Programme Information

Required Credits/Units: 240

Aims of the Programme
The aim of the programme is to generate computer professionals with scientific knowledge and skills essential for advancing their professional careers and/or proceed with further research and progress towards a doctoral degree.

Learning Outcomes
At the end of the programme, the student will be expected to:

a) Identify the physical and logical control of today’s modern networking architectures, as well as the connectivity characteristics for end- to end reliable data transmission.
b) Identify network attacks, basic network defence tools, various types of malicious software (i.e. malware) and perfectly use countermeasure defence/detection tools by deploying existing technologies and libraries to achieve security goals.
c) Integrate cybersecurity ethics as a network security practitioner.
d) Design and develop centralized or distributed systems based on required functionality and purpose.
e) Identify and interpret actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information in computers and computer networks, along with identifying actions to protect and respond to unauthorized activity within information systems and computer networks.
f) Implement intelligence collection capabilities conducted through computer networks to gather data from target or adversary automated information systems or networks.
g) Analyse cyber related decisions as they apply to national security strategy from social, ethical, legal, and political viewpoints.
h) Understand common web infrastructure and applications attack vectors and be able to utilize tools and skills in order to attack web infrastructures and applications.
i) Create a solid enterprise-wide information security infrastructure, including analysing the security needs of the enterprise, designing a strategic plan to address the security requirements, selecting the appropriate tools to implement the security organizational policies, and establishing recovery techniques from disruptive and destructive information security events.
j) Design and deploy web database applications using commercially available database systems, and develop advanced queries using various query languages.
k) Communicate clearly and analytically using techniques derived from scientific practice in group meetings, presentations, lectures, written reports, and research papers.

Entry Requirements

Admission Requirements

The general admission requirements for entry to Unicaf University in Zambia Master degree programmes are as outlined below. Students are advised to contact the Office of Admissions to find out more about the range of equivalent international academic qualifications accepted.

  • Admission to a Master’s degree programme requires an accredited Bachelor degree or international equivalent. Related professional qualifications at the appropriate level will also be considered for entry.
  • Students with an accredited Master’s degree will also be considered for entry.
  • Recognised proof of English proficiency if the Bachelor degree was not taught in the English language
  • Copy of valid passport or national ID

In addition to a strong academic record, extra-curricular activities, leadership skills and other relevant background information are taken into account.

Programme Outline

Foundation Courses

Course Code Course Title Credits
UU-Msc-IND100-ZM Induction Module 0.00
UU-FNT-203-ZM Introduction to Master Degree 0.00

Core Units

Course Code Course Title Credits
UU-COM-713-ZM Cyber Physical Systems and the Internet of Things 25.00
UU-COM-714-ZM Cryptography and Networking Security 25.00
UU-COM-715-ZM Distributed Systems 25.00
UU-COM-760-ZM Machine Learning Technologies (MSc) 25.00
UU-COM-711-ZM Database Systems 25.00
UU-COM-729-ZM Network Defense and Countermeasures 25.00
UU-COM-770-ZM Software Project Management and Development 25.00
UU-COM-780-ZM Research Methods in Computing 25.00
UU-COM-790-ZM Final Thesis Project 40.00
Back to Programmes

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties Cookie Policy