Bachelor in Cyber Security

  1. Introduction

When the world is entering the 4th industrial revolution, machines are becoming more popular, cheaper to produce, and most importantly, connected together. This trend improve convenience for human, but poses the risks of insecured information sharing. Network devices and collected information are vulnerable to different types of attacks, such as tracking, stealing, or hijacking. This is critical to certain services, such as national security.

The Cyber-Security bachelor program at USTH meets the urgent needs for human resources in this field for organizations, enterprises and state agencies. Additionally, graduated students from this field can participate in research activities of academic institutes and universities.

  1. Program

The Cyber-Security bachelor program lasts 3 years, including:

  • The foundation year provides foundation knowledge to students for all specialties (60 ECTS)
  • Second year focuses on foundation knowledge regarding mathematics and computer science. These are the major building blocks of Cyber-Security. A total of 60 ECTS is offered to students. A majority of these courses is be shared with the ICT specialty.
  • The third year consists of Cyber-Security specialization courses (60 ECTS). Based on the requirement of the employers, these courses are grouped into 2 categories:
    • Information assurance concentrates on ensuring quality of the data stored in each system, including data encryption, key exchange, mechanisms to attacks using malware. This domain also provides to student knowledge about data recovery.
    • Network security ensures that the organization is well protected against network attacks. This domain covers different network services, such as Web, Cloud or wireless system. An introduction on detecting and preventing intrusion for such services is also provided to students.

Being a skill-oriented pathway, Cyber-Security provides an evenly distributed teaching hour for each course: 50% for lectures and 50% practical work. In more “theory-oriented” courses, this ratio can be 70% lectures and 30% practical work.

All courses are taught in English, including lectures, practical works and tutorials. This international environment helps student to have huge advantages when compared with traditional domestic programs, especially with the ability to self-study and reading documents. Most up-to-date cyber-security documents are in English and will not likely be translated to Vietnamese in a near future.

Expected Program (2nd and 3th year)

MATH 2.1

Probability and Statistics

Sets, events, random numbers, probability distributions, density functions, random sampling, limit theory


MATH 2.3

Discrete math

Set theory, operations on sets, relations, relational functions, correlations, combinations


MATH 2.5

Computational theory

Finite automata, push down automata, turing machine


MATH 2.4

Numerical method

Approximation of equation solution, integral


ICT 2.2

Object-oriented programming

Class, object, method, attribute, inheritance, polymorphism, interface, exception


ICT 2.1

Data structures and algorithms

Single link list, stack, queue, tree structure, sort algorithms, search algorithms


ICT 3.7

Communication system

Analog and digital communication systems, communication channels, interference, coding, modulation methods, signal propagation


ICT 2.4

Computer architecture and organization

MIPS microprocessor architecture, MIPS processor implementations, pipeline issues, memory architecture


ICT 2.8

Operating system

Process, thread, memory architecture in process, process management, memory management, synchronization between processes


ICT 2.6

Computer Network

Physical layer, protocols, routing protocols, IP networks, UDP, TCP, SMTP email protocol, FTP file transfer, SNMP network management, DNS domain management


ICT 3.2

Web application programming

HTML tags, Javascript language, PHP, styles, attributes in CSS, libraries like jQuery, Bootstrap, Code Igniter, methods of XML data representation, JSON.


ICT 2.5


Relational relations, SQL statements, constraints, transactions, views, relational database design, relational-entity model.


CS 2.1

Advanced computer architecture and x86 instruction set

Machine language, interrupt, x86 instruction set, register, stack, addressing mechanism, x86 processor pipeline


ICT 3.1

Object-oriented system design [2 elective courses in 4 subjects]

Object-oriented concepts: abstraction, encapsulation, inheritance, modularity, polymorphism, software architectures, UML diagrams such as sequence diagrams, class diagrams, use case diagram


ICT 3.6

Advanced Database [2 elective courses in 4 subjects]

Entity-relational model, relational data description, SQL statements, database indexing, distributed databases, XML databases, query processing, query management parallel


ICT 3.15

Dispersion system [2 elective courses of 4 subjects]

Distributed system architecture, RPC, MapReduce model, distributed file system, peer-to-peer architecture, BitTorrent, cloud computing


CS 2.3

Network programming [2 elective courses of 4 subjects]

Network architecture, guest-server model, peer-to-peer model, socket mechanism


CS 3.1

Law of cyberspace and ethics

Information security law, privacy, neutrality of the internet, copyright issues


CS 3.2


Symmetric encryption, asymmetric encryption, hash functions, asymmetric encryption applications, message authentication codes, key exchange mechanisms


CS 3.3

Digital Forensics

Network traffic collection, TCP header check, Internet forensics, cloud computing forensics


CS 3.4

Mobile Forensics

Recover deleted data, decode, detect malicious code on mobile, electronic evidence and how to collect on mobile


CS 3.5

Malware analysis

Structure of the PE executable file, decompress executable file, decompile, debug, x86 function call convention, modification of x86 instruction


CS 3.6

Data Integrity and Disaster Recovery

Procedures, planning methods, principles for overcoming incidents, methods for deployment of overcoming incidents, assessing the function of restoring information


CS 3.7

Intrusion Detection and Prevention System

Intrusion detection, intrusion prevention, prevention methods, vulnerability shutdown, monitoring and alerting system, information gathering on network attacks.


CS 3.8

Administration of Computer systems

Computer system, Linux operating system, network system, network device, network management protocol, bash script


CS 3.9

Wireless and mobile network security

Security issues and wireless security solutions for mobile phones, application security techniques


CS 3.10

Web security

Gathering information, client-side data verification, server-side data verification, web-based malware


CS 3.11

Cloud Security and Privacy

Service model on cloud computing, resource sharing, data isolation, cloud-based malware


CS 3.12

Penetration testing

Security vulnerabilities, vulnerability-based attacks, hijacking, data changes, defense systems



Group Project



  1. Program outcomes

Graduated students are expected to have the following skills: implement technologies, processes and practices to protect networks, computers, programs and data from attack, damage and unauthorized access; operate and maintain security in information systems; detect, analyze and recover damage of security threats on information systems; develop security-related software.

Students are also taught soft skills and language skils to adapt with the increasing requirements of professional working environment.

  1. Job opportunities

After the bachelor course, students are able to apply for the following positions: cyber security (system) engineer, cyber security analyst, network administrator, system administrator, in the following organizations:

  • Banks, insurance companies: data integrity, data protection
  • IT or production companies: network security
  • Security-focus companies
       5. Contacts

ĐUniversity of Science and Technology of Hanoi

Department of Fundamental and Applied Sciences

University of Science and Technology of Hanoi

Address: Room 803, A21 Building, VAST, 18 Hoang Quoc Viet, Cau Giay, Hanoi

Tel:  0243 791 8618