Master of Science in Cyber Security | Asia Pacific University (APU)

You are here

Master of Science in Cyber Security

Duration:
Full time (1+ years)

* Only available in full-time study mode

Awarded by:
APU, Malaysia

Intakes:

Full Time:

06 Dec 2021 
 

  

APU-DMU DUAL DEGREE PROGRAMME


Students who are under Masters Degree Programme will have the option to opt-in for the APU-DMU Dual Degree Scheme. Under this Scheme, students will receive 2 Degree Certificates & Transcripts upon graduation: 1 from Asia Pacific University (APU), Malaysia and 1 from De Montfort University (DMU), UK.


To know more about APU-DMU Dual Scheme, please click HERE

 


MORE THAN JUST A CYBER SECURITY MASTER PROGRAMME

APU's Master of Science in Cyber Security programme is designed to provide you an edge with the latest technologies that are in line with the Industrial Revolution 4.0.

Digital Transformation for IR4.0


ADMISSION REQUIREMENTS

GENERAL REQUIREMENTS

• Bachelor’s degree with minimum CGPA of 2.75 out of 4.00, or its equivalent qualification as acceptable by the Senate.

• Bachelor’s degree with CGPA 2.50 out of 4.00, but below CGPA 2.75; can be accepted with rigorous assessment (include test, interview or portfolio).

• Bachelor’s degree with CGPA below 2.50 out of 4.00, or qualification which is equivalent can be accepted with minimum 5 years relevant working experience in related field.

° Applicants without a Bachelor’s degree or equivalent in Cyber Security or Forensic Computing must pass the perquisite modules in Cyber Security and Digital Forensics to continue with the Master’s degree.
* Applicants without a Computing-related Bachelor’s degree must pass the pre-requisite modules to continue with the Master’s Degree.

 
Note: The above entry requirements may differ for specific programmes based on the latest programme standards published by Malaysian Qualifications Agency (MQA).

 
ENGLISH REQUIREMENTS

INTERNATIONAL STUDENTS

• IELTS : 5.0

For more information please click HERE

Students from English speaking countries and those with qualifications taught in English (previous Bachelor’s/Master’s Degree taught in English) are exempted from English requirements. Applications for exemption must be accompanied by supporting documents.


PROGRAMME OUTLINE

This programme is specifically designed to provide:

  • Opportunity for professional development at an advanced level within the area of Cyber Security.
  • Enhancement of skills and knowledge in Cyber Security for practising IT professionals.
  • Ability to further develop specialisation gained in taught modules through an extensive research-based and/or technical-based dissertation, to prepare the student to be a subject matter expert in the field.
  • Furthermore, APU is also poised to become a frontrunner in cyber security research through the establishment of the Forensics and Cyber Security (FSEC) Research Centre, through which research activities will be undertaken to challenge boundaries in the application of cyber security.

THE BENEFITS OF THE PROGRAMME

  • The curriculum covers a wide range of industry relevant subject areas in Security Operations Centre (SOC) and Incident Response, Security Auditing and Assessment, Advanced Ethical Hacking, E-Investigation, Data Analytics in Cyber Security etc.
  • External reviews conducted by Cyber Security Malaysia (CSM), KPMG and F-Secure during the development of the programme curriculum.
  • Programme Support by an Industry Advisory Panel involving cyber security experts from Cyber Intelligence, Cyber Test Systems, Akati Consulting Group and Cyber Security Malaysia (CSM).
  • A fully-functional Security Operations Centre (SOC) that allows students to have handson cybersecurity operations platform to monitor live data which allows them to perform real-time cyber security monitoring to fortify network defense with global threat intelligence and launching faster response on cyber security incidents.
  • A full-fledged Cyber Threats Simulation and Response Centre – Cyber Range is also included within the Cyber Security Talent Zone in APU. Cyber Range incorporates latest technologies and a military grade cyber-defence system, enabling students to understand and formulate defence strategies, and practice the entire chain of cyber defence, while preparing them to deal with real cyber threat attack when it happens.
  • A technical project related to Cyber Security as dissertation in the final semester.
  • Research opportunities for students via APU’s Forensic and Cyber Security Research Centre - FSEC.

WHO SHOULD ATTEND

This programme is geared towards practicing IT/Computing professionals within industry who seek further formal qualifications in Cyber Security. In addition, professionals and managers who wish to enhance themselves with Cyber Security knowledge and skills to postgraduate level will find this programme attractive. Fresh undergraduate students from Cyber Security / Digital Forensics background will also find this programme worthwhile as a path to further enhance their academic qualifications.

MODULES & PROJECT

The programme comprises 3 pre-requisite modules (for non-Computing students), 10 modules including 3 elective modules and a Project.

PRE-REQUISITE MODULES
(FOR NON-COMPUTING STUDENTS: TO BE COMPLETED UPON 1st MONTH OF THE PROGRAMME)

  • Cyber Security
  • Digital Forensics
  • Digital Forensic and Cyber Security Tools

CORE MODULES

  • Information Security Design
  • E-Investigation
  • Cyber Security & Threats
  • Security Operations Center (SOC) & Incident Response
  • Advanced Ethical Hacking
  • Advanced Digital Forensics
  • Research Methodology in Computing & Engineering
  • Project

ELECTIVE MODULES (CHOOSE 3)*

  • Network Design & Performance
  • Information Security Architectures
  • Security Audit and Assessment
  • Data Analytics in Cyber Security
  • Applied Scripting in Cyber Security
* Elective modules may be pre-selected for students at the beginning of the semester. If students wish to change these pre-selected elective modules, they can choose from the available modules offered in the semester OR among the intensive delivery modules – however such changes may prolong the study duration.
 

PROJECT

As part of this course, you are expected to complete an extensive project paper in relation to Cyber Security for both academic and industry purposes. This project paper will be supervised by a member of academic staff as the main supervisor. It may involve working with an external organization (probably directly relevant to your work or organization or any of our industry partners). You are given considerable flexibility in choosing any Cyber Security related topics to base your project paper. As for the deliverables, you are required to come up with a prototype / simulation / framework etc. (the list is just an example and not limited to only these) and to produce one project paper and a publishable conference / journal paper consists of summary of the work.


ROCHESTON DISTINGUISHED

The Rocheston Certified Penetration Tester (RCPT) program stresses research, live labs and interactive sessions on emerging security findings, offering the scope for defining the information security requirements while finding options to enhance existing methodology assets. The RCPT certification is designed and embedded as part of their Advanced Ethical Hacking module in the MSc in Cybersecurity programme, to allow the students to have an industry-standard exposure towards penetration testing as well as an opportunity to upskill themselves in real-life scenarios and simulations through the offered CyberLabs. As such, every student in the programme is given equal opportunity in getting their hands on the certification as part of the syllabus learn in the module without the need of taking up additional training resources. The certification received by the student is valid for 2 years and subject to a renewal process to ensure all Penetration Testers are updated with the current scope of Penetration Testing.


CAREER OPTIONS

  • Cyber Security Analyst / Consultant
  • Information Security Analyst / Consultant
  • Cyber Security Incident Response Consultant
  • Digital Forensic Investigator
  • Cyber Security Engineer
  • Information Security Engineer
  • Cyber Security Manager
  • Information Security Manager


DEMAND GROWING FOR CYBER SECURITY JOBS

“Pikom’s ICT Job Market Outlook in Malaysia 2018 report highlighted that cybersecurity positions are among the top-paying jobs in each of five position levels from fresh graduate to senior manager.”

Source: https://www.nst.com.my/education/2018/07/391959/what-it-takes-become-cybersecurity-specialist


GLOBAL CYBERSECURITY SKILL SHORTAGE + INCREASED BUDGETS =
CAREER OPPORTUNITIES

Source: https://cybersecurity.isaca.org/newsroom



Source: https://newsroom.intel.com/news-releases/global-study-reveals-businesses-countries-vulnerable-due-shortage-cybersecurity-talent/#gs.qc3z9r


Source: https://cybersecurityventures.com/jobs/
https://www.statista.com/statistics/595182/ worldwide-security-as-a-service-market-size/


DEMAND INCREASING FOR SKILLED PROFESSIONALS

“Both the government and the private sector are scrambling for talent. Thousands of information-security jobs are going unfilled as the industry in the U.S. struggles with a shortage of properly trained professionals. By one estimate, there will be 3.5 million unfilled cybersecurity jobs by 2021.”

Source:  https://www.securitymagazine.com/articles/90182-the-cybersecurity-talent-gap-an-industry-crisis



Source:
https://newsroom.intel.com/news-releases/global-study-reveals-businesses-countries-vulnerable-due-shortage-cybersecurity-talent/#gs.qc3z9r
https://www.businesswire.com/news/home/20190304005307/en/ ISACA%E2%80%99s-State-Cybersecurity-2019-Survey-Retaining-Qualified 
https://blogvaronis2.wpengine.com/wp-content/uploads/2018/05/cybersecurity-statistics-2019.jpg


“As digital transformation agendas continue to dominate, a bigger cybersecurity budget is necessary. Almost all companies are looking at technologies such as robotics, machine learning, artificial intelligence, blockchain and so on. All of that change will come with additional cyber risks and necessary investments.”
- Mike Maddison, EY EMEIA Cybersecurity Leader

“Malaysia is one of the top three ASEAN countries that are expected to contribute 75 per cent of cybersecurity services market share by 2025.”

“Malaysia need 10,500 cybersecurity personnel by 2020.”
- Frost & Sullivan Digital Talent Report

“Organizations were facing difficulties in hiring talents with 32% of these take 6 months or more to fill cybersecurity jobs.”
- Information Systems Audit and Control Association (ISACA) 2019


COURSE FEES

Malaysian Students

International Students

RM 32,600

RM 38,500 (USD 9,745)

​* Fees stated above do not include Enrolment Fees, Registration Fees and other Miscellaneous Fees. Please refer to Fee Guide for details.

(N/481/7/0810)(05/24)(MQA/PA11934)

All information is correct at the time of publication, but is subject to change in the interest of continuing improvement.