Admission for the May 2026 cohort is ongoing. Apply Now!

Days
Hrs
Mins
Secs

SCHOOL OF COMPUTING

BSc. Cybersecurity

This programme is designed to prepare individuals for careers in the field of cybersecurity, which focuses on protecting computer systems, networks, and data from unauthorised access, attacks, and threats.

Admission Options

Tuition Per Session

$560

Tuition Per Semester

$315

Introduction to BSc. Cybersecurity

Start Your Bachelor’s Degree in Cybersecurity

Learn on your terms with pre-recorded engaging and interactive videos on your educational journey for flexible, convenient, and self-paced study.

Why you should apply :

Study Level
BSc. Cybersecurity
Study Duration

8 Semesters

Mode of study

Blended Learning

Tuition Per Session

$560

Tuition Per Semester

$315

Applications for May 2026 admission is ongoing.

Apply before 31st May 2026, to secure your place. Discount applies for full year’s payment.

Curriculum

Programme Outline

Our curriculum is designed to provide students with the skills and knowledge they need to succeed in a variety of careers in the tech industry. The programme covers a wide range of topics, including programming, data structures, algorithms, operating systems, and artificial intelligence.

1st Semester
Units
Communication in English I
2
  • Identify possible sound patterns in English.
  • List notable language skills and classify word formation processes.
  • Construct simple and fairly complex sentences in English.
  • Apply logical and critical reasoning skills for meaningful presentations.
  • Demonstrate an appreciable level of public speaking and listening.
  • Write simple and technical reports.
Elementary Mathematics I – Algebra and Trigonometry
2
  • Understand sets, subsets, unions, intersections, complements, and Venn diagrams.
  • Solve quadratic equations.
  • Solve trigonometric functions.
  • Understand various types of numbers.
  • Apply the Binomial theorem to solve problems.
General Physics I – Mechanics
2
  • Identify physical quantities and their units.
  • Differentiate between vectors and scalars.
  • Describe motion using fundamental laws of mechanics.
  • Apply Newton’s laws to solve motion problems.
  • Evaluate work, energy, velocity, momentum, acceleration, and torque.
  • Apply principles of conservation of energy and momentum.
  • Explain and analyse motion under gravity.
General Practical Physics I
1
  • Conduct measurements of physical quantities.
  • Observe, collect, and tabulate data.
  • Identify and evaluate experimental errors.
  • Plot and analyse graphs.
  • Draw conclusions from data analysis.
Use of Library, Study Skills and ICT
2
  • Understand ICT applications in libraries and information services.
  • Acquire essential ICT and data communication skills.
  • Explore web technology resources and ethical considerations in ICT use.
Descriptive Statistics
3
  • Explain concepts of descriptive statistics.
  • Present data using graphs and charts.
  • Differentiate measures of location, dispersion, and partition.
  • Interpret skewness, kurtosis, rates, ratios, and index numbers.
  • Apply probability concepts and discrete and continuous distributions.
Introduction to Computing Sciences
3
  • Explain components and applications of computers.
  • Describe information processing and the Internet.
  • Identify computing disciplines and specialisations.
  • Demonstrate practical computer and Internet skills.
Environmental and Sustainability (Elective)
2
  • Understand human-environment relationships.
  • Examine energy use and environmental consequences.
  • Investigate chemicals, waste, and ecosystem health.
Contemporary Health Issues (Elective)
2
  • Outline and classify contemporary health issues.
  • Discuss disease prevention, management, and population health.
  • Explain determinants of health and links to sustainable development goals.
  • Relate health issues to global health challenges.
2nd Semester
Units
Introduction to Problem Solving
3
  • Explain problem-solving processes.
  • Demonstrate problem-solving skills.
  • Develop and apply algorithms.
  • Solve problems using pseudocode, flowcharts, and programming languages.
Nigerian People and Culture
2
  • Analyse Nigerian history and cultural development.
  • Identify linguistic groups and national evolution.
  • Discuss national development and governance challenges.
Elementary Mathematics II – Calculus
2
  • Differentiate and apply calculus rules.
  • Analyse functions, limits, continuity, derivatives, and integrals.
General Physics II – Electricity & Magnetism
2
  • Analyse magnetic fields and electromagnetic induction.
  • Apply Maxwell’s equations and circuit analysis.
  • Evaluate AC and DC circuit characteristics.
General Practical Physics II
1
  • Conduct and analyse physics experiments.
  • Interpret data and experimental results.
Communication in English II
2
  • Deepen spoken and written communication skills.
  • Demonstrate proficiency in public speaking and effective communication.
Introduction to Web Technologies
3
  • Design and develop web pages using HTML5, CSS, and JavaScript.
  • Host websites on web servers.
  • Develop practical web content skills.
1st Semester
Units
Mathematical Methods I
2
  • Describe the real-valued functions of a real variable.
  • Solve problems using the Mean Value Theorem and Taylor series expansion.
  • Evaluate line integrals, surface integrals, and volume integrals.
Entrepreneurship and Innovation
2
  • Explain concepts and theories of entrepreneurship, intrapreneurship, opportunity seeking, new value creation, and risk-taking.
  • Analyse the importance of micro and small businesses in wealth creation, employment, and financial independence.
  • Engage in entrepreneurial thinking.
  • Identify key elements in innovation and describe stages in enterprise formation, partnership, and networking, including business planning.
  • State the basic principles of e-commerce.
Computer Programming I
3
  • Identify different programming paradigms and their approaches to programming.
  • Write programs in C using basic data types and strings.
  • Design and implement programming problems using selection.
  • Design and implement programming problems using loops, and use classes as data abstractions in an object-oriented approach.
  • Implement simple exception handling, develop programs with input/output from text files, and solve problems involving arrays.
Discrete Structures
2
  • Convert logical statements from informal language to propositional and predicate logic expressions.
  • Describe strengths and limitations of propositional and predicate logic and outline the structure of common proof techniques.
  • Apply proof techniques to construct sound arguments, apply the pigeonhole principle, and compute permutations and combinations.
  • Map real-world applications to counting formalisms under constraints and solve basic recurrence relations.
Linear Algebra I
2
  • Understand vector spaces, linear transformations, matrices, determinants, eigenvalues, and eigenvectors.
  • Apply these concepts to solve mathematical problems.
Introduction to Software Engineering
2
  • Describe the concept of the software life cycle.
  • Explain the phases of requirements analysis, design, development, testing, and maintenance.
  • Differentiate among software development models.
  • Utilise UML for object-oriented analysis and design.
  • Describe design architectures and key software project management tasks.
  • Describe basic legal issues related to software engineering.
Introduction to Cybersecurity and Strategy
2
  • Articulate cybersecurity concepts, methods, terminologies, and elements.
  • List and explain common cyber-attacks, threats, challenges, and solutions.
  • Apply techniques for identifying, detecting, and defending against threats, and safeguarding information assets.
  • Recognise attacker motives, countermeasures, and ethical obligations of security professionals.
  • Evaluate cybersecurity and national security strategies and evolving requirements for risk mitigation.
Cybercrime, Law and Countermeasures
2
  • Discuss cybercrimes including computer crimes, internet fraud, e-commerce issues, and threats to national infrastructure.
  • Explain global policies, legal issues, investigative techniques, and enforcement implications related to cybercrime.
  • Analyse cyber law in Nigeria and other countries, including penalties.
  • Compare international and national applications of cyber law and countermeasures across regions.
  • Identify challenges and opportunities in cyber law enforcement.
SIWES I
3
  • Apply cybersecurity concepts in practical settings, including preventive measures and protection of the cyber environment.
  • Describe the operations of a cybersecurity unit and the assignments completed during the SIWES period.
  • Produce a comprehensive report summarising knowledge gained and experiences during training.
2nd Semester
Units
Philosophy, Logic and Human Existence
2
  • Survey main branches of philosophy and symbolic logic, including common logical connectives and laws of thought.
  • Apply deduction using rules of inference and bi-conditionals.
  • Discuss types of discourse, nature of arguments, validity, soundness, and argument evaluation techniques.
  • Distinguish between inductive and deductive inferences.
Computer Programming II
3
  • Develop solutions using object-oriented programming in C++.
  • Use modules, packages, and namespaces for program organisation.
  • Use APIs in writing applications.
  • Apply divide-and-conquer strategies for searching and sorting using iterative and recursive solutions.
  • Explain exceptions and handle them in programs.
  • Write simple multithreaded applications and basic GUI applications.
Computer Architecture and Organisation
2
  • Explain instruction formats and variable-length versus fixed-length formats.
  • Describe the von Neumann machine and its major functional units.
  • Explain subroutine calls at the assembly level.
  • Describe interrupts and I/O operations.
  • Write simple assembly language segments.
  • Explain how high-level constructs map to machine language.
  • Compare alternative data path implementations.
  • Explain control points and control signal generation using hardwired or micro-programmed control.
Systems Analysis and Design
3
  • Describe system requirements gathering techniques.
  • Describe data modelling using entity relationship modelling.
  • Describe process modelling using data flow diagrams.
  • Describe architectural design, process design, and database design.
  • Describe user interface design.
Linear Algebra II
2
  • Solve linear equations and apply change of basis, eigenvalues, and eigenvectors.
  • Apply the Cayley-Hamilton theorem and work with symmetric and positive definite matrices.
  • Use orthogonal diagonalisation, SVD, and orthogonal projections.
  • Apply orthonormal bases and the Gram-Schmidt process to problems and applications.
Computer Networks
3
  • Explain Internet architecture and core protocols.
  • Explain layered architectures, addressing, naming, forwarding, routing, reliability, and the client-server model.
  • Apply knowledge through programming exercises involving simplified Internet protocols.
  • Design, analyse, troubleshoot, implement, and optimise computer networks and protocols.
1st Semester
Units
Data Structures
3
  • Demonstrate a comprehensive understanding of fundamental programming concepts and data structures in C++ such as primitive types, arrays, records, strings, and string processing.
  • Have a solid grasp of data representation in memory and effectively allocate memory on the stack and heap.
  • Implement and apply various data structures including queues and trees, utilising appropriate implementation strategies.
  • Manage run-time storage effectively through pointers and references, and adeptly work with linked structures.
  • Gain practical experience in writing C++ functions and implementing algorithms for arrays, records, string processing, queues, trees, pointers, and linked structures.
Artificial Intelligence
2
  • Explain AI fundamentals, concepts, goals, types, techniques, branches, applications, AI technology, and tools.
  • Discuss intelligent agents, their performance, examples, faculties, environment and architectures, and determine the characteristics of a given problem that an intelligent system must solve.
  • Describe the Turing test and the “Chinese Room” thought experiment, and differentiate between optimal reasoning/behaviour and human-like reasoning/behaviour.
  • Analyse heuristics and trade-offs among completeness, optimality, time complexity, and space complexity.
  • Practice Natural Language Processing, translate natural language sentences into predicate logic statements, convert logic statements into clause form, and apply resolution to logic statements for query answers.
  • Analyse programming languages for AI and expert systems technology, and apply them in application domains of AI.
Cryptography Techniques, Algorithms and Applications
2
  • Define cryptography concepts and cryptosystems, and differentiate between symmetric and asymmetric cryptography.
  • Exhibit practical experience in cryptanalysis, utilising protocols, hashing, digital signatures, and certificates.
  • Examine certificate authorities, policies, and procedures for proper cryptography usage in secure systems.
  • Identify and understand public-key cryptography, discrete algorithms, and cryptographic mathematical concepts, including hash functions, data integrity, authentication, algorithmic number theory, and primality testing.
  • Discuss factoring integers, RSA encryption, RSA key generation security, and discrete logarithm cryptographic schemes.
Cybersecurity Risks Analysis, Challenges and Mitigation
2
  • Describe cybersecurity risks, preventive measures, and challenges, while proposing strategies for the future.
  • Apply decision and risk analysis techniques to mitigate cybersecurity vulnerabilities and devise effective assessments for risk mitigation in the cloud.
  • Discuss implications of information technology on national development, cyber-attacks, and the safety of information, considering economic and geopolitical factors affecting African countries.
  • Review information security principles and applied management, including governance, security policy, threat and vulnerability management, crisis response, and legal considerations.
  • Explore ISO 27000 series, incident response, forensics, dealing with classified data, and regulatory drivers.
Digital Forensics and Investigation Methods
2
  • Build a foundational understanding of digital forensics and digital evidence, with an awareness of associated challenges.
  • Evaluate the cyber trail and its complexities.
  • Review the development of investigative tools and the language of computer crime investigation.
  • Explore techniques and tools used in computer forensics investigations and apply best practices in securing, processing, acquiring, examining, and reporting digital evidence using contemporary technologies and methodologies.
System and Network Administration (Elective)
2
  • Demonstrate in-depth knowledge of system administration, focusing on fundamental architecture shared across various systems.
  • Develop working knowledge of UNIX/LINUX for effective system administration practice.
  • Demonstrate skills and competencies to manage computer systems within an organisational infrastructure, including hardware, software, and user administration.
  • Showcase expertise in user, device, and file system administration, computer and network security, system monitoring, administrative support tools, and network, server, and client administration.
  • Handle diverse system administration tasks in real-world scenarios.
Cyber Security in Business and Industries (Elective)
2
  • Apply and integrate cybersecurity principles, frameworks, standards, and best practices into business management, governance, and policy development processes.
  • Provide insights into organising, managing, and governing enterprise IT cybersecurity within business settings, including risk management practices.
  • Design and implement industry-wide cybersecurity initiatives and programmes.
  • Navigate the intersection of cybersecurity and business, ensuring protection of information assets, adherence to regulations, and development of robust cybersecurity strategies aligned with organisational goals.
SIWES II
3
  • Articulate and describe assignments undertaken and skills acquired throughout the training period.
  • Prepare and submit a comprehensive report documenting knowledge gained and experiences encountered during the exercise.
  • Showcase hands-on experience in real-world settings, enhancing practical skills and professional readiness.
2nd Semester
Units
Peace and Conflict Resolution
2
  • Analyse the concepts of peace, conflict, and security.
  • List major forms, types, and root causes of conflict and violence.
  • Differentiate between conflict and terrorism.
  • Enumerate security and peacebuilding strategies.
  • Describe roles of international organisations, media, and traditional institutions in peacebuilding.
Venture Creation
2
  • Identify business opportunities in Nigeria through environmental scanning and market research, considering social, climate, and technological factors.
  • Understand entrepreneurial finance options like venture capital, equity finance, microfinance, and small business investment organisations.
  • Grasp principles of marketing, customer acquisition and retention, and e-commerce models (B2B, C2C, B2C), learning from successful e-commerce companies.
  • Acquire skills in small business management, family business dynamics, negotiation, and modern business communication methods.
  • Demonstrate ability to generate business ideas and explore emerging technologies for market solutions and digital business strategies.
Operating Systems
3
  • Recognise operating system types and structures.
  • Describe OS support for processes and threads.
  • Recognise CPU scheduling, synchronisation, and deadlock.
  • Resolve OS issues related to synchronisation and failure for distributed systems.
  • Explain OS support for virtual memory, disk scheduling, I/O, and file systems.
  • Identify security and protection issues in computer systems.
  • Use C and Unix commands, examine behaviour and performance of Linux, and develop system programs related to process synchronisation, shared memory, mailboxes, and file systems.
Biometrics Security
2
  • Discuss and apply biometric algorithms and data analysis techniques, including digital image and signal processing.
  • Demonstrate proficiency in automated biometric identification for hands, fingers, palms, heads, face, voice, eyes, and other biometrics.
  • Develop methods for obtaining and matching biometric data, and assess performance using thresholds, error rates, and graph analysis.
  • Handle storage, quality, upgrades, security, and integrity of biometric data elements.
  • Discuss privacy issues, security strength, recognition rates, and applications of biometrics, passwords, and smart cards, including future trends.
Information and Big Data Security
2
  • Understand foundations of big data, including computing technology and statistics.
  • Explore technical challenges and statistical assumptions in applied fields, including fraud detection and communication monitoring.
  • Critically engage with social implications of surveillance and behavioural prediction enabled by big data, addressing ethical trade-offs.
  • Master principles and practices of using big data to enhance computing system security.
  • Apply these principles through real-world examples and novel datasets.
Software Defined Networking and Content Delivery Networks (Elective)
2
  • Understand software-defined networking (SDN) and its impact on communication network management, maintenance, and security.
  • Understand content delivery networks (CDN) and the infrastructure enabling rapid delivery of digital content globally.
  • Apply SDN and CDN concepts to optimise network performance, enhance data delivery, and support secure network operations.
Network Perimeter Security (Elective)
2
  • Understand perimeter security, focusing on safeguarding network boundaries against unauthorised access.
  • Apply defence mechanisms such as surveillance detection, pattern analysis, threat recognition, and response strategies.
  • Design and implement network perimeter security measures to protect sensitive data and resources.
  • Proactively address threats and contribute to secure, resilient network infrastructures.
Cybersecurity Innovation and New Technologies
2
  • Understand the role entrepreneurship plays in driving social and economic change in a cyber-driven society.
  • Explain how novel cybersecurity technologies contribute to business success and information protection.
  • Identify business models and entrepreneurial opportunities through data analytics.
  • Develop business plans, assess feasibility, and outline marketing strategies.
  • Discuss business ethics and legal considerations in cyber-driven business environments.
1st Semester
Units
Research Methodology and Technical Report Writing
3
  • Distinguish qualitative and quantitative research methodologies and their applications.
  • Identify and define a research problem in a given area.
  • Identify different methods of data collection and select methods appropriate to a given situation.
  • Design and conduct simple research, including analysis and interpretation of research results.
  • Document the research problem and methodology through to research report writing.
  • Defend the written research report.
  • Familiarise themselves with ethical issues in the conduct of research.
Systems Vulnerability Assessment and Testing
2
  • Gain a comprehensive introduction to vulnerability assessment and penetration testing methodologies, including proficiency in relevant software tools.
  • Develop a thorough understanding of key concepts, including the vulnerability assessment process, host and network scanning techniques, principles of penetration testing, and techniques for network, software, web, and mobile security.
  • Apply methodologies and tools to assess and test the security of systems, preparing for practical identification and remediation of vulnerabilities in cybersecurity environments.
Project Management
2
  • Acquire comprehensive knowledge of project management, including planning, scheduling, and resource utilisation.
  • Efficiently manage project resources, make procurement decisions, and monitor and execute projects with strong communication and time management skills.
  • Lead and oversee projects to ensure timely and successful completion.
  • Handle project complexities, adapt to change, and make informed decisions to achieve project goals.
  • Prepare for real-world project management scenarios and effective project delivery.
Final Year Project I
3
  • Develop essential skills to embark on a research-oriented project in Cyber Security.
  • Identify researchable project topics and conduct a comprehensive literature review relevant to the identified problem statement, demonstrating proper acknowledgement and referencing of sources.
  • Conceptualise and design a well-structured research methodology to address the identified problem, selecting appropriate data analysis tools aligned with research objectives.
  • Write a coherent proposal for the research project and present ideas effectively in written and oral formats.
  • Prepare for subsequent phases of the final year project through rigorous and meaningful Cyber Security research planning.
Cyber Threat Intelligence and Cyber Conflict
2
  • Detect, respond to, and combat organised cybercrimes and cyberwar activities, recognising that not every attack can be prevented.
  • Analyse successful and unsuccessful advanced persistent threats and malware campaigns to strengthen capabilities against cyber terrorism and related tactics.
  • Develop knowledge of cyber threat intelligence and cyber tactical threat intelligence, and evaluate the role and skills of a cyber threat intelligence analyst.
  • Identify the evolution of counterterrorism and cyber conflict, and understand the dynamic nature of these domains.
Ethical Hacking and Reverse Engineering
2
  • Gain understanding of ethical hacking and reverse engineering methodologies and techniques, with relevance to internet security and personal safety.
  • Learn ethical hacking techniques for safeguarding systems and personal security from threats.
  • Acquire reverse engineering skills to gain insights into devices and systems.
  • Develop hands-on experience in both ethical hacking and reverse engineering.
  • Apply practical knowledge to address cybersecurity challenges and engineering complexities in real-world scenarios.
Information Security and Data Management
2
  • Develop knowledge and skills to address information security, interoperability, and data management concerns in modern technological contexts.
  • Implement best practices and standards for information security and data management, including privacy measures and effective inter-agency communication.
  • Resolve vulnerabilities and improve security capabilities within organisational operations, technological assets, and management.
  • Proactively address information security challenges and promote effective data management to safeguard sensitive information and improve organisational efficiency and privacy protection.
2nd Semester
Units
Ethics and Legal Issues in Cyber Security
3
  • Understand state laws and regulations concerning ethics in cybersecurity and identify and explain relevant codes of ethics in the field.
  • Explore and analyse social and ethical issues across Cyber Security domains, using real-life cases to develop ethical resolutions and policies.
  • Understand consequences of disregarding ethical provisions and non-compliance.
  • Develop sound methods to resolve ethical conflicts and crises with professionalism and integrity.
  • Uphold ethical standards and promote ethical practices in Cyber Security practice.
Machine Learning
3
  • Understand machine learning as a subfield of artificial intelligence, focusing on learning from empirical data.
  • Learn theoretical foundations and core algorithms, including decision trees, neural networks, Bayesian learning, and support vector machines.
  • Develop programming skills to apply machine learning algorithms to real-world datasets for analysis and interpretation.
  • Implement machine learning techniques in practical applications to extract insights from data.
Deep and Dark Web Security
2
  • Understand the deep and dark web and its role as a hidden layer of internet content.
  • Explain how activists, hacktivists, nation-states, researchers, and people seeking anonymity use these domains.
  • Develop skills to navigate these spaces with awareness of security, safety, reliability, and privacy concerns.
  • Apply knowledge to detect threats, protect against malicious activity, and use dark web concepts for anonymity and privacy protection where appropriate.
  • Operate more effectively as a cybersecurity professional, prepared for challenges and opportunities linked to the deep and dark web.
Final Year Project II
3
  • Showcase generic transferable and technical skills in Cyber Security, including communication and teamwork.
  • Produce a comprehensive technical report addressing real-world cybersecurity challenges.
  • Defend the written project report and demonstrate application of research methodologies.
  • Appreciate the complexities involved in full-fledged cybersecurity research projects.
  • Strengthen readiness for professional practice through applied research and reporting.
Steganography: Access Methods and Data Hiding
2
  • Understand steganography as a technique for hiding sensitive information to reduce exposure to unauthorised access.
  • Learn core steganographic techniques and their practical applications in cybersecurity.
  • Develop proficiency in implementing encryption methods that support concealed communication.
  • Use steganography to protect sensitive data and communication channels from unauthorised access.
  • Contribute to stronger cybersecurity measures through practical application of data hiding techniques.
Cloud Computing Security
2
  • Understand cloud architecture principles, design patterns, and real-world best practices for cloud providers and consumers.
  • Deliver secure cloud-based services, including cloud security architecture, guiding security design principles, industry standards, applied technologies, and regulatory compliance.
  • Design, implement, deliver, and manage secure cloud-based services to ensure data protection and integrity.
  • Navigate cloud security complexities and contribute to secure and resilient cloud infrastructure management in industry settings.

Admission Requirements

Admission Requirements for BSc. Cybersecurity

100 Level Entry Requirements for BSc. Cybersecurity

Here’s what you need to study for a bachelor’s programme at Miva University

A copy of your O’Level result

The result must include a minimum of five credits in the following subjects in not more than two sittings:

Please note that submission of Joint Admissions and Matriculation Board (JAMB) results is not mandatory at this stage. However, upon admission to the university, the provided results will be thoroughly verified for authenticity and compliance with the stated criteria, including JAMB Regularisation.

Direct Entry Admission Requirements for BSc. Cybersecurity

Here’s what you need to study for a bachelor’s programme at Miva Open University

Frame 31 (1)

Direct Entry Candidates must meet ‘O’ Level requirements for the programme:

Careers

Potential Roles for BSc. Cybersecurity Degree Holders

Tuition

Payment Plans

Miva Open University offers a flexible payment plan for its degree programmes. You may choose to pay the year’s fee or per semester.

Tuition Per Semester

$315

/Semester

Tuition Per Session

$560

/Session

* Discount applies for full year’s payment