Undergraduate ProgrammesBSc Information Security ̵...
Teaching Method
80% Practical training
BSc Information Security - 4 Years
It involves the protection of sensitive data and systems from unauthorized access, disclosure, disruption, modification, or destruction.
It encompasses a range of practices, technologies, and policies designed to safeguard information and ensure data confidentiality, integrity, and availability in various digital environments.
Admission Deadline
SESSION 1
Admission Open – First Week of November
Admission Closes – Last Week of March
SESSION 2
Admission Open – First Week of April
Admission Closes – Last Week of July
Syllabus & Requirements
Syllabus
Download PDF – Click here
Admission requirements
- WASSCE or SSSCE or GBCE or HND or MATURE or GCE or Baccalaureate or Undergraduates or Graduates
Download PDF – Click here
Duration and Fees
Tuition Fees –
Ghanaian – GHC 4,000 per semester
Non – Ghanaian – GHC 9,500 per semester
Duration – 4 years (8 semesters)
Admission Process
Step 1 – Register at campus or To Register Online – Click Here
Step 2 – Pay at least a 50% Course Fee to complete your admission Pay at Campus or Online – Click here
Hostel and Accomodation
Hostel facilities are available
Hostel Fees – click here
Our hostels are clean and hygenic
Job Opportunities
Security Analyst
- Job Role: Monitor and protect organizational information systems.
- Job Description: Detects, investigates, and responds to security breaches, implementing preventive measures to safeguard data and infrastructure.
- Average Salary: GHS 6,000 – 12,000/month
Network Security Engineer
- Job Role: Design and secure computer networks.
- Job Description: Implements firewalls, VPNs, and intrusion detection systems to defend against cyber threats and network attacks.
- Average Salary: GHS 7,000 – 14,000/month
Penetration Tester (Ethical Hacker)
- Job Role: Test and identify vulnerabilities in systems.
- Job Description: Conducts authorized simulated cyberattacks to uncover weaknesses and recommends corrective measures.
- Average Salary: GHS 8,000 – 16,000/month
Security Consultant
- Job Role: Advise organizations on cybersecurity strategy.
- Job Description: Assesses security risks, designs policies, and guides companies in improving their security posture.
- Average Salary: GHS 8,000 – 15,000/month
Incident Responder
- Job Role: Investigate and mitigate cyber incidents.
- Job Description: Responds to security breaches, performs forensic analysis, and implements strategies to prevent recurrence.
- Average Salary: GHS 7,000 – 13,000/month
Security Software Developer
- Job Role: Develop secure software and tools.
- Job Description: Builds applications and scripts designed to detect, prevent, and resolve security vulnerabilities.
- Average Salary: GHS 7,000 – 14,000/month
Security Compliance Analyst
- Job Role: Ensure adherence to security standards and laws.
- Job Description: Conducts audits and ensures compliance with ISO, GDPR, and other cybersecurity frameworks.
- Average Salary: GHS 6,000 – 11,000/month
Security Operations Center (SOC) Analyst
- Job Role: Monitor real-time security events.
- Job Description: Analyzes security alerts, investigates potential threats, and coordinates response actions in a 24/7 SOC environment.
- Average Salary: GHS 6,000 – 12,000/month
and more
FAQ related to BSc Information Security
1. How to apply for BSc IS at SIIMT? ▼
To apply for BSc IS at SIIMT, click here. Follow the registration process on the provided page to start your journey in
SIIMT - BSc Information Security
2. What are the 4 types of Info. Security? ▼
The four types of information security are physical security, network security, application security, and data security. Each type focuses on protecting specific aspects of information and technology systems.
Tutorialspoint - Types of InfoSec
3. What is the main purpose of Info. Security? ▼
The main purpose is to safeguard sensitive data and information from unauthorized access, disclosure, alteration, and destruction. It ensures the confidentiality, integrity, and availability of information.
SearchSecurity - Information Security
4. What is an example of Info. Sec? ▼
An example of Info Sec is the use of encryption to protect confidential data during transmission. Encryption converts data into a secure format that can only be decoded by authorized individuals with the appropriate decryption key.
Cisco - Information Security Examples
5. What is the difference between cybersecurity and information security? ▼
While often used interchangeably, cybersecurity is a subset of information security. Information security encompasses the protection of all types of data, while cybersecurity specifically focuses on safeguarding digital information from cyber threats.
Forcepoint - Cybersecurity vs Information Security
Embark on a transformative journey at SIIMT University College for an empowering BSc in Information Security!
WHY CHOOSE US?
Practical Training
Bridging knowledge with experience, shaping skills, and preparing for real-world success
Industry Experts
Students learn from industry experts, shaping skills for real-world success and job market.
Updated Syllabus
Our syllabus enriches learning, fostering skills, and prepares students for a brighter future
Table of Contents
Toggle
