, ACL, LAN, WAN, and MAN.
- Practical Penetration Testing
- In this module, students will study the theoretical and practical aspects of penetration testing and security auditing. They will explore standard tools and techniques, focusing on understanding the underlying theoretical concepts of systems exploitation.
Year Three
Semester V
- Digital Security Risk and Audit Management
-
Identify security issues and gaps in a system. Ensure the system complies with internal and external security policies. Plan and conduct system and penetration testing to effectively identify vulnerabilities and their mitigation processes.
Tools used: OpenVAS, Nessus, SIEM Solutions
-
- Reverse Engineering and Exploit Development
-
Examine how software operates within a computer and interacts with its various components. Then, learn how to penetrate system applications and create exploits and shellcodes to achieve this.
Tools used: gdb, Ghidra, IDA, Strace, Itrace
-
- Research Project Preparation
- Identify and refine a project topic and research question, conduct an initial literature review, and create a detailed, attainable project plan. Consider the research's social, legal, and ethical impacts.
Semester VI
- Advanced Penetration Testing
-
The following will all be covered in this course.
-
Students will learn how red team assessment differs from traditional pen testing.
-
Social engineering attacks.
-
The objective of red-teaming
-
Red team techniques
-
Red teaming frameworks/guidelines
-
Red team tools and usages/use cases
-
Red team report writing and some red team-related lab hands-on.
-
-
- Applied Cryptography
- The secret to conveying confidential messages includes covering risk management techniques and their application in the SDLC. This involves symmetric key encryption, public key encryption, digital certificates, IPsec, RSA tools, firewalls, different types of VPNs, and IPS/IDS.
- Research Project Delivery
- Undertake a significant project that will engage the in-depth technical, problem-solving, creative, and other skills required by a professional practitioner. Students must ensure that their work adheres to appropriate codes of practice and fulfills ethical requirements.(Individual research project)