CYS107

BSc (Hons) Cyber Security

Defend Digital Frontiers. Outsmart Cyber Threats. Become a Digital Guardian.

4 Years
Full-time
Hands-on Learning

Next Start Dates

October 2025
Apply Now

Program Gallery

Southern Atlanctic University
Digital Forensics Lab

Program Overview

This specialized program prepares you to protect critical information systems from evolving cyber threats. You will learn to think like both a defender and an attacker, mastering skills in ethical hacking, digital forensics, network security, and cryptography. This hands-on, offensive-and-defensive program equips you with the technical expertise and ethical foundation to build resilient systems, investigate cybercrimes, and lead security efforts in any organization.

Why This Program?

  • Train in our dedicated Cyber Range—a isolated, controlled virtual environment for practicing penetration testing, digital forensics, and incident response on real-world scenarios.
  • Earn industry certifications like CompTIA Security+, CEH (Certified Ethical Hacker), and CHFI (Computer Hacking Forensics Investigator) as part of your coursework.
  • Participate in national and international Capture The Flag (CTF) competitions as part of the SAU Cyber Eagles team.
  • Learn from faculty who are active practitioners and consultants in the cybersecurity field.

Real-World Importance

Cybersecurity professionals are the digital first responders and guardians of our online world.

They protect national infrastructure from attacks, safeguard personal data from theft, ensure the integrity of financial transactions, and help bring cybercriminals to justice.

In an era where a single breach can cost millions and damage reputations, their role is critically important to national security, economic stability, and individual privacy.

They work on the front lines of a constant, evolving battle to keep our digital lives safe..

Curriculum Overview

Program Structure

70%
Core Courses
15%
Electives
15%
Practical Experience

Key Topics

Network Security & Defense
Ethical Hacking & Penetration Testing
Digital Forensics & Incident Response
Cryptography & Secure Communications
Security Risk Analysis & Governance
Operating System & Application Security

Course Outline

Year 1: Computing Foundations

Year 2: Core Security Principles

Year 3: Offensive & Defensive Security

Year 4: Advanced Topics & Capstone

Career Opportunities

Security Analyst / SOC Analyst

Potential Sectors:

Financial InstitutionsManaged Security Service Providers (MSSPs)Large CorporationsGovernment Agencies

Penetration Tester (Ethical Hacker)

Potential Sectors:

Cybersecurity Consulting FirmsFreelance (Bug Bounty Programs)Internal Red Teams

Digital Forensics Investigator

Potential Sectors:

Law Enforcement (EFCC, Police)Corporate InvestigationLegal FirmsInsurance Companies

Security Architect

Potential Sectors:

Enterprise IT DepartmentsCloud Service ProvidersSoftware Companies

Chief Information Security Officer (CISO)

Potential Sectors:

Executive Leadership in any large organization

Learning Outcomes

Conduct vulnerability assessments and penetration tests on networks and applications to identify security weaknesses.
Perform digital forensic investigations to collect, preserve, and analyze digital evidence from various devices.
Design, implement, and manage security infrastructure, including firewalls, IDS/IPS, and SIEM systems.
Analyze and assess cyber risks to an organization and develop policies and strategies to mitigate them.
Apply cryptographic principles to secure data in transit and at rest, and understand the strengths/weaknesses of various algorithms.

Admission Requirements

UTME Requirements

O'Level Requirements

  • English Language
  • Mathematics
  • Physics
  • Chemistry
  • Further Mathematics, Biology, Economics, or ICT

Five (5) O'Level credit passes at not more than two sittings. A credit in ICT or Computer Studies is a distinct advantage.

JAMB Subjects

  • English Language (Compulsory)
  • Mathematics
  • Physics
  • Chemistry, Economics, Biology, or ICT

JAMB Score Requirements

Minimum Score

150

Competitive Score

190

This is an emerging and high-demand field. Competitive scores are rising rapidly at universities that offer it.

Direct Entry Requirements

Other Requirements

Grading System

Our Successful Alumni

Kemi Adekunle

Kemi Adekunle

Security Analyst, Central Bank of Nigeria

Class of 2020

"The hands-on experience in the Cyber Range was unparalleled. On my first day at the CBN, I was already familiar with the tools and procedures they use for monitoring threats. I felt immediately productive."

Jide Sowole

Jide Sowole

Founder, 'ShieldGate' Cybersecurity Consultancy

Class of 2018

"The program's focus on both technical skills and risk management allowed me to not only find vulnerabilities but also effectively communicate the business impact to clients, which is the key to a successful consultancy."

Did You Know?

The first computer virus, called 'Creeper,' was created as an experiment in 1971. It simply displayed the message 'I'm the creeper, catch me if you can!'
Human error is still the cause of over 90% of cybersecurity breaches, highlighting the importance of security awareness training.
The global cybersecurity market is projected to exceed $300 billion by 2025, reflecting the massive and growing demand for expertise.

Meet Your Department Head

Dr. Zainab Bello

Dr. Zainab Bello

Professor of Digital Forensics

Cybersecurity is not a product; it's a process. It requires constant vigilance, creativity, and a deep understanding of technology and human behavior. We train you to be resilient, resourceful, and always ethical in this high-stakes field.

A former consultant for the EFCC's cybercrime unit, Dr. Bello is a certified ethical hacker and forensics expert. She specializes in tracking advanced persistent threats (APTs) and has testified as an expert witness in high-profile cybercrime cases.

Accreditation

Nigerian University Commission (NUC)

Exam Preparation

The curriculum is designed to prepare students for industry certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), and Certified Digital Forensics Examiner (CDFE).

Facilities & Resources

  • The Cyber Range: A isolated, virtualized lab environment for conducting realistic cyber warfare exercises, penetration testing, and forensics investigations.
  • Digital Forensics Lab: Equipped with write-blockers, forensic workstations, and specialized software (e.g., FTK, EnCase) for analyzing hard drives and mobile devices.
  • Dedicated Networking Lab: With hardware for configuring and testing firewalls, routers, and switches in secure configurations.

Industry Connections

Partners

EFCC Cybercrime UnitNigerian Communications Commission (NCC)Check Point SoftwarePaladin SecurityMainOne

Initiatives

  • Annual Cyber Defense Exercise
  • Guest Lectures from National Security Advisers
  • Participation in National Cyber Awareness Month
  • CTF Team Sponsorships

Scholarship Opportunities

Women in Cyber Scholarship

Designed to encourage and support female students entering the cybersecurity field, which has a significant gender gap.

National Security Scholarship

For students demonstrating exceptional talent and a commitment to pursuing a career in protecting national critical infrastructure.

Contact Information

Southern Atlantic University | Empowering Change Through Education