Cyber Security Engineering Technology Program
Vision
To equip the next generation of cybersecurity professionals through cutting-edge education,
hands-on learning, and industry collaboration.
Mission
To deliver a comprehensive and practical education that equips students with the skills to design, implement, and manage
secure digital systems. The program emphasizes ethical practices, innovation, industry collaboration, and readiness
to address global cyber threats.
Program Description
With the widespread adoption of globalization, privatization, and digital transformation, the role of cybersecurity
has become more crucial than ever. Cyber Security has been therefore recognized as a global problem, transcending
national boundaries. It is a rapidly growing challenge with new sophisticated zero-day attacks costing economies
billions of dollars annually. It particularly affects the developed world, but developing countries are at higher
risk due to the lack of expertise and shortage of security professionals with adequate skills and experience to
effectively combat this rising threat. As digital security is now integral to protecting socio-economic activities,
ensuring data confidentiality, and maintaining system integrity, its reliability and resilience have become top
priorities. Advanced technologies that integrate threat detection, data protection, and risk management provide
opportunities to develop robust cybersecurity frameworks, safeguarding critical infrastructures and digital ecosystems
against evolving cyber threats. Our cybersecurity program is designed to equip students with the knowledge, skills,
and hands-on experience needed to protect digital systems and explore digital security, risk management, and cyber
forensics, all under the guidance of our renowned faculty and industry experts. Through state-of-the-art labs,
real-world simulations, and industry collaborations, students gain practical expertise in identifying vulnerabilities,
mitigating cyber risks, and responding to security incidents. With the growing demand for cybersecurity professionals,
the graduates of this program have diverse career opportunities, and the job market remains highly competitive,
offering lucrative salaries and career growth opportunities for skilled professionals.
Program Educational Objectives (PEOs)
PEO-1 |
Graduates will excel in the field of cyber security by making intellectual and technical contributions
to industry, academia, and research.
|
PEO-2 |
Graduates will be innovative problem-solvers capable of effectively analyzing and addressing emerging
cybersecurity challenges in a dynamic and evolving information landscape.
|
PEO-3 |
Graduates will demonstrate an entrepreneurial spirit, leadership qualities, and effective communication skills to
design and develop creative and impactful cybersecurity solutions that benefit society.
|
PEO-4 |
Graduates will act as responsible and ethical professionals with a strong moral compass, positively
contributing to society and upholding the highest standards of integrity in their work. |
Program Learning Outcomes (PLOs)
Academic Education
|
To prepare graduates as computing professionals.
|
Knowledge for Solving Computing Problems
|
Apply knowledge of computing fundamentals, knowledge of a computing specialization,
and mathematics, science, and domain knowledge appropriate for the computing specialization
to the 16 abstraction and conceptualization of computing models from defined problems and requirements.
|
Problem Analysis
|
Identify, formulate, research literature, and solve complex computing problems reaching substantiated
conclusions using fundamental principles of mathematics, computing sciences, and relevant domain disciplines.
|
Design/ Development of Solutions
|
Design and evaluate solutions for complex computing problems, and design and evaluate systems, components, or processes that
meet specified needs with appropriate consideration for public health and safety, cultural, societal, and environmental considerations.
|
Modern Tool Usage
|
Create, select, adapt and apply appropriate techniques, resources, and modern computing tools to complex computing activities,
with an understanding of the limitations.
|
Individual and Team Work |
Function effectively as an individual and as a member or leader in diverse teams and in multi-disciplinary settings.
|
Communication
|
Communicate effectively with the computing community and with society at large about complex computing activities by being
able to comprehend and write effective reports, design documentation, make effective presentations, and give and understand clear instructions.
|
Computing Professionalism and Society
|
Understand and assess societal, health, safety, legal, and cultural issues within local and global contexts, and the consequential
responsibilities relevant to professional computing practice.
|
Ethics
|
Understand and commit to professional ethics, responsibilities, and norms of professional computing practice.
|
Life-long Learning
|
Recognize the need, and have the ability, to engage in independent learning for continual development as a computing professional.
|
State-of-the art Laboratories
The Department of Cyber Security features state-of-the-art laboratories equipped with advanced computing
facilities, providing students with a hands-on environment to develop, experiment, and refine their technical
skills. The lab supports a wide range of computing applications, fostering innovation, research, and practical
learning in cybersecurity.
Curriculum
SEMESTER – I
Sr. No
|
Course Code
|
Course Title
|
Nature
|
Credit Hours
|
|
Theory
|
Practical
|
1.
|
NS-101
|
Calculus & Analytical Geometry
|
Natural Sciences
|
2
|
0
|
2.
|
HS-102
|
Islamic Studies/Ethics
|
Humanities and Social Sciences
|
2
|
0
|
3.
|
NS-103
|
Applied Physics
|
Natural Sciences
|
2
|
1
|
4.
|
HS-104
|
English and Composition Comprehension
|
Humanities and Social Sciences
|
2
|
0
|
5.
|
CS-105
|
Introduction to Info & Comm Technologies
|
Computing
|
2
|
1
|
6.
|
CS-106
|
Programming Fundamentals
|
Computing
|
1
|
2
|
Total
|
11
|
4
|
Grand Total
|
15
|
SEMESTER – II
Sr. No
|
Course Code
|
Course Title
|
Nature
|
Credit Hours
|
|
Theory
|
Practical
|
1.
|
CS-107
|
Computer Networks
|
Computing
|
2
|
1
|
2.
|
CYS-108
|
Introduction to Cybersecurity
|
Core
|
3
|
0
|
3.
|
CS-109
|
Object Oriented Programming
|
Computing
|
1
|
2
|
4.
|
CS-110
|
Discrete Structure
|
Computing
|
2
|
0
|
5.
|
HS-111
|
Pakistan Studies
|
Humanities and Social Sciences
|
2
|
0
|
6.
|
HS-112
|
Communication & Presentation Skills
|
Humanities and Social Sciences
|
2
|
0
|
Total
|
12
|
3
|
Grand Total
|
15
|
SEMESTER – III
Sr. No
|
Course Code
|
Course Title
|
Nature
|
Credit Hours
|
|
Theory
|
Practical
|
1.
|
CS-201
|
Data Structure and Algorithm
|
Computing
|
2
|
1
|
2.
|
CYS-202
|
Information Privacy and Security
|
Core
|
2
|
1
|
3.
|
CYS-203
|
Information System Audit
|
Core
|
2
|
1
|
4.
|
CYS-204
|
Cyber Risk Management
|
Core
|
3
|
0
|
5.
|
NS-205
|
Linear Algebra
|
Natural Sciences
|
2
|
0
|
6.
|
NS-206
|
Probability and Statistics
|
Natural Sciences
|
3
|
0
|
Total
|
14
|
3
|
Grand Total
|
17
|
SEMESTER – IV
Sr. No
|
Course Code
|
Course Title
|
Nature
|
Credit Hours
|
|
Theory
|
Practical
|
1.
|
CYS-207
|
IT Forensics and Investigation
|
Core
|
3
|
0
|
2.
|
CS-208
|
Database Systems
|
Computing
|
2
|
1
|
3.
|
CS-209
|
Operating Systems
|
Computing
|
2
|
1
|
4.
|
CYS-210
|
Principals of Data Protection
|
Core
|
3
|
0
|
5.
|
NS-211
|
Differential Equations
|
Natural Sciences
|
2
|
0
|
6.
|
CYS-212
|
Computing and Ethics
|
Core
|
2
|
0
|
Total
|
14
|
2
|
Grand Total
|
16
|
SEMESTER – V
Sr. No
|
Course Code
|
Course Title
|
Nature
|
Credit Hours
|
|
Theory
|
Practical
|
1.
|
CYS-301
|
Network Security
|
Core
|
2
|
1
|
2.
|
CYS-302
|
Cryptography
|
Core
|
2
|
1
|
3.
|
CYS-303
|
Intrusion Detection Systems
|
Core
|
3
|
0
|
4.
|
CS-304
|
Software Engineering
|
Computing
|
3
|
0
|
5.
|
CS-305
|
Web Systems and Technologies
|
Computing
|
1
|
2
|
6.
|
HS-306
|
Technical Report Writing
|
Humanities and Social Sciences
|
2
|
0
|
Total
|
13
|
4
|
Grand Total
|
17
|
SEMESTER – VI
Sr. No
|
Course Code
|
Course Title
|
Nature
|
Credit Hours
|
|
Theory
|
Practical
|
1.
|
CYS-307
|
Secure Software Design
|
Core
|
3
|
0
|
2.
|
MS-308
|
Security of Smart Devices
|
Core
|
2
|
1
|
3.
|
CYS-309
|
Design & Analysis of Algorithms
|
Core
|
3
|
0
|
4.
|
CYS-310
|
Cloud Computing and Security
|
Core
|
1
|
2
|
5.
|
CYS-311
|
Computer Forensics
|
Core
|
3
|
0
|
6.
|
MS-312
|
Small Business and Entrepreneurship
|
Management Sciences
|
3
|
0
|
Total
|
15
|
3
|
Grand Total
|
18
|
SEMESTER – VII
Sr. No
|
Course Code
|
Course Title
|
Nature
|
Credit Hours
|
|
Theory
|
Practical
|
1.
|
CYS-401
|
Trusted Supervised Industrial Training-I
|
Engineering Technology
Domain SIT
|
0
|
16
|
Total
|
0+16
|
Grand Total
|
16
|
SEMESTER – VIII
Sr. No
|
Course Code
|
Course Title
|
Nature
|
Credit Hours
|
|
Theory
|
Practical
|
1.
|
CYS-402
|
Supervised Industrial Training- II
|
Engineering Technology
Domain SIT
|
0
|
16
|
Total
|
0+16
|
Grand Total
|
16
|
|