MS Information Security – NUST
Course Name: MS Information Security
Course Overview
Cyber threats to federal information systems and cyber-based critical infrastructures are evolving and growing. These threats can be unintentional and intentional, targeted or non-targeted, and can come from a variety of sources, such as foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. As government, private sector, and personal activities continue to move to networked operations; digital systems add ever more capabilities; wireless systems become more ubiquitous and as the design, manufacture, and service of information technology have moved overseas, the threat will continue to grow. In the absence of robust security programs, agencies have experienced a wide range of incidents involving data loss or theft, computer intrusions and privacy breaches; underscoring the need for improved security practices.
No. of Semesters: 2
Requirements:
GENERAL ELIGIBILITY:
-
Sixteen years of schooling or 4 years (minimum 124 credit hours) education after HSSC/A’ Level in relevant discipline with minimum CGPA of 2.0 out of 4.0 OR 55% marks (percentage will only be considered if CGPA is not mentioned on the transcript).
-
GAT (General) conducted by NTS with at least 50 accumulative score or GRE (General) conducted by ETS, USA, with following minimum score separately in each section:-
Description |
Scale |
Quantitative |
151/170 |
Verbal |
146/170 |
Analytical Writing |
3.5/6.0 |
Information Security
BE in Electrical / Telecommunication / Computer Software/ Computer System/ Electronics / Industrial Electronics / Electrical & Communication / Avionics / Communication Technologies.
OR
MCS / MIT / BCS (4 years) / BIT (4 years) or MSc in (Statistics / Physics / Applied Physics / Mathematics / Electronics) with BCS / BIT.
Course Duration: 2 years
How to apply:
Application
• Access web-link: www.pgadmission.nust.edu.pk • Fill online application form. • Upload scanned copies of required documents.
Application Confirmation
• Application confirmation will be sent at the given email address within 24 hours of submission.
Application Fee
• Deposit Application Fee online in any HBL branch.
Fee Receipt
• Fee confirmation will be sent at the given email address within 15 days of payment.
Application Status
• Application status would be communicated through email/website within 2 days of documents receipt.
Interview Calls
• Eligible candidates and those who qualify GAT-Gen or relevant tests will be asked to appear for interviews.
Interviews
• Candidates would appear for interviews at the concerned School/College/Center in July 2014.
Selection List
• Selection list will be uploaded on NUST website by the mid of August 2014.
Admission Dues
• Candidates will deposit admission dues in any HBL branch as per challan form available online.
Document Submission
• Candidates will prepare documents as per given checklist available online and will submit to the PGP Directorate, Main Office NUST. • All original documents, Medical Certificate and Affidavit will be submitted to the respective Schools/Colleges/Centers at the time of joining.
Joining Instructions
• Relevant NUST School/College/Center will issue joining instructions to those candidates who have completed all admission requirements.
• Successful candidates will join relevant programs as per joining instructions in 2nd week of September 2014.
Curriculum
Courses Credit Hours
Computer Security 3 |
Network Security 3 |
Advanced Cryptography – I 3 |
Information Security Management 3 |
MS Thesis 6 |
ADDITIONAL COURSES
Research Methodology 2 |
ADDITIONAL ELECTIVES
Advanced Computer Architecture 3 |
Advanced Data Communications 3 |
Advanced Database Concepts 3 |
Advanced Distributed Computing 3 |
Artificial Intelligence and Machine Learning 3 |
Cloud Computing 3 |
Data Mining 3 |
Distributed Computing 3 |
Distributed Databases 3 |
Software Verification 3 |
Wireless Networks 3 |
ELECTIVE COURSES – CRYPTOLOGY
Advanced Cryptography – II 3 |
Cryptanalysis 3 |
Quantum Cryptography 3 |
Formal Methods for Information Security 3 |
Advanced Topics in Cryptology 3 |
ELECTIVE COURSES – DIGITAL FORENSICS AND INCIDENT RESPONSE
Computer Forensics 3 |
Information Hiding 3 |
Network Forensics 3 |
OS & File System Forensics 3 |
Forensics Incident Response 3 |
Malware Analysis and Reverse Engineering 3 |
Intrusion Detection 3 |
Advanced Topics in Digital Forensics and Incident Response 3 |
ELECTIVE COURSES – GENERAL
Secure Coding 3 |
Biometrics 3 |
Cyber Warfare 3 |
Access Control and Database Security 3 |
Advanced Topics in Information Security 3 |
Advanced Simulation and Modeling 3 |
Analysis of Stochastic Systems 3 |
Pattern Recognition 3 |
Advance Artificial Intelligence 3 |
ELECTIVE COURSES – INFORMATION SECURITY MANAGEMENT
Information Security Project Management 3 |
IT Security Evaluation & Auditing 3 |
Legal Aspects of Information Security 3 |
Security Planning and Incident Management 3 |
Security Risk Analysis and Management 3 |
Auditing Networks, Perimeters and Systems 3 |
Security and Privacy of Information and Information Systems 3 |
Advanced Topics in Information Security Management 3 |
ELECTIVE COURSES – SYSTEMS / NETWORK SECURITY
Wireless Network Security 3 |
Vulnerability Exploitation and Defense 3 |
Electronic Warfare – Principles and Techniques 3 |
Secure Communications 3 |
Data Communication Networks & Security 3 |
Cloud Computing Security 3 |
Advanced Web Security 3 |
Secure Electronic Commerce 3 |
Cellular and Mobile Network Security 3 |
Information Security Engineering 3 |
Advanced Topics in Systems Security 3 |