This program is designed to offer a unique learning experience particularly in the field of computer security. It’s the first of its kind in Uganda and it will facilitate graduates to improve the computer security systems of different organisations in Uganda and beyond.
Career Options
Graduates of this program are particularly exposed to skills that help keep computer systems secure, reliable and robust.
The world has witnessed immense computer crimes in the recent past prompting immediate efforts to curb the vices through enhanced computer security techniques. This course offers skills to learners that will help in detecting, preventing, mitigating and dealing with computer criminals.
Computer forensics is also needed in recovery as well as identification and prosecution of the perpetrators.
This course exposes students to core computer science areas like networking, programming, database management and operating systems as well as security and forensics areas like evidence handling, evidence analysis, pattern and audit trailing, security tools / techniques, human psychology and the criminal justice system.
Graduates of this program can become Digital security officers, Computer forensic investigators, Database analysts, Digital forensic analysts, Technology security specialists, Systems Administrators.
Admission Requirements
Programme Name | Bsc.Science in Computer Security and Forensics |
---|---|
Programme Duration | 3 Years |
Admission Criteria | Direct Entry
|
Mode | Dual Mode (online and Local Support) |
Fee Type - Per Semester | Uganda Shillings 1,200,000 |
Programme Structure
Codes | Course name | LH | PH | TH | CH | CU | Mother Department | Cross Cutting | Semester | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Year 1 semester 1 (6 cores) | ||||||||||||||||
CS 100 | Structured Programming | 45 | - | 30 | 60 | 4 | ||||||||||
CS 101 | Computer Applications & Systems | 30 | 30 | - | 45 | 3 | ||||||||||
PS 101 | Human Psychology | 30 | 30 | - | 45 | 3 | ||||||||||
BA 100 | Organizational Theory & Management | 30 | - | 30 | 45 | 3 | ||||||||||
BA 104 | Business Communication | 30 | 30 | - | 45 | 3 | ||||||||||
BA 108 | Entrepreneurship Theory and Principles | 30 | - | 30 | 45 | 3 | ||||||||||
Semester load | 19 | |||||||||||||||
Year 1 semester 2 (5 cores) | ||||||||||||||||
CS 103 | Fundamentals of UNIX Operating Systems | 30 | - | 30 | 45 | 3 | ||||||||||
CS 200 | Object Oriented Programming | 30 | 30 | 30 | 60 | 4 | ||||||||||
CS 104 | Computer Hardware and Assembly | 30 | - | 30 | 45 | 3 | ||||||||||
NW 200 | Computer Networks and Data Communication | 30 | - | 30 | 60 | 4 | ||||||||||
CS 207 | Computer Crimes | 45 | 30 | - | 60 | 4 | ||||||||||
IT 200 | Information Security | 30 | - | 30 | 45 | 3 | ||||||||||
Semester load | 21 | |||||||||||||||
Year 1 recess term | ||||||||||||||||
TM 100 | Community Engagement I | - | 300 | - | 75 | 5 | ||||||||||
Recess term load | 5 | |||||||||||||||
Year 2 semester 1(6 cores) | ||||||||||||||||
SE 201 | Software Security | 30 | - | 30 | 45 | 3 | ||||||||||
CS 205 | Cryptology and Coding Theory | 30 | - | 30 | 60 | 4 | ||||||||||
IS 300 | Database Management Systems | 30 | 15 | 15 | 60 | 4 | ||||||||||
CS 201 | Operating Systems | 30 | - | 30 | 60 | 4 | ||||||||||
CF 100 | Computer Forensic Tools | 45 | 15 | 15 | 60 | 4 | ||||||||||
LW 200 | Physical Investigations | 45 | 15 | 15 | 60 | 4 | ||||||||||
Semester load | 23 | |||||||||||||||
Year 2 semester 2 (5 cores) | ||||||||||||||||
LW 201 | Evidence Handling and Presentation | 45 | 30 | - | 60 | 4 | ||||||||||
CF 200 | Operating Systems Forensics | 45 | 30 | - | 60 | 4 | ||||||||||
CS 211 | Computer Security Techniques | 45 | - | 30 | 60 | 4 | ||||||||||
TM 201 | Research Methods | 30 | - | 30 | 45 | 3 | ||||||||||
CS 212 | Security Modeling | 30 | - | 30 | 45 | 3 | ||||||||||
(1 electives) | ||||||||||||||||
NW 300 | Mobile Technologies | 30 | 30 | - | 45 | 3 | ||||||||||
IT 302 | Multimedia Technologies | 45 | 30 | - | 45 | 3 | ||||||||||
IS 306 | Data Mining & Business Intelligence | 45 | 30 | - | 60 | 4 | ||||||||||
Semester load | 21/22 | |||||||||||||||
TM 200 | Community Engagement II | - | 300 | - | 75 | 5 | ||||||||||
Recess term load | 5 | |||||||||||||||
Year 3 semester one (2 cores) | ||||||||||||||||
IT 202 | Legal & Ethical Issues in Computing | 45 | - | - | 45 | 3 | ||||||||||
CF 300 | Digital Devices Forensics | 30 | 30 | - | 45 | 3 | ||||||||||
IS 203 | Systems Administration | 45 | 30 | - | 60 | 4 | ||||||||||
CF 301 | Data Forensics | 30 | 30 | - | 45 | 3 | ||||||||||
LW 100 | Criminal profiling | 30 | 30 | 30 | 60 | 4 | ||||||||||
IS 301 | Data Warehousing | 30 | - | 30 | 45 | 3 | ||||||||||
Semester load | 20 | |||||||||||||||
Year 3 semester 2 (3 cores) | ||||||||||||||||
NW 301 | Network Security | 30 | 30 | - | 60 | 4 | ||||||||||
PP 305 | Project Planning & Management | 30 | 30 | - | 45 | 3 | ||||||||||
TM 301 | Project | - | 120 | - | 60 | 4 | ||||||||||
BA 107 | Principles of Marketing | 30 | 30 | - | 45 | 3 | ||||||||||
LW 202 | The Criminal Justice System | 30 | 30 | - | 45 | 3 | ||||||||||
PS 200 | Psychology of Abnormal Behavior | 30 | 30 | - | 60 | 3 | ||||||||||
Semester load | 20 | |||||||||||||||
Year 3 recess term | ||||||||||||||||
TM 300 | Community Engagement III | - | 300 | 75 | 5 | |||||||||||
Recess term load | 5 |
Fees per semester
Fees per semester | Functional Fees | Application Fees |
---|---|---|
1,200,000 UGX | 250,000 UGX | 50,000 UGX |
International students pay international student tuition fees which is rated in dollars and this specifically covers only the cost of teaching and many student support services. This tuition below is per academic session and includes both the tuition and functional fees.
Category of Programme | Fees per academic session (USD) | Application / Admission Fee |
---|---|---|
Bachelor’s Degree | $700 | $30 |
Undergraduate Diploma | $500 | $30 |
Undergraduate Certificate | $250 | $30 |