BSc Cyber Security

Course Overview

Our Cyber security degree combines three sought after streams of computing: networking, cyber security and digital forensics. It gives you a thorough understanding of socio-technical systems and skills to prevent or respond to cyber security incidents. And develops your ability to critically analyse and apply digital solutions to security examination and digital forensic investigations.

This includes an appreciation of tools, techniques and legal requirements. The degree programme, with its well-balanced theory and practice, has a strong technical focus. You’ll develop your understanding of how networked cyber systems function and how they might be abused.

The course centres around the relationship between technology, people, processes, the physical environment and cyber security. You’ll be able to pursue a wide array of career pathways within the public, private and charity sectors.

What you'll study

Semester I

    • Communication and Technical Writing
    • Discrete Mathematics
    • Computer System Architecture
    • Introduction to Cyber Security
    • Database Systems
    • Foundations of Intelligence

Semester II

    • Probability and Statistics
    • Cyber Laws
    • Development Studies
    • Programming Fundamentals
    • Operating Systems Concepts
    • Software Design

Semester III

    • Foundations of Mathematical Analysis
    • Routing & Switching
    • Communication Networks
    • Web Technologies
    • Security Strategies in Windows Platform
    • Research Skills for IT Professionals

Semester IV

    • Security Strategies in UNIX Platform
    • Programming in C++
    • Network Security
    • Java Programming
    • Ethical Hacking
    • Cyberwarfare
    • Industrial Practical Training

Semester V

    • IT Project Management
    • Vulnerability Analysis
    • Network Management and Administration
    • Data Structure and Algorithms
    • Wireless Networking
    • Introduction to Social Psychology

Semester VI

    • Social and Ethical Issues in Computing
    • Individual Project
    • Information Systems Security and Auditing
    • Digital Forensics
    • Cryptology and Coding Theory
    • Database Security
Entry Requirements

Holder of Ordinary Diploma (NTA Level 6) in Cyber Security, Information Technology, Computer Engineering, Computer Science , Information Technology, Computer networks, Mobile Application, Library Studies, Library and Information Sciences, Records Management, Multimedia, Business Information Technology, Electrical Engineering, Mechanical Engineering, Bio technology, Communication Systems Technology with an average of “B’’ or a minimum GPA of 3.0 or Foundation Programme of the OUT with a minimum GPA of 3.0.


Form VI with two principal passes in the following Science subjects: Physics, Chemistry, Biology, Computer Studies, Agriculture, Geography, Computer Science or Mathematics. The two principal passes MUST make an aggregate of 4.0 points as a minimum or Foundation Programme of the OUT with a minimum GPA of 3.0

What you'll experience

On this degree course, you'll:

  • Communicate ICT developments and cyber security issues effectively within and outside the organization
  • Apply mathematical skills to solve cyber security problems
  • Develop secure computer communication systems
  • Evaluate local and international legal framework related to cyber security
  • Make use of programming language skills to develop secure computer software
  • Employ cyber operation skills to defend organization digital resources.
  • Employ social psychology, digital forensics and intrusion investigation skills to address cyber security needs
  • Apply information system auditing principles, risk management skills, and fraud prevention and detection knowledge to protect organization information assets
  • Manage computer communication systems to ensure secure communication.

Careers and opportunities

Our graduates will work in roles including:

  • Cybersecurity Analyst
  • Cybersecurity Consultant
  • Information Security Officer
  • Forensic Computer Analyst
  • Information Security Analyst
  • Penetration Tester
  • Security Architect
  • Security Systems Administrator
  • IT Security Consultant

Teaching methods

Teaching methods on this course include:

  • Lectures
  • Tutorials
  • Laboratory work
  • Practical work

How you're assessed

You’ll be assessed through:

  • Classroom Test           
  • Semester examination           
  • Assignments          
  • Presentations
  • Competence Test  
  • Projects

Course costs

Registration (IAA)

TZS 20,000/=

Examination (IAA)

TZS 70,000/=

Application Form (IAA)

TZS 10,000/=

Wear and tear

TZS 20,000/=


TZS 20,000/=

Computer Lab Fee

TZS 200,000/=

Student ID

TZS 3,000/=

  • EAC students – $700 per year
  • SADC students – $750 per year
  • Other students – $780 per year

How to Apply

Institute of Accountancy Arusha admission cycles are normally guided by two regulatory authorities which are The National Council for Technical Education (NACTE) and The Tanzania Commission for Universities (TCU). If you apply to IAA, you will be following provisions as set forth by the mentioned authorities.

Different programmes have different entry requirements. You can visit our programme page to see entry requirement for different programmes or be sure to read thoroughly the TCU admission guide book and the NACTE admission guide book.

We consider each applicant and put enormous care into evaluating every application. We hope you will explore the information in this section to understand what we look for in our admissions process.

  • Fee 1,500,000/=
  • Duration 3 Years
  • Language English
  • Mode of Study Full Time
  • Intakes October