Application Deadline: 16.01.26
The MSc in Cybersecurity seeks to prepare students to prevent, counter, and recover from cybercrimes and cyberattacks. As this area of expertise is multi-disciplinary the programme provides strong foundations in IT security, criminology, management, law, science, business technology, and psychology. This programme within the Centre for Information and Communications Technology (CICT) reaffirms UTT's commitment to develop the thinking and skills needed to navigate new and emerging technologies within national and global contexts.
The programme prepares graduates for employment in the following areas/industries: Banking, Government and the Public Sector, PublicUtilities e.g. T&TEC, TSTT, WASA, Health, National Security, Energy Companies, or any company using Information and CommunicationTechnologies.
The MSc in Cybersecurity programme is accredited by the UK Institution of Engineering and Technology (IET).
Master of Science in Cybersecurity with specialisations in:
Programme Credits: 42
Programme Options:
Evening Classes ONLY
Duration: 1½ years Full-time, 2 ½ Part-time
Note: The Bachelor’s degree should be in the areas of:
Mature Student Entry
An applicant who does not satisfy all the stipulated minimum academic or technical qualifications for admission to a programme may be accepted as a Mature Student. He/she would need to possess the critical elements of the stipulated qualification and would be assessed by the UTT Programme Head as possessing a combination of qualifications and educational or experiential maturity to enable him/her to successfully participate in the programme.
| COURSE CODE | COURSE TITLE | NO. OF CREDITS |
|---|---|---|
| CICC5001 | Computer Security | 4.0 |
| CICC5001: COMPUTER SECURITY The course introduces the most important features of computer security and privacy, including algorithms and protocols for encryption, cryptography, authentication, and key management, as well as malware detection, database security and other system-related security issues. The course covers threats and vulnerabilities in the computer systems, as well as rules, methods and mechanisms for data and system protection. After completing this course, students will be able to analyze, design and build secure systems of moderate complexity. | ||
| CICC5002 | Cybersecurity Law, Policy, Management and Economics | 3.0 |
| CICC5002: CYBERSECURITY LAW, POLICY, MANAGEMENT AND ECONOMICS This course explores the managerial, legal, regulatory, and policy framework of cybersecurity, cyber terrorism, cyber violent extremism and cybercrime. It provides students with a framework for understanding the myriads of laws and regulations that govern this emerging field. While the focus of the course will be on U.S. cyber law and policy, law and policy of Caribbean countries will also be addressed. It examines important management issues associated with cybersecurity in industry. It also addresses critical issues for businesses to learn about the costs and investment decisions around securing their online systems. It will provide students with the economic concepts, measurement approaches and data analytics to make better security decisions and understand the forces that shape the security decisions of other businesses, products and services. | ||
| CICC5003 | Cyber-Physical Security for Critical Infrastructure | 3.0 |
| CICC5003: CYBER-PHYSICAL SECURITY FOR CRITICAL INFRASTRUCTURE The cyber-physical security addresses security concerns for cyber physical systems (CPS) and internet of things (IoT) devices. CPS and IoT play an increasingly important role in critical infrastructure, government and everyday life. Automobiles, medical devices and building controls are examples of CPS. Water, transportation, telecommunication networks, oil/gas pipelines and plants, and power grids are examples of critical infrastructure. With the increased use of CPS and the parallel rise in cyber-attack capabilities, it is imperative that new methods for securing these systems be developed. This course will investigate key concepts behind CPS including identification and authentication technologies, protocol analysis and intrusion detection system (IDS) development. | ||
| CICC5004 | Advanced Network and Web Security | 4.0 |
| CICC5004: ADVANCED NETWORK ANDWEB SECURITY This course first presents various network and communication attack techniques and countermeasures, including various vulnerabilities of TCP/IP protocols, denial of service (DOS), attacks on routing, attacks on wireless networks, TCP session hijacking and so on. This course will also cover defending mechanisms, including intrusion detection, firewalls, tracing the source of attacks, anonymous communication, IPsec and virtual private networks. This course then introduces students to the field of web security: that is, how to build secure web applications. The web is our gateway to many critical services and is quickly evolving as a platform to connect all our devices. Web vulnerabilities are growing on a year- to-year basis and designing secure web applications is challenging. The course covers fundamental concepts of web programming, web vulnerability exploitation, web browser design flaws and key advanced topics in web privacy. | ||
Total Credits: 14
| COURSE CODE | COURSE TITLE | NO. OF CREDITS |
|---|---|---|
| CICC5011 | Data Protection and Privacy | 4.0 |
| CICC5011: DATA PROTECTION AND PRIVACY This course introduces privacy and data protection practices in the development, engineering, deployment and auditing of ICT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologiesandsystems. Thecourseteaches key European/US/Canada data protection laws and regulatory bodies, describing the evolution toward a harmonized legislative framework. It discusses the applications of relevant data protection laws, legal bases and compliance requirements for processing personal data in practice. The course also identifies privacy program management responsibilities and describes the role of accountability in privacy program management. It examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organisation, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. | ||
| CICC5012 | Cybercrime and Deep Web | 4.0 |
| CICC5012: CYBERCRIME AND DEEP WEB This course mainly explores technical aspects of cybercrime, Darknet and Deep Web. Deep Web – which includes dark web as a subset – is the part of the World Wide Web not indexed by the search engines like Google and Bing. The origins and extent of cybercrime and Deep Web, responses from legal systems to cyber-criminals and the social impact of cybercrimes will be addressed. Various types of cybercrimes, cyber-criminals, as well as the motivations and methods involved in cyber-offences will be studied. The etiology of cybercrimes will be analysed from cultural, subcultural, sociological and opportunity perspectives. International issues and jurisdictional challenges will be critically examined. | ||
| CICC5013 | Digital Forensics and Cybercrime Investigation | 4.0 |
| CICC5013: DIGITAL FORENSICS AND CYBERCRIME INVESTIGATION This course examines essential digital forensics concepts and techniques of profiling and categorising cybercriminals. The topics include network forensics, computer forensics, web forensics, mobile cellular forensics, etc. A further aim of this course is to introduce students to developing areas of cybercrime analysis, cybercrime profiling and counter terrorism and to provide the skills for investigating new areas of digital forensics, such as covert analysis and intruder artefacts. This course also examines the legal obligations of digital forensics and cyber profiling, in order to gain an understanding of the relevant statutes and industry guidelines for improving the authenticity of evidence via a chain of custody from collecting evidence through to presenting findings in a professional manner. | ||
| CICC5014 | Hacking and Penetration Testing | 4.0 |
| ICC5014: HACKING AND PENETRATION TESTING This course provides students with a broad understanding and knowledge of network/ system/web/physical infrastructure vulnerabilities and provides unique applications involved in the professional domain of Cyber Security and Information Assurance. It discusses the latest cutting- edge insidious attack vectors and the patterns of denial-of-service attacks. The course is directed toward ethical hacking and penetration (Pen) testing. Penetration tests probe network and information system securitycomponentsbyconductingsimulated attacks on systems. This specialisation prepares the student to develop rules of engagement, prepare a tool kit, discover and exploit system vulnerabilities, ethically conduct a penetration test and prepare penetration test documentation. | ||
Total Credits: 16
| COURSE CODE | COURSE TITLE | NO. OF CREDITS |
|---|---|---|
| CICC6001 | Cybersecurity Thesis | 12.0 |
| CICC6001: CYBERSECURITY THESIS Comprehensive project culminating in a Thesis document and presentation; students undertake a major individual project which involves addressing a significant technical problem which they embark on under the guidance of one or more supervisors; students are expected to demonstrate an ability to apply structured, disciplined approaches of the curricula in addressing the solution to the problem; students produce a technical report thesis of their work together with a demonstration of the working system. | ||
Total Credits: 12
| COURSE CODE | COURSE TITLE | NO. OF CREDITS |
|---|---|---|
| CICC5001 | Computer Security | 4.0 |
| CICC5001: COMPUTER SECURITY The course introduces the most important features of computer security and privacy, including algorithms and protocols for encryption, cryptography, authentication, and key management, as well as malware detection, database security and other system-related security issues. The course covers threats and vulnerabilities in the computer systems, as well as rules, methods and mechanisms for data and system protection. After completing this course, students will be able to analyze, design and build secure systems of moderate complexity. | ||
| CICC5002 | Cybersecurity Law, Policy, Management and Economics | 3.0 |
| CICC5002: CYBERSECURITY LAW, POLICY, MANAGEMENT AND ECONOMICS This course explores the managerial, legal, regulatory, and policy framework of cybersecurity, cyber terrorism, cyber violent extremism and cybercrime. It provides students with a framework for understanding the myriads of laws and regulations that govern this emerging field. While the focus of the course will be on U.S. cyber law and policy, law and policy of Caribbean countries will also be addressed. It examines important management issues associated with cybersecurity in industry. It also addresses critical issues for businesses to learn about the costs and investment decisions around securing their online systems. It will provide students with the economic concepts, measurement approaches and data analytics to make better security decisions and understand the forces that shape the security decisions of other businesses, products and services. | ||
| CICC5005 | Information Security Risk, Audit and Compliance | 3.0 |
| CICC5005: INFORMATION SECURITY RISK, AUDIT AND COMPLIANCE This course provides context, best practice frameworks and practical tools to operate at the highest levels in risk management, internal audit and compliance in the corporate/government environment. It teaches students about information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. It also examines issues of compliance which is similar to security in that it drives a business to practice due diligence in the protection of its digital assets, the motive behind compliance is different: It is centered around the requirements of a third party, uch as a government, security framework or client’s contractual terms. It develops audit knowledge of security and controls to properly identify and categorise risks and achieve audit objectives. | ||
| CICC5006 | Networks and Network Security | 4.0 |
| CICC5006: NETWORKS AND NETWORK SECURITY Networking and telecommunications form a vital foundation for an organisation’s functions and strategies and new technologies have increased the importance of reliable networks. This course introduces students to important concepts in a non- technical format focusing on technology and protocols utilised by most people using the Internet. This course also introduces students to the interdisciplinary field of cybersecurity by discussing cybersecurity theory and the relationship of cybersecurity to businesses, society and people. Students will be exposed to multiple cybersecurity technologies, processes and procedures. | ||
| CICC5007 | Introduction to Computer Programming | 1.0 |
| CICC5007: INTRODUCTION TO COMPUTER PROGRAMMING This short course will give students the basic understanding and skills needed to get started in the world of cybersecurity programming, hacking and penetration testing. Students will gain foundational knowledge and skills that all programmers use whether they program mobile apps, create web pages, penetration testing or analyse data. More than just exposure to programming, they will gain a powerful set of thinking and problem-solving skills that can be applied to their lives. | ||
| CICC5008 | Essential Mathematics for Cryptography | 1.0 |
| CICC5008: ESSENTIAL MATHEMATICS FOR CRYPTOGRAPHY Math is one of the most essential skills in cryptography. However, it can be one of the most difficult for many to master. With this short mathematical course, non- technical cybersecurity professionals learn mathematics from the level they’re at. This short course covers a wide range of mathematical topics essential for public key infrastructure, cryptographic algorithms and hacking. | ||
Total Credits: 16
| COURSE CODE | COURSE TITLE | NO. OF CREDITS |
|---|---|---|
| CICC5011 | Data Protection and Privacy | 4.0 |
| CICC5011: DATA PROTECTION AND PRIVACY This course introduces privacy and data protection practices in the development, engineering, deployment and auditing of ICT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologiesandsystems. Thecourseteaches key European/US/Canada data protection laws and regulatory bodies, describing the evolution toward a harmonized legislative framework. It discusses the applications of relevant data protection laws, legal bases and compliance requirements for processing personal data in practice. The course also identifies privacy program management responsibilities and describes the role of accountability in privacy program management. It examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organisation, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. | ||
| CICC5012 | Cybercrime and Deep Web | 4.0 |
| CICC5012: CYBERCRIME AND DEEP WEB This course mainly explores technical aspects of cybercrime, Darknet and Deep Web. Deep Web – which includes dark web as a subset – is the part of the World Wide Web not indexed by the search engines like Google and Bing. The origins and extent of cybercrime and Deep Web, responses from legal systems to cyber-criminals and the social impact of cybercrimes will be addressed. Various types of cybercrimes, cyber-criminals, as well as the motivations and methods involved in cyber-offences will be studied. The etiology of cybercrimes will be analysed from cultural, subcultural, sociological and opportunity perspectives. International issues and jurisdictional challenges will be critically examined. | ||
| Students are required to choose TWO of the following courses: | ||
| CICC5015 | Cyber Ethics | 3.0 |
| CICC5015: CYBER ETHICS This course is designed to enhance students’ understanding of human behaviour in the cyber world. Consideration will be given to cultural and regulatory practices of the judicial system of societies and the global nature and impact of computer crime. The course focuses on responsible behaviour within cyberspace and the effects of irresponsible behaviour including cyberbullying, cyber stalking, plagiarism, malware use, hacking, password theft and the unauthorised downloading of materials from criminological and psychological perspectives. Emphasis will also be placed on the Ten Commandments of Computer Ethics. | ||
| CICC5016 | Psychology of Cybercrime | 3.0 |
| CICC5016: PSYCHOLOGY OF CYBERCRIME This course takes a deeper examination into the mind of criminals using scientific methods. The course introduces basic principles in criminal psychology, applied psychology, investigative psychology as well as offender profiling particularly as they relate to cybercrimes. It also looks into the impact of cybercrime on victims, punishment and preventative measures. It is designed as a MSc level course for researchers and practitioners in the disciplines of 40 criminology, cyberpsychology and forensic psychology, though it is also likely to be of significant interest to many students of information technology and other related disciplines. | ||
| CICC5017 | Violent Extremism, Terrorism and Radicalisation | 3.0 |
| CICC5017: VIOLENT EXTREMISM, TERRORISM AND RADICALIZATION This course discusses the various types of terrorism, violent extremism and elements of radicalization. It also enables the students to be able to plan, implement and evaluate appropriate counter-terrorism plans, measures to counteract violent extremism and reduce radicalization. It advocates that human rights be duly considered. As a result, a close examination of relevant legislation will be undertaken as part of the course. The course allows the students to look at existing anti-terrorism strategies, countering violent extremism policies and de-radicalization principles in other jurisdictions and determine its applicability to the local context. | ||
Total Credits: 14
| COURSE CODE | COURSE TITLE | NO. OF CREDITS |
|---|---|---|
| CICC6001 | Cybersecurity Thesis | 12.0 |
| CICC6001: CYBERSECURITY THESIS Comprehensive project culminating in a Thesis document and presentation; students undertake a major individual project which involves addressing a significant technical problem which they embark on under the guidance of one or more supervisors; students are expected to demonstrate an ability to apply structured, disciplined approaches of the curricula in addressing the solution to the problem; students produce a technical report thesis of their work together with a demonstration of the working system. | ||
Total Credits: 12
TOTAL CREDITS REQUIRED FOR COMPLETION: 42
The programme prepares graduates for employment in the following areas/industries: Banking, Government and the Public Sector, Public Utilities e.g. T&TEC, TSTT, WASA, Health, National Security, Energy Companies, any company with Internet connection.
Programme Officers/Admin Asst
Kerleen Packette: 868-642-8888 ext. 32316
Shareeba Ali-Mohammed: 868-642-8888 ext. 25114
Academic
Lisa Wharwood: 868-795-7833
Donald Walker: 868-389-2803
Elizabeth French: 868-768-7285
Emile Ramlal: 868-729-4965
Melissa Ramsubir: 868-688-9541
Sylvester Phagoo: 868-767-7786

