Master of Science in Cyber Security
(R/0613/7/0019)(05/29)(MQA/FA11934)
Course OverviewAPU-DMU Dual Degree Programme
Students who are under Masters Degree Programme will have the option to opt-in for the APU-DMU Dual Degree Scheme. Under this Scheme, students will receive 2 Degree Certificates & Transcripts upon graduation: 1 from Asia Pacific University (APU), Malaysia and 1 from De Montfort University (DMU), UK.
To know more about APU-DMU Dual Scheme, please click HERE.
This programme is specifically designed to provide:
- Opportunity for professional development at an advanced level within the area of Cyber Security.
- Ability to further develop specialisation gained in taught modules through an extensive research-based and/or technical-based dissertation, to prepare a subject matter expert in the field.
- APU is also poised to become a frontrunner in cyber security research through the establishment of the Forensics and Cyber Security (FSEC) Research Centre, through which research activities will be undertaken to challenge boundaries in the application of cyber security.
Click HERE for more information on APU Masters Degree Scholarship
MORE THAN JUST A CYBER SECURITY MASTER PROGRAMME
APU's Master of Science in Cyber Security programme is designed to provide you an edge with the latest technologies that are in line with the Industrial Revolution 4.0.
Full Time:
1+ years
Part Time:
2.5-3 years
RM 40, 800.00
Total: Malaysian - RM 37,200 | International - RM 40,800
Full-time
• 20 Jan 2025
• 12 May 2025
• 25 Aug 2025
• 15 Dec 2025
Part-time
• 25 Oct 2024
• 10 Jan 2025
• 11 Apr 2025
• 13 Jun 2025
• 15 Aug 2025
• 31 Oct 2025
GENERAL REQUIREMENTS |
• Bachelor’s degree in Computing or related fields with a minimum CGPA of 2.50, or its equivalent qualification as accepted by the Senate. • Bachelor’s degree in Computing or related fields with a minimum CGPA of 2.00 and not meeting a CGPA of 2.50 can be accepted, subject to a rigorous internal assessment. • Bachelor’s degree in non-related fields with a minimum CGPA of 2.00 as accepted by the Senate and with relevant working experience, subject to a rigorous internal assessment. • Bachelor’s degree in non-related fields with a minimum CGPA of 2.00 as accepted by the Senate and without relevant working experience, subject to passing pre-requisite courses. |
* Applicants without a Computing-related Bachelor’s degree must pass the pre-requisite modules to continue with the Master’s Degree.
ENGLISH REQUIREMENTS | |
INTERNATIONAL STUDENTS | • IELTS 5.5 |
Students who are unable to obtain the required level of English Competency during the maximum 12 months’ period, will not be allowed to pursue their studies in the main programme and will have to return to their home country.
Note: The above entry requirements may differ for specific programmes based on the latest programme standards published by Malaysian Qualifications Agency (MQA).
TThis programme comprises 10 coursework modules and a Project. There are 7 compulsory Core Modules (including Research Methodology module) and you will have to choose 3 elective modules from those listed.
(For non-computing students: Duration: 1 month (Full-time) / 4 months (Part-time))
- Cyber Security
- Digital Forensics
- Digital Forensic and Cyber Security Tools
- Information Security Design
- Data Analytics in Cyber Security
- Cyber Security & Threats
- Security Operations Center & Incident Response
- Advanced Ethical Hacking
- Advanced Digital Forensics
- Research Methodology in Computing & Engineering
- Project
- Network Design & Performance
- Information Security Architectures
- Security Audit and Assessment
- E-Investigation
- Applied Scripting in Cyber Security
* Elective modules may be pre-selected for students at the beginning of the semester. If students wish to change these pre-selected elective modules, they can choose from the available modules offered in the semester OR among the intensive delivery modules – however such changes may prolong the study duration.
On successful completion of this programme, you will be able to :
- The curriculum covers a wide range of industry relevant subject areas in Security Operations Centre (SOC) and Incident Response, Security Auditing and Assessment, Advanced Ethical Hacking, E-Investigation, Data Analytics in Cyber Security etc.
- External reviews conducted by Cyber Security Malaysia (CSM), KPMG and F-Secure during the development of the programme curriculum.
- Programme Support by an Industry Advisory Panel involving cyber security experts from Cyber Intelligence, Cyber Test Systems, Akati Consulting Group and Cyber Security Malaysia (CSM).
- A fully-functional Security Operations Centre (SOC) that allows students to have handson cybersecurity operations platform to monitor live data which allows them to perform real-time cyber security monitoring to fortify network defense with global threat intelligence and launching faster response on cyber security incidents.
- A full-fledged Cyber Threats Simulation and Response Centre – Cyber Range is also included within the Cyber Security Talent Zone in APU. Cyber Range incorporates latest technologies and a military grade cyber-defence system, enabling students to understand and formulate defence strategies, and practice the entire chain of cyber defence, while preparing them to deal with real cyber threat attack when it happens.
- A technical project related to Cyber Security as dissertation in the final semester.
- Research opportunities for students via APU’s Forensic and Cyber Security Research Centre - FSEC.
The Rocheston Certified Penetration Tester (RCPT) program stresses research, live labs and interactive sessions on emerging security findings, offering the scope for defining the information security requirements while finding options to enhance existing methodology assets. The RCPT certification is designed and embedded as part of Advanced Ethical Hacking module in the Master of Science in Cyber Security programme, to allow the students to have an industry-standard exposure towards penetration testing as well as an opportunity to upskill themselves in real-life scenarios and simulations through the offered CyberLabs. As such, every student in the programme is given equal opportunity in getting their hands on the certification as part of the syllabus learn in the module without the need of taking up additional training resources. Studen can opt for the Rocheston certification which is valid for 2 years and subject to a renewal process to ensure all Penetration Testers are updated with the current scope of Penetration Testing.
Upon completion of the Advanced Digital Forensics module, students will be ready and may opt for the Certified Hacker Forensics Investigator (CHFI) professional certification. The CHFI certification is provided by the International Council of Electronic Commerce Consultants [EC-Council], which is an American organisation that offers cybersecurity certification, education, training, and services in various cybersecurity skills. EC-Council is d headquartered in Albuquerque, New Mexico, and has certified over 237,000 professionals from 145 countries (https://iclass.eccouncil.org/). CHFI is an advanced cybersecurity certification for forensic network security investigators.
Upon completion of the Security Operations Center (SOC) & Incident Response SOC module, students will be ready and may opt for the Certified Security Operation Center (CSOC) professional certification. The CSOC examination is certified by the Global ACE Certification where the certification body for the Global ACE Certification is the Information Security Certification Body or ISCB, a department within CyberSecurity Malaysia (CSM). Candidates can take the examination at authorised examination centres in participating member countries. Candidates who have successfully passed the CSOC examination will be eligible to apply as an associate or professional member by fulfilling the membership criteria defined under the Global ACE Certification.
Source:
“As digital transformation agendas continue to dominate, a bigger cybersecurity budget is necessary. Almost all companies are looking at technologies such as robotics, machine learning, artificial intelligence, blockchain and so on. All of that change will come with additional cyber risks and necessary investments.”
- Security Architect
- Cyber Security Analyst / Consultant
- Information Security Analyst
- Cyber Security Incident Response Consultant
- Digital Forensic Investigator
- Cyber Security Engineer
- Information Security Engineer
- Cyber Security Manager
- Information Security Manager
- MSc in Software Engineering
- Master of Science in Artificial Intelligence
- Master of Science in Artificial Intelligence (ODL)
- MSc in Data Science and Business Analytics
- Master of Science in Data Science and Business Analytics (ODL)
- MSc in Information Technology Management
- Master of Technology Management
- Master of Science in Digital Transformation
- Master of Project Management
- Master of Science in Computing