OVERVIEW:
Description of the Programme:
This course is designed to meet the new and growing demand for specialists in the prevention, detection, correction, and conviction of digital crimes.
This new discipline is based on computer digital forensic and computer security technologies, and involves the application of scientific methods for the collection, analysis, interpretation, and presentation of potential evidence to the courts.
Law enforcement, military agencies and the intelligence
community have traditionally used computer digital forensics extensively for the prosecution or
protection of individuals – and these are the concepts you’ll learn in this programme.
Admission Requirements:
Candidates must satisfy the minimum entry requirements of Jaramogi Oginga Odinga University of Science and Technology.
In addition, they should meet the following requirements:
a) Have at least a mean grade of C+ in Kenya Certificate of Secondary Education (KCSE). In addition, candidates are expected to have at least a grade C or above in Mathematics, Physics or Physical Science OR
b) Have two principal passes in science subject in KACE and at least a credit in pass in Mathematics. OR
c) Have a Higher Diploma or Diploma in IT or any other related discipline from a recognized university or college. OR
d) Have a degree from a recognized University
Programme Learning Objectives (PLOs):
The overall objectives of the course is to prepare students for current and emerging technological trends supporting a wide range of information assurance and security concerns within public, private, and governmental and non-governmental organizations.
The specific objectives are:
a) To equip students with advance training in computer security and digital forensics technology.
b) To equip students with knowledge of computer crime, law-enforcement and forensic methods, and the legal requirements for collecting, preserving and presenting evidence to court.
c) To train and motivate students to gain an understanding of how to manage security within an organization and appreciate the security needs of networks, users and applications within that organisation.
d) To provide the students with understanding of computer security implementation standards, best practices, technologies and methods, which will enable them to effectively secure and manage the business environment.
e) To equip students with relevant techniques required in identification, analysis, assessment and evaluation of information system threats and vulnerabilities and their impact on an organization’s critical information infrastructures.
f) To provide students with technical knowhow needed to identify management, technical,
personnel, operational and physical security controls in the enterprise.
STRUCTURE OF PROGRAMME:
Duration of the Program:
a) The Degree course shall normally take four academic years covering 8 semesters.
b) A candidate will be deemed to have passed an academic year after successful completion of all the units offered in that year. A Diploma Certificate may be is
Courses Distribution:
YEAR ONE: SMESTER ONE
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3111 | Introduction to Computer Systems | 28 | 14 | 42 | 1C |
IIT 3112 | Introduction to Programming | 28 | 14 | 42 | 1C |
IIT 3113 | PC Security and Privacy | 28 | 14 | 42 | 1C |
IIT 3114 | HTML Programming and Internet Tools | 28 | 14 | 42 | 1C |
SMA 3113 | Logical Functions | 28 | 14 | 42 | 1R |
SMA 3114 | Logical Functions | 42 | 0 | 42 | 1R |
EEL 3115 | Communication Skills | 42 | 0 | 42 | 1R |
SBI 3114 | HIV and AIDS | 42 | 0 | 42 | 1R |
Total | 280 | 56 | 336 | 8 |
YEAR ONE: SEMESTER TWO
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3121 | Data Communication Principles | 28 | 14 | 42 | 1C |
IIT 3122 | Systems Building | 28 | 14 | 42 | 1C |
IIT 3123 | Computer Systems Architecture | 28 | 14 | 42 | 1C |
IIT 3124 | Circuit Theory and Basic Electronics | 28 | 14 | 42 | 1C |
IIT 3125 | Emerging Threats, Attacks and Defenses | 28 | 14 | 42 | 1C |
IIT 3126 | Computer, Law, Ethics and Society | 28 | 14 | 42 | 1C |
SLB 3111 | Development Studies | 42 | 0 | 42 | 1R |
ESD 3121 | Information Security Audit and Controls | 42 | 0 | 42 | 1R |
Total | 280 | 56 | 336 | 8 |
YEAR TWO: SEMESTER ONE
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3211 | Operating Systems | 28 | 14 | 42 | 1C |
IIT 3212 | Computer Forensics I | 28 | 14 | 42 | 1C |
IIT 3213 | Database Administration and Design | 28 | 14 | 42 | 1C |
IIT 3214 | Web Application Technologies | 28 | 14 | 42 | 1C |
IIT 3215 | Systems Analysis and Design | 28 | 14 | 42 | 1C |
IIT 3216 | TCP/IP Network Administration | 28 | 14 | 42 | 1C |
IIT 3217 | Network Design and Implementation | 28 | 14 | 42 | 1C |
IIT 3218 | Introduction to Number Theory | 28 | 14 | 42 | 1C |
Total | 224 | 112 | 336 | 8 |
YEAR TWO: SEMESTER TWO
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3221 | Computer and Network Security | 28 | 14 | 42 | 1C |
IIT 3222 | Information Technology Policy and Strategy | 28 | 14 | 42 | 1C |
IIT 3223 | Systems Programming | 28 | 14 | 42 | 1C |
IIT 3224 | Criminalistics/ Forensic Science Lab | 0 | 42 | 42 | 1C |
IIT 3225 | Ethical Hacking and Penetration Testing | 28 | 14 | 42 | 1C |
IIT 3226 | Digital Electronics | 28 | 14 | 42 | 1C |
IIT 3227 | Computer Systems and Networking Lab | 28 | 14 | 42 | 1R |
BCM 3226 | Entrepreneur Business Process | 28 | 14 | 42 | 1C |
Total | 182 | 154 | 336 | 8 |
YEAR THREE: SEMESTER ONE
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3311 | Computer Forensics II | 28 | 14 | 42 | 1C |
IIT 3312 | Distributed Systems | 28 | 14 | 42 | 1C |
IIT 3313 | Legal Issues, Ethics and Incident Response in IT Security | 28 | 14 | 42 | 1C |
IIT 3314 | Organization and Project Management | 28 | 14 | 42 | 1C |
IIT 3315 | Fundamentals of Cryptography and Steganography | 28 | 14 | 42 | 1C |
IIT 3316 | Protocols and Systems for Internet and Web Security | 28 | 14 | 42 | 1C |
BLB 3113 | Laws of Crime | 42 | 0 | 42 | 1R |
BBM 3111 | Principles of Accounting | 42 | 0 | 42 | 1C |
Total | 254 | 84 | 336 | 8 |
YEAR THREE: SEMESTER TWO
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3321 | Enterprise Systems Management and Security | 28 | 14 | 42 | 1C |
IIT 3322 | Computer Security, Risk Management and Control | 28 | 14 | 42 | 1C |
IIT 3323 | Information Systems Control and Audit | 28 | 14 | 42 | 1C |
IIT 3324 | Wireless Networks and Mobile Computing | 28 | 14 | 42 | 1C |
IIT 3325 | Management Information Systems | 28 | 14 | 42 | 1C |
IIT 3326 | Programming Distributed Components | 28 | 14 | 42 | 1C |
IIT 3327 | Artificial Intelligence | 28 | 14 | 42 | 1R |
BCM 3112 | Elements of Management | 42 | 14 | 42 | 1C |
Total | 238 | 98 | 336 | 8 |
YEAR THREE: SEMESTER THREE
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3331 | Industrial Attachment | 0 | 480 | 480 | 1C |
YEAR FOUR: SEMESTER ONE
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3411 | IT Security Architecture and Design | 28 | 14 | 42 | 1C |
IIT 3412 | Information Security Policy and Compliance | 28 | 14 | 42 | 1C |
IIT 3413 | Operating System Security | 28 | 14 | 42 | 1C |
IIT 3414 | Cybercrime Investigation | 28 | 14 | 42 | 1C |
IIT 3415 | Network Management and Security | 28 | 14 | 42 | 1C |
IIT 3416 | Computer Graphics | 28 | 14 | 42 | 1C |
BLB 3216 | Law of Evidence | 42 | 0 | 42 | 1R |
Electives ( Any 3 Electives)* |
*ELECTIVES ( Any 3 Electives)
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3431 | Java Security | 28 | 14 | 42 | 1E |
IIT 3432 | Forensic Computing Capstone Research | 28 | 14 | 42 | 1E |
IIT 3433 | Embedded Systems Programming I | 28 | 14 | 42 | 1E |
IIT 3434 | Technology Project Management | 28 | 14 | 42 | 1E |
IIT 3435 | Technologies in National Cyber Security | 28 | 14 | 42 | 1E |
IIT 3436 | Fraud and Forensic Accounting | 28 | 14 | 42 | 1E |
IIT 3437 | Legal and Ethical Issues in Cybercrime and Prosecution | 42 | 0 | 42 | 1E |
IIT 3438 | Financial Issues in Managing a Secure Operation | 42 | 0 | 42 | 1E |
IIT 3439 | Mobile Phone Cybercrime | 42 | 0 | 42 | 1E |
IEX 3421 | Critical Thinking | 42 | 0 | 42 | 1E |
YEAR FOUR: SEMESTER TWO
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3421 | Information Warfare | 28 | 14 | 42 | 1C |
IIT 3422 | Project | 0 | 42 | 42 | 1C |
IIT 3423 | Cybercrime and the Law | 28 | 14 | 42 | 1C |
Electives ( Any 6 Electives)* |
*ELECTIVES ( Any 6 Electives)
Course Code | Course Title | Course Contact Hours | Weight (Units) | ||
Lecture | Practical | Total | |||
IIT 3441 | Advanced Linux/ UNIX System Administrator | 28 | 14 | 42 | 1E |
IIT 3442 | Distributed Applications Development | 28 | 14 | 42 | 1E |
IIT 3443 | Social Network Computing | 28 | 14 | 42 | 1E |
IIT 3444 | HPC Cluster, Virtualization and Cloud Computing | 28 | 14 | 42 | 1E |
IIT 3445 | Secure e-Business | 28 | 14 | 42 | 1E |
IIT 3446 | Embedded Systems Programming II | 28 | 14 | 42 | 1E |
IIT 3447 | Digital Defense: Issues in Security and Critical Infrastructure Protection | 28 | 14 | 42 | 1E |
IIT 3448 | Biometric Authentication Technologies | 28 | 14 | 42 | 1E |
IIT 3449 | Advanced Topics in Information Assurance, Security and Auditing | 28 | 14 | 42 | 1E |
BBM 3125 | Business Laws | 42 | 0 | 42 | 1E |
BCM 3222 | Financial Management | 42 | 0 | 42 | 1E |
BLB 3227 | Legal Systems and Legal Methods | 1E |
EXPECTED CAREER DIRECTIONS:
Graduates can work computer forensic investigators, information security consultants, information security analysts, information security administrator or information security auditors.
Programe Fees:
Kshs: 146,000 per Year