Program Description

The global demand for cybersecurity experts is growing as threat actors try to infiltrate and compromise enterprise networks. The Bachelor of Science in Cybersecurity program is designed specifically for students interested in entering the high-demand field of cybersecurity. The program will prepare students to develop a deeper understanding of current information and system protection technology and methods. Two options are available for the students in taking the course. The first option is a three-year undergraduate course with a two-year graduate school undertaking for a total of five years. And the second option is to finish it as a four-year undergraduate course.

Under the guidance of faculty with field experience, our graduates will be prepared to tackle issues in the real world and create and implement effective security measures that protect the security of the IT infrastructure. Students will acquire a firm foundation in traditional computer and network security concepts and techniques. Additionally, the course is designed to address the evolving landscape of secure computing, which now encompasses computers and network-enabled devices such as smartphones, tablet computers, and the Internet of Things (IoT).

Program Educational Objectives (PEOs)

The BSCS program aligns with Institution's desire to transform students with persons of conscience, compassion, and competence. It strengthens its multi-disciplinary approach by offering common courses that broaden students’ knowledge to different field of Information Technology by implementing the PEOs which are:

  • Actively participating in the production and utilization of innovative computing systems and applications that adhere to ethical and professional standards (Competence and Conscience);
  • Practicing of community service and development in both professional and personal levels; and (Compassion)
  • Promoting and pursuing lifelong learning. (Competence)

Program Outcomes

The POs are anchored and aligned in the stipulated Graduate Outcomes based on CMO No. 25 Series of 2015 which are as follows:

  1. Apply knowledge of computing, science, and mathematics appropriate to the discipline.
  2. Analyze problems, and identify and define the computing requirements appropriate to its solution, especially in the context of cybersecurity threats and defense.
  3. Design, implement, and evaluate secure computing-based solutions to meet desired needs.
  4. Use current techniques, skills, and tools necessary for secure computing practices.
  5. Apply security principles and practices to maintain operations in the presence of risks and threats.
  6. Function effectively on teams to accomplish a common cybersecurity goal.
  7. Understand professional, ethical, legal, security, and social issues and responsibilities.
  8. Communicate effectively with a range of audiences.
  9. Analyze the local and global impact of computing and cybersecurity solutions on individuals, organizations, and society.
  10. Recognize the need for and engage in continuing professional development.
  11. Conduct digital forensics investigations, vulnerability assessments, and penetration testing in line with professional standards.
  12. Demonstrate leadership, innovation, and entrepreneurial skills in cybersecurity-related activities and endeavors.

Institutional Student Learning Outcomes (ISLOs)

The following 7 proficiencies shall be the foundation of the HAU educational experience and shall serve as general student learning outcomes in broad and integrative knowledge in all degree programs.

  1. Communication
  2. Valuing and Ethical Reasoning
  3. Critical and Creative Thinking
  4. Civic and Global Learning
  5. Applied and Collaborative Learning
  6. Aesthetic Engagement
  7. Information and Communication Technology (ICT) Literacy

Program Structure

Program Structure

S.Y. 2022-2023

S.Y. 2020-2021

List of Job Opportunities for Cybersecurity:

  1. Cybersecurity Analyst
  2. Information Security Officer
  3. Security Operations Center (SOC) Analyst
  4. Penetration Tester / Ethical Hacker
  5. Incident Response Specialist
  6. Network Security Engineer
  7. Security Auditor / Compliance Analyst
  8. Malware Analyst
  9. Digital Forensics Specialist
  10. Vulnerability Analyst
  11. Risk Management Specialist
  12. Cloud Security Engineer
  13. Security Consultant
  14. IAM (Identity & Access Management) Specialist

Admission Policies

View Admission Policies

Retention Policy

View Retention Policy