top of page

Information Technology (IT) Security is a set of cyber security strategies designed to prevent unauthorised access to organisational assets such as data, networks, and computers. It protects sensitive information and potential hacking activities that could disrupt the flow of an organisation's operations
It is very important to protect digital data from hackers. IT security is not a cheap investment, but a breach into an organisation's system caused by malware such as Ransom ware, Spyware, and viruses, can be far more expensive and may result in a sign for an organisation.

Information Technology Security courses give students an insight into security protocols and protection measures such as cryptography, encryption standards, biometrics, all of which are widely used today. They also enable students to study the legal aspects such as regulations and observance of cyber security.

Students in this field learn how operating systems can be analysed and internal breaches repaired. They also learn how to detect and prevent virtual breaches, leading to the propagation of harmful computer viruses. In general, the ultimate goal of the programme is to teach students how cyber security risks can be assessed and mitigated.


Study levels:

The study levels that are offered for this programme are:
Advanced Diploma IT Security
Associate Degree in Applied technologies
Associate Degree in Technology
Bachelor in Computing and IT and Business
Bachelor in Computing and IT and Design
Bachelor in Computing and IT and Mathematics
Bachelor in Computing and IT and Psychology
Bachelor in Computing and IT and Statistics
Bachelor in IT Security
Bachelor in Political Science and Security studies
Bachelor of Computer Science
Bachelor of Counter Terrorism Security and Intelligence
Bachelor of Engineering
Bachelor of Information and Communication Technology
Bachelor of Information Technology
Bachelor of Mathematics
Bachelor of Networking
Bachelor of Science
Bachelor of Technology
Diploma in IT Security
Graduate Diploma IT Security
Master in Computing and IT and Business
Master in Computing and IT and Design
Master in Computing and IT and Psychology
Master in Computing and IT and Statistics
Master in IT Security
Master of Computer Science
Master of Counter Terrorism Security and Intelligence
Master of Engineering
Master of Information and Communication Technology
Master of information technology
Master of Mathematics
Master of Networking
Master of Science
Master of Technology
Postgraduate Diploma IT Security
Pre-bachelor degree in Business Computing and IT
Doctor of Philosophy in Information Technology Security


Some of the expected modules that this programme has to offer are:

Throwing Caps

Specialiasation modules

Advanced Digital Forensics
Application of Programming Principles
Architectural Thinking for Security
Asymmetric Cryptography
Business Systems Analysis and Design
C Programming
Cloud Computing
Computer Fundamentals
Computer Law and Cyber Security Management
Computer Networks
Computer Systems
Cyber Situational Awareness
Cyber Threat Intelligence and Incident Response
Database Design and Implementation
Database Systems
Enterprise Security and Privacy
Ethical Hacking and Countermeasures
Information and Network Security
Information Assurance

Information Security for Business and Government
Information Security Management
Linux Security
Malware Analysis
Mathematics for Computing
Multimedia Security and Digital Forensics
Networks and Cyber Security
Penetration Testing
Principles of Programming
Professionalism in Forensics and Security
Secure Systems and Applications
Security by Design
Security Information and Event Management
Software and Security Management
Symmetric Cryptography
Web Application Development
Windows Forensics



Some of the career options for graduates from an IT security programme are:


    Incident Manager
    Information Assurance Specialist
    Information Security Account Executive
    Information Security Software Engineer
    Information Technology Security Analyst
    Information Technology Security Architect
    Information Technology Security Awareness Manager
    Information Technology Security Consultant
    Information Technology Security Engineer
    Information Technology Security Risk Manager
    Information Technology Security Trainer


    Information Technology Specialist
    Network Security Detection Engineer
    Security Administrator
    Security Officer
    Security Operations Engineer
    Security Technology Administrator
    Technical Director
    Threat Researcher
bottom of page