Master of Cyber Security
Master of Cyber Security
PROGRAMME SPECIFICATIONS
The Master of Cyber Security is offered on a full-time basis. The full-time mode is offered only
at the UTM main campus in Johor Bahru. The duration of study for the full-time programme is
3 semesters (1.5 years), subjected to the student’s entry qualifications with total number of
credits is 45.
This programme bridges the gap between those cyber security aspects with the real-world
requirements. The aim of this programme is to support the global need in producing
professional, dedicated and ethical cyber security experts who will effectively plan, design,
manage and practice reliable cyber security mechanisms and technologies. The programme
is designed based on top cyber security professional certifications such as CISSP (Certified
Information Systems Security Professional), CPT (Certified Penetration Tester), CSAP
(Certified Secure Application Professional), CDSP (Certified Data Security Professional) and
CHFI (Computer Hacking and Forensic Investigation).
General Information
Full Time
11. Study Duration Minimum: 1.5 years
Maximum: 4 years
COURSE MENU
Additional Courses (for non-Computer Science/IT background)
MECR0013 Cryptography
MECR0023 Computer Security
After having completed the programme, graduates should be able to demonstrate the following
competencies:
Code Intended Learning Outcomes
PLO3 Apply practical skills to solve problems in the field of Cybersecurity. (Practical
Skills)
PLO5 Communicate effectively the knowledge, skills and ideas using appropriate
methods to peers, experts and communities. (Communications Skills)
PLO7 Evaluate numerical and graphical data critically using quantitative or qualitative
tools in solving problems. (Numeracy Skills)
*Please attach a copy of results for previous semesters and a copy of registration slip for
current semester.
Projects (Compulsory)
TOTAL CREDITS:
CAREER OPPORTUNITIES
Security Specialist/ Administrator/ Architect/ Analyst/ Auditor/ Director/ Consultant/ Engineer/
Manager; Cryptographer; Cryptanalyst; Chief Information Security Officer; Vulnerability
Assessor; Incident Responder; Forensic Expert; Penetration Tester; Source Code Auditor.
COURSE SYNOPSIS
ADDITIONAL COURSES
MECR0013 Cryptography
Cryptography addresses the principles, means, and methods of disguising information to
ensure its integrity, confidentiality and authenticity. This course provides the background for
the application and implementation of security mechanisms covered in the other courses. It
deals with both theoretical and practical aspects of cryptography, to give an insight to the
problems that arise in cryptography and the tools used to solve them. It introduces both
symmetric key cipher system and public key cryptography, covering methods of obtaining the
objectives of CIA (Confidentiality, Integrity and Availability).
CORE COURSES
ELECTIVE COURSES
MECR2415 Project 1
This is the initial part of a 2-parts Master project that every student must fulfill successfully.
Students are required to propose a suitable research topic under the supervision of a lecturer
as a supervisor. Students must meet regularly with supervisor who will monitor their
continuous progress. At the end of this course, students are required to prepare a report to be
evaluated and present their proposal.
MECR2427 Project 2
This is the second part of a 2-parts Master project that every student must fulfill successfully.
Students are required to execute the next phases of their development plan in Project 1.
Students are now required to code and integrate the different modules that make up the
proposed project. Students will test the developed modules and the final fully-integrated
project following software development and research testing practices. Students must meet
regularly with supervisor(s) who will monitor their continuous progress. Students are required
to prepare a report to be evaluated and present their final work. The corrected report will be
printed as a Master’s thesis.