Build the Future
Code beyond the Decentralised Chain & Architect Sovereign Trust
Our Cyber Security & Forensics Management is a definitive specialisation of tomorrow’s digital guardians. Cyber threats evolve faster than code itself and this comprehensive and forward-looking program infuses Offensive, Defensive and Investigative Analysis & Strategies. This prepares our graduates to deploy advanced security frameworks and explore methodologies for identifying, preserving, analysing, and presenting digital evidence with legal standards.
Through immersive red-team, blue-team & purple-team simulations with ethical hacking labs, and real-time incident command scenarios, this course produces Cyber Architects not just as a responder for protecting critical information infrastructure (CII), but as a visionary Entrepreneur of cyber resilience. The programme is designed for Cyber Security Specialists ready to lead organizations through the unknown frontiers of digital risks and forensics management. Key learning topics include Incident Response Planning, Advance Penetration Testing, Digital data acquisition, Malware Reverse Engineering and more.
- Comprehensive Curriculum:
Engage in a rigorous, hands-on program balancing offensive and defensive skills, from fundamentals to AI-driven attacks. - Advanced Tech Focus:
Tackle emerging topics like blockchain security and incident response, preparing you for modern real-world challenges. - Applied Mastery:
Build job-ready expertise through CTF (Capture The Flag) projects and a focus on both theory and practice.
- Core Cybersecurity Skills:
Vulnerability assessments, ethical hacking (Windows, Web, Mobile, Web3/Blockchain), penetration testing, cryptography, and threat intelligence. - Defensive Operations:
Endpoint and cloud security, Security Operations Center (SOC) management, threat detection, and incident response. - Investigation & Analysis:
Digital forensics (including dark web and fullstack forensics), malware reverse engineering, and cybercrime investigation. - Technical Foundation:
Secure coding, network security, applied data structures & algorithms, and modern database design. - Advanced & Emerging Tech:
Adversary emulation, C2 framework development, DevSecOps, and AI applications in both offensive and defensive security contexts.
This curriculum harmonizes aesthetics with high-speed automation, fostering inquiry-based learning through both theory and practical sessions. You will acquire architectural and design skills necessary for the Zero UI landscape, moving from foundational concepts to the concurrent application of user experience strategy and intelligent automation. By treating ethics, design, and architecture as a unified professional language, the program prepares you for the multifaceted roles of the future economy.
You will have numerous professional opportunities in various global and local organizations such as financial institutions, tech-based firms, business organizations, government agencies, and ministries. The following are potential job opportunities for our graduates:
- Blockchain Apps Developers
- Blockchain Solution Architects
- Blockchain Software QA Specialists
- Smart Contract Developers & Security Auditors
- Protocol Engineers
- ZK & Blockchain Security Engineers
- Tokenomics & Consensus Mechanism Specialists
- Web3 Technical Entrepreneurs & Founders
- Cybersecurity Analyst
- Penetration Tester / Ethical Hacker
- SOC Engineer / Incident Responder
- Digital Forensic Investigator
- Cloud Security Specialist
- Threat Intelligence Analyst
- Security Consultant
Course Modules
Students will have to complete 60 credits in each semester. In total, a student has to complete 480 credits to be eligible for the award of a Bachelor of Computer Science (Cyber Security & Forensics Management).
| Module Title | Credit |
|---|---|
| Semester 1 | |
| Fundamentals of Programming | 12 |
| Front End Web Development I | 12 |
| Fundamentals of Computing | 12 |
| Modern Database Design & Development | 12 |
| Dzongkha Communication | 12 |
| Semester 2 | |
| Back End Web Development | 12 |
| User Interaction Design | 12 |
| Mathematics for Programming I - Discrete Structures | 12 |
| Academic Skills | 12 |
| Essentials for Networking & Automation | 12 |
| Module Title | Credit |
|---|---|
| Semester 1 | |
| Mathematics for Programming II - Statistics and Probability | 12 |
| Applied Data Structures and Algorithms | 12 |
| Introduction to Research | 12 |
| Windows Exploitation | 12 |
| Endpoint Security (Network & Server Defense) | 12 |
| Semester 2 | |
| Mathematics for Programming III - Linear Algebra | 12 |
| PRJ2: Immersive Red & Blue CTF | 12 |
| Security Operations & Management (SOC) | 12 |
| Web & Mobile Pen-Test Attacks & Exploitation | 12 |
| Purple Dashboarding, Documentation & Collab | 12 |
| Module Title | Credit |
|---|---|
| Semester 1 | |
| Traditional AI and Machine Learning | 12 |
| Cloud Security | 12 |
| Cryptography | 12 |
| Mathematics for Programming IV - Optimization | 12 |
| Web3 & Blockchain Pen-Test Attacks | 12 |
| Fullstack & Dark Web Forensics | 12 |
| Semester 2 | |
| Malware Reverse Engineering | 12 |
| PRJ3: Immersive Red & Blue CTF with Purple Feedback | 12 |
| Adversary Emulation & Threat Intelligence | 12 |
| Threat Detection & Monitoring | 12 |
| Elective I - Tokenomics | 12 |
| Module Title | Credit |
|---|---|
| Semester 1 | |
| Advanced Ethical Hacking | 12 |
| C2 Framework Development | 12 |
| Incident Response & Recovery | 12 |
| Digital Crimes & Evidence Management | 12 |
| Elective II - DevSecOps for Development | 12 |
| Semester 2 | |
| Industry Capstone Cyber Project | 36 |
| Advanced Analytical & Critical English Skills | 12 |
| Elective III - Offensive AGI Agent Attacks | 12 |