Bachelor of Science in Computer Security and Forensics

All Programmes

OVERVIEW:
Description of the Programme:

This course is designed to meet the new and growing demand for specialists in the prevention, detection, correction, and conviction of digital crimes.

This new discipline is based on computer digital forensic and computer security technologies, and involves the application of scientific methods for the collection, analysis, interpretation, and presentation of potential evidence to the courts.

Law enforcement, military agencies and the intelligence community have traditionally used computer digital forensics extensively for the prosecution or protection of individuals – and these are the concepts you’ll learn in this programme.

Admission Requirements:

Candidates must satisfy the minimum entry requirements of Jaramogi Oginga Odinga University of Science and Technology.

In addition, they should meet the following requirements:

a) Have at least a mean grade of C+ in Kenya Certificate of Secondary Education (KCSE). In addition, candidates are expected to have at least a grade C or above in Mathematics, Physics or Physical Science OR

b) Have two principal passes in science subject in KACE and at least a credit in pass in Mathematics. OR

c) Have a Higher Diploma or Diploma in IT or any other related discipline from a recognized university or college. OR

d)  Have a degree from a recognized University

Programme Learning Objectives (PLOs):

The overall objectives of the course is to prepare students for current and emerging technological trends supporting a wide range of information assurance and security concerns within public, private, and governmental and non-governmental organizations.

The specific objectives are:

a) To equip students with advance training in computer security and digital forensics technology.

b) To equip students with knowledge of computer crime, law-enforcement and forensic methods, and the legal requirements for collecting, preserving and presenting evidence to court.

c) To train and motivate students to gain an understanding of how to manage security within an organization and appreciate the security needs of networks, users and applications within that organisation.

d) To provide the students with understanding of computer security implementation standards, best practices, technologies and methods, which will enable them to effectively secure and manage the business environment.

e) To equip students with relevant techniques required in identification, analysis, assessment and evaluation of information system threats and vulnerabilities and their impact on an organization’s critical information infrastructures.

f) To provide students with technical knowhow needed to identify management, technical, personnel, operational and physical security controls in the enterprise.



STRUCTURE OF PROGRAMME:
Duration of the Program:

a) The Degree course shall normally take four academic years covering 8 semesters.

b) A candidate will be deemed to have passed an academic year after successful completion of all the units offered in that year. A Diploma Certificate may be is

Courses Distribution:

YEAR ONE: SMESTER ONE

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3111 Introduction to Computer Systems 28 14 42               1C
IIT 3112 Introduction to Programming 28 14 42               1C
IIT 3113 PC Security and Privacy 28 14 42               1C
IIT 3114 HTML Programming and Internet Tools 28 14 42               1C
SMA 3113 Logical Functions 28 14 42               1R
SMA 3114 Logical Functions  42 0 42               1R
EEL 3115 Communication Skills 42 0 42               1R
SBI 3114 HIV and AIDS 42 0 42               1R
Total 280 56 336 8


YEAR ONE: SEMESTER TWO

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3121 Data Communication Principles 28 14 42               1C
IIT 3122 Systems Building 28 14 42               1C
IIT 3123 Computer Systems Architecture 28 14 42               1C
IIT 3124 Circuit Theory and Basic Electronics 28 14 42               1C
IIT 3125 Emerging Threats, Attacks and Defenses 28 14 42               1C
IIT 3126 Computer, Law, Ethics and Society 28 14 42               1C
SLB 3111 Development Studies 42 0 42               1R
ESD 3121 Information Security Audit and Controls 42 0 42               1R
Total 280 56 336 8


YEAR TWO: SEMESTER ONE

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3211 Operating Systems 28 14 42               1C
IIT 3212 Computer Forensics I 28 14 42               1C
IIT 3213 Database Administration and Design 28 14 42               1C
IIT 3214 Web Application Technologies 28 14 42               1C
IIT 3215 Systems Analysis and Design 28 14 42               1C
IIT 3216 TCP/IP Network Administration 28 14 42               1C
IIT 3217Network Design and Implementation 28 14 42               1C
IIT 3218 Introduction to Number Theory 28 14 42               1C
Total 224 112 336 8

YEAR TWO: SEMESTER TWO

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3221 Computer and Network Security  28 14 42               1C
IIT 3222 Information Technology Policy and Strategy 28 14 42               1C
IIT 3223 Systems Programming 28 14 42               1C
IIT 3224 Criminalistics/ Forensic Science Lab 0 42 42               1C
IIT 3225 Ethical Hacking and Penetration Testing 28 14 42               1C
IIT 3226 Digital Electronics 28 14 42               1C
IIT 3227 Computer Systems and Networking Lab 28 14 42               1R
BCM 3226 Entrepreneur Business Process 28 14 42               1C
Total 182 154 336 8


YEAR THREE: SEMESTER ONE

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3311 Computer Forensics II 28 14 42              1C
IIT 3312 Distributed Systems 28 14 42               1C
IIT 3313 Legal Issues, Ethics and Incident Response in IT Security 28 14 42               1C
IIT 3314Organization and Project Management 28 14 42               1C
IIT 3315Fundamentals of Cryptography and Steganography 28 14 42               1C
IIT 3316 Protocols and Systems for Internet and Web Security 28 14 42               1C
BLB 3113 Laws of Crime 42 0 42               1R
BBM 3111 Principles of Accounting 42 0 42               1C
Total 254 84 336 8


YEAR THREE: SEMESTER TWO

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3321 Enterprise Systems Management and Security 28 14 42               1C
IIT 3322 Computer Security, Risk Management and Control 28 14 42               1C
IIT 3323 Information Systems Control and Audit 28 14 42               1C
IIT 3324 Wireless Networks and Mobile Computing 28 14 42               1C
IIT 3325Management Information Systems 28 14 42               1C
IIT 3326 Programming Distributed Components 28 14 42               1C
IIT 3327 Artificial Intelligence 28 14 42               1R
BCM 3112 Elements of Management 42 14 42               1C
Total 238 98 336 8

YEAR THREE: SEMESTER THREE

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3331 Industrial Attachment 0 480 480               1C


YEAR FOUR: SEMESTER ONE

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3411 IT Security Architecture and Design 28 14 42               1C
IIT 3412 Information Security Policy and Compliance 28 14 42               1C
IIT 3413 Operating System Security 28 14 42               1C
IIT 3414 Cybercrime Investigation 28 14 42               1C
IIT 3415 Network Management and Security 28 14 42               1C
IIT 3416 Computer Graphics 28 14 42               1C
BLB 3216 Law of Evidence 42 0 42               1R

Electives ( Any 3 Electives)*




*ELECTIVES ( Any 3 Electives)

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3431 Java Security 28 14 42               1E
IIT 3432 Forensic Computing Capstone Research 28 14 42               1E
IIT 3433 Embedded Systems Programming I 28 14 42               1E
IIT 3434 Technology Project Management 28 14 42               1E
IIT 3435 Technologies in National Cyber Security 28 14 42               1E
IIT 3436Fraud and Forensic Accounting 28 14 42               1E
IIT 3437 Legal and Ethical Issues in Cybercrime and Prosecution 42 0 42               1E
IIT 3438 Financial Issues in Managing a Secure Operation 42 0 42               1E
IIT 3439 Mobile Phone Cybercrime 420 42 1E
IEX 3421Critical Thinking420421E


YEAR FOUR: SEMESTER TWO

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3421 Information Warfare 28 14 42               1C
IIT 3422 Project 0 42 42               1C
IIT 3423 Cybercrime and the Law 28 14 42               1C

Electives ( Any 6 Electives)*




*ELECTIVES ( Any 6 Electives)

Course Code Course Title Course Contact Hours Weight (Units)
Lecture Practical  Total
IIT 3441 Advanced Linux/ UNIX System Administrator 28 14 42               1E
IIT 3442 Distributed Applications Development 28 14 42               1E
IIT 3443 Social Network Computing 28 14 42               1E
IIT 3444 HPC Cluster, Virtualization and Cloud Computing 28 14 42               1E
IIT 3445 Secure e-Business 28 14 42               1E
IIT 3446 Embedded Systems Programming II 28 14 42               1E
IIT 3447 Digital Defense: Issues in Security and Critical Infrastructure Protection  28 14 42               1E
IIT 3448 Biometric Authentication Technologies 28 14 42               1E
IIT 3449 Advanced Topics in Information Assurance, Security and Auditing 2814 421E
BBM 3125Business Laws420421E
BCM 3222Financial Management420421E
BLB 3227Legal Systems and Legal Methods


1E























EXPECTED CAREER DIRECTIONS:

Graduates can work computer forensic investigators, information security consultants, information security analysts, information security administrator or information security  auditors.

Programe Fees:

Kshs: 146,000 per Year