Bachelor in Cyber Security


  1. Introduction

When the world is entering the 4th industrial revolution, machines are becoming more popular, cheaper to produce, and most importantly, connected together. This trend improve convenience for human, but poses the risks of insecured information sharing. Network devices and collected information are vulnerable to different types of attacks, such as tracking, stealing, or hijacking. This is critical to certain services, such as national security.

The Cyber-Security bachelor program at USTH meets the urgent needs for human resources in this field for organizations, enterprises and state agencies. Additionally, graduated students from this field can participate in research activities of academic institutes and universities.

  1. Program

The Cyber-Security bachelor program lasts 3 years, including:

  • The foundation year provides foundation knowledge to students for all specialties (60 ECTS)
  • Second year focuses on foundation knowledge regarding mathematics and computer science. These are the major building blocks of Cyber-Security. A total of 60 ECTS is offered to students. A majority of these courses is be shared with the ICT specialty.
  • The third year consists of Cyber-Security specialization courses (60 ECTS). Based on the requirement of the employers, these courses are grouped into 2 categories:
    • Information assurance concentrates on ensuring quality of the data stored in each system, including data encryption, key exchange, mechanisms to attacks using malware. This domain also provides to student knowledge about data recovery.
    • Network security ensures that the organization is well protected against network attacks. This domain covers different network services, such as Web, Cloud or wireless system. An introduction on detecting and preventing intrusion for such services is also provided to students.

Being a skill-oriented pathway, Cyber-Security provides an evenly distributed teaching hour for each course: 50% for lectures and 50% practical work. In more “theory-oriented” courses, this ratio can be 70% lectures and 30% practical work.

All courses are taught in English, including lectures, practical works and tutorials. This international environment helps student to have huge advantages when compared with traditional domestic programs, especially with the ability to self-study and reading documents. Most up-to-date cyber-security documents are in English and will not likely be translated to Vietnamese in a near future.

Expected Program (2nd and 3th year)

MATH 2.1

Probability and Statistics

Sets, events, random numbers, probability distributions, density functions, random sampling, limit theory

25h/15h

MATH 2.3

Discrete math

Set theory, operations on sets, relations, relational functions, correlations, combinations

20h/10h

MATH 2.5

Computational theory

Finite automata, push down automata, turing machine

20h/10h

MATH 2.4

Numerical method

Approximation of equation solution, integral

18h/16h

ICT 2.2

Object-oriented programming

Class, object, method, attribute, inheritance, polymorphism, interface, exception

26h/14h

ICT 2.1

Data structures and algorithms

Single link list, stack, queue, tree structure, sort algorithms, search algorithms

20h/16h

ICT 3.7

Communication system

Analog and digital communication systems, communication channels, interference, coding, modulation methods, signal propagation

25h/20h

ICT 2.4

Computer architecture and organization

MIPS microprocessor architecture, MIPS processor implementations, pipeline issues, memory architecture

26h/12h

ICT 2.8

Operating system

Process, thread, memory architecture in process, process management, memory management, synchronization between processes

26h/14h

ICT 2.6

Computer Network

Physical layer, protocols, routing protocols, IP networks, UDP, TCP, SMTP email protocol, FTP file transfer, SNMP network management, DNS domain management

30h/10h

ICT 3.2

Web application programming

HTML tags, Javascript language, PHP, styles, attributes in CSS, libraries like jQuery, Bootstrap, Code Igniter, methods of XML data representation, JSON.

26h/14h

ICT 2.5

Database

Relational relations, SQL statements, constraints, transactions, views, relational database design, relational-entity model.

24h/16h

CS 2.1

Advanced computer architecture and x86 instruction set

Machine language, interrupt, x86 instruction set, register, stack, addressing mechanism, x86 processor pipeline

24h/16h

ICT 3.1

Object-oriented system design [2 elective courses in 4 subjects]

Object-oriented concepts: abstraction, encapsulation, inheritance, modularity, polymorphism, software architectures, UML diagrams such as sequence diagrams, class diagrams, use case diagram

21h/15h

ICT 3.6

Advanced Database [2 elective courses in 4 subjects]

Entity-relational model, relational data description, SQL statements, database indexing, distributed databases, XML databases, query processing, query management parallel

24h/16h

ICT 3.15

Dispersion system [2 elective courses of 4 subjects]

Distributed system architecture, RPC, MapReduce model, distributed file system, peer-to-peer architecture, BitTorrent, cloud computing

21h/15h

CS 2.3

Network programming [2 elective courses of 4 subjects]

Network architecture, guest-server model, peer-to-peer model, socket mechanism

24h/16h

CS 3.1

Law of cyberspace and ethics

Information security law, privacy, neutrality of the internet, copyright issues

21h/15h

CS 3.2

Cryptography

Symmetric encryption, asymmetric encryption, hash functions, asymmetric encryption applications, message authentication codes, key exchange mechanisms

24h/16h

CS 3.3

Digital Forensics

Network traffic collection, TCP header check, Internet forensics, cloud computing forensics

21h/15h

CS 3.4

Mobile Forensics

Recover deleted data, decode, detect malicious code on mobile, electronic evidence and how to collect on mobile

21h/15h

CS 3.5

Malware analysis

Structure of the PE executable file, decompress executable file, decompile, debug, x86 function call convention, modification of x86 instruction

18h/18h

CS 3.6

Data Integrity and Disaster Recovery

Procedures, planning methods, principles for overcoming incidents, methods for deployment of overcoming incidents, assessing the function of restoring information

21h/15h

CS 3.7

Intrusion Detection and Prevention System

Intrusion detection, intrusion prevention, prevention methods, vulnerability shutdown, monitoring and alerting system, information gathering on network attacks.

24h/16h

CS 3.8

Administration of Computer systems

Computer system, Linux operating system, network system, network device, network management protocol, bash script

18h/18h

CS 3.9

Wireless and mobile network security

Security issues and wireless security solutions for mobile phones, application security techniques

21h/15h

CS 3.10

Web security

Gathering information, client-side data verification, server-side data verification, web-based malware

24h/16h

CS 3.11

Cloud Security and Privacy

Service model on cloud computing, resource sharing, data isolation, cloud-based malware

21h/15h

CS 3.12

Penetration testing

Security vulnerabilities, vulnerability-based attacks, hijacking, data changes, defense systems

18h/18h

 

Group Project

   
 

Internship

   
  1. Program outcomes

Graduated students are expected to have the following skills: implement technologies, processes and practices to protect networks, computers, programs and data from attack, damage and unauthorized access; operate and maintain security in information systems; detect, analyze and recover damage of security threats on information systems; develop security-related software.

Students are also taught soft skills and language skils to adapt with the increasing requirements of professional working environment.

  1. Job opportunities

After the bachelor course, students are able to apply for the following positions: cyber security (system) engineer, cyber security analyst, network administrator, system administrator, in the following organizations:

  • Banks, insurance companies: data integrity, data protection
  • IT or production companies: network security
  • Security-focus companies
       5. Contacts

ĐUniversity of Science and Technology of Hanoi

Undergraduate School

Room 807, A21 Bulding, Vietnam Academy of Science and Technology 
Add: 18 Hoang Quoc Viet, Cau Giay District, Hanoi 
Telephone:   +84-24 37 91 85 16 | +84-24 37 91 85 27