A Bachelor of Science (BS) in Cybersecurity offered at PAF-IAST is a 4 year undergraduate degree program that focuses on the study of techniques and strategies to protect digital systems, networks, and data from unauthorized access, theft, and damage. This program equips students with essential knowledge and skills in areas such as network security, cryptography, incident response, ethical hacking, and risk management. Graduates of this program are prepared to tackle the growing challenges of cybersecurity threats and play a crucial role in safeguarding information and infrastructure in various industries.
Career Paths: Full stack secure Developer, Secure Software Architect, Data and Information Security, Digital Forensic Analyst, Cybersecurity Specialist, AI/Machine Learning Engineer in Cyber Security, Cloud and Edge Security Implementation, IT and Cyber Security Solution Maker and Technology Entrepreneur.
Course Code |
Course Title |
Theory Cr. Hrs. |
Lab Cr. Hrs. |
Total |
COMP-102 |
Introduction to ICT |
2 |
|
2 |
COMP-102L |
Introduction to ICT Lab |
|
1 |
1 |
COMP-111 |
Programming Fundamentals |
3 |
|
3 |
COMP-111L |
Programming Fundamentals Lab |
|
1 |
1 |
PHY-101 |
Applied Physics |
3 |
|
|
PHY-101L |
Applied Physics Lab |
|
1 |
1 |
SS-103 |
English Language and Communication Skills |
3 |
|
3 |
SS-111 |
Islamic Studies |
2 |
|
2 |
SS-331 |
Community Service |
|
|
1 |
(University Elective-I)* |
||||
|
Total Credit Hours |
13 |
3 |
16 |
Course Code |
Course Title |
Theory Cr. Hrs. |
Lab Cr. Hrs. |
Total |
COMP-112 |
Object Oriented Programming |
3 |
|
3 |
COMP-112L |
Object Oriented Programming Lab |
|
1 |
1 |
COMP-121 |
Discrete Structures |
3 |
|
3 |
MGT-262 |
Entrepreneurship |
3 |
|
3 |
(University Elective-II) |
||||
MTH-101 |
Calculus and Analytical Geometry |
3 |
|
|
MTH-206 |
Probability and Statistics |
3 |
|
3 |
SS-112 |
Pakistan Studies |
2 |
|
2 |
|
Total Credit Hours |
17 |
1 |
18 |
Course Code |
Course Title |
Theory Cr. Hrs. |
Lab Cr. Hrs. |
Total |
COMP-201 |
Data Structures and Algorithms |
3 |
|
3 |
COMP-201L |
Data Structures and Algorithms Lab |
|
1 |
1 |
COMP-291 |
Information Security |
3 |
|
3 |
COMP-340 |
Artificial Intelligence |
3 |
|
3 |
COMP-340L |
Artificial Intelligence Lab |
|
1 |
1 |
EE-101 |
Digital Logic Design |
3 |
|
3 |
EE-101L |
Digital Logic Design Lab |
|
1 |
1 |
MTH-204 |
Linear Algebra |
3 |
|
|
|
Total Credit Hours |
15 |
3 |
18 |
Course Code |
Course Title |
Theory Cr. Hrs. |
Lab Cr. Hrs. |
Total |
COMP-262 |
Operating Systems |
3 |
|
3 |
COMP-262L |
Operating Systems Lab |
|
1 |
1 |
COMP-231 |
Database Systems |
3 |
|
3 |
COMP-231L |
Database Systems Lab |
|
1 |
1 |
COMP-261 |
Comp. Organization and Assembly Lang. |
3 |
|
3 |
COMP-261L |
Comp. Organization and Assembly Lang. Lab |
|
1 |
1 |
COMP-222 |
Design and Analysis of Algorithms |
3 |
|
3 |
COMP-292 |
Introduction to Cyber Security |
3 |
|
|
|
Total Credit Hours |
15 |
3 |
18 |
Course Code |
Course Title |
Theory Cr. Hrs. |
Lab Cr. Hrs. |
Total |
COMP-460 |
Parallel and Distributed Computing |
2 |
|
2 |
COMP-460L |
Parallel and Distributed Computing Lab |
|
1 |
1 |
COMP-171 |
Software Engineering |
3 |
|
3 |
MTH-203 |
Differential Equations |
3 |
|
3 |
SS-203 |
Technical and Business Writing |
3 |
|
3 |
COMP-392 |
Digital Forensics |
2 |
|
2 |
COMP392l |
Digital Forensics Lab |
|
1 |
1 |
COMP-393 |
Information Assurance |
3 |
|
|
|
Total Credit Hours |
16 |
2 |
18 |
Course Code |
Course Title |
Theory Cr. Hrs. |
Lab Cr. Hrs. |
Total |
COMP-352 |
Computer Networks |
3 |
|
3 |
COMP-352L |
Computer Networks Lab |
|
1 |
1 |
COMP-474 |
Vulnerability Assessment & Reverse Engg. |
2 |
|
2 |
COMP-474l |
Vulnerability Assessment & Reverse Engg. Lab |
|
1 |
1 |
COMP-390 |
Network Security |
2 |
|
2 |
COMP-390l |
Network Security Lab |
|
1 |
1 |
COMP-373 |
Secure Software Design and Development |
2 |
|
2 |
COMP-373L |
Secure Software Design and Development Lab |
|
1 |
|
COMP-### |
IS Elective-I |
3 |
|
3 |
|
Total Credit Hours |
12 |
4 |
16 |
Course Code |
Course Title |
Theory Cr. Hrs. |
Lab Cr. Hrs. |
Total |
COMP-498 |
Final Year Project I |
|
3 |
3 |
MGT-356 |
Intellectual Property Law |
3 |
|
3 |
(University Elective-III) |
||||
COMP-### |
IS Elective-II |
3 |
|
3 |
COMP-### |
IS Elective-III |
3 |
|
3 |
COMP-### |
IS Elective-IV |
3 |
|
3 |
|
Total Credit Hours |
12 |
3 |
15 |
Course Code |
Course Title |
Theory Cr. Hrs. |
Lab Cr. Hrs. |
Total |
COMP-499 |
Final Year Project II |
|
3 |
3 |
SS-220 |
Organizational Behavior |
3 |
|
3 |
(University Elective-IV) |
||||
SS-310 |
Professional Ethics |
3 |
|
3 |
COMP-### |
IS Elective-V |
3 |
|
3 |
|
Total Credit Hours |
9 |
3 |
12 |
|
|
|
Total |
131 |
Course Code |
Title |
COMP-390 |
Network Security |
COMP-391 |
Cryptanalysis |
COMP-392 |
Digital Forensics |
COMP-394 |
Wireless and Mobile Security |
COMP-492 |
Penetration Testing |
COMP-373 |
Secure Software Design and Development |
COMP-313 |
Mobile Application Development |
COMP-317 |
Mobile game development |
COMP-351 |
Web Engineering |
COMP-453 |
Full Stack Development |
COMP-454 |
Semantic Web |
COMP-312 |
Visual Programming |
COMP-312 |
Visual Programming Lab |
COMP-332 |
Data Mining |