Master of Science in Cybersecurity

The programme is to provide participants with the knowledge and necessary skills in several core areas of cyber security and to provide a comprehensive and deep understanding of security principles, practical techniques used in solving security problems and addressing relevant cybersecurity issues.

Objectives of the Programme

Students who successfully complete the M.Sc. Cybersecurity programme will be able to:

  • Develop the ability to assess and manage both security and risk in a corporate environment.
  • Develop a transferable research skills and interdisciplinary knowledge for a wide range of information and technology, research and policy careers.
  • Equipped with advanced knowledge of multi-disciplinary cybersecurity principles, and to enable students to recognize the importance of multi-disciplinary approach in addressing cybersecurity
  • Have advanced understanding of the social and human factors in cybersecurity attack vectors.

Admission Requirement

  • A good first degree with at least a 2nd Class Lower division from an accredited institution; students with an accredited undergraduate degree in computer science, computer engineering, information systems, MIS, IT, or other related fields.
  • In exceptional cases, applicants with 3rd Class Division who are already employed in programme-related fields, with relevant work experience and demonstrate capacity to cope with the programme may be considered for admission.  Such applicants must write and pass a selection examination and an interview organised by the Graduate School.
  • Applicants with professional qualifications in Computer Science, Computer Engineering and Information Technology in good standing may be considered for admission.
  • Any other qualification in lieu of what stated above, the school of graduate studies will sort clarifcation from the Ghana Tertiary Education Commission.

Mode of Study

Graduates of this programme are well-prepared for the following roles:

Full time

Weekend

Career Prospects:

Candidates after successful completion of this prestigious programmes, qualifies to occupy positions such as;
Chief Information security officer


Chief privacy officer

Computer forensics

Cryptographer

Cybercrime investigator

Data protection officer

Penetration tester

Cybersecurity consultant

Application

The following documents are to be enclosed along with the completed application form;
  • Two passport Size Photographs
  • Copy of Identity Card
  • Evidence of Source of Funding
  • Secondary/High School Certificate
  • Degree Certificate(s)
  • Transcript(s)
  • Proof of National Service
  • Proof of Work Experience
  • Resume/CV
  • Two Letters of Recommendation (One (1) must be Academic)
  • Statement of Purpose