
BSc Cyber Security
Din Daeng, Thailand
DURATION
3 Years
LANGUAGES
English
PACE
Full time
APPLICATION DEADLINE
Request application deadline
EARLIEST START DATE
Apr 2025
TUITION FEES
EUR 19,900 / per year *
STUDY FORMAT
On-Campus
* Spanish & Thai Citizens: 9.950 EUR | internationals: 19.900 EUR
Key Summary
Introduction
As enterprise is becoming focused on the security of its information systems, the demand for cybersecurity specialists continues to expand. The Bsc in Cybersecurity prepares students to handle the full variety of threats and challenges faced by the modern enterprise. Students start with foundations in mathematics and computer science, continue with programming and security tools and arrive at the understanding of the full range of current cyber threats, enterprise security architecture as well as legal and ethical aspects of security.
Students enrolled in Bachelor's programmes at Harbour.Space University have the opportunity to receive an accredited degree from the University of the Thai Chamber of Commerce (UTCC) in Bangkok, Thailand. Benefit from Harbour.Space University's long-term partnership with this reputable and dynamic university in Asia.
Accreditation
Students enrolled in Bachelor's programmes at Harbour.Space Institute have the opportunity to receive an accredited degree from the University of the Thai Chamber of Commerce (UTCC) in Bangkok, Thailand. Benefit from Harbour.Space Institute's long-term partnership with this reputable and dynamic university in Asia.
Admissions
Scholarships and Funding
Two types of Scholarships
- Work and Study: Combining education with hands-on industry experience to prepare students for successful careers.
- Excellence & Equity: Empowering diverse and high-achieving students to reach their full potential through dedicated financial support.
Scholarship amount
Scholarships range from 5% to 100%, customized to match your potential and needs. When you receive 50% or more, you become a Co-Creator, playing a vital role in our community by contributing as a teaching assistant or through part-time work. Co-Creators are the backbone of Harbour.Space, helping to shape the future while receiving significant support for their education.
How to apply
Students are automatically considered for the Excellence & Equity Scholarships when they apply to Harbour.Space. No extra steps are required.
Curriculum
1 year
In the first year, students obtain the foundational theoretical knowledge they need to become cybersecurity professionals. The programme builds the mathematical basis upon which students will develop understanding of programming, computer networks and enterprise information systems during following years. The courses are mostly given in a form of lectures and takeaway coursework.
Topics
- Combinatorics & Graphs - 1
- Foundations of programming – 1
- Calculus – 1
- Foundations of mathematical logic
- Linear algebra -1
- Data structures and algorithms – 1
- Combinatorics and graphs – 2
- Calculus – 2
- Data structures and algorithms – 2
- Linear algebra – 2
- Computer Organisation and Systems
- Combinatorics
- Operating systems
- Calculus – 3
- Capstone Project
- Seminars & Workshops
2 year
In the second year, students complete the foundations with courses in programming, scripting, machine learning and databases and continue to study security of operating systems and networks. The second year also offers a fundamental courses in cryptography and principles of secure programming. Most courses require practical coursework and a course project enabling students to get a feel for the challenges and approaches used in this field. The students will also begin developing software for the Capstone project.
Topics
- Probability theory
- Introduction to Statistics
- Java
- Practical Unix
- Parallel and Disrtibuted Computing - 1
- Introduction to Cyber Security
- Machine learning – 1
- Secure Programming
- Compilers
- Introduction to Computer Networking
- Database Systems Principles
- Windows Administration
- Introduction to Cryptography
- Scripting Languages
- Web Applications
- Captstone Project
- Seminars & Workshops
3 year
During the third, the final year, students focus on veriety of cybersecurity topics including advanced network management, operating system security, policy analysis and implementation, vulnerability analysis and legal environment. The courses are taught by researchers and professionals who practice the material they teach either academically or professionally. This is the best time to learn cybersecurity first hand from leading practitioners. The goal of the final year is to expose students to a range of real-world security challenges and mitigation strategies and to ensure seamless transition into a professional roles.
Topics
- Linux Administration
- Human Aspects of Cybersecurity: Law, Ethics and Privacy
- Disaster Recovery
- Advanced Network Management & Security
- Operating Systems Security
- Policy Analysis and Implementation
- Enterprise Information Systems & Clouds
- Ethical Hacking
- Risk Management
- Vulnerability Analysis, Penetration Testing
- Data Visualization
- Mobile Application Development
- Technical Project Management
- Performance Oriented Computing
- Computer Forensics
- Software Testing, Verification and Validation
- Leadership & Group Dynamics
- Writing, Documentation, TeX, JavaDoc, Academic
- Captstone Project
- Seminars & Workshops
Career Opportunities
- Junior security engineer conducts incident/event investigation analysis and tests security products and systems to detect security weaknesses.
- Security Engineer builds and maintains IT security solutions for an organisation, develops technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
- The Security Director oversees the implementation of all IT security measures throughout an organisation required to ensure the security of equipment, information, and personnel from fraud, internet hacking, physical assault, industrial espionage, terrorism or robbery.
- Security Architect creates complex security structures and thinks like a hacker would, because he/she must anticipate all of the moves and tactics that hackers will use to try and gain unauthorized access to the computer system.
- A Chief Information Security Officer (CISO) establishes and maintains the enterprise vision, strategy and programmes to ensure information assets and technologies are adequately protected.
Gallery
Women in Tech Scholarship
Apply now to receive up to 50% off your tuition fee and a discounted application fee.