Admission Fee | 15,000 |
Security Deposit(refundable) | 5,000 |
Total at the time of admission | 20,000 |
Per Month Fees 04 Years | 8,500 |
Digital world has evolved into a stage for creativity and a front line for cyber-attacks in a time when technology is moving forward at an unrelenting pace. We find ourselves in a never-ending struggle to safeguard the very foundations upon which our contemporary society is founded — our data, our privacy, and our vital infrastructure – even as we embrace the digital age with open arms. The ground-breaking field of BS Cyber Security Technology is positioned to influence how cybersecurity will develop in the future. It is born within this dynamic environment.
Imagine living in a future where our linked systems are resilient to even the most advanced attacks, where our private information is protected from prying eyes, and where our digital lives are unaffected by the continuous onslaught of cybercriminals. This vision is headed by the BS in Cyber Security Technology program, which equips a new generation of cyber guardians with the knowledge and abilities necessary to defend, create, and lead in the digital age.
We explore the deep workings of cybersecurity in this thrilling voyage, where algorithms and artificial intelligence collide with moral conundrums and legal frameworks. To address the human aspects of cybersecurity, we not only go into the depths of cryptography, penetration testing, and incident response, but also into the spheres of psychology, ethics, and policy. This is more than simply a program; it represents a fundamental shift in how we view and protect our digital environment.
We cordially invite you to join us on this transformative journey, where innovation meets security, code meets conscience, and the future meets the present. The goal of the BS Cyber Security Technology program is to create a safer, more robust digital world for future generations, not only to prepare for the issues of the future. Join us in redefining cybersecurity’s laws and lead the BS Cyber Security Technology revolution.
“To prepare students for careers in the ever-evolving field of cybersecurity by providing a comprehensive and forward-thinking education. We are committed to fostering a community of learners who are dedicated to safeguarding digital assets, protecting privacy, and mitigating cyber threats. Cultivate ethical and responsible cybersecurity professionals who understand the importance of upholding privacy, integrity, and confidentiality in an interconnected world. Instill a commitment to continuous learning, ensuring that our graduates remain at the forefront of cybersecurity practices and are capable of addressing the challenges of the future.”
PEO 1: Graduates will be effective cybersecurity practitioners with the ability to assess and manage security risks, implement protective measures, and respond to security incidents in a variety of computing environments.
PEO 2: Graduates will demonstrate proficiency in identifying and solving complex cybersecurity challenges, adapting to emerging threats, and contributing to innovative security solutions within the rapidly evolving field of cybersecurity.
PEO 3: Graduates will excel in both written and oral communication, as well as teamwork, enabling them to convey technical information clearly, work effectively in interdisciplinary teams, and engage with diverse stakeholders.
PEO 4: Graduates will uphold the highest ethical standards in cybersecurity practice, considering the ethical, legal, and social implications of their work, and demonstrating a commitment to responsible and socially responsible cybersecurity.
PLO 1: Engineering Technology Knowledge: An ability to apply knowledge of mathematics, natural science, Engineering Technology fundamentals, and Engineering Technology specialization to defined and applied Engineering Technology procedures, processes, systems, or methodologies.
PLO 2: Problem Analysis: An ability to Identify, formulate, research literature, and analyze broadly defined Engineering Technology problems reaching substantiated conclusions using analytical tools appropriate to the discipline or area of specialization.
PLO 3: Design/Development of Solutions: An ability to design solutions for broadly- defined Engineering Technology problems and contribute to the design of systems, components or processes to meet specified needs with appropriate consideration for public health and safety, cultural, societal, and environmental considerations.
PLO 4: Investigation: An ability to conduct investigations of broadly-defined problems; locate, search and select relevant data from codes, databases, and literature; and design and conduct experiments to provide valid conclusions.
PLO 5: Modern Tool Usage: An ability to Select and apply appropriate techniques, resources, and modern technology and IT tools, including prediction and modeling, to broadly-defined Engineering Technology problems, with an understanding of the limitations.
PLO 6: The Engineering Technologist and Society: An ability to demonstrate understanding of the societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to Engineering Technology practice and solutions to broadly defined Engineering Technology problems.
PLO 7: Environment and Sustainability: An ability to understand and evaluate the sustainability and impact of Engineering Technology work in the solution of broadly defined Engineering Technology problems in societal and environmental contexts.
PLO 8: Ethics: Understand and commit to professional ethics and responsibilities, and norms of Engineering Technology practice.
PLO 9: Individual and Teamwork: An ability to Function effectively as an individual and as a member or leader in diverse teams.
PLO 10: Communication: An ability to communicate effectively on broadly defined Engineering Technology activities with the Engineering Technologist community and with society at large by being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
PLO 11: Project Management: An ability to demonstrate knowledge and understanding of Engineering Technology management principles and apply these to one’s work as a member or leader in a team and to manage projects in multidisciplinary environments.
PLO 12: Lifelong Learning: An ability to recognize the need for and have the ability to engage in independent and lifelong learning in specialist Engineering Technologies.
Cybersecurity technologists play a crucial role in protecting organizations, individuals, and society as a whole from a wide range of digital threats and attacks. Here are several reasons why choosing a career as a cybersecurity technologist is a valuable and important choice. Increasing Cyber Threats: With the growth of the digital world, cyber threats have become more sophisticated and pervasive. Cyberattacks can lead to data breaches, financial losses, reputation damage, and even national security risks. Cybersecurity technologists are needed to defend against these threats. Protecting Data and Privacy: In today’s digital age, sensitive information and personal data are stored and transmitted online. Cybersecurity professionals work to safeguard this data and protect the privacy of individuals and organizations. The demand for cybersecurity professionals is consistently high and is expected to grow in the coming years. This means a strong job market with many opportunities for career growth and development.
The eligibility/admission criteria for admission in BSc (Cyber Security Technology) program is strictly as defined in NTC’s Accreditation Manual, Clause 3.2.4.1.
The primary requirements for eligibility/admission are:
SEMESTER I | ||||||
S. No. | Course Code | Course Title | Th. | Lab | Cr. Hr. | Pre-requisite |
1 | CS-107T | Introduction to Info. & Comm. Technologies (Theory) (Computing-I) | 1 | 0 | 1+2 | |
2 | CS-107L | Introduction to Info. & Comm. Technologies (Lab) (Computing-I) | 0 | 2 | ||
2 | CS-104T | Programming Fundamentals (Theory) (Computing-II) | 2 | 0 | 2+2 | |
3 | CS-104L | Programming Fundamentals (Lab) (Computing-II) | 0 | 2 | ||
4 | NS-109 | Calculus And Analytical Geometry (Natural Sciences-I) | 3 | 0 | 3+0 | |
5 | NS-106T | Applied Physics (Theory) (Natural Sciences-II) | 2 | 0 | 2+1 | |
6 | NS-106L | Applied Physics (Lab) (Natural Sciences-II) | 0 | 1 | ||
7 | HS-100 | English Composition & Comprehension (Humanities and Social Sciences-I) | 2 | 0 | 2+0 | |
8 | HS-101 | Islamic Studies/Ethical Behavior (Humanities and Social Sciences-II) | 2 | 0 | 2+0 | |
HS-102 | ||||||
Total | 12 | 5 | 17 |
SEMESTER II | ||||||
S. No. | Course Code | Course Title | Th. | Lab | Cr. Hr. | Pre-requisite |
1 | CS-112T | Object Oriented Programming (Theory) | 2 | 0 | 2+2 | Programming Fundamentals (Theory and Lab) |
(Cyber Security) Foundation-I | ||||||
1 | CS-112L | Object Oriented Programming (Lab) | 0 | 2 | ||
(Cyber Security) Foundation-I | ||||||
2 | EE-100T | Digital Logic Design (Theory) | 2 | 0 | 2+1 | |
(Cyber Security) Foundation-II | ||||||
3 | EE-100L | Digital Logic Design (Lab) | 0 | 1 | ||
(Cyber Security) Foundation-II | ||||||
4 | HS-103 | Pakistan Studies | 2 | 0 | 2+0 | |
(Humanities and Social Sciences-III) | ||||||
5 | HS-114 | Communication and Presentation Skills | 3 | 0 | 3+0 | English Composition & Comprehension |
(Humanities and Social Sciences-IV) | ||||||
6 | NS-110 | Linear Algebra (Natural Sciences-III) | 2 | 0 | 2+0 | Calculus and Analytical Geometry |
7 | CS-102T | Web Engineering (Theory) | 1 | 0 | 1+2 | |
(Cyber Security) Foundation-III | ||||||
8 | CS-102L | Web Engineering (Lab) | 0 | 2 | ||
(Cyber Security) Foundation-III | ||||||
Total | 12 | 5 | 17 |
SEMESTER III | ||||||
S. No. | Course Code | Course Title | Th. | Lab | Cr. Hr. | Pre-requisite |
1 | CS-211T | Data Structures and Algorithms (Theory) | 2 | 0 | 2+1 | Programming Fundamentals (Theory and Lab) |
(Cyber Security) Foundation-IV | ||||||
2 | CS-211L | Data Structures and Algorithms (Lab) | 0 | 1 | ||
(Cyber Security) Foundation-IV | ||||||
3 | CS-203T | Computer Communication Networks (Theory) | 2 | 0 | 2+2 | |
(Cyber Security) Foundation-V | ||||||
4 | CS-203L | Computer Communication Networks (Lab) | 0 | 2 | ||
(Cyber Security) Foundation-V | ||||||
5 | HS-231 | Technical and Business Writing (Humanities and Social Sciences-V) | 2 | 0 | 2+0 | Communication & Presentation Skills |
6 | CB-231T | Introduction to Cyber Security (Theory) | 2 | 0 | 2+1 | |
(Cyber Security) Breadth-II | ||||||
7 | CB-231L | Introduction to Cyber Security (Lab) (Cyber Security) Breadth-II | 0 | 1 | ||
8 | NS-206 | Probability and Statistics | 3 | 0 | 3+0 | |
(Natural Sciences-IV) | ||||||
9 | CS-213T | Introduction to Database System (Theory) | 2 | 0 | 2+1 | Data Structures & Algorithms (Theory and Lab) |
(Cyber Security) Foundation-V | ||||||
10 | CS-213L | Introduction to Database System (Lab) (Cyber Security) Foundation-V | 0 | 1 | ||
Total | 13 | 5 | 18 |
SEMESTER IV | ||||||
S. No. | Course Code | Course Title | Th. | Lab | Cr. Hr. | Pre-requisite |
1 | CS-234T | Operating Systems (Theory) | 2 | 0 | 2+1 | Data Structures & Algorithms (Theory and Lab) |
(Cyber Security) Breadth -III | ||||||
2 | CS-234L | Operating Systems (Lab) | 0 | 1 | ||
(Cyber Security) Breadth -III | ||||||
3 | CS-214T | Computer Organization & Assembly Language (Theory) | 2 | 0 | 2+1 | Digital Logic Design (Theory and Lab) |
4 | CS-214L | Computer Organization & Assembly Language (Lab) | 0 | 1 | ||
5 | CS-235T | Artificial Intelligence (Theory) | 1 | 0 | 1+1 | Object Oriented Programming (Theory and Lab) |
(Cyber Security) Breadth -V | ||||||
6 | CS-235L | Artificial Intelligence (Lab) | 0 | 1 | ||
(Cyber Security) Breadth -V | ||||||
7 | CB-232T | Systems And Network Administration (Theory) | 1 | 0 | 1+2 | Computer Communication Networks (Theory & Lab) |
(Cyber Security) Breadth -IV | ||||||
8 | CB-232L | Systems And Network Administration (Lab) | 0 | 2 | ||
(Cyber Security) Breadth -IV | ||||||
9 | CS-215T | Information Security (Theory) | 2 | 0 | 2+1 | Computer Communication Networks (Theory & Lab) |
(Cyber Security) Foundation-VI | ||||||
10 | CS-215L | Information Security (Lab) | 0 | 1 | ||
(Cyber Security) Foundation-VI | ||||||
11 | HS-207 | Psychology (University Elective-1) | 3 | 0 | 3+0 | |
Total | 11 | 6 | 17 |
SEMESTER V | ||||||
S. No. | Course Code | Course Title | Th. | Lab | Cr. Hr. | Pre-requisite |
1 | MS-303 | Human Resource Management (University Elective-II) | 3 | 0 | 3+0 | |
2 | CS-355T | Machine Learning (Theory) | 1 | 0 | 2+1 | Artificial Intelligence (Theory & Lab) |
(Depth Elective-1) | ||||||
3 | CS-355L | Machine Learning (Lab) | 0 | 2 | ||
(Depth Elective-1) | ||||||
4 | CS-351T | Block Chain Technology and Application (Theory) | 2 | 0 | 2+2 | |
(Depth Elective-II) | ||||||
5 | CS-351L | Block Chain Technology and Application (Lab) | 0 | 2 | ||
(Depth Elective-II) | ||||||
6 | HS-304 | Professional Practices | 2 | 0 | 2+0 | |
(Humanities and Social Sciences-VI) | ||||||
7 | MS-304 | Entrepreneurship and Leadership (Management Elective-1) | 3 | 0 | 3+0 | |
Total | 11 | 4 | 15 |
SEMESTER VI | ||||||
S. No. | Course Code | Course Title | Th. | Lab | Cr. Hr. | Pre-requisite |
1 | CB-361 | Final Year Project-I | 0 | 3 | 0+3 | |
2 | MS-300 | Information Technology Project Management (Management Elective-II) | 2 | 0 | 2+0 | |
3 | CB-352T | Error Correction and Coding Techniques (Theory) | 1 | 0 | 1+1 | Object Oriented Programming (Theory and Lab) |
(Depth Elective-III) | ||||||
4 | CB-352L | Error Correction and Coding Techniques (Lab) | 0 | 1 | ||
(Depth Elective-III) | ||||||
5 | CB-331T | Incident Response and Digital Forensics (Theory) | 2 | 0 | 2+1 | Information Security (Theory & Lab) |
(Information Security) Breadth -VI | ||||||
6 | CB-331L | Incident Response and Digital Forensics (Lab) | 0 | 1 | ||
(Information Security) Breadth -VI | ||||||
7 | CB-353T | IT Security Audit and Evaluation (Lab) (Cyber Security) Depth –IV | 2 | 0 | 2+1 | Information Security (Theory & Lab) |
8 | CB-353L | IT Security Audit and Evaluation (Lab) (Cyber Security) Depth –IV | 0 | 1 | ||
9 | BM-300T | Bioinformatics (Theory) (IDTE-I) | 1 | 0 | 1+1 | |
10 | BM-300L | Bioinformatics (Lab) (IDTE-I) | 0 | 1 | ||
Total | 8 | 7 | 15 |
SEMESTER VII | ||||||
S. No. | Course Code | Course Title | Th. | Lab | Cr. Hr. | Pre-requisite |
1 | CB-462 | Final Year Project-II | 0 | 3 | 0+3 | |
2 | NS-401 | Health, Safety and the Environment | 1 | 0 | 1+0 | |
(Humanities and Social Sciences-VII) | ||||||
3 | CB-451T | Cryptography (Theory) | 2 | 0 | 2+1 | |
(Depth Elective-IV) | ||||||
4 | CB-451L | Cryptography (Lab) | 0 | 1 | ||
(Depth Elective-IV) | ||||||
5 | CB-452T | Cloud Computing and IoT (Theory) | 2 | 0 | 2+1 | |
(Depth Elective-V) | ||||||
6 | CB-452L | Cloud Computing and IoT (Lab) | 0 | 1 | ||
(Depth Elective-V) | ||||||
7 | CB-457T | Ethical Hacking and Penetration Testing (Theory) | 2 | 0 | 2+1 | Information Security (Theory & Lab) |
(Cyber Security Depth – VII) | ||||||
8 | CB-457L | Ethical Hacking and Penetration Testing (Lab) | 0 | 1 | ||
(Cyber Security Depth – VII) | ||||||
9 | EE-464 | Renewable Energy (IDTE-II) | 2 | 0 | 2+0 | |
Total | 9 | 6 | 15 |
SEMESTER VIII | ||||||
S. No. | Course Code | Course Title | Th. | Lab | Cr. Hr. | Pre-requisite |
1 | CB-464 | Supervise Industrial Training (Compulsory) | 0 | 16 | 0+16 | |
Total | 0 | 16 | 16 |
Total Credit Hours = 130
Total Lab Credit Hours=54 (41.54)
Total Theory Credit Hours = 76 (58.46)
The career prospects for individuals with a background in cybersecurity technology are quite promising due to the increasing importance of cybersecurity in virtually every industry. Here are some career paths and opportunities for those with expertise in cybersecurity technology:
Analyzing security data and implementing measures to protect an organization’s systems and networks from cyber threats.
Identifying vulnerabilities in systems and networks by simulating cyberattacks to help organizations improve their security posture.
Advising organizations on cybersecurity best practices, conducting risk assessments, and developing security strategies tailored to their specific needs.
Designing and implementing secure systems and networks, including infrastructure, applications, and cloud environments.
Investigating security breaches and responding to cyber incidents to minimize damage and prevent future occurrences.
Building and maintaining security systems, including firewalls, encryption protocols, and intrusion detection/prevention systems.
Developing cryptographic algorithms and protocols to secure data transmission and storage.
Monitoring and analyzing security events and incidents in real-time to detect and respond to threats.
Gathering and analyzing threat intelligence to identify emerging cyber threats and vulnerabilities.
Collecting and analyzing digital evidence to investigate cybercrimes and support legal proceedings.
These are just a few examples, and the field of cybersecurity offers a wide range of career paths and opportunities for growth. With the increasing frequency and sophistication of cyber threats, the demand for cybersecurity professionals is expected to continue growing, making it a promising career choice for individuals with the right skills and expertise.
Admission Fee | 15,000 |
Security Deposit(refundable) | 5,000 |
Total at the time of admission | 20,000 |
Per Month Fees 04 Years | 8,500 |