Master of Science in Computer Science

Aims of the Programme
The aim of the programme is to generate computer professionals with scientific knowledge and skills essential for advancing their professional careers and/or proceed with further research and progress towards a doctoral degree.

Learning Outcomes
At the end of the programme, the student will be expected to:

a) Identify the physical and logical control of today’s modern networking architectures, as well as the connectivity characteristics for end- to end reliable data transmission.
b) Identify network attacks, basic network defence tools, various types of malicious software (i.e. malware) and perfectly use countermeasure defence/detection tools by deploying existing technologies and libraries to achieve security goals.
c) Integrate cybersecurity ethics as a network security practitioner.
d) Design and develop centralized or distributed systems based on required functionality and purpose.
e) Identify and interpret actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information in computers and computer networks, along with identifying actions to protect and respond to unauthorized activity within information systems and computer networks.
f) Implement intelligence collection capabilities conducted through computer networks to gather data from target or adversary automated information systems or networks.
g) Analyse cyber related decisions as they apply to national security strategy from social, ethical, legal, and political viewpoints.
h) Understand common web infrastructure and applications attack vectors and be able to utilize tools and skills in order to attack web infrastructures and applications.
i) Create a solid enterprise-wide information security infrastructure, including analysing the security needs of the enterprise, designing a strategic plan to address the security requirements, selecting the appropriate tools to implement the security organizational policies, and establishing recovery techniques from disruptive and destructive information security events.
j) Design and deploy web database applications using commercially available database systems, and develop advanced queries using various query languages.
k) Communicate clearly and analytically using techniques derived from scientific practice in group meetings, presentations, lectures, written reports, and research papers.


Follow the path to your future!

Earn a generous scholarship to study for an internationally recognised Bachelor’s, Master’s or Doctoral degree

Learning flexibility

Step 1 of 3

Amazing Opportunity to earn a Scholarship. Apply Now!
Complete the following required fields to apply for a Unicaf scholarship for the programme of your choice.