Program Description

The global demand for cybersecurity experts is growing as threat actors try to infiltrate and compromise enterprise networks. The Bachelor of Science in Cybersecurity program is designed specifically for students interested in entering the high-demand field of cybersecurity. The program will prepare students to develop a deeper understanding of current information and system protection technology and methods. Two options are available for the students in taking the course. The first option is a three-year undergraduate course with a two-year graduate school undertaking for a total of five years. And the second option is to finish it as a four-year undergraduate course.

Under the guidance of faculty with field experience, our graduates will be prepared to tackle issues in the real world and create and implement effective security measures that protect the security of the IT infrastructure. Students will acquire a firm foundation in traditional computer and network security concepts and techniques. Additionally, the course is designed to address the evolving landscape of secure computing, which now encompasses computers and network-enabled devices such as smartphones, tablet computers, and the Internet of Things (IoT).

Program Educational Objectives (PEOs)

The BSCS program aligns with Institution's desire to transform students with persons of conscience, compassion, and competence. It strengthens its multi-disciplinary approach by offering common courses that broaden students’ knowledge to different field of Information Technology by implementing the PEOs which are:

  • Actively participating in the production and utilization of innovative computing systems and applications that adhere to ethical and professional standards (Competence and Conscience);
  • Practicing of community service and development in both professional and personal levels; and (Compassion)
  • Promoting and pursuing lifelong learning. (Competence)

Program Learning Outcomes

Program Learning Outcomes

The PLOs are anchored and aligned in the stipulated Graduate Outcomes based on CMO No. 25 Series of 2015 which are as follows:

  • Apply knowledge of computing fundamentals, knowledge of a computing specialization, and mathematics, science, and domain knowledge appropriate for the computing specialization to the abstraction and conceptualization of computing models from defined problems and requirements.
  • Formulate research literature to solve complex computing problems reaching substantiated conclusions using fundamental principles of mathematics, computing sciences, and relevant domain disciplines
  • Apply mathematical foundations, algorithmic principles and computer science theory in the modeling and design of computer-based systems in a way that demonstrates comprehension of the tradeoffs involved in design choices
  • Describe information security issues in relation to the design, development and use of information systems
  • Design solutions for complex computing problems, and evaluate systems, components, or processes that meet specified needs with appropriate consideration for public health and sale, cultural, societal, and environmental considerations.
  • Create appropriate techniques, resources and modern computing tools to complex computing activities, with an understanding of the limitations to accomplish a common goal .
  • Function effectively as an individual and as a member or leader in diverse teams and in multidisciplinary settings.
  • Communicate effectively with the computing community and with society at large about complex computing activities by being able to comprehend and write effective reports, design documentation, make effective presentations, and give clear instructions.
  • Recognize the legal, social, ethical, and professional issues involved in the utilization of computer technology and be guided by the adoption of appropriate professional, ethical and legal practices.
  • Recognize the need, and have the ability, to engage in independent learning for continual development as a computing professional.
  • Synthesize their research, academic and professional interest, and aspirations to determine its relevance to their courses and computing professional future.

Institutional Student Learning Outcomes (ISLOs)

The following 7 proficiencies shall be the foundation of the HAU educational experience and shall serve as general student learning outcomes in broad and integrative knowledge in all degree programs.

  1. Communication
  2. Valuing and Ethical Reasoning
  3. Critical and Creative Thinking
  4. Civic and Global Learning
  5. Applied and Collaborative Learning
  6. Aesthetic Engagement
  7. Information and Communication Technology (ICT) Literacy

Program Structure

Program Structure

S.Y. 2022-2023

S.Y. 2020-2021

Career Opportunities:

Primary Job Roles:

  • Cyber Security Specialist
  • Ethical Hackers
  • Incident Responder
  • Penetration Tester
  • Vulnerability Assessor
  • Security Manager
  • Security Architect
  • Security Analyst
  • Security Auditor
  • Security Engineer

Secondary Job Roles:

  • Network Administrator
  • Computer Programmer / Developer
  • Compliance Officer

Admission Policies

View Admission Policies

Retention Policy

View Retention Policy