Security Penetration

This course is offered by the
Faculty of Information Science & Technology (FIST)

In today’s technology-driven world, cybersecurity is undeniably a critical component. Its importance cannot be overstated, given the growing threat of cybercrimes and their potential impact on businesses, governments, and individuals, causing significant financial and reputational damage, loss of data, and even compromising national security. As security technology continues to evolve, so do the methods and tactics of cybercriminals, making it essential to keep pace with the latest trends and threats.

This track is designed to provide students with the essential skills and knowledge needed to protect computer systems and networks and respond to security incidents, and the knowledge in security vulnerability assessment and managerial aspects of information security.

As the Internet-of-Things (IoT) and cloud computing become more prevalent, the attack surface for cybercriminals will expand. Therefore, the need for experts in cybersecurity will only increase as businesses and governments seek to counter cyber threats and secure their assets. Completing this track gives you a significant advantage in the current job market.

Visit Our Courses

(Complete any 3 courses)


Hacking is attempting to gain unauthorised access to systems and resources. Ethical hacking is using hacking techniques to find and exploit weaknesses in systems and networks, with the ultimate goal of improving security. This course teaches you ethical hacking methodology, common practices and techniques used by computer hackers, and security assessment procedures. Gain an understanding of security threats, vulnerability assessment, and penetration testing in various fields. These skills and knowledge will help protect you against cyber threats in both work and personal life.


Cyber Law refers to any law that relates or applies to the internet, digital data, and online communication technologies. Its focus is on the legislation that governs information technology, personal information, intellectual property, cybercrime, and electronic commerce. This course helps you to develop an understanding of various legal issues and frameworks relevant to technology and its usage. You will also learn to apply legal reflection activities in information technology. The knowledge gained can be useful for addressing legal issues related to technology.


Information security is concerned with the protection of sensitive information of an organisation from unauthorised access. This course provides you with the skills and knowledge needed to manage the security of said information in an organisation. This includes understanding the managerial aspects of information security such as access control models, information security governance, and information security program assessment and metrics, identification and mitigation of risks to information assets, and the policies and procedures that can be put in place to protect against security threats.


The identification of vulnerabilities in systems leading to timely countermeasures go a long way in the prevention of security breaches. This course takes you through the foundational components needed to conduct security analysis and vulnerability assessments for computer systems, networks, and applications. You will also be exposed to the practical aspects of vulnerability assessment methodologies, such as penetration testing and exploitation of information systems. You will learn to effectively identify, manage and mitigate risks to information security, and protect digital assets.